
CVE-2006-2460 – Sugar Suite Open Source 4.2 - 'OptimisticLock' Command Execution
https://notcve.org/view.php?id=CVE-2006-2460
19 May 2006 — Sugar Suite Open Source (SugarCRM) 4.2 and earlier, when register_globals is enabled, does not protect critical variables such as $_GLOBALS and $_SESSION from modification, which allows remote attackers to conduct attacks such as directory traversal or PHP remote file inclusion, as demonstrated by modifying the GLOBALS[sugarEntry] parameter. • https://www.exploit-db.com/exploits/1785 •

CVE-2005-4086 – SugarSuite Open Source 4.0beta - Remote Code Execution
https://notcve.org/view.php?id=CVE-2005-4086
08 Dec 2005 — Directory traversal vulnerability in acceptDecline.php in Sugar Suite Open Source Customer Relationship Management (SugarCRM) 4.0 beta and earlier allows remote attackers to include arbitrary local files via ".." sequences in the beanFiles array parameter. • https://www.exploit-db.com/exploits/1359 •

CVE-2005-4087 – SugarSuite Open Source 4.0beta - Remote Code Execution
https://notcve.org/view.php?id=CVE-2005-4087
08 Dec 2005 — PHP remote file include vulnerability in acceptDecline.php in Sugar Suite Open Source Customer Relationship Management (SugarCRM) 4.0 beta and earlier allows remote attackers to execute arbitrary PHP code via a URL in the beanFiles array parameter. • https://www.exploit-db.com/exploits/1359 •

CVE-2005-0266
https://notcve.org/view.php?id=CVE-2005-0266
01 Jan 2005 — Cross-site scripting (XSS) vulnerability in index.php in SugarCRM 1.X allows remote attackers to inject arbitrary web script or HTML via the (1) return_module, (2) return_action, (3) name, (4) module, or (5) record parameter. • http://marc.info/?l=bugtraq&m=110461706232174&w=2 •

CVE-2004-1226
https://notcve.org/view.php?id=CVE-2004-1226
15 Dec 2004 — SugarCRM Sugar Sales 2.0.1c and earlier allows remote attackers to gain sensitive information via certain requests to scripts that contain invalid input, which reveals the path in an error message, as demonstrated using phprint.php with an empty module parameter. • http://marc.info/?l=bugtraq&m=110295433323795&w=2 •

CVE-2004-1225 – SugarCRM 1.x/2.0 Module - 'record' SQL Injection
https://notcve.org/view.php?id=CVE-2004-1225
15 Dec 2004 — SQL injection vulnerability in SugarCRM Sugar Sales before 2.0.1a allows remote attackers to execute arbitrary SQL commands and gain privileges via the record parameter in a DetailView action to index.php, and record parameters in other functionality. • https://www.exploit-db.com/exploits/24768 •

CVE-2004-1228
https://notcve.org/view.php?id=CVE-2004-1228
15 Dec 2004 — The install scripts in SugarCRM Sugar Sales 2.0.1c and earlier are not removed after installation, which allows attackers to obtain the MySQL administrative password in cleartext from an installation form, or to cause a denial of service by changing database settings to the default. • http://marc.info/?l=bugtraq&m=110295433323795&w=2 •

CVE-2004-1227 – SugarCRM 1.x/2.0 Module - Traversal Arbitrary File Access
https://notcve.org/view.php?id=CVE-2004-1227
15 Dec 2004 — Directory traversal vulnerability in SugarCRM Sugar Sales 2.0.1c and earlier allows remote attackers to read arbitrary files and possibly execute arbitrary PHP code via .. (dot dot) sequences in the (1) module, (2) action, or (3) theme parameters to index.php, (4) the theme parameter to Login.php, and possibly other parameters or scripts. • https://www.exploit-db.com/exploits/24769 •