CVE-2005-3158
https://notcve.org/view.php?id=CVE-2005-3158
SQL injection vulnerability in messages.php in PHP-Fusion 6.00.106 and 6.00.107 allows remote attackers to execute arbitrary SQL commands via the (1) pm_email_notify and (2) pm_save_sent parameters, a different vulnerability than CVE-2005-3157 and CVE-2005-3159. • http://marc.info/?l=bugtraq&m=112801702000944&w=2 http://www.gnucitizen.org/writings/php-fusion-messages.php-sql-injection-vulnerability.xhtml •
CVE-2005-3159 – PHP-Fusion 4.0/5.0/6.0 - 'messages.php' SQL Injection
https://notcve.org/view.php?id=CVE-2005-3159
SQL injection vulnerability in messages.php in PHP-Fusion allows remote attackers to execute arbitrary SQL commands via the msg_view parameter, a different vulnerability than CVE-2005-3157 and CVE-2005-3158. • https://www.exploit-db.com/exploits/26102 http://marc.info/?l=bugtraq&m=112811077320676&w=2 http://www.osvdb.org/18708 http://www.s4a.cc/forum/archive/index.php/t-3585.html http://www.securityfocus.com/bid/14489 •
CVE-2005-2783 – PHP-Fusion 4.0/5.0/6.0 - BBCode URL Tag Script Injection
https://notcve.org/view.php?id=CVE-2005-2783
Cross-site scripting (XSS) vulnerability in PHP-Fusion 6.00.107 and earlier allows remote attackers to inject arbitrary web script or HTML via nested, malformed URL BBCode tags. • https://www.exploit-db.com/exploits/26209 http://marc.info/?l=bugtraq&m=112533836103267&w=2 http://secunia.com/advisories/16632 http://www.securityfocus.com/bid/14688 https://exchange.xforce.ibmcloud.com/vulnerabilities/22056 •
CVE-2005-2401
https://notcve.org/view.php?id=CVE-2005-2401
PHP-Fusion allows remote attackers to inject arbitrary Cascading Style Sheets (CSS) via the BBCode color tag. PHP-Fusion permite que atacantes remotos inyecten CSS arbitrario mediante el tag de color BBCode. • http://secunia.com/advisories/16096 http://www.osvdb.org/18111 http://www.securityfocus.com/bid/14332 •
CVE-2005-2075 – PHP-Fusion 6.00.105 - Accessible Database Backups Download
https://notcve.org/view.php?id=CVE-2005-2075
PHP-Fusion 5.0 and 6.0 stores the database file with a predictable filename under the web document root with insufficient access control, which allows remote attackers to obtain sensitive information via a direct request to the filename in the administration/db_backups directory in PHP-Fusion 6.0 or the fusion_admin/db_backups directory in 5.0. • https://www.exploit-db.com/exploits/1068 http://dark-assassins.com/forum/viewtopic.php?t=142 http://secunia.com/advisories/15830 http://www.vupen.com/english/advisories/2005/0888 •