Page 3 of 21 results (0.001 seconds)

CVSS: 7.5EPSS: 0%CPEs: 8EXPL: 2

phpgwapi/js/fckeditor/editor/dialog/fck_spellerpages/spellerpages/serverscripts/spellchecker.php in EGroupware 1.4.001+.002; 1.6.001+.002 and possibly other versions before 1.6.003; and EPL 9.1 before 9.1.20100309 and 9.2 before 9.2.20100309; allows remote attackers to execute arbitrary commands via shell metacharacters in the (1) aspell_path or (2) spellchecker_lang parameters. phpgwapi/js/fckeditor/editor/dialog/fck_spellerpages/spellerpages/serverscripts/spellchecker.php en EGroupware v1.4.001+.002; v1.6.001+.002 y posiblemente otras versiones anteriores a v1.6.003 y EPL v9.1 anterior a v9.1.20100309 y v9.2 anterior a v9.2.20100309; permite a atacantes remotos ejecutar código arbitrario a través de metacaracteres shell en los parámetros (1) aspell_path y (2) spellchecker_lang • https://www.exploit-db.com/exploits/11777 http://www.debian.org/security/2010/dsa-2013 http://www.egroupware.org/news?item=93 http://www.exploit-db.com/exploits/11777 http://www.openwall.com/lists/oss-security/2010/09/21/7 • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVSS: 4.3EPSS: 0%CPEs: 8EXPL: 2

Cross-site scripting (XSS) vulnerability in login.php in EGroupware 1.4.001+.002; 1.6.001+.002 and possibly other versions before 1.6.003; and EPL 9.1 before 9.1.20100309 and 9.2 before 9.2.20100309; allows remote attackers to inject arbitrary web script or HTML via the lang parameter. Múltiples vulnerabilidades de ejecución de secuencias de comandos en sitios cruzados (XSS) en EGroupware v1.4.001+.002; v1.6.001+.002 y posiblemente otras versioens anteriores a v1.6.003; y EPL v9.1 anterior a v9.1.20100309 y v9.2 anterior a v9.2.20100309; permite a atacantes remotos inyectar secuencias de comandos web o HTML a través del parámetro lang • https://www.exploit-db.com/exploits/11777 http://www.debian.org/security/2010/dsa-2013 http://www.egroupware.org/news?item=93 http://www.exploit-db.com/exploits/11777 http://www.openwall.com/lists/oss-security/2010/09/21/7 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 10.0EPSS: 0%CPEs: 3EXPL: 0

Multiple unspecified vulnerabilities in eGroupWare before 1.4.004 have unspecified attack vectors and "grave" impact when the web server has write access to a directory under the web document root. Múltiples vulnerabilidades no especificadas en eGroupWare anterior a 1.4.004, tienen vectores de ataque no especificados y un impacto "grave" cuando el servidor web tiene acceso de escritura a un directorio bajo la raíz de los documentos web. • http://secunia.com/advisories/30073 http://www.egroupware.org/news http://www.gentoo.org/security/en/glsa/glsa-200805-04.xml http://www.securityfocus.com/bid/28817 https://exchange.xforce.ibmcloud.com/vulnerabilities/42141 • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVSS: 4.3EPSS: 0%CPEs: 43EXPL: 1

The _bad_protocol_once function in phpgwapi/inc/class.kses.inc.php in KSES, as used in eGroupWare before 1.4.003, Moodle before 1.8.5, and other products, allows remote attackers to bypass HTML filtering and conduct cross-site scripting (XSS) attacks via a string containing crafted URL protocols. La función _bad_protocol_once en el archivo phpgwapi/inc/class.kses.inc.php en KSES, como es usado en eGroupWare versiones anteriores a 1.4.003, Moodle versiones anteriores a 1.8.5 y otros productos, permite a los atacantes remotos omitir el filtrado de HTML y conducir ataques de tipo cross-site scripting (XSS) por medio de una cadena que contiene protocolos URL especialmente diseñados. • http://docs.moodle.org/en/Release_Notes#Moodle_1.8.5 http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00006.html http://secunia.com/advisories/29491 http://secunia.com/advisories/30073 http://secunia.com/advisories/30986 http://secunia.com/advisories/31017 http://secunia.com/advisories/31018 http://secunia.com/advisories/31167 http://secunia.com/advisories/32400 http://secunia.com/advisories/32446 http://www.debian.org/security/2008/dsa-1691 http://www& • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 4.3EPSS: 0%CPEs: 1EXPL: 0

Multiple cross-site scripting (XSS) vulnerabilities in eGroupWare 1.4.001 allow remote attackers to inject arbitrary web script or HTML via the cat_data[color] parameter to (1) preferences/inc/class.uicategories.inc.php and (2) admin/inc/class.uicategories.inc.php. Múltiples vulnerabilidades de secuencias de comandos en sitios cruzados (XSS) en el eGroupWare 1.4.001 permiten a atacantes remotos la inyección de secuencias de comandos web o HTML de su elección a través del parámetro cat_data[color] en el (1) preferences/inc/class.uicategories.inc.php y (2) admin/inc/class.uicategories.inc.php. • http://secunia.com/advisories/26944 http://www.egroupware.org/news http://www.egroupware.org/viewvc/branches/1.4/admin/inc/class.uicategories.inc.php?r1=23611&r2=24443&pathrev=24443 http://www.egroupware.org/viewvc/branches/1.4/preferences/inc/class.uicategories.inc.php?r1=23741&r2=24443&pathrev=24443 http://www.securityfocus.com/bid/25800 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •