FreshPorts - VuXML

This page displays vulnerability information about FreeBSD Ports.

The VUXML data was last processed by FreshPorts on 2024-04-19 20:48:44 UTC

List all Vulnerabilities, by package

List all Vulnerabilities, by date

k68

These are the vulnerabilities relating to the commit you have selected:

VuXML IDDescription
39953788-6bbb-11d9-8bc9-000a95bc6faeegroupware -- arbitrary file download in JiNN

eGroupWare contains a bug in the JiNN component that allows a remote attacker to download arbitrary files.


Discovery 2004-10-15
Entry 2005-01-21
eGroupWare
< 1.0.0.006

http://cvs.sourceforge.net/viewcvs.py/egroupware/jinn/CHANGELOG#rev1.24
http://sourceforge.net/mailarchive/forum.php?thread_id=5915445&forum_id=35178
b4892b5b-fb1c-11d9-96ba-00909925db3eegroupware -- multiple cross-site scripting (XSS) and SQL injection vulnerabilities

Multiple cross-site scripting (XSS) vulnerabilities in eGroupware before 1.0.0.007 allow remote attackers to inject arbitrary web script or HTML via the (1) ab_id, (2) page, (3) type, or (4) lang parameter to index.php or (5) category_id parameter.

Multiple SQL injection vulnerabilities in index.php in eGroupware before 1.0.0.007 allow remote attackers to execute arbitrary SQL commands via the (1) filter or (2) cats_app parameter.


Discovery 2005-04-20
Entry 2005-07-23
egroupware
< 1.0.0.007

CVE-2005-1202
CVE-2005-1203
http://sourceforge.net/project/shownotes.php?release_id=320768
e39caf05-2d6f-11df-aec2-000c29ba66d2egroupware -- two vulnerabilities

Egroupware Team report:

Nahuel Grisolia from CYBSEC S.A. Security Systems found two security problems in EGroupware:

Serious remote command execution (allowing to run arbitrary command on the web server by simply issuing a HTTP request!).

A reflected cross-site scripting (XSS).

Both require NO valid EGroupware account and work without being logged in!


Discovery 2010-03-09
Entry 2010-03-11
egroupware
< 1.6.003

38609
http://secunia.com/advisories/38859/
http://www.egroupware.org/Home?category_id=95&item=93
e65ad1bf-0d8b-11da-90d0-00304823c0d3pear-XML_RPC -- remote PHP code injection vulnerability

A Hardened-PHP Project Security Advisory reports:

When the library parses XMLRPC requests/responses, it constructs a string of PHP code, that is later evaluated. This means any failure to properly handle the construction of this string can result in arbitrary execution of PHP code.

This new injection vulnerability is cause by not properly handling the situation, when certain XML tags are nested in the parsed document, that were never meant to be nested at all. This can be easily exploited in a way, that user-input is placed outside of string delimiters within the evaluation string, which obviously results in arbitrary code execution.

Note that several applications contains an embedded version on XML_RPC, therefor making them the vulnerable to the same code injection vulnerability.


Discovery 2005-08-15
Entry 2005-08-15
Modified 2005-09-04
pear-XML_RPC
< 1.4.0

phpmyfaq
< 1.4.11

drupal
< 4.6.3

eGroupWare
< 1.0.0.009

phpAdsNew
< 2.0.5

phpgroupware
< 0.9.16.007

b2evolution
< 0.9.0.12_2

CVE-2005-2498
http://b2evolution.net/news/2005/08/31/fix_for_xml_rpc_vulnerability_again_1
http://downloads.phpgroupware.org/changelog
http://drupal.org/files/sa-2005-004/advisory.txt
http://phpadsnew.com/two/nucleus/index.php?itemid=45
http://sourceforge.net/project/shownotes.php?release_id=349626
http://www.hardened-php.net/advisory_142005.66.html
http://www.hardened-php.net/advisory_152005.67.html
http://www.phpmyfaq.de/advisory_2005-08-15.php