View | Details | Raw Unified | Return to bug 272685 | Differences between
and this patch

Collapse All | Expand All

(-)b/security/vuxml/vuln/2020.xml (-20 / +20 lines)
Lines 465-472 Link Here
465
    <affects>
465
    <affects>
466
      <package>
466
      <package>
467
	<name>glpi</name>
467
	<name>glpi</name>
468
	<range><gt>9.5.0</gt></range>
468
	<range><ge>9.5.0</ge><lt>9.5.3</lt></range>
469
	<range><lt>9.5.3</lt></range>
470
      </package>
469
      </package>
471
    </affects>
470
    </affects>
472
    <description>
471
    <description>
Lines 486-491 Link Here
486
    <dates>
485
    <dates>
487
      <discovery>2020-10-01</discovery>
486
      <discovery>2020-10-01</discovery>
488
      <entry>2020-10-01</entry>
487
      <entry>2020-10-01</entry>
488
      <modified>2023-10-11</modified>
489
    </dates>
489
    </dates>
490
  </vuln>
490
  </vuln>
491
491
Lines 494-501 Link Here
494
    <affects>
494
    <affects>
495
      <package>
495
      <package>
496
	<name>glpi</name>
496
	<name>glpi</name>
497
	<range><gt>9.1</gt></range>
497
	<range><ge>9.1</ge><lt>9.5.2</lt></range>
498
	<range><lt>9.5.2</lt></range>
499
      </package>
498
      </package>
500
    </affects>
499
    </affects>
501
    <description>
500
    <description>
Lines 514-519 Link Here
514
    <dates>
513
    <dates>
515
      <discovery>2020-06-25</discovery>
514
      <discovery>2020-06-25</discovery>
516
      <entry>2020-06-25</entry>
515
      <entry>2020-06-25</entry>
516
      <modified>2023-10-11</modified>
517
    </dates>
517
    </dates>
518
  </vuln>
518
  </vuln>
519
519
Lines 522-529 Link Here
522
    <affects>
522
    <affects>
523
      <package>
523
      <package>
524
	<name>glpi</name>
524
	<name>glpi</name>
525
	<range><gt>9.5.0</gt></range>
525
	<range><ge>9.5.0</ge><lt>9.5.2</lt></range>
526
	<range><lt>9.5.2</lt></range>
527
      </package>
526
      </package>
528
    </affects>
527
    </affects>
529
    <description>
528
    <description>
Lines 542-547 Link Here
542
    <dates>
541
    <dates>
543
      <discovery>2020-06-25</discovery>
542
      <discovery>2020-06-25</discovery>
544
      <entry>2020-06-25</entry>
543
      <entry>2020-06-25</entry>
544
      <modified>2023-10-11</modified>
545
    </dates>
545
    </dates>
546
  </vuln>
546
  </vuln>
547
547
Lines 550-557 Link Here
550
    <affects>
550
    <affects>
551
      <package>
551
      <package>
552
	<name>glpi</name>
552
	<name>glpi</name>
553
	<range><gt>0.65</gt></range>
553
	<range><ge>0.65</ge><lt>9.5.2</lt></range>
554
	<range><lt>9.5.2</lt></range>
555
      </package>
554
      </package>
556
    </affects>
555
    </affects>
557
    <description>
556
    <description>
Lines 570-575 Link Here
570
    <dates>
569
    <dates>
571
      <discovery>2020-06-25</discovery>
570
      <discovery>2020-06-25</discovery>
572
      <entry>2020-06-25</entry>
571
      <entry>2020-06-25</entry>
572
      <modified>2023-10-11</modified>
573
    </dates>
573
    </dates>
574
  </vuln>
574
  </vuln>
575
575
Lines 578-585 Link Here
578
    <affects>
578
    <affects>
579
      <package>
579
      <package>
580
	<name>glpi</name>
580
	<name>glpi</name>
581
	<range><gt>0.68</gt></range>
581
	<range><ge>0.68</ge><lt>9.5.2</lt></range>
582
	<range><lt>9.5.2</lt></range>
583
      </package>
582
      </package>
584
    </affects>
583
    </affects>
585
    <description>
584
    <description>
Lines 598-603 Link Here
598
    <dates>
597
    <dates>
599
      <discovery>2020-06-25</discovery>
598
      <discovery>2020-06-25</discovery>
600
      <entry>2020-06-25</entry>
599
      <entry>2020-06-25</entry>
600
      <modified>2023-10-11</modified>
601
    </dates>
601
    </dates>
602
  </vuln>
602
  </vuln>
603
603
Lines 606-613 Link Here
606
    <affects>
606
    <affects>
607
      <package>
607
      <package>
608
	<name>glpi</name>
608
	<name>glpi</name>
609
	<range><gt>0.70</gt></range>
609
	<range><ge>0.70</ge><lt>9.5.2</lt></range>
610
	<range><lt>9.5.2</lt></range>
611
      </package>
610
      </package>
612
    </affects>
611
    </affects>
613
    <description>
612
    <description>
Lines 626-631 Link Here
626
    <dates>
625
    <dates>
627
      <discovery>2020-06-25</discovery>
626
      <discovery>2020-06-25</discovery>
628
      <entry>2020-06-25</entry>
627
      <entry>2020-06-25</entry>
628
      <modified>2023-10-11</modified>
629
    </dates>
629
    </dates>
630
  </vuln>
630
  </vuln>
631
631
Lines 634-641 Link Here
634
    <affects>
634
    <affects>
635
      <package>
635
      <package>
636
	<name>glpi</name>
636
	<name>glpi</name>
637
	<range><gt>9.5.0</gt></range>
637
	<range><ge>9.5.0</ge><lt>9.5.1</lt></range>
638
	<range><lt>9.5.1</lt></range>
639
      </package>
638
      </package>
640
    </affects>
639
    </affects>
641
    <description>
640
    <description>
Lines 655-660 Link Here
655
    <dates>
654
    <dates>
656
      <discovery>2020-06-25</discovery>
655
      <discovery>2020-06-25</discovery>
657
      <entry>2020-06-25</entry>
656
      <entry>2020-06-25</entry>
657
      <modified>2023-10-11</modified>
658
    </dates>
658
    </dates>
659
  </vuln>
659
  </vuln>
660
660
Lines 663-670 Link Here
663
    <affects>
663
    <affects>
664
      <package>
664
      <package>
665
	<name>glpi</name>
665
	<name>glpi</name>
666
	<range><gt>0.68.1</gt></range>
666
	<range><ge>0.68.1</ge><lt>9.4.6</lt></range>
667
	<range><lt>9.4.6</lt></range>
668
      </package>
667
      </package>
669
    </affects>
668
    </affects>
670
    <description>
669
    <description>
Lines 683-688 Link Here
683
    <dates>
682
    <dates>
684
      <discovery>2020-03-30</discovery>
683
      <discovery>2020-03-30</discovery>
685
      <entry>2020-03-30</entry>
684
      <entry>2020-03-30</entry>
685
      <modified>2023-10-11</modified>
686
    </dates>
686
    </dates>
687
  </vuln>
687
  </vuln>
688
688
Lines 746-753 Link Here
746
    <affects>
746
    <affects>
747
      <package>
747
      <package>
748
	<name>glpi</name>
748
	<name>glpi</name>
749
	<range><gt>0.83.3</gt></range>
749
	<range><ge>0.83.3</ge><lt>9.4.6</lt></range>
750
	<range><lt>9.4.6</lt></range>
751
      </package>
750
      </package>
752
    </affects>
751
    </affects>
753
    <description>
752
    <description>
Lines 767-772 Link Here
767
    <dates>
766
    <dates>
768
      <discovery>2020-03-30</discovery>
767
      <discovery>2020-03-30</discovery>
769
      <entry>2020-03-30</entry>
768
      <entry>2020-03-30</entry>
769
      <modified>2023-10-11</modified>
770
    </dates>
770
    </dates>
771
  </vuln>
771
  </vuln>
772
772
Lines 803-810 Link Here
803
    <affects>
803
    <affects>
804
      <package>
804
      <package>
805
	<name>glpi</name>
805
	<name>glpi</name>
806
	<range><gt>9.1</gt></range>
806
	<range><ge>9.1</ge><lt>9.4.6</lt></range>
807
	<range><lt>9.4.6</lt></range>
808
      </package>
807
      </package>
809
    </affects>
808
    </affects>
810
    <description>
809
    <description>
Lines 824-829 Link Here
824
    <dates>
823
    <dates>
825
      <discovery>2020-03-30</discovery>
824
      <discovery>2020-03-30</discovery>
826
      <entry>2020-03-30</entry>
825
      <entry>2020-03-30</entry>
826
      <modified>2023-10-11</modified>
827
    </dates>
827
    </dates>
828
  </vuln>
828
  </vuln>
829
829
(-)b/security/vuxml/vuln/2023.xml (+555 lines)
Lines 1-3 Link Here
1
  <vuln vid="10e86b16-6836-11ee-b06f-0050569ceb3a">
2
    <topic>Unallowed PHP script execution in GLPI</topic>
3
    <affects>
4
      <package>
5
	<name>glpi</name>
6
	<range><lt>10.0.10</lt></range>
7
      </package>
8
    </affects>
9
    <description>
10
	<body xmlns="http://www.w3.org/1999/xhtml">
11
	<p>From the GLPI 10.0.10 Changelog:</p>
12
	<blockquote
13
	cite="https://github.com/glpi-project/glpi/releases/tag/10.0.10">
14
	<p>You will find below security issues fixed in this bugfixes version:
15
	[SECURITY - Critical] Unallowed PHP script execution (CVE-2023-42802).</p>
16
	</blockquote>
17
	<p>The mentioned CVE is invalid</p>
18
	</body>
19
    </description>
20
    <references>
21
      <cvename>CVE-2023-42802</cvename>
22
      <url>https://github.com/glpi-project/glpi/releases/tag/10.0.10</url>
23
    </references>
24
    <dates>
25
      <discovery>2023-09-27</discovery>
26
      <entry>2023-10-11</entry>
27
    </dates>
28
  </vuln>
29
30
  <vuln vid="894f2491-6834-11ee-b06f-0050569ceb3a">
31
    <topic>glpi-project -- SQL injection in ITIL actors in GLPI</topic>
32
    <affects>
33
      <package>
34
	<name>glpi</name>
35
	<range><ge>10.0.8</ge><lt>10.0.10</lt></range>
36
      </package>
37
    </affects>
38
    <description>
39
	<body xmlns="http://www.w3.org/1999/xhtml">
40
	<p>security-advisories@github.com reports:</p>
41
	<blockquote cite="https://github.com/glpi-project/glpi/security/advisories/GHSA-x3jp-69f2-p84w">
42
	  <p>GLPI stands for Gestionnaire Libre de Parc Informatique is a Free
43
	Asset and IT Management Software package, that provides ITIL Service
44
	Desk features, licenses tracking and software auditing.  The ITIL
45
	actors input field from the Ticket form can be used to perform a
46
	SQL injection.  Users are advised to upgrade to version 10.0.10.
47
	There are no known workarounds for this vulnerability.</p>
48
	</blockquote>
49
	</body>
50
    </description>
51
    <references>
52
      <cvename>CVE-2023-42461</cvename>
53
      <url>https://nvd.nist.gov/vuln/detail/CVE-2023-42461</url>
54
    </references>
55
    <dates>
56
      <discovery>2023-09-27</discovery>
57
      <entry>2023-10-11</entry>
58
    </dates>
59
  </vuln>
60
61
  <vuln vid="54e5573a-6834-11ee-b06f-0050569ceb3a">
62
    <topic>Phishing through a login page malicious URL in GLPI</topic>
63
    <affects>
64
      <package>
65
	<name>glpi</name>
66
	<range><ge>10.0.8</ge><lt>10.0.10</lt></range>
67
      </package>
68
    </affects>
69
    <description>
70
	<body xmlns="http://www.w3.org/1999/xhtml">
71
	<p>security-advisories@github.com reports:</p>
72
	<blockquote cite="https://github.com/glpi-project/glpi/security/advisories/GHSA-2hcg-75jj-hghp">
73
	  <p>GLPI stands for Gestionnaire Libre de Parc Informatique is a Free
74
	Asset and IT Management Software package, that provides ITIL Service
75
	Desk features, licenses tracking and software auditing.  The lack
76
	of path filtering on the GLPI URL may allow an attacker to transmit
77
	a malicious URL of login page that can be used to attempt a phishing
78
	attack on user credentials.  Users are advised to upgrade to version
79
	10.0.10.  There are no known workarounds for this vulnerability.</p>
80
	</blockquote>
81
	</body>
82
    </description>
83
    <references>
84
      <cvename>CVE-2023-41888</cvename>
85
      <url>https://nvd.nist.gov/vuln/detail/CVE-2023-41888</url>
86
    </references>
87
    <dates>
88
      <discovery>2023-09-27</discovery>
89
      <entry>2023-10-11</entry>
90
    </dates>
91
  </vuln>
92
93
  <vuln vid="20302cbc-6834-11ee-b06f-0050569ceb3a">
94
    <topic>Users login enumeration by unauthenticated user in GLPI</topic>
95
    <affects>
96
      <package>
97
	<name>glpi</name>
98
	<range><ge>0.68</ge><lt>10.0.10</lt></range>
99
      </package>
100
    </affects>
101
    <description>
102
	<body xmlns="http://www.w3.org/1999/xhtml">
103
	<p>security-advisories@github.com reports:</p>
104
	<blockquote cite="https://github.com/glpi-project/glpi/security/advisories/GHSA-5cf4-6q6r-49x9">
105
	  <p>GLPI stands for Gestionnaire Libre de Parc Informatique is a Free
106
	Asset and IT Management Software package, that provides ITIL Service
107
	Desk features, licenses tracking and software auditing.  An
108
	unauthenticated user can enumerate users logins.  Users are advised
109
	to upgrade to version 10.0.10.  There are no known workarounds for
110
	this vulnerability.</p>
111
	</blockquote>
112
	</body>
113
    </description>
114
    <references>
115
      <cvename>CVE-2023-41323</cvename>
116
      <url>https://nvd.nist.gov/vuln/detail/CVE-2023-41323</url>
117
    </references>
118
    <dates>
119
      <discovery>2023-09-27</discovery>
120
      <entry>2023-10-11</entry>
121
    </dates>
122
  </vuln>
123
124
  <vuln vid="ae8b1445-6833-11ee-b06f-0050569ceb3a">
125
    <topic>Privilege Escalation from technician to super-admin in GLPI</topic>
126
    <affects>
127
      <package>
128
	<name>glpi</name>
129
	<range><ge>9.1.0</ge><lt>10.0.10</lt></range>
130
      </package>
131
    </affects>
132
    <description>
133
	<body xmlns="http://www.w3.org/1999/xhtml">
134
	<p>security-advisories@github.com reports:</p>
135
	<blockquote cite="https://github.com/glpi-project/glpi/security/advisories/GHSA-9j8m-7563-8xvr">
136
	  <p>GLPI stands for Gestionnaire Libre de Parc Informatique is a Free
137
	Asset and IT Management Software package, that provides ITIL Service
138
	Desk features, licenses tracking and software auditing.  A user
139
	with write access to another user can make requests to change the
140
	latter&apos;s password and then take control of their account.
141
	Users are advised to upgrade to version 10.0.10.  There are no known
142
	work around for this vulnerability.</p>
143
	</blockquote>
144
	</body>
145
    </description>
146
    <references>
147
      <cvename>CVE-2023-41322</cvename>
148
      <url>https://nvd.nist.gov/vuln/detail/CVE-2023-41322</url>
149
    </references>
150
    <dates>
151
      <discovery>2023-09-27</discovery>
152
      <entry>2023-10-11</entry>
153
    </dates>
154
  </vuln>
155
156
  <vuln vid="6851f3bb-6833-11ee-b06f-0050569ceb3a">
157
    <topic>Sensitive fields enumeration through API in GLPI</topic>
158
    <affects>
159
      <package>
160
	<name>glpi</name>
161
	<range><ge>9.1.1</ge><lt>10.0.10</lt></range>
162
      </package>
163
    </affects>
164
    <description>
165
	<body xmlns="http://www.w3.org/1999/xhtml">
166
	<p>security-advisories@github.com reports:</p>
167
	<blockquote cite="https://github.com/glpi-project/glpi/security/advisories/GHSA-3fxw-j5rj-w836">
168
	  <p>GLPI stands for Gestionnaire Libre de Parc Informatique is a Free
169
	Asset and IT Management Software package, that provides ITIL Service
170
	Desk features, licenses tracking and software auditing.  An API
171
	user can enumerate sensitive fields values on resources on which
172
	he has read access.  Users are advised to upgrade to version 10.0.10.
173
	There are no known workarounds for this vulnerability.</p>
174
	</blockquote>
175
	</body>
176
    </description>
177
    <references>
178
      <cvename>CVE-2023-41321</cvename>
179
      <url>https://nvd.nist.gov/vuln/detail/CVE-2023-41321</url>
180
    </references>
181
    <dates>
182
      <discovery>2023-09-27</discovery>
183
      <entry>2023-10-11</entry>
184
    </dates>
185
  </vuln>
186
187
  <vuln vid="df71f5aa-6831-11ee-b06f-0050569ceb3a">
188
    <topic>File deletion through document upload process in GLPI</topic>
189
    <affects>
190
      <package>
191
	<name>glpi</name>
192
	<range><ge>10.0.0</ge><lt>10.0.10</lt></range>
193
      </package>
194
    </affects>
195
    <description>
196
	<body xmlns="http://www.w3.org/1999/xhtml">
197
	<p>security-advisories@github.com reports:</p>
198
	<blockquote cite="https://github.com/glpi-project/glpi/security/advisories/GHSA-hm76-jh96-7j75">
199
	  <p>GLPI stands for Gestionnaire Libre de Parc Informatique is a Free
200
	Asset and IT Management Software package, that provides ITIL Service
201
	Desk features, licenses tracking and software auditing.  The document
202
	upload process can be diverted to delete some files.  Users are
203
	advised to upgrade to version 10.0.10.  There are no known workarounds
204
	for this vulnerability.</p>
205
	</blockquote>
206
	</body>
207
    </description>
208
    <references>
209
      <cvename>CVE-2023-42462</cvename>
210
      <url>https://nvd.nist.gov/vuln/detail/CVE-2023-42462</url>
211
    </references>
212
    <dates>
213
      <discovery>2023-09-27</discovery>
214
      <entry>2023-10-11</entry>
215
    </dates>
216
  </vuln>
217
218
  <vuln vid="95c4ec45-6831-11ee-b06f-0050569ceb3a">
219
    <topic>Account takeover through API in GLPI</topic>
220
    <affects>
221
      <package>
222
	<name>glpi</name>
223
	<range><ge>9.3.0</ge><lt>10.0.10</lt></range>
224
      </package>
225
    </affects>
226
    <description>
227
	<body xmlns="http://www.w3.org/1999/xhtml">
228
	<p>security-advisories@github.com reports:</p>
229
	<blockquote cite="https://github.com/glpi-project/glpi/security/advisories/GHSA-58wj-8jhx-jpm3">
230
	  <p>GLPI stands for Gestionnaire Libre de Parc Informatique is a Free
231
	Asset and IT Management Software package, that provides ITIL Service
232
	Desk features, licenses tracking and software auditing.  An API
233
	user that have read access on users resource can steal accounts of
234
	other users.  Users are advised to upgrade to version 10.0.10.
235
	There are no known workarounds for this vulnerability.</p>
236
	</blockquote>
237
	</body>
238
    </description>
239
    <references>
240
      <cvename>CVE-2023-41324</cvename>
241
      <url>https://nvd.nist.gov/vuln/detail/CVE-2023-41324</url>
242
    </references>
243
    <dates>
244
      <discovery>2023-09-27</discovery>
245
      <entry>2023-10-11</entry>
246
    </dates>
247
  </vuln>
248
249
  <vuln vid="040e69f1-6831-11ee-b06f-0050569ceb3a">
250
    <topic>Account takeover via Kanban feature in GLPI</topic>
251
    <affects>
252
      <package>
253
	<name>glpi</name>
254
	<range><ge>9.5.0</ge><lt>10.0.10</lt></range>
255
      </package>
256
    </affects>
257
    <description>
258
	<body xmlns="http://www.w3.org/1999/xhtml">
259
	<p>security-advisories@github.com reports:</p>
260
	<blockquote cite="https://github.com/glpi-project/glpi/security/advisories/GHSA-5wj6-hp4c-j5q9">
261
	  <p>GLPI stands for Gestionnaire Libre de Parc Informatique is a Free
262
	Asset and IT Management Software package, that provides ITIL Service
263
	Desk features, licenses tracking and software auditing.  A logged
264
	user from any profile can hijack the Kanban feature to alter any
265
	user field, and end-up with stealing its account.  Users are advised
266
	to upgrade to version 10.0.10.  There are no known workarounds for
267
	this vulnerability.</p>
268
	</blockquote>
269
	</body>
270
    </description>
271
    <references>
272
      <cvename>CVE-2023-41326</cvename>
273
      <url>https://nvd.nist.gov/vuln/detail/CVE-2023-41326</url>
274
    </references>
275
    <dates>
276
      <discovery>2023-09-27</discovery>
277
      <entry>2023-10-11</entry>
278
    </dates>
279
  </vuln>
280
281
  <vuln vid="6f6518ab-6830-11ee-b06f-0050569ceb3a">
282
    <topic>Account takeover via SQL Injection in UI layout preferences in GLPI</topic>
283
    <affects>
284
      <package>
285
	<name>glpi</name>
286
	<range><ge>10.0.0</ge><lt>10.0.10</lt></range>
287
      </package>
288
    </affects>
289
    <description>
290
	<body xmlns="http://www.w3.org/1999/xhtml">
291
	<p>security-advisories@github.com reports:</p>
292
	<blockquote cite="https://github.com/glpi-project/glpi/security/advisories/GHSA-mv2r-gpw3-g476">
293
	  <p>GLPI stands for Gestionnaire Libre de Parc Informatique is a Free
294
	Asset and IT Management Software package, that provides ITIL Service
295
	Desk features, licenses tracking and software auditing.  UI layout
296
	preferences management can be hijacked to lead to SQL injection.
297
	This injection can be use to takeover an administrator account.
298
	Users are advised to upgrade to version 10.0.10.  There are no known
299
	workarounds for this vulnerability.</p>
300
	</blockquote>
301
	</body>
302
    </description>
303
    <references>
304
      <cvename>CVE-2023-41320</cvename>
305
      <url>https://nvd.nist.gov/vuln/detail/CVE-2023-41320</url>
306
    </references>
307
    <dates>
308
      <discovery>2023-09-27</discovery>
309
      <entry>2023-10-11</entry>
310
    </dates>
311
  </vuln>
312
313
  <vuln vid="257e1bf0-682f-11ee-b06f-0050569ceb3a">
314
    <topic>GLPI vulnerable to SQL injection via dashboard administration</topic>
315
    <affects>
316
      <package>
317
	<name>glpi</name>
318
	<range><ge>9.5.0</ge><lt>10.0.9</lt></range>
319
      </package>
320
    </affects>
321
    <description>
322
	<body xmlns="http://www.w3.org/1999/xhtml">
323
	<p>security-advisories@github.com reports:</p>
324
	<blockquote cite="https://github.com/glpi-project/glpi/releases/tag/10.0.9">
325
	  <p>GLPI is a Free Asset and IT Management Software package, Data center
326
	management, ITIL Service Desk, licenses tracking and software
327
	auditing.  An administrator can trigger SQL injection via dashboards
328
	administration.  This vulnerability has been patched in version
329
	10.0.9.
330
	</p>
331
	</blockquote>
332
	</body>
333
    </description>
334
    <references>
335
      <cvename>CVE-2023-37278</cvename>
336
      <url>https://nvd.nist.gov/vuln/detail/CVE-2023-37278</url>
337
    </references>
338
    <dates>
339
      <discovery>2023-07-13</discovery>
340
      <entry>2023-10-11</entry>
341
    </dates>
342
  </vuln>
343
344
  <vuln vid="40173815-6827-11ee-b06f-0050569ceb3a">
345
    <topic>GLPI vulnerable to unauthorized access to User data</topic>
346
    <affects>
347
      <package>
348
	<name>glpi</name>
349
	<range><ge>0.68</ge><lt>10.0.8</lt></range>
350
      </package>
351
    </affects>
352
    <description>
353
	<body xmlns="http://www.w3.org/1999/xhtml">
354
	<p>security-advisories@github.com reports:</p>
355
	<blockquote cite="https://github.com/glpi-project/glpi/releases/tag/10.0.8">
356
	  <p>GLPI is a free asset and IT management software package.  Versions
357
	of the software starting with 0.68 and prior to 10.0.8 have an
358
	incorrect rights check on a on a file accessible by an authenticated
359
	user.  This allows access to the list of all users and their personal
360
	information.  Users should upgrade to version 10.0.8 to receive a
361
	patch.</p>
362
	</blockquote>
363
	</body>
364
    </description>
365
    <references>
366
      <cvename>CVE-2023-34106</cvename>
367
      <url>https://nvd.nist.gov/vuln/detail/CVE-2023-34106</url>
368
    </references>
369
    <dates>
370
      <discovery>2023-07-05</discovery>
371
      <entry>2023-10-11</entry>
372
    </dates>
373
  </vuln>
374
375
  <vuln vid="1fe40200-6823-11ee-b06f-0050569ceb3a">
376
    <topic>GLPI vulnerable to unauthorized access to KnowbaseItem data</topic>
377
    <affects>
378
      <package>
379
	<name>glpi</name>
380
	<range><ge>9.2.0</ge><lt>10.0.8</lt></range>
381
      </package>
382
    </affects>
383
    <description>
384
	<body xmlns="http://www.w3.org/1999/xhtml">
385
	<p>security-advisories@github.com reports:</p>
386
	<blockquote cite="https://github.com/glpi-project/glpi/releases/tag/10.0.8">
387
	  <p>GLPI is a free asset and IT management software package.  Versions
388
	of the software starting with 9.2.0 and prior to 10.0.8 have an
389
	incorrect rights check on a on a file accessible by an authenticated
390
	user, allows access to the view all KnowbaseItems.  Version 10.0.8
391
	has a patch for this issue.</p>
392
	</blockquote>
393
	</body>
394
    </description>
395
    <references>
396
      <cvename>CVE-2023-34107</cvename>
397
      <url>https://nvd.nist.gov/vuln/detail/CVE-2023-34107</url>
398
    </references>
399
    <dates>
400
      <discovery>2023-07-05</discovery>
401
      <entry>2023-10-11</entry>
402
    </dates>
403
  </vuln>
404
405
  <vuln vid="b14a6ddc-6821-11ee-b06f-0050569ceb3a">
406
    <topic>GLPI vulnerable to reflected XSS in search pages</topic>
407
    <affects>
408
      <package>
409
	<name>glpi</name>
410
	<range><ge>9.4.0</ge><lt>10.0.8</lt></range>
411
      </package>
412
    </affects>
413
    <description>
414
	<body xmlns="http://www.w3.org/1999/xhtml">
415
	<p>security-advisories@github.com reports:</p>
416
	<blockquote cite="https://github.com/glpi-project/glpi/releases/tag/10.0.8">
417
	  <p>GLPI is a free asset and IT management software package.  Starting
418
	in version 9.4.0 and prior to version 10.0.8, a malicious link can
419
	be crafted by an unauthenticated user that can exploit a reflected
420
	XSS in case any authenticated user opens the crafted link.  Users
421
	should upgrade to version 10.0.8 to receive a patch.</p>
422
	</blockquote>
423
	</body>
424
    </description>
425
    <references>
426
      <cvename>CVE-2023-34244</cvename>
427
      <url>https://nvd.nist.gov/vuln/detail/CVE-2023-34244</url>
428
    </references>
429
    <dates>
430
      <discovery>2023-07-05</discovery>
431
      <entry>2023-10-11</entry>
432
    </dates>
433
  </vuln>
434
435
  <vuln vid="95fde6bc-6821-11ee-b06f-0050569ceb3a">
436
    <topic>GLPI vulnerable to unauthenticated access to Dashboard data</topic>
437
    <affects>
438
      <package>
439
	<name>glpi</name>
440
	<range><ge>9.5.0</ge><lt>10.0.8</lt></range>
441
      </package>
442
    </affects>
443
    <description>
444
	<body xmlns="http://www.w3.org/1999/xhtml">
445
	<p>security-advisories@github.com reports:</p>
446
	<blockquote cite="https://github.com/glpi-project/glpi/releases/tag/10.0.8">
447
	  <p>GLPI is a free asset and IT management software package.  Starting
448
	in version 9.5.0 and prior to version 10.0.8, an incorrect rights
449
	check on a file allows an unauthenticated user to be able to access
450
	dashboards data.  Version 10.0.8 contains a patch for this issue.</p>
451
	</blockquote>
452
	</body>
453
    </description>
454
    <references>
455
      <cvename>CVE-2023-35940</cvename>
456
      <url>https://nvd.nist.gov/vuln/detail/CVE-2023-35940</url>
457
    </references>
458
    <dates>
459
      <discovery>2023-07-05</discovery>
460
      <entry>2023-10-11</entry>
461
    </dates>
462
  </vuln>
463
464
  <vuln vid="717efd8a-6821-11ee-b06f-0050569ceb3a">
465
    <topic>GLPI vulnerable to unauthorized access to Dashboard data</topic>
466
    <affects>
467
      <package>
468
	<name>glpi</name>
469
<range><ge>9.5.0</ge><lt>10.0.8</lt></range>
470
      </package>
471
    </affects>
472
    <description>
473
	<body xmlns="http://www.w3.org/1999/xhtml">
474
	<p>security-advisories@github.com reports:</p>
475
	<blockquote cite="https://github.com/glpi-project/glpi/releases/tag/10.0.8">
476
	  <p>GLPI is a free asset and IT management software package.  Starting
477
	in version 9.5.0 and prior to version 10.0.8, an incorrect rights
478
	check on a on a file accessible by an authenticated user (or not
479
	for certain actions), allows a threat actor to interact, modify,
480
	or see Dashboard data.  Version 10.0.8 contains a patch for this
481
	issue.</p>
482
	</blockquote>
483
	</body>
484
    </description>
485
    <references>
486
      <cvename>CVE-2023-35939</cvename>
487
      <url>https://nvd.nist.gov/vuln/detail/CVE-2023-35939</url>
488
    </references>
489
    <dates>
490
      <discovery>2023-07-05</discovery>
491
      <entry>2023-10-11</entry>
492
    </dates>
493
  </vuln>
494
495
  <vuln vid="548a4163-6821-11ee-b06f-0050569ceb3a">
496
    <topic>GLPI vulnerable to SQL injection through Computer Virtual Machine information</topic>
497
    <affects>
498
      <package>
499
	<name>glpi</name>
500
	<range><ge>0.80</ge><lt>10.0.8</lt></range>
501
      </package>
502
    </affects>
503
    <description>
504
	<body xmlns="http://www.w3.org/1999/xhtml">
505
	<p>security-advisories@github.com reports:</p>
506
	<blockquote cite="https://github.com/glpi-project/glpi/releases/tag/10.0.8">
507
	  <p>GLPI is a free asset and IT management software package.  Starting
508
	in version 0.80 and prior to version 10.0.8, Computer Virtual Machine
509
	form and GLPI inventory request can be used to perform a SQL injection
510
	attack.  Version 10.0.8 has a patch for this issue.  As a workaround,
511
	one may disable native inventory.</p>
512
	</blockquote>
513
	</body>
514
    </description>
515
    <references>
516
      <cvename>CVE-2023-36808</cvename>
517
      <url>https://nvd.nist.gov/vuln/detail/CVE-2023-36808</url>
518
    </references>
519
    <dates>
520
      <discovery>2023-07-05</discovery>
521
      <entry>2023-10-11</entry>
522
    </dates>
523
  </vuln>
524
525
  <vuln vid="e44e5ace-6820-11ee-b06f-0050569ceb3a">
526
    <topic>GLPI vulnerable to SQL injection via inventory agent request</topic>
527
    <affects>
528
      <package>
529
	<name>glpi</name>
530
	<range><ge>10.0.0</ge><lt>10.0.8</lt></range>
531
      </package>
532
    </affects>
533
    <description>
534
	<body xmlns="http://www.w3.org/1999/xhtml">
535
	<p>security-advisories@github.com reports:</p>
536
	<blockquote cite="https://github.com/glpi-project/glpi/releases/tag/10.0.8">
537
	  <p>GLPI is a free asset and IT management software package.  Starting
538
	in version 10.0.0 and prior to version 10.0.8, GLPI inventory
539
	endpoint can be used to drive a SQL injection attack.  By default,
540
	GLPI inventory endpoint requires no authentication.  Version 10.0.8
541
	has a patch for this issue.  As a workaround, one may disable native
542
	inventory.</p>
543
	</blockquote>
544
	</body>
545
    </description>
546
    <references>
547
      <cvename>CVE-2023-35924</cvename>
548
      <url>https://nvd.nist.gov/vuln/detail/CVE-2023-35924</url>
549
    </references>
550
    <dates>
551
      <discovery>2023-07-05</discovery>
552
      <entry>2023-10-11</entry>
553
    </dates>
554
  </vuln>
555
1
  <vuln vid="4f254817-6318-11ee-b2ff-080027de9982">
556
  <vuln vid="4f254817-6318-11ee-b2ff-080027de9982">
2
    <topic>Django -- multiple vulnerabilities</topic>
557
    <topic>Django -- multiple vulnerabilities</topic>
3
    <affects>
558
    <affects>
(-)b/www/glpi/Makefile (-3 / +2 lines)
Lines 1-6 Link Here
1
PORTNAME=	glpi
1
PORTNAME=	glpi
2
PORTVERSION=	10.0.7
2
PORTVERSION=	10.0.10
3
PORTEPOCH=	1
3
PORTEPOCH=	2
4
CATEGORIES=	www
4
CATEGORIES=	www
5
MASTER_SITES=	https://github.com/glpi-project/glpi/releases/download/${PORTVERSION}/
5
MASTER_SITES=	https://github.com/glpi-project/glpi/releases/download/${PORTVERSION}/
6
6
Lines 15-21 CPE_VENDOR= glpi-project Link Here
15
USE_PHP=	bz2 ctype curl exif fileinfo gd iconv intl mbstring \
15
USE_PHP=	bz2 ctype curl exif fileinfo gd iconv intl mbstring \
16
		mysqli opcache session simplexml sodium xml xmlrpc zip zlib \
16
		mysqli opcache session simplexml sodium xml xmlrpc zip zlib \
17
		dom filter
17
		dom filter
18
IGNORE_WITH_PHP=	82 83
19
18
20
NO_ARCH=	yes
19
NO_ARCH=	yes
21
NO_BUILD=	yes
20
NO_BUILD=	yes
(-)b/www/glpi/distinfo (-3 / +3 lines)
Lines 1-3 Link Here
1
TIMESTAMP = 1683389004
1
TIMESTAMP = 1696934290
2
SHA256 (glpi-10.0.7.tgz) = 0d51de960272d3d5b322e83d74a8261423d4baefad5ef815402591e8ead04e53
2
SHA256 (glpi-10.0.10.tgz) = b303eece25bcbf81cd6bcd74b2a8412f02b33c3471bd935530b06470dcf7b051
3
SIZE (glpi-10.0.7.tgz) = 56550228
3
SIZE (glpi-10.0.10.tgz) = 59092816
(-)b/www/glpi/pkg-plist (-52 / +142 lines)
Lines 18-23 Link Here
18
%%WWWDIR%%/ajax/compareKbRevisions.php
18
%%WWWDIR%%/ajax/compareKbRevisions.php
19
%%WWWDIR%%/ajax/dashboard.php
19
%%WWWDIR%%/ajax/dashboard.php
20
%%WWWDIR%%/ajax/dcroom_size.php
20
%%WWWDIR%%/ajax/dcroom_size.php
21
%%WWWDIR%%/ajax/debug.php
21
%%WWWDIR%%/ajax/displayMessageAfterRedirect.php
22
%%WWWDIR%%/ajax/displayMessageAfterRedirect.php
22
%%WWWDIR%%/ajax/domainrecord_data_form.php
23
%%WWWDIR%%/ajax/domainrecord_data_form.php
23
%%WWWDIR%%/ajax/dropdownAllItems.php
24
%%WWWDIR%%/ajax/dropdownAllItems.php
Lines 65-70 Link Here
65
%%WWWDIR%%/ajax/getMapPoint.php
66
%%WWWDIR%%/ajax/getMapPoint.php
66
%%WWWDIR%%/ajax/getShareDashboardDropdownValue.php
67
%%WWWDIR%%/ajax/getShareDashboardDropdownValue.php
67
%%WWWDIR%%/ajax/getUserPicture.php
68
%%WWWDIR%%/ajax/getUserPicture.php
69
%%WWWDIR%%/ajax/get_item_content.php
68
%%WWWDIR%%/ajax/helpdesk_observer.php
70
%%WWWDIR%%/ajax/helpdesk_observer.php
69
%%WWWDIR%%/ajax/impact.php
71
%%WWWDIR%%/ajax/impact.php
70
%%WWWDIR%%/ajax/index.php
72
%%WWWDIR%%/ajax/index.php
Lines 121-126 Link Here
121
%%WWWDIR%%/ajax/unlockobject.php
123
%%WWWDIR%%/ajax/unlockobject.php
122
%%WWWDIR%%/ajax/updateTrackingDeviceType.php
124
%%WWWDIR%%/ajax/updateTrackingDeviceType.php
123
%%WWWDIR%%/ajax/updateTranslationFields.php
125
%%WWWDIR%%/ajax/updateTranslationFields.php
126
%%WWWDIR%%/ajax/updateTranslationValue.php
124
%%WWWDIR%%/ajax/updatecurrenttab.php
127
%%WWWDIR%%/ajax/updatecurrenttab.php
125
%%WWWDIR%%/ajax/viewsubitem.php
128
%%WWWDIR%%/ajax/viewsubitem.php
126
%%WWWDIR%%/ajax/visibility.php
129
%%WWWDIR%%/ajax/visibility.php
Lines 141-147 Link Here
141
%%WWWDIR%%/css/includes/components/_asset-form.scss
144
%%WWWDIR%%/css/includes/components/_asset-form.scss
142
%%WWWDIR%%/css/includes/components/_browser_tree.scss
145
%%WWWDIR%%/css/includes/components/_browser_tree.scss
143
%%WWWDIR%%/css/includes/components/_buttons-group.scss
146
%%WWWDIR%%/css/includes/components/_buttons-group.scss
144
%%WWWDIR%%/css/includes/components/_debug-panel.scss
147
%%WWWDIR%%/css/includes/components/_debug-toolbar.scss
145
%%WWWDIR%%/css/includes/components/_documentation.scss
148
%%WWWDIR%%/css/includes/components/_documentation.scss
146
%%WWWDIR%%/css/includes/components/_fileupload.scss
149
%%WWWDIR%%/css/includes/components/_fileupload.scss
147
%%WWWDIR%%/css/includes/components/_flatpickr.scss
150
%%WWWDIR%%/css/includes/components/_flatpickr.scss
Lines 268-273 Link Here
268
%%WWWDIR%%/css/lib/bootstrap/scss/mixins/_visually-hidden.scss
271
%%WWWDIR%%/css/lib/bootstrap/scss/mixins/_visually-hidden.scss
269
%%WWWDIR%%/css/lib/bootstrap/scss/utilities/_api.scss
272
%%WWWDIR%%/css/lib/bootstrap/scss/utilities/_api.scss
270
%%WWWDIR%%/css/lib/bootstrap/scss/vendor/_rfs.scss
273
%%WWWDIR%%/css/lib/bootstrap/scss/vendor/_rfs.scss
274
%%WWWDIR%%/css/lib/fontsource/inter/files/inter-all-100-normal.woff
275
%%WWWDIR%%/css/lib/fontsource/inter/files/inter-all-200-normal.woff
276
%%WWWDIR%%/css/lib/fontsource/inter/files/inter-all-300-normal.woff
277
%%WWWDIR%%/css/lib/fontsource/inter/files/inter-all-400-normal.woff
278
%%WWWDIR%%/css/lib/fontsource/inter/files/inter-all-500-normal.woff
279
%%WWWDIR%%/css/lib/fontsource/inter/files/inter-all-600-normal.woff
280
%%WWWDIR%%/css/lib/fontsource/inter/files/inter-all-700-normal.woff
281
%%WWWDIR%%/css/lib/fontsource/inter/files/inter-all-800-normal.woff
282
%%WWWDIR%%/css/lib/fontsource/inter/files/inter-all-900-normal.woff
271
%%WWWDIR%%/css/lib/fontsource/inter/files/inter-cyrillic-100-normal.woff2
283
%%WWWDIR%%/css/lib/fontsource/inter/files/inter-cyrillic-100-normal.woff2
272
%%WWWDIR%%/css/lib/fontsource/inter/files/inter-cyrillic-200-normal.woff2
284
%%WWWDIR%%/css/lib/fontsource/inter/files/inter-cyrillic-200-normal.woff2
273
%%WWWDIR%%/css/lib/fontsource/inter/files/inter-cyrillic-300-normal.woff2
285
%%WWWDIR%%/css/lib/fontsource/inter/files/inter-cyrillic-300-normal.woff2
Lines 666-672 Link Here
666
%%WWWDIR%%/front/fieldunicity.php
678
%%WWWDIR%%/front/fieldunicity.php
667
%%WWWDIR%%/front/filesystem.form.php
679
%%WWWDIR%%/front/filesystem.form.php
668
%%WWWDIR%%/front/filesystem.php
680
%%WWWDIR%%/front/filesystem.php
669
%%WWWDIR%%/front/find_num.php
670
%%WWWDIR%%/front/fqdn.form.php
681
%%WWWDIR%%/front/fqdn.form.php
671
%%WWWDIR%%/front/fqdn.php
682
%%WWWDIR%%/front/fqdn.php
672
%%WWWDIR%%/front/graph.send.php
683
%%WWWDIR%%/front/graph.send.php
Lines 1199-1204 Link Here
1199
%%WWWDIR%%/install/migrations/update_10.0.6_to_10.0.7/ticket_fix_internal_tto_escalation.php
1210
%%WWWDIR%%/install/migrations/update_10.0.6_to_10.0.7/ticket_fix_internal_tto_escalation.php
1200
%%WWWDIR%%/install/migrations/update_10.0.6_to_10.0.7/unmanageds.php
1211
%%WWWDIR%%/install/migrations/update_10.0.6_to_10.0.7/unmanageds.php
1201
%%WWWDIR%%/install/migrations/update_10.0.6_to_10.0.7/wrong_fkey.php
1212
%%WWWDIR%%/install/migrations/update_10.0.6_to_10.0.7/wrong_fkey.php
1213
%%WWWDIR%%/install/migrations/update_10.0.7_to_10.0.8.php
1214
%%WWWDIR%%/install/migrations/update_10.0.7_to_10.0.8/changes.php
1215
%%WWWDIR%%/install/migrations/update_10.0.7_to_10.0.8/configs.php
1216
%%WWWDIR%%/install/migrations/update_10.0.7_to_10.0.8/dates.php
1217
%%WWWDIR%%/install/migrations/update_10.0.7_to_10.0.8/networkport.php
1218
%%WWWDIR%%/install/migrations/update_10.0.7_to_10.0.8/problems.php
1219
%%WWWDIR%%/install/migrations/update_10.0.7_to_10.0.8/queuednotification.php
1220
%%WWWDIR%%/install/migrations/update_10.0.7_to_10.0.8/ram_field.php
1221
%%WWWDIR%%/install/migrations/update_10.0.7_to_10.0.8/rule.php
1222
%%WWWDIR%%/install/migrations/update_10.0.7_to_10.0.8/rule_tickets.php
1223
%%WWWDIR%%/install/migrations/update_10.0.8_to_10.0.9.php
1224
%%WWWDIR%%/install/migrations/update_10.0.8_to_10.0.9/queuednotification.php
1225
%%WWWDIR%%/install/migrations/update_10.0.9_to_10.0.10.php
1226
%%WWWDIR%%/install/migrations/update_10.0.9_to_10.0.10/configs.php
1227
%%WWWDIR%%/install/migrations/update_10.0.9_to_10.0.10/ldap_fields.php
1228
%%WWWDIR%%/install/migrations/update_10.0.9_to_10.0.10/mailcollector.php
1229
%%WWWDIR%%/install/migrations/update_10.0.9_to_10.0.10/templates.php
1202
%%WWWDIR%%/install/migrations/update_9.1.0_to_9.1.1.php
1230
%%WWWDIR%%/install/migrations/update_9.1.0_to_9.1.1.php
1203
%%WWWDIR%%/install/migrations/update_9.1.1_to_9.1.3.php
1231
%%WWWDIR%%/install/migrations/update_9.1.1_to_9.1.3.php
1204
%%WWWDIR%%/install/migrations/update_9.1.x_to_9.2.0.php
1232
%%WWWDIR%%/install/migrations/update_9.1.x_to_9.2.0.php
Lines 1271-1276 Link Here
1271
%%WWWDIR%%/install/migrations/update_9.5.x_to_10.0.0/transfer.php
1299
%%WWWDIR%%/install/migrations/update_9.5.x_to_10.0.0/transfer.php
1272
%%WWWDIR%%/install/migrations/update_9.5.x_to_10.0.0/uuids.php
1300
%%WWWDIR%%/install/migrations/update_9.5.x_to_10.0.0/uuids.php
1273
%%WWWDIR%%/install/mysql/.htaccess
1301
%%WWWDIR%%/install/mysql/.htaccess
1302
%%WWWDIR%%/install/mysql/glpi-0.80.0-empty.sql
1303
%%WWWDIR%%/install/mysql/glpi-0.80.1-empty.sql
1304
%%WWWDIR%%/install/mysql/glpi-0.80.2-empty.sql
1305
%%WWWDIR%%/install/mysql/glpi-0.80.3-empty.sql
1306
%%WWWDIR%%/install/mysql/glpi-0.80.4-empty.sql
1307
%%WWWDIR%%/install/mysql/glpi-0.80.5-empty.sql
1308
%%WWWDIR%%/install/mysql/glpi-0.80.6-empty.sql
1309
%%WWWDIR%%/install/mysql/glpi-0.80.7-empty.sql
1310
%%WWWDIR%%/install/mysql/glpi-0.83.0-empty.sql
1311
%%WWWDIR%%/install/mysql/glpi-0.83.1-empty.sql
1312
%%WWWDIR%%/install/mysql/glpi-0.83.2-empty.sql
1313
%%WWWDIR%%/install/mysql/glpi-0.83.3-empty.sql
1314
%%WWWDIR%%/install/mysql/glpi-0.83.4-empty.sql
1315
%%WWWDIR%%/install/mysql/glpi-0.83.5-empty.sql
1316
%%WWWDIR%%/install/mysql/glpi-0.83.6-empty.sql
1317
%%WWWDIR%%/install/mysql/glpi-0.83.7-empty.sql
1318
%%WWWDIR%%/install/mysql/glpi-0.83.8-empty.sql
1319
%%WWWDIR%%/install/mysql/glpi-0.83.9-empty.sql
1320
%%WWWDIR%%/install/mysql/glpi-0.84.0-empty.sql
1321
%%WWWDIR%%/install/mysql/glpi-0.84.1-empty.sql
1322
%%WWWDIR%%/install/mysql/glpi-0.84.2-empty.sql
1323
%%WWWDIR%%/install/mysql/glpi-0.84.3-empty.sql
1324
%%WWWDIR%%/install/mysql/glpi-0.84.4-empty.sql
1325
%%WWWDIR%%/install/mysql/glpi-0.84.5-empty.sql
1326
%%WWWDIR%%/install/mysql/glpi-0.84.6-empty.sql
1327
%%WWWDIR%%/install/mysql/glpi-0.84.7-empty.sql
1328
%%WWWDIR%%/install/mysql/glpi-0.84.8-empty.sql
1329
%%WWWDIR%%/install/mysql/glpi-0.85.0-empty.sql
1330
%%WWWDIR%%/install/mysql/glpi-0.85.1-empty.sql
1331
%%WWWDIR%%/install/mysql/glpi-0.85.2-empty.sql
1332
%%WWWDIR%%/install/mysql/glpi-0.85.3-empty.sql
1333
%%WWWDIR%%/install/mysql/glpi-0.85.4-empty.sql
1334
%%WWWDIR%%/install/mysql/glpi-0.85.5-empty.sql
1335
%%WWWDIR%%/install/mysql/glpi-0.90.0-empty.sql
1336
%%WWWDIR%%/install/mysql/glpi-0.90.1-empty.sql
1337
%%WWWDIR%%/install/mysql/glpi-0.90.2-empty.sql
1338
%%WWWDIR%%/install/mysql/glpi-0.90.3-empty.sql
1339
%%WWWDIR%%/install/mysql/glpi-0.90.4-empty.sql
1340
%%WWWDIR%%/install/mysql/glpi-0.90.5-empty.sql
1274
%%WWWDIR%%/install/mysql/glpi-10.0.0-empty.sql
1341
%%WWWDIR%%/install/mysql/glpi-10.0.0-empty.sql
1275
%%WWWDIR%%/install/mysql/glpi-10.0.1-empty.sql
1342
%%WWWDIR%%/install/mysql/glpi-10.0.1-empty.sql
1276
%%WWWDIR%%/install/mysql/glpi-10.0.2-empty.sql
1343
%%WWWDIR%%/install/mysql/glpi-10.0.2-empty.sql
Lines 1278-1283 Link Here
1278
%%WWWDIR%%/install/mysql/glpi-10.0.4-empty.sql
1345
%%WWWDIR%%/install/mysql/glpi-10.0.4-empty.sql
1279
%%WWWDIR%%/install/mysql/glpi-10.0.5-empty.sql
1346
%%WWWDIR%%/install/mysql/glpi-10.0.5-empty.sql
1280
%%WWWDIR%%/install/mysql/glpi-10.0.6-empty.sql
1347
%%WWWDIR%%/install/mysql/glpi-10.0.6-empty.sql
1348
%%WWWDIR%%/install/mysql/glpi-10.0.7-empty.sql
1349
%%WWWDIR%%/install/mysql/glpi-10.0.8-empty.sql
1350
%%WWWDIR%%/install/mysql/glpi-10.0.9-empty.sql
1351
%%WWWDIR%%/install/mysql/glpi-9.1.0-empty.sql
1352
%%WWWDIR%%/install/mysql/glpi-9.1.1-empty.sql
1353
%%WWWDIR%%/install/mysql/glpi-9.1.2-empty.sql
1354
%%WWWDIR%%/install/mysql/glpi-9.1.3-empty.sql
1355
%%WWWDIR%%/install/mysql/glpi-9.1.4-empty.sql
1356
%%WWWDIR%%/install/mysql/glpi-9.1.5-empty.sql
1357
%%WWWDIR%%/install/mysql/glpi-9.1.6-empty.sql
1358
%%WWWDIR%%/install/mysql/glpi-9.1.7-empty.sql
1359
%%WWWDIR%%/install/mysql/glpi-9.2.0-empty.sql
1360
%%WWWDIR%%/install/mysql/glpi-9.2.1-empty.sql
1361
%%WWWDIR%%/install/mysql/glpi-9.2.2-empty.sql
1362
%%WWWDIR%%/install/mysql/glpi-9.2.3-empty.sql
1363
%%WWWDIR%%/install/mysql/glpi-9.2.4-empty.sql
1281
%%WWWDIR%%/install/mysql/glpi-9.3.0-empty.sql
1364
%%WWWDIR%%/install/mysql/glpi-9.3.0-empty.sql
1282
%%WWWDIR%%/install/mysql/glpi-9.3.1-empty.sql
1365
%%WWWDIR%%/install/mysql/glpi-9.3.1-empty.sql
1283
%%WWWDIR%%/install/mysql/glpi-9.3.2-empty.sql
1366
%%WWWDIR%%/install/mysql/glpi-9.3.2-empty.sql
Lines 1336-1341 Link Here
1336
%%WWWDIR%%/js/marketplace.min.js
1419
%%WWWDIR%%/js/marketplace.min.js
1337
%%WWWDIR%%/js/misc.js
1420
%%WWWDIR%%/js/misc.js
1338
%%WWWDIR%%/js/misc.min.js
1421
%%WWWDIR%%/js/misc.min.js
1422
%%WWWDIR%%/js/modules/Debug/Debug.js
1423
%%WWWDIR%%/js/modules/Debug/Debug.min.js
1339
%%WWWDIR%%/js/modules/Kanban/Kanban.js
1424
%%WWWDIR%%/js/modules/Kanban/Kanban.js
1340
%%WWWDIR%%/js/modules/Kanban/Kanban.min.js
1425
%%WWWDIR%%/js/modules/Kanban/Kanban.min.js
1341
%%WWWDIR%%/js/modules/Search/GenericView.js
1426
%%WWWDIR%%/js/modules/Search/GenericView.js
Lines 1361-1366 Link Here
1361
%%WWWDIR%%/js/rack.min.js
1446
%%WWWDIR%%/js/rack.min.js
1362
%%WWWDIR%%/js/reservations.js
1447
%%WWWDIR%%/js/reservations.js
1363
%%WWWDIR%%/js/reservations.min.js
1448
%%WWWDIR%%/js/reservations.min.js
1449
%%WWWDIR%%/js/webkit_fix.js
1450
%%WWWDIR%%/js/webkit_fix.min.js
1451
%%WWWDIR%%/lib/blueimp/jquery-file-upload/LICENSE.txt
1452
%%WWWDIR%%/lib/blueimp/jquery-file-upload/jquery.fileupload-process.js
1453
%%WWWDIR%%/lib/blueimp/jquery-file-upload/jquery.fileupload-process.min.js
1454
%%WWWDIR%%/lib/blueimp/jquery-file-upload/jquery.fileupload-validate.js
1455
%%WWWDIR%%/lib/blueimp/jquery-file-upload/jquery.fileupload-validate.min.js
1456
%%WWWDIR%%/lib/blueimp/jquery-file-upload/jquery.fileupload.js
1457
%%WWWDIR%%/lib/blueimp/jquery-file-upload/jquery.fileupload.min.js
1458
%%WWWDIR%%/lib/blueimp/jquery-file-upload/jquery.iframe-transport.js
1459
%%WWWDIR%%/lib/blueimp/jquery-file-upload/jquery.iframe-transport.min.js
1364
%%WWWDIR%%/lib/bundles/base.js
1460
%%WWWDIR%%/lib/bundles/base.js
1365
%%WWWDIR%%/lib/bundles/base.min.js
1461
%%WWWDIR%%/lib/bundles/base.min.js
1366
%%WWWDIR%%/lib/bundles/chartist.js
1462
%%WWWDIR%%/lib/bundles/chartist.js
Lines 2410-2419 Link Here
2410
%%WWWDIR%%/public/lib/tinymce-i18n/langs6/ug.min.js
2506
%%WWWDIR%%/public/lib/tinymce-i18n/langs6/ug.min.js
2411
%%WWWDIR%%/public/lib/tinymce-i18n/langs6/uk.js
2507
%%WWWDIR%%/public/lib/tinymce-i18n/langs6/uk.js
2412
%%WWWDIR%%/public/lib/tinymce-i18n/langs6/uk.min.js
2508
%%WWWDIR%%/public/lib/tinymce-i18n/langs6/uk.min.js
2509
%%WWWDIR%%/public/lib/tinymce-i18n/langs6/uz.js
2510
%%WWWDIR%%/public/lib/tinymce-i18n/langs6/uz.min.js
2413
%%WWWDIR%%/public/lib/tinymce-i18n/langs6/vi.js
2511
%%WWWDIR%%/public/lib/tinymce-i18n/langs6/vi.js
2414
%%WWWDIR%%/public/lib/tinymce-i18n/langs6/vi.min.js
2512
%%WWWDIR%%/public/lib/tinymce-i18n/langs6/vi.min.js
2415
%%WWWDIR%%/public/lib/tinymce-i18n/langs6/zh-Hans.js
2513
%%WWWDIR%%/public/lib/tinymce-i18n/langs6/zh-Hans.js
2416
%%WWWDIR%%/public/lib/tinymce-i18n/langs6/zh-Hans.min.js
2514
%%WWWDIR%%/public/lib/tinymce-i18n/langs6/zh-Hans.min.js
2515
%%WWWDIR%%/public/lib/tinymce-i18n/langs6/zh-Hant.js
2516
%%WWWDIR%%/public/lib/tinymce-i18n/langs6/zh-Hant.min.js
2517
%%WWWDIR%%/public/lib/tinymce-i18n/langs6/zh_HK.js
2518
%%WWWDIR%%/public/lib/tinymce-i18n/langs6/zh_HK.min.js
2519
%%WWWDIR%%/public/lib/tinymce-i18n/langs6/zh_MO.js
2520
%%WWWDIR%%/public/lib/tinymce-i18n/langs6/zh_MO.min.js
2521
%%WWWDIR%%/public/lib/tinymce-i18n/langs6/zh_SG.js
2522
%%WWWDIR%%/public/lib/tinymce-i18n/langs6/zh_SG.min.js
2417
%%WWWDIR%%/public/lib/tinymce.js
2523
%%WWWDIR%%/public/lib/tinymce.js
2418
%%WWWDIR%%/public/lib/tinymce.js.map
2524
%%WWWDIR%%/public/lib/tinymce.js.map
2419
%%WWWDIR%%/public/lib/tinymce.min.js
2525
%%WWWDIR%%/public/lib/tinymce.min.js
Lines 2715-2720 Link Here
2715
%%WWWDIR%%/src/DCRoom.php
2821
%%WWWDIR%%/src/DCRoom.php
2716
%%WWWDIR%%/src/Dashboard/Dashboard.php
2822
%%WWWDIR%%/src/Dashboard/Dashboard.php
2717
%%WWWDIR%%/src/Dashboard/Filter.php
2823
%%WWWDIR%%/src/Dashboard/Filter.php
2824
%%WWWDIR%%/src/Dashboard/Filters/AbstractFilter.php
2825
%%WWWDIR%%/src/Dashboard/Filters/DatesFilter.php
2826
%%WWWDIR%%/src/Dashboard/Filters/DatesModFilter.php
2827
%%WWWDIR%%/src/Dashboard/Filters/GroupTechFilter.php
2828
%%WWWDIR%%/src/Dashboard/Filters/ItilCategoryFilter.php
2829
%%WWWDIR%%/src/Dashboard/Filters/LocationFilter.php
2830
%%WWWDIR%%/src/Dashboard/Filters/ManufacturerFilter.php
2831
%%WWWDIR%%/src/Dashboard/Filters/RequestTypeFilter.php
2832
%%WWWDIR%%/src/Dashboard/Filters/StateFilter.php
2833
%%WWWDIR%%/src/Dashboard/Filters/TicketTypeFilter.php
2834
%%WWWDIR%%/src/Dashboard/Filters/UserTechFilter.php
2718
%%WWWDIR%%/src/Dashboard/Grid.php
2835
%%WWWDIR%%/src/Dashboard/Grid.php
2719
%%WWWDIR%%/src/Dashboard/Item.php
2836
%%WWWDIR%%/src/Dashboard/Item.php
2720
%%WWWDIR%%/src/Dashboard/Provider.php
2837
%%WWWDIR%%/src/Dashboard/Provider.php
Lines 2726-2731 Link Here
2726
%%WWWDIR%%/src/DatabaseInstanceType.php
2843
%%WWWDIR%%/src/DatabaseInstanceType.php
2727
%%WWWDIR%%/src/Datacenter.php
2844
%%WWWDIR%%/src/Datacenter.php
2728
%%WWWDIR%%/src/DbUtils.php
2845
%%WWWDIR%%/src/DbUtils.php
2846
%%WWWDIR%%/src/Debug/Profile.php
2847
%%WWWDIR%%/src/Debug/Profiler.php
2848
%%WWWDIR%%/src/Debug/ProfilerSection.php
2849
%%WWWDIR%%/src/Debug/Toolbar.php
2729
%%WWWDIR%%/src/DeviceBattery.php
2850
%%WWWDIR%%/src/DeviceBattery.php
2730
%%WWWDIR%%/src/DeviceBatteryModel.php
2851
%%WWWDIR%%/src/DeviceBatteryModel.php
2731
%%WWWDIR%%/src/DeviceBatteryType.php
2852
%%WWWDIR%%/src/DeviceBatteryType.php
Lines 2837-2842 Link Here
2837
%%WWWDIR%%/src/HTMLTableUnknownHeadersOrder.php
2958
%%WWWDIR%%/src/HTMLTableUnknownHeadersOrder.php
2838
%%WWWDIR%%/src/Holiday.php
2959
%%WWWDIR%%/src/Holiday.php
2839
%%WWWDIR%%/src/Html.php
2960
%%WWWDIR%%/src/Html.php
2961
%%WWWDIR%%/src/Http/Firewall.php
2840
%%WWWDIR%%/src/Http/ProxyRouter.php
2962
%%WWWDIR%%/src/Http/ProxyRouter.php
2841
%%WWWDIR%%/src/Http/Response.php
2963
%%WWWDIR%%/src/Http/Response.php
2842
%%WWWDIR%%/src/IPAddress.php
2964
%%WWWDIR%%/src/IPAddress.php
Lines 3310-3315 Link Here
3310
%%WWWDIR%%/src/USBVendor.php
3432
%%WWWDIR%%/src/USBVendor.php
3311
%%WWWDIR%%/src/Unmanaged.php
3433
%%WWWDIR%%/src/Unmanaged.php
3312
%%WWWDIR%%/src/Update.php
3434
%%WWWDIR%%/src/Update.php
3435
%%WWWDIR%%/src/UploadHandler.php
3313
%%WWWDIR%%/src/User.php
3436
%%WWWDIR%%/src/User.php
3314
%%WWWDIR%%/src/UserCategory.php
3437
%%WWWDIR%%/src/UserCategory.php
3315
%%WWWDIR%%/src/UserEmail.php
3438
%%WWWDIR%%/src/UserEmail.php
Lines 3331-3336 Link Here
3331
%%WWWDIR%%/templates/components/checkbox_matrix.html.twig
3454
%%WWWDIR%%/templates/components/checkbox_matrix.html.twig
3332
%%WWWDIR%%/templates/components/dashboard/widget_form.html.twig
3455
%%WWWDIR%%/templates/components/dashboard/widget_form.html.twig
3333
%%WWWDIR%%/templates/components/dates_timeline.html.twig
3456
%%WWWDIR%%/templates/components/dates_timeline.html.twig
3457
%%WWWDIR%%/templates/components/debug/debug_toolbar.html.twig
3334
%%WWWDIR%%/templates/components/dropdown/limit.html.twig
3458
%%WWWDIR%%/templates/components/dropdown/limit.html.twig
3335
%%WWWDIR%%/templates/components/form/buttons.html.twig
3459
%%WWWDIR%%/templates/components/form/buttons.html.twig
3336
%%WWWDIR%%/templates/components/form/computerantivirus.html.twig
3460
%%WWWDIR%%/templates/components/form/computerantivirus.html.twig
Lines 3394-3399 Link Here
3394
%%WWWDIR%%/templates/components/modal.html.twig
3518
%%WWWDIR%%/templates/components/modal.html.twig
3395
%%WWWDIR%%/templates/components/pager.html.twig
3519
%%WWWDIR%%/templates/components/pager.html.twig
3396
%%WWWDIR%%/templates/components/photoswipe.html.twig
3520
%%WWWDIR%%/templates/components/photoswipe.html.twig
3521
%%WWWDIR%%/templates/components/plugin_uninstall_modal.html.twig
3397
%%WWWDIR%%/templates/components/rss_feed.html.twig
3522
%%WWWDIR%%/templates/components/rss_feed.html.twig
3398
%%WWWDIR%%/templates/components/search/controls.html.twig
3523
%%WWWDIR%%/templates/components/search/controls.html.twig
3399
%%WWWDIR%%/templates/components/search/display_data.html.twig
3524
%%WWWDIR%%/templates/components/search/display_data.html.twig
Lines 3402-3408 Link Here
3402
%%WWWDIR%%/templates/components/user/info_card.html.twig
3527
%%WWWDIR%%/templates/components/user/info_card.html.twig
3403
%%WWWDIR%%/templates/components/user/link_with_tooltip.html.twig
3528
%%WWWDIR%%/templates/components/user/link_with_tooltip.html.twig
3404
%%WWWDIR%%/templates/components/user/picture.html.twig
3529
%%WWWDIR%%/templates/components/user/picture.html.twig
3405
%%WWWDIR%%/templates/debug_panel.html.twig
3406
%%WWWDIR%%/templates/display_and_die.html.twig
3530
%%WWWDIR%%/templates/display_and_die.html.twig
3407
%%WWWDIR%%/templates/dropdown_form.html.twig
3531
%%WWWDIR%%/templates/dropdown_form.html.twig
3408
%%WWWDIR%%/templates/generic_show_form.html.twig
3532
%%WWWDIR%%/templates/generic_show_form.html.twig
Lines 3475-3515 Link Here
3475
%%WWWDIR%%/templates/password_form.html.twig
3599
%%WWWDIR%%/templates/password_form.html.twig
3476
%%WWWDIR%%/vendor/.htaccess
3600
%%WWWDIR%%/vendor/.htaccess
3477
%%WWWDIR%%/vendor/autoload.php
3601
%%WWWDIR%%/vendor/autoload.php
3478
%%WWWDIR%%/vendor/blueimp/jquery-file-upload/LICENSE.txt
3479
%%WWWDIR%%/vendor/blueimp/jquery-file-upload/README.md
3480
%%WWWDIR%%/vendor/blueimp/jquery-file-upload/SECURITY.md
3481
%%WWWDIR%%/vendor/blueimp/jquery-file-upload/VULNERABILITIES.md
3482
%%WWWDIR%%/vendor/blueimp/jquery-file-upload/composer.json
3483
%%WWWDIR%%/vendor/blueimp/jquery-file-upload/css/jquery.fileupload-noscript.css
3484
%%WWWDIR%%/vendor/blueimp/jquery-file-upload/css/jquery.fileupload-ui-noscript.css
3485
%%WWWDIR%%/vendor/blueimp/jquery-file-upload/css/jquery.fileupload-ui.css
3486
%%WWWDIR%%/vendor/blueimp/jquery-file-upload/css/jquery.fileupload.css
3487
%%WWWDIR%%/vendor/blueimp/jquery-file-upload/docker-compose.yml
3488
%%WWWDIR%%/vendor/blueimp/jquery-file-upload/img/loading.gif
3489
%%WWWDIR%%/vendor/blueimp/jquery-file-upload/img/progressbar.gif
3490
%%WWWDIR%%/vendor/blueimp/jquery-file-upload/js/cors/jquery.postmessage-transport.js
3491
%%WWWDIR%%/vendor/blueimp/jquery-file-upload/js/cors/jquery.xdr-transport.js
3492
%%WWWDIR%%/vendor/blueimp/jquery-file-upload/js/demo.js
3493
%%WWWDIR%%/vendor/blueimp/jquery-file-upload/js/jquery.fileupload-audio.js
3494
%%WWWDIR%%/vendor/blueimp/jquery-file-upload/js/jquery.fileupload-image.js
3495
%%WWWDIR%%/vendor/blueimp/jquery-file-upload/js/jquery.fileupload-process.js
3496
%%WWWDIR%%/vendor/blueimp/jquery-file-upload/js/jquery.fileupload-ui.js
3497
%%WWWDIR%%/vendor/blueimp/jquery-file-upload/js/jquery.fileupload-validate.js
3498
%%WWWDIR%%/vendor/blueimp/jquery-file-upload/js/jquery.fileupload-video.js
3499
%%WWWDIR%%/vendor/blueimp/jquery-file-upload/js/jquery.fileupload.js
3500
%%WWWDIR%%/vendor/blueimp/jquery-file-upload/js/jquery.iframe-transport.js
3501
%%WWWDIR%%/vendor/blueimp/jquery-file-upload/js/vendor/jquery.ui.widget.js
3502
%%WWWDIR%%/vendor/blueimp/jquery-file-upload/package-lock.json
3503
%%WWWDIR%%/vendor/blueimp/jquery-file-upload/package.json
3504
%%WWWDIR%%/vendor/blueimp/jquery-file-upload/server/gae-python/app.yaml
3505
%%WWWDIR%%/vendor/blueimp/jquery-file-upload/server/gae-python/main.py
3506
%%WWWDIR%%/vendor/blueimp/jquery-file-upload/server/gae-python/static/favicon.ico
3507
%%WWWDIR%%/vendor/blueimp/jquery-file-upload/server/gae-python/static/robots.txt
3508
%%WWWDIR%%/vendor/blueimp/jquery-file-upload/server/php/Dockerfile
3509
%%WWWDIR%%/vendor/blueimp/jquery-file-upload/server/php/UploadHandler.php
3510
%%WWWDIR%%/vendor/blueimp/jquery-file-upload/server/php/files/.htaccess
3511
%%WWWDIR%%/vendor/blueimp/jquery-file-upload/server/php/index.php
3512
%%WWWDIR%%/vendor/blueimp/jquery-file-upload/server/php/php.ini
3513
%%WWWDIR%%/vendor/brick/math/CHANGELOG.md
3602
%%WWWDIR%%/vendor/brick/math/CHANGELOG.md
3514
%%WWWDIR%%/vendor/brick/math/LICENSE
3603
%%WWWDIR%%/vendor/brick/math/LICENSE
3515
%%WWWDIR%%/vendor/brick/math/SECURITY.md
3604
%%WWWDIR%%/vendor/brick/math/SECURITY.md
Lines 4793-4798 Link Here
4793
%%WWWDIR%%/vendor/psr/http-message/LICENSE
4882
%%WWWDIR%%/vendor/psr/http-message/LICENSE
4794
%%WWWDIR%%/vendor/psr/http-message/README.md
4883
%%WWWDIR%%/vendor/psr/http-message/README.md
4795
%%WWWDIR%%/vendor/psr/http-message/composer.json
4884
%%WWWDIR%%/vendor/psr/http-message/composer.json
4885
%%WWWDIR%%/vendor/psr/http-message/docs/PSR7-Interfaces.md
4886
%%WWWDIR%%/vendor/psr/http-message/docs/PSR7-Usage.md
4796
%%WWWDIR%%/vendor/psr/http-message/src/MessageInterface.php
4887
%%WWWDIR%%/vendor/psr/http-message/src/MessageInterface.php
4797
%%WWWDIR%%/vendor/psr/http-message/src/RequestInterface.php
4888
%%WWWDIR%%/vendor/psr/http-message/src/RequestInterface.php
4798
%%WWWDIR%%/vendor/psr/http-message/src/ResponseInterface.php
4889
%%WWWDIR%%/vendor/psr/http-message/src/ResponseInterface.php
Lines 5459-5465 Link Here
5459
%%WWWDIR%%/vendor/seld/jsonlint/LICENSE
5550
%%WWWDIR%%/vendor/seld/jsonlint/LICENSE
5460
%%WWWDIR%%/vendor/seld/jsonlint/README.md
5551
%%WWWDIR%%/vendor/seld/jsonlint/README.md
5461
%%WWWDIR%%/vendor/seld/jsonlint/composer.json
5552
%%WWWDIR%%/vendor/seld/jsonlint/composer.json
5462
%%WWWDIR%%/vendor/seld/jsonlint/phpstan.neon.dist
5463
%%WWWDIR%%/vendor/seld/jsonlint/src/Seld/JsonLint/DuplicateKeyException.php
5553
%%WWWDIR%%/vendor/seld/jsonlint/src/Seld/JsonLint/DuplicateKeyException.php
5464
%%WWWDIR%%/vendor/seld/jsonlint/src/Seld/JsonLint/JsonParser.php
5554
%%WWWDIR%%/vendor/seld/jsonlint/src/Seld/JsonLint/JsonParser.php
5465
%%WWWDIR%%/vendor/seld/jsonlint/src/Seld/JsonLint/Lexer.php
5555
%%WWWDIR%%/vendor/seld/jsonlint/src/Seld/JsonLint/Lexer.php
Lines 5930-5935 Link Here
5930
%%WWWDIR%%/vendor/symfony/polyfill-mbstring/LICENSE
6020
%%WWWDIR%%/vendor/symfony/polyfill-mbstring/LICENSE
5931
%%WWWDIR%%/vendor/symfony/polyfill-mbstring/Mbstring.php
6021
%%WWWDIR%%/vendor/symfony/polyfill-mbstring/Mbstring.php
5932
%%WWWDIR%%/vendor/symfony/polyfill-mbstring/README.md
6022
%%WWWDIR%%/vendor/symfony/polyfill-mbstring/README.md
6023
%%WWWDIR%%/vendor/symfony/polyfill-mbstring/Resources/unidata/caseFolding.php
5933
%%WWWDIR%%/vendor/symfony/polyfill-mbstring/Resources/unidata/lowerCase.php
6024
%%WWWDIR%%/vendor/symfony/polyfill-mbstring/Resources/unidata/lowerCase.php
5934
%%WWWDIR%%/vendor/symfony/polyfill-mbstring/Resources/unidata/titleCaseRegexp.php
6025
%%WWWDIR%%/vendor/symfony/polyfill-mbstring/Resources/unidata/titleCaseRegexp.php
5935
%%WWWDIR%%/vendor/symfony/polyfill-mbstring/Resources/unidata/upperCase.php
6026
%%WWWDIR%%/vendor/symfony/polyfill-mbstring/Resources/unidata/upperCase.php
Lines 5950-5955 Link Here
5950
%%WWWDIR%%/vendor/symfony/polyfill-php81/LICENSE
6041
%%WWWDIR%%/vendor/symfony/polyfill-php81/LICENSE
5951
%%WWWDIR%%/vendor/symfony/polyfill-php81/Php81.php
6042
%%WWWDIR%%/vendor/symfony/polyfill-php81/Php81.php
5952
%%WWWDIR%%/vendor/symfony/polyfill-php81/README.md
6043
%%WWWDIR%%/vendor/symfony/polyfill-php81/README.md
6044
%%WWWDIR%%/vendor/symfony/polyfill-php81/Resources/stubs/CURLStringFile.php
5953
%%WWWDIR%%/vendor/symfony/polyfill-php81/Resources/stubs/ReturnTypeWillChange.php
6045
%%WWWDIR%%/vendor/symfony/polyfill-php81/Resources/stubs/ReturnTypeWillChange.php
5954
%%WWWDIR%%/vendor/symfony/polyfill-php81/bootstrap.php
6046
%%WWWDIR%%/vendor/symfony/polyfill-php81/bootstrap.php
5955
%%WWWDIR%%/vendor/symfony/polyfill-php81/composer.json
6047
%%WWWDIR%%/vendor/symfony/polyfill-php81/composer.json
Lines 6499-6505 Link Here
6499
%%WWWDIR%%/vendor/webmozart/assert/src/Assert.php
6591
%%WWWDIR%%/vendor/webmozart/assert/src/Assert.php
6500
%%WWWDIR%%/vendor/webmozart/assert/src/InvalidArgumentException.php
6592
%%WWWDIR%%/vendor/webmozart/assert/src/InvalidArgumentException.php
6501
%%WWWDIR%%/vendor/webmozart/assert/src/Mixin.php
6593
%%WWWDIR%%/vendor/webmozart/assert/src/Mixin.php
6502
%%WWWDIR%%/version/10.0.7
6594
%%WWWDIR%%/version/10.0.10
6503
@dir %%WWWDIR%%/ajax
6595
@dir %%WWWDIR%%/ajax
6504
@dir %%WWWDIR%%/bin
6596
@dir %%WWWDIR%%/bin
6505
@dir %%WWWDIR%%/config
6597
@dir %%WWWDIR%%/config
Lines 6579-6588 Link Here
6579
@dir %%WWWDIR%%/install/migrations/update_10.0.4_to_10.0.5
6671
@dir %%WWWDIR%%/install/migrations/update_10.0.4_to_10.0.5
6580
@dir %%WWWDIR%%/install/migrations/update_10.0.5_to_10.0.6
6672
@dir %%WWWDIR%%/install/migrations/update_10.0.5_to_10.0.6
6581
@dir %%WWWDIR%%/install/migrations/update_10.0.6_to_10.0.7
6673
@dir %%WWWDIR%%/install/migrations/update_10.0.6_to_10.0.7
6674
@dir %%WWWDIR%%/install/migrations/update_10.0.7_to_10.0.8
6675
@dir %%WWWDIR%%/install/migrations/update_10.0.8_to_10.0.9
6676
@dir %%WWWDIR%%/install/migrations/update_10.0.9_to_10.0.10
6582
@dir %%WWWDIR%%/install/migrations/update_9.4.x_to_9.5.0
6677
@dir %%WWWDIR%%/install/migrations/update_9.4.x_to_9.5.0
6583
@dir %%WWWDIR%%/install/migrations/update_9.5.x_to_10.0.0
6678
@dir %%WWWDIR%%/install/migrations/update_9.5.x_to_10.0.0
6584
@dir %%WWWDIR%%/install/mysql
6679
@dir %%WWWDIR%%/install/mysql
6585
@dir %%WWWDIR%%/js
6680
@dir %%WWWDIR%%/js
6681
@dir %%WWWDIR%%/js/modules/Debug/
6586
@dir %%WWWDIR%%/js/Forms
6682
@dir %%WWWDIR%%/js/Forms
6587
@dir %%WWWDIR%%/js/RichText
6683
@dir %%WWWDIR%%/js/RichText
6588
@dir %%WWWDIR%%/js/modules
6684
@dir %%WWWDIR%%/js/modules
Lines 6590-6595 Link Here
6590
@dir %%WWWDIR%%/js/modules/Search
6686
@dir %%WWWDIR%%/js/modules/Search
6591
@dir %%WWWDIR%%/js/modules/SearchTokenizer
6687
@dir %%WWWDIR%%/js/modules/SearchTokenizer
6592
@dir %%WWWDIR%%/lib
6688
@dir %%WWWDIR%%/lib
6689
@dir %%WWWDIR%%/lib/blueimp/
6690
@dir %%WWWDIR%%/lib/blueimp/jquery-file-upload/
6593
@dir %%WWWDIR%%/lib/bundles
6691
@dir %%WWWDIR%%/lib/bundles
6594
@dir %%WWWDIR%%/locales
6692
@dir %%WWWDIR%%/locales
6595
@dir %%WWWDIR%%/marketplace
6693
@dir %%WWWDIR%%/marketplace
Lines 6693-6698 Link Here
6693
@dir %%WWWDIR%%/src/ContentTemplates/Parameters/ParametersTypes
6791
@dir %%WWWDIR%%/src/ContentTemplates/Parameters/ParametersTypes
6694
@dir %%WWWDIR%%/src/Csv
6792
@dir %%WWWDIR%%/src/Csv
6695
@dir %%WWWDIR%%/src/Dashboard
6793
@dir %%WWWDIR%%/src/Dashboard
6794
@dir %%WWWDIR%%/src/Dashboard/Filters/
6795
@dir %%WWWDIR%%/src/Debug/
6696
@dir %%WWWDIR%%/src/Exception
6796
@dir %%WWWDIR%%/src/Exception
6697
@dir %%WWWDIR%%/src/Features
6797
@dir %%WWWDIR%%/src/Features
6698
@dir %%WWWDIR%%/src/Http
6798
@dir %%WWWDIR%%/src/Http
Lines 6723-6728 Link Here
6723
@dir %%WWWDIR%%/templates/central/lists
6823
@dir %%WWWDIR%%/templates/central/lists
6724
@dir %%WWWDIR%%/templates/components
6824
@dir %%WWWDIR%%/templates/components
6725
@dir %%WWWDIR%%/templates/components/dashboard
6825
@dir %%WWWDIR%%/templates/components/dashboard
6826
@dir %%WWWDIR%%/templates/components/debug/
6726
@dir %%WWWDIR%%/templates/components/dropdown
6827
@dir %%WWWDIR%%/templates/components/dropdown
6727
@dir %%WWWDIR%%/templates/components/form
6828
@dir %%WWWDIR%%/templates/components/form
6728
@dir %%WWWDIR%%/templates/components/itilobject
6829
@dir %%WWWDIR%%/templates/components/itilobject
Lines 6748-6765 Link Here
6748
@dir %%WWWDIR%%/templates/pages/setup/general
6849
@dir %%WWWDIR%%/templates/pages/setup/general
6749
@dir %%WWWDIR%%/templates/pages/tools
6850
@dir %%WWWDIR%%/templates/pages/tools
6750
@dir %%WWWDIR%%/vendor
6851
@dir %%WWWDIR%%/vendor
6751
@dir %%WWWDIR%%/vendor/blueimp
6752
@dir %%WWWDIR%%/vendor/blueimp/jquery-file-upload
6753
@dir %%WWWDIR%%/vendor/blueimp/jquery-file-upload/css
6754
@dir %%WWWDIR%%/vendor/blueimp/jquery-file-upload/img
6755
@dir %%WWWDIR%%/vendor/blueimp/jquery-file-upload/js
6756
@dir %%WWWDIR%%/vendor/blueimp/jquery-file-upload/js/cors
6757
@dir %%WWWDIR%%/vendor/blueimp/jquery-file-upload/js/vendor
6758
@dir %%WWWDIR%%/vendor/blueimp/jquery-file-upload/server
6759
@dir %%WWWDIR%%/vendor/blueimp/jquery-file-upload/server/gae-python
6760
@dir %%WWWDIR%%/vendor/blueimp/jquery-file-upload/server/gae-python/static
6761
@dir %%WWWDIR%%/vendor/blueimp/jquery-file-upload/server/php
6762
@dir %%WWWDIR%%/vendor/blueimp/jquery-file-upload/server/php/files
6763
@dir %%WWWDIR%%/vendor/brick
6852
@dir %%WWWDIR%%/vendor/brick
6764
@dir %%WWWDIR%%/vendor/brick/math
6853
@dir %%WWWDIR%%/vendor/brick/math
6765
@dir %%WWWDIR%%/vendor/brick/math/src
6854
@dir %%WWWDIR%%/vendor/brick/math/src
Lines 6952-6957 Link Here
6952
@dir %%WWWDIR%%/vendor/psr/http-factory
7041
@dir %%WWWDIR%%/vendor/psr/http-factory
6953
@dir %%WWWDIR%%/vendor/psr/http-factory/src
7042
@dir %%WWWDIR%%/vendor/psr/http-factory/src
6954
@dir %%WWWDIR%%/vendor/psr/http-message
7043
@dir %%WWWDIR%%/vendor/psr/http-message
7044
@dir %%WWWDIR%%/vendor/psr/http-message/docs/
6955
@dir %%WWWDIR%%/vendor/psr/http-message/src
7045
@dir %%WWWDIR%%/vendor/psr/http-message/src
6956
@dir %%WWWDIR%%/vendor/psr/log
7046
@dir %%WWWDIR%%/vendor/psr/log
6957
@dir %%WWWDIR%%/vendor/psr/log/Psr
7047
@dir %%WWWDIR%%/vendor/psr/log/Psr

Return to bug 272685