{"url":"http://public2.vulnerablecode.io/api/packages/84820?format=json","purl":"pkg:ebuild/www-apps/egroupware@1.4.004","type":"ebuild","namespace":"www-apps","name":"egroupware","version":"1.4.004","qualifiers":{},"subpath":"","is_vulnerable":false,"next_non_vulnerable_version":null,"latest_non_vulnerable_version":null,"affected_by_vulnerabilities":[],"fixing_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/14153?format=json","vulnerability_id":"VCID-ba3v-4d8e-mfgx","summary":"Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')\nThe _bad_protocol_once function in phpgwapi/inc/class.kses.inc.php in KSES, as used in eGroupWare before 1.4.003, Moodle before 1.8.5, and other products, allows remote attackers to bypass HTML filtering and conduct cross-site scripting (XSS) attacks via a string containing crafted URL protocols.","references":[{"reference_url":"http://docs.moodle.org/en/Release_Notes#Moodle_1.8.5","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://docs.moodle.org/en/Release_Notes#Moodle_1.8.5"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00006.html","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00006.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-1502.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-1502.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2008-1502","reference_id":"","reference_type":"","scores":[{"value":"0.01086","scoring_system":"epss","scoring_elements":"0.78109","published_at":"2026-05-15T12:55:00Z"},{"value":"0.01086","scoring_system":"epss","scoring_elements":"0.78095","published_at":"2026-05-14T12:55:00Z"},{"value":"0.01086","scoring_system":"epss","scoring_elements":"0.78052","published_at":"2026-05-12T12:55:00Z"},{"value":"0.01086","scoring_system":"epss","scoring_elements":"0.78034","published_at":"2026-05-11T12:55:00Z"},{"value":"0.01086","scoring_system":"epss","scoring_elements":"0.78044","published_at":"2026-05-09T12:55:00Z"},{"value":"0.01086","scoring_system":"epss","scoring_elements":"0.78027","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01086","scoring_system":"epss","scoring_elements":"0.77999","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01086","scoring_system":"epss","scoring_elements":"0.77989","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01086","scoring_system":"epss","scoring_elements":"0.77976","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01086","scoring_system":"epss","scoring_elements":"0.77968","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01086","scoring_system":"epss","scoring_elements":"0.77935","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01086","scoring_system":"epss","scoring_elements":"0.77853","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01086","scoring_system":"epss","scoring_elements":"0.78116","published_at":"2026-05-16T12:55:00Z"},{"value":"0.01086","scoring_system":"epss","scoring_elements":"0.7788","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01086","scoring_system":"epss","scoring_elements":"0.77941","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01086","scoring_system":"epss","scoring_elements":"0.77942","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01086","scoring_system":"epss","scoring_elements":"0.77905","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01086","scoring_system":"epss","scoring_elements":"0.77921","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01086","scoring_system":"epss","scoring_elements":"0.77894","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01086","scoring_system":"epss","scoring_elements":"0.77889","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01086","scoring_system":"epss","scoring_elements":"0.77862","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01086","scoring_system":"epss","scoring_elements":"0.77845","published_at":"2026-04-01T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2008-1502"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1502","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1502"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/41435","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/41435"},{"reference_url":"https://github.com/moodle/moodle","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/moodle/moodle"},{"reference_url":"https://usn.ubuntu.com/658-1","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://usn.ubuntu.com/658-1"},{"reference_url":"https://usn.ubuntu.com/658-1/","reference_id":"","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/658-1/"},{"reference_url":"https://web.archive.org/web/20080709031015/http://www.securityfocus.com/bid/28424","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://web.archive.org/web/20080709031015/http://www.securityfocus.com/bid/28424"},{"reference_url":"https://web.archive.org/web/20080828131802/http://secunia.com/advisories/31017","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://web.archive.org/web/20080828131802/http://secunia.com/advisories/31017"},{"reference_url":"https://web.archive.org/web/20080905011948/http://secunia.com/advisories/31018","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://web.archive.org/web/20080905011948/http://secunia.com/advisories/31018"},{"reference_url":"https://web.archive.org/web/20081011001554/http://secunia.com/advisories/31167","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://web.archive.org/web/20081011001554/http://secunia.com/advisories/31167"},{"reference_url":"https://web.archive.org/web/20081025081058/http://secunia.com/advisories/32400","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://web.archive.org/web/20081025081058/http://secunia.com/advisories/32400"},{"reference_url":"https://web.archive.org/web/20081028073531/http://secunia.com/advisories/32446","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://web.archive.org/web/20081028073531/http://secunia.com/advisories/32446"},{"reference_url":"https://web.archive.org/web/20090129193143/http://secunia.com/advisories/30986","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://web.archive.org/web/20090129193143/http://secunia.com/advisories/30986"},{"reference_url":"https://web.archive.org/web/20100819022833/http://secunia.com/advisories/30073","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://web.archive.org/web/20100819022833/http://secunia.com/advisories/30073"},{"reference_url":"https://web.archive.org/web/20120719035305/http://secunia.com/advisories/29491","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://web.archive.org/web/20120719035305/http://secunia.com/advisories/29491"},{"reference_url":"https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00331.html","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00331.html"},{"reference_url":"http://www.debian.org/security/2008/dsa-1691","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://www.debian.org/security/2008/dsa-1691"},{"reference_url":"http://www.debian.org/security/2009/dsa-1871","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://www.debian.org/security/2009/dsa-1871"},{"reference_url":"http://www.egroupware.org/changelog","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://www.egroupware.org/changelog"},{"reference_url":"http://www.egroupware.org/viewvc/branches/1.4/phpgwapi/inc/class.kses.inc.php?r1=23625&r2=25110&pathrev=25110","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://www.egroupware.org/viewvc/branches/1.4/phpgwapi/inc/class.kses.inc.php?r1=23625&r2=25110&pathrev=25110"},{"reference_url":"http://www.gentoo.org/security/en/glsa/glsa-200805-04.xml","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://www.gentoo.org/security/en/glsa/glsa-200805-04.xml"},{"reference_url":"http://www.openwall.com/lists/oss-security/2008/07/08/14","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://www.openwall.com/lists/oss-security/2008/07/08/14"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=454246","reference_id":"454246","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=454246"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=504243","reference_id":"504243","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=504243"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2008-1502","reference_id":"CVE-2008-1502","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2008-1502"},{"reference_url":"https://github.com/advisories/GHSA-v759-3wr5-p294","reference_id":"GHSA-v759-3wr5-p294","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"cvssv3.1_qr","scoring_elements":""}],"url":"https://github.com/advisories/GHSA-v759-3wr5-p294"},{"reference_url":"https://security.gentoo.org/glsa/200805-04","reference_id":"GLSA-200805-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200805-04"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/84820?format=json","purl":"pkg:ebuild/www-apps/egroupware@1.4.004","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-apps/egroupware@1.4.004"}],"aliases":["CVE-2008-1502","GHSA-v759-3wr5-p294"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ba3v-4d8e-mfgx"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60206?format=json","vulnerability_id":"VCID-zsh3-98k8-1ycj","summary":"Multiple vulnerabilities in eGroupWare may lead to execution of arbitrary\n    PHP code, the ability to upload malicious files and cross-site scripting\n    attacks.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2008-2041","reference_id":"","reference_type":"","scores":[{"value":"0.00526","scoring_system":"epss","scoring_elements":"0.6693","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00526","scoring_system":"epss","scoring_elements":"0.66968","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00526","scoring_system":"epss","scoring_elements":"0.66993","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00526","scoring_system":"epss","scoring_elements":"0.67018","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00526","scoring_system":"epss","scoring_elements":"0.6703","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00526","scoring_system":"epss","scoring_elements":"0.67049","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00526","scoring_system":"epss","scoring_elements":"0.67035","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00526","scoring_system":"epss","scoring_elements":"0.67004","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00526","scoring_system":"epss","scoring_elements":"0.67037","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00526","scoring_system":"epss","scoring_elements":"0.67052","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00526","scoring_system":"epss","scoring_elements":"0.67033","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00526","scoring_system":"epss","scoring_elements":"0.67053","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00526","scoring_system":"epss","scoring_elements":"0.67067","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00526","scoring_system":"epss","scoring_elements":"0.67066","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00526","scoring_system":"epss","scoring_elements":"0.67038","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00526","scoring_system":"epss","scoring_elements":"0.67079","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00526","scoring_system":"epss","scoring_elements":"0.67118","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00526","scoring_system":"epss","scoring_elements":"0.67091","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00526","scoring_system":"epss","scoring_elements":"0.67114","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00526","scoring_system":"epss","scoring_elements":"0.67177","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00526","scoring_system":"epss","scoring_elements":"0.67189","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00526","scoring_system":"epss","scoring_elements":"0.672","published_at":"2026-05-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2008-2041"},{"reference_url":"https://security.gentoo.org/glsa/200805-04","reference_id":"GLSA-200805-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200805-04"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/84820?format=json","purl":"pkg:ebuild/www-apps/egroupware@1.4.004","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-apps/egroupware@1.4.004"}],"aliases":["CVE-2008-2041"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-zsh3-98k8-1ycj"}],"risk_score":null,"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-apps/egroupware@1.4.004"}