CVE-2008-2041
https://notcve.org/view.php?id=CVE-2008-2041
Multiple unspecified vulnerabilities in eGroupWare before 1.4.004 have unspecified attack vectors and "grave" impact when the web server has write access to a directory under the web document root. Múltiples vulnerabilidades no especificadas en eGroupWare anterior a 1.4.004, tienen vectores de ataque no especificados y un impacto "grave" cuando el servidor web tiene acceso de escritura a un directorio bajo la raíz de los documentos web. • http://secunia.com/advisories/30073 http://www.egroupware.org/news http://www.gentoo.org/security/en/glsa/glsa-200805-04.xml http://www.securityfocus.com/bid/28817 https://exchange.xforce.ibmcloud.com/vulnerabilities/42141 • CWE-94: Improper Control of Generation of Code ('Code Injection') •
CVE-2008-1502
https://notcve.org/view.php?id=CVE-2008-1502
The _bad_protocol_once function in phpgwapi/inc/class.kses.inc.php in KSES, as used in eGroupWare before 1.4.003, Moodle before 1.8.5, and other products, allows remote attackers to bypass HTML filtering and conduct cross-site scripting (XSS) attacks via a string containing crafted URL protocols. La función _bad_protocol_once en el archivo phpgwapi/inc/class.kses.inc.php en KSES, como es usado en eGroupWare versiones anteriores a 1.4.003, Moodle versiones anteriores a 1.8.5 y otros productos, permite a los atacantes remotos omitir el filtrado de HTML y conducir ataques de tipo cross-site scripting (XSS) por medio de una cadena que contiene protocolos URL especialmente diseñados. • http://docs.moodle.org/en/Release_Notes#Moodle_1.8.5 http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00006.html http://secunia.com/advisories/29491 http://secunia.com/advisories/30073 http://secunia.com/advisories/30986 http://secunia.com/advisories/31017 http://secunia.com/advisories/31018 http://secunia.com/advisories/31167 http://secunia.com/advisories/32400 http://secunia.com/advisories/32446 http://www.debian.org/security/2008/dsa-1691 http://www& • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •
CVE-2007-3155
https://notcve.org/view.php?id=CVE-2007-3155
Unspecified vulnerability in eGroupWare before 1.2.107-2 has unknown impact and attack vectors related to ADOdb. NOTE: due to lack of details from the vendor, it is uncertain whether this issue is already covered by another CVE identifier. Vulnerabilidad no especificada en eGroupWare anterior a 1.2.107-2 tiene un impacto desconocido y vectores de ataque relacionados con ADOdb. NOTA: debido a la carencia de detalles del vendedor, es incierto si este asunto fue cubierto ya por otro identificador de CVE. • http://osvdb.org/37188 http://secunia.com/advisories/25454 http://sourceforge.net/project/shownotes.php?release_id=513311&group_id=78745 http://sourceforge.net/project/shownotes.php?release_id=513749&group_id=78745 http://www.securityfocus.com/bid/24378 https://exchange.xforce.ibmcloud.com/vulnerabilities/34914 •
CVE-2007-3154
https://notcve.org/view.php?id=CVE-2007-3154
Unspecified vulnerability in Walter Zorn wz_tooltip.js (aka wz_tooltips) before 4.01, as used by eGroupWare before 1.2.107-2 and other packages, has unknown impact and remote attack vectors. Vulnerabilidad no especificada en Walter Zorn wz_tooltip.js (también conocido como wz_tooltips) anterior a 4.01, tal y como se utiliza por eGroupWare anterior a 1.2.107-2 y otros paquetes, tiene un impacto desconocido y vectores de ataque remotos. • http://osvdb.org/37187 http://secunia.com/advisories/25454 http://sourceforge.net/project/shownotes.php?release_id=513311&group_id=78745 http://sourceforge.net/project/shownotes.php?release_id=513749&group_id=78745 http://www.securityfocus.com/bid/24378 http://www.walterzorn.com/tooltip/history.htm https://exchange.xforce.ibmcloud.com/vulnerabilities/34913 •
CVE-2005-1203 – eGroupWare 1.0 - 'index.php?cats_app' SQL Injection
https://notcve.org/view.php?id=CVE-2005-1203
Multiple SQL injection vulnerabilities in index.php in eGroupware before 1.0.0.007 allow remote attackers to execute arbitrary SQL commands via the (1) filter or (2) cats_app parameter. • https://www.exploit-db.com/exploits/25437 https://www.exploit-db.com/exploits/25436 http://marc.info/?l=bugtraq&m=111401760125555&w=2 http://secunia.com/advisories/14982 http://security.gentoo.org/glsa/glsa-200504-24.xml http://sourceforge.net/project/shownotes.php?release_id=320768 http://www.gulftech.org/?node=research&article_id=00069-04202005 http://www.osvdb.org/15753 http://www.securityfocus.com/bid/13212 •