This page displays vulnerability information about FreeBSD Ports.
The VUXML data was last processed by FreshPorts on 2024-04-19 20:48:44 UTC
List all Vulnerabilities, by package
List all Vulnerabilities, by date
k68These are the vulnerabilities relating to the commit you have selected:
VuXML ID | Description |
---|---|
39953788-6bbb-11d9-8bc9-000a95bc6fae | egroupware -- arbitrary file download in JiNN eGroupWare contains a bug in the JiNN component that allows a remote attacker to download arbitrary files. Discovery 2004-10-15 Entry 2005-01-21 eGroupWare < 1.0.0.006 http://cvs.sourceforge.net/viewcvs.py/egroupware/jinn/CHANGELOG#rev1.24 http://sourceforge.net/mailarchive/forum.php?thread_id=5915445&forum_id=35178 |
b4892b5b-fb1c-11d9-96ba-00909925db3e | egroupware -- multiple cross-site scripting (XSS) and SQL injection vulnerabilities Multiple cross-site scripting (XSS) vulnerabilities in eGroupware before 1.0.0.007 allow remote attackers to inject arbitrary web script or HTML via the (1) ab_id, (2) page, (3) type, or (4) lang parameter to index.php or (5) category_id parameter. Multiple SQL injection vulnerabilities in index.php in eGroupware before 1.0.0.007 allow remote attackers to execute arbitrary SQL commands via the (1) filter or (2) cats_app parameter. Discovery 2005-04-20 Entry 2005-07-23 egroupware < 1.0.0.007 CVE-2005-1202 CVE-2005-1203 http://sourceforge.net/project/shownotes.php?release_id=320768 |
e39caf05-2d6f-11df-aec2-000c29ba66d2 | egroupware -- two vulnerabilities Egroupware Team report:
Discovery 2010-03-09 Entry 2010-03-11 egroupware < 1.6.003 38609 http://secunia.com/advisories/38859/ http://www.egroupware.org/Home?category_id=95&item=93 |
e65ad1bf-0d8b-11da-90d0-00304823c0d3 | pear-XML_RPC -- remote PHP code injection vulnerability A Hardened-PHP Project Security Advisory reports:
Note that several applications contains an embedded version on XML_RPC, therefor making them the vulnerable to the same code injection vulnerability. Discovery 2005-08-15 Entry 2005-08-15 Modified 2005-09-04 pear-XML_RPC < 1.4.0 phpmyfaq < 1.4.11 drupal < 4.6.3 eGroupWare < 1.0.0.009 phpAdsNew < 2.0.5 phpgroupware < 0.9.16.007 b2evolution < 0.9.0.12_2 CVE-2005-2498 http://b2evolution.net/news/2005/08/31/fix_for_xml_rpc_vulnerability_again_1 http://downloads.phpgroupware.org/changelog http://drupal.org/files/sa-2005-004/advisory.txt http://phpadsnew.com/two/nucleus/index.php?itemid=45 http://sourceforge.net/project/shownotes.php?release_id=349626 http://www.hardened-php.net/advisory_142005.66.html http://www.hardened-php.net/advisory_152005.67.html http://www.phpmyfaq.de/advisory_2005-08-15.php |