CVE-2008-6187 – GForge 4.5.19 - Multiple SQL Injections
https://notcve.org/view.php?id=CVE-2008-6187
SQL injection vulnerability in frs/shownotes.php in Gforge 4.5.19 and earlier allows remote attackers to execute arbitrary SQL commands via the release_id parameter. Vulnerabilidad de inyección SQL en frs/shownotes.php en Gforge v4.5.19 y versiones anteriores permite a atacantes remotos ejecutar comandos SQL de su elección a través del parámetro "release_id". • https://www.exploit-db.com/exploits/6707 http://gforge.org/tracker/index.php?func=detail&aid=5553&group_id=1&atid=105 http://secunia.com/advisories/32217 http://www.securityfocus.com/bid/31674 https://exchange.xforce.ibmcloud.com/vulnerabilities/45811 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •
CVE-2008-2381
https://notcve.org/view.php?id=CVE-2008-2381
SQL injection vulnerability in the create function in common/include/GroupJoinRequest.class in GForge 4.5 and 4.6 allows remote attackers to execute arbitrary SQL commands via the comments variable. Vulerabilidad de inyección SQL en la función create de common/include/GroupJoinRequest.class en Gforge v4.5 y v4.6 permite a atacantes remotos ejecutar comandos SQL de su elección a través de la variable comments. • http://gforge.org/scm/viewvc.php/branches/Branch_4_5/gforge/common/include/GroupJoinRequest.class?root=gforge&r1=4590&r2=6709 http://gforge.org/scm/viewvc.php/branches/Branch_4_5/gforge/common/include/GroupJoinRequest.class?root=gforge&view=log http://secunia.com/advisories/33229 http://secunia.com/advisories/33499 http://security-tracker.debian.net/tracker/CVE-2008-2381 http://www.securityfocus.com/bid/33086 http://www.securitytracker.com/id?1021510 http://www.vupen.com/english/advis • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •
CVE-2008-0167 – phpQLAdmin 2.2.7 - Multiple Remote File Inclusions
https://notcve.org/view.php?id=CVE-2008-0167
The write_array_file function in utils/include.pl in GForge 4.5.14 updates configuration files by truncating them to zero length and then writing new data, which might allow attackers to bypass intended access restrictions or have unspecified other impact in opportunistic circumstances. La función write_array_file en utils/include.pl de GForge 4.5.14 actualiza los archivos de configuración truncándolos a longitud cero y a continuación escribe datos nuevos, lo que podría permitir a atacantes evitar las restricciones de acceso planificadas o tener otros impactos no especificados en circunstancias oportunas. • https://www.exploit-db.com/exploits/5173 http://secunia.com/advisories/30088 http://secunia.com/advisories/30286 http://security.debian.org/pool/updates/main/g/gforge/gforge_4.5.14-22etch8.diff.gz http://www.debian.org/security/2008/dsa-1577 http://www.securityfocus.com/bid/29215 http://www.vupen.com/english/advisories/2008/1537/references https://exchange.xforce.ibmcloud.com/vulnerabilities/42456 • CWE-59: Improper Link Resolution Before File Access ('Link Following') •
CVE-2008-0173
https://notcve.org/view.php?id=CVE-2008-0173
SQL injection vulnerability in Gforge 4.6.99 and earlier allows remote attackers to execute arbitrary SQL commands via unspecified parameters, related to RSS exports. Vulnerabilidad de inyección SQL en Gforge 4.6.99 y anteriores permite a atacantes remotos ejecutar comandos SQL de su elección a través de parámetro no especificados, relacionado con la exportación de RSS. • http://secunia.com/advisories/28395 http://secunia.com/advisories/28451 http://www.debian.org/security/2008/dsa-1459 http://www.securityfocus.com/bid/27266 http://www.vupen.com/english/advisories/2008/0115 https://exchange.xforce.ibmcloud.com/vulnerabilities/39666 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •
CVE-2007-3921
https://notcve.org/view.php?id=CVE-2007-3921
gforge 3.1 and 4.5.14 allows local users to truncate arbitrary files via a symlink attack on temporary files. gforge 3.1 y 4.5.14 permite a usuarios locales truncar archivos de su elección mediante un ataque de enlace simbólico (symlink attack) sobre archivos temporales. • http://osvdb.org/42117 http://secunia.com/advisories/27549 http://secunia.com/advisories/27586 http://www.debian.org/security/2007/dsa-1402 http://www.securityfocus.com/bid/26373 http://www.vupen.com/english/advisories/2007/3773 https://exchange.xforce.ibmcloud.com/vulnerabilities/38329 • CWE-59: Improper Link Resolution Before File Access ('Link Following') •