Filtered by vendor Phpgroupware
Subscriptions
Total
27 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2004-1383 | 1 Phpgroupware | 1 Phpgroupware | 2025-04-03 | N/A |
Multiple SQL injection vulnerabilities in phpGroupWare 0.9.16.003 and earlier allow remote attackers to execute arbitrary SQL statements via the (1) order, (2) project_id, (3) pro_main, or (4) hours_id parameters to index.php or (5) ticket_id to viewticket_details.php. | ||||
CVE-2001-0043 | 1 Phpgroupware | 1 Phpgroupware | 2025-04-03 | N/A |
phpGroupWare before 0.9.7 allows remote attackers to execute arbitrary PHP commands by specifying a malicious include file in the phpgw_info parameter of the phpgw.inc.php program. | ||||
CVE-2004-1385 | 1 Phpgroupware | 1 Phpgroupware | 2025-04-03 | N/A |
phpGroupWare 0.9.16.003 and earlier allows remote attackers to gain sensitive information via (1) unexpected characters in the session ID such as shell metacharacters, (2) an invalid appname parameter to preferences.php or (3) an invalid menuaction parameter to index.php, which reveals the web server path in an error message. | ||||
CVE-2002-0536 | 1 Phpgroupware | 1 Phpgroupware | 2025-04-03 | N/A |
PHPGroupware 0.9.12 and earlier, when running with the magic_quotes_gpc feature disabled, allows remote attackers to compromise the database via a SQL injection attack. | ||||
CVE-2003-0657 | 1 Phpgroupware | 1 Phpgroupware | 2025-04-03 | N/A |
Multiple SQL injection vulnerabilities in the infolog module for phpgroupware 0.9.14 and earlier could allow remote attackers to conduct unauthorized database actions. | ||||
CVE-2004-0016 | 1 Phpgroupware | 1 Phpgroupware | 2025-04-03 | N/A |
The calendar module for phpgroupware 0.9.14 does not enforce the "save extension" feature for holiday files, which allows remote attackers to create and execute PHP files. | ||||
CVE-2004-0017 | 1 Phpgroupware | 1 Phpgroupware | 2025-04-03 | N/A |
Multiple SQL injection vulnerabilities in the (1) calendar and (2) infolog modules for phpgroupware 0.9.14 allow remote attackers to perform unauthorized database operations. |