
CVE-2008-2041
https://notcve.org/view.php?id=CVE-2008-2041
30 Apr 2008 — Multiple unspecified vulnerabilities in eGroupWare before 1.4.004 have unspecified attack vectors and "grave" impact when the web server has write access to a directory under the web document root. Múltiples vulnerabilidades no especificadas en eGroupWare anterior a 1.4.004, tienen vectores de ataque no especificados y un impacto "grave" cuando el servidor web tiene acceso de escritura a un directorio bajo la raíz de los documentos web. • http://secunia.com/advisories/30073 • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVE-2008-1502
https://notcve.org/view.php?id=CVE-2008-1502
25 Mar 2008 — The _bad_protocol_once function in phpgwapi/inc/class.kses.inc.php in KSES, as used in eGroupWare before 1.4.003, Moodle before 1.8.5, and other products, allows remote attackers to bypass HTML filtering and conduct cross-site scripting (XSS) attacks via a string containing crafted URL protocols. La función _bad_protocol_once en el archivo phpgwapi/inc/class.kses.inc.php en KSES, como es usado en eGroupWare versiones anteriores a 1.4.003, Moodle versiones anteriores a 1.8.5 y otros productos, permite a los ... • http://docs.moodle.org/en/Release_Notes#Moodle_1.8.5 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVE-2007-3154
https://notcve.org/view.php?id=CVE-2007-3154
11 Jun 2007 — Unspecified vulnerability in Walter Zorn wz_tooltip.js (aka wz_tooltips) before 4.01, as used by eGroupWare before 1.2.107-2 and other packages, has unknown impact and remote attack vectors. Vulnerabilidad no especificada en Walter Zorn wz_tooltip.js (también conocido como wz_tooltips) anterior a 4.01, tal y como se utiliza por eGroupWare anterior a 1.2.107-2 y otros paquetes, tiene un impacto desconocido y vectores de ataque remotos. • http://osvdb.org/37187 •

CVE-2007-3155
https://notcve.org/view.php?id=CVE-2007-3155
11 Jun 2007 — Unspecified vulnerability in eGroupWare before 1.2.107-2 has unknown impact and attack vectors related to ADOdb. NOTE: due to lack of details from the vendor, it is uncertain whether this issue is already covered by another CVE identifier. Vulnerabilidad no especificada en eGroupWare anterior a 1.2.107-2 tiene un impacto desconocido y vectores de ataque relacionados con ADOdb. NOTA: debido a la carencia de detalles del vendedor, es incierto si este asunto fue cubierto ya por otro identificador de CVE. • http://osvdb.org/37188 •

CVE-2005-1202 – eGroupWare 1.0 - '/sitemgr-site/index.php?category_id' Cross-Site Scripting
https://notcve.org/view.php?id=CVE-2005-1202
21 Apr 2005 — Multiple cross-site scripting (XSS) vulnerabilities in eGroupware before 1.0.0.007 allow remote attackers to inject arbitrary web script or HTML via the (1) ab_id, (2) page, (3) type, or (4) lang parameter to index.php or (5) category_id parameter. • https://www.exploit-db.com/exploits/25435 •

CVE-2005-1203 – eGroupWare 1.0 - 'index.php?cats_app' SQL Injection
https://notcve.org/view.php?id=CVE-2005-1203
21 Apr 2005 — Multiple SQL injection vulnerabilities in index.php in eGroupware before 1.0.0.007 allow remote attackers to execute arbitrary SQL commands via the (1) filter or (2) cats_app parameter. • https://www.exploit-db.com/exploits/25437 •

CVE-2005-1129
https://notcve.org/view.php?id=CVE-2005-1129
16 Apr 2005 — eGroupWare 1.0.6 and earlier, when an e-mail is composed with an attachment but not sent, will send that attachment in the next e-mail, which may cause sensitive information to be sent to the wrong recipient. • http://archives.neohapsis.com/archives/bugtraq/2005-04/0157.html •

CVE-2004-1467 – eGroupWare 1.0 Calendar Module - 'date' Cross-Site Scripting
https://notcve.org/view.php?id=CVE-2004-1467
31 Dec 2004 — Multiple cross-site scripting (XSS) vulnerabilities in eGroupWare 1.0.00.003 and earlier allow remote attackers to inject arbitrary web script or HTML via (1) date or search text field in the calendar module, (2) Field parameter, Filter parameter, QField parameter, Start parameter or Search field in the address module, (3) Subject field in the message module or (4) Subject field in the Ticket module. • https://www.exploit-db.com/exploits/24403 •