Vulnerabilities > Gforge > High
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2009-11-24 | CVE-2009-4070 | SQL Injection vulnerability in Gforge 4.5.14/4.7.3 SQL injection vulnerability in GForge 4.5.14, 4.7.3, and possibly other versions allows remote attackers to execute arbitrary SQL commands via unknown vectors. | 7.5 |
2009-02-19 | CVE-2008-6189 | SQL Injection vulnerability in Gforge 4.5.19 SQL injection vulnerability in GForge 4.5.19 allows remote attackers to execute arbitrary SQL commands via the offset parameter to (1) new/index.php, (2) news/index.php, and (3) top/topusers.php, which is not properly handled in database-pgsql.php. | 7.5 |
2009-02-19 | CVE-2008-6188 | SQL Injection vulnerability in Gforge SQL injection vulnerability in people/editprofile.php in Gforge 4.6 rc1 and earlier allows remote attackers to execute arbitrary SQL commands via the skill_edit[] parameter. | 7.5 |
2009-02-19 | CVE-2008-6187 | SQL Injection vulnerability in Gforge SQL injection vulnerability in frs/shownotes.php in Gforge 4.5.19 and earlier allows remote attackers to execute arbitrary SQL commands via the release_id parameter. | 7.5 |
2009-01-02 | CVE-2008-2381 | SQL Injection vulnerability in Gforge 4.5/4.6 SQL injection vulnerability in the create function in common/include/GroupJoinRequest.class in GForge 4.5 and 4.6 allows remote attackers to execute arbitrary SQL commands via the comments variable. | 7.5 |
2008-01-15 | CVE-2008-0173 | SQL Injection vulnerability in Gforge SQL injection vulnerability in Gforge 4.6.99 and earlier allows remote attackers to execute arbitrary SQL commands via unspecified parameters, related to RSS exports. | 7.5 |
2007-09-06 | CVE-2007-3913 | Improper Input Validation vulnerability in Gforge SQL injection vulnerability in Gforge before 3.1 allows remote attackers to execute arbitrary SQL commands via unspecified vectors. | 7.5 |
2007-04-26 | CVE-2007-2298 | Remote File Include vulnerability in Garennes Repertoire_Config Multiple PHP remote file inclusion vulnerabilities in Garennes 0.6.1 and earlier allow remote attackers to execute arbitrary PHP code via a URL in the repertoire_config parameter to index.php in (1) cpe/, (2) direction/, or (3) professeurs/. | 7.5 |