Page 2 of 9 results (0.002 seconds)

CVSS: 7.5EPSS: 11%CPEs: 4EXPL: 1

SQL injection vulnerability in PHP-Fusion 6.00.200 through 6.00.300 allows remote attackers to execute arbitrary SQL commands via the ratings parameter in multiple scripts, such as ratings_include.php. • https://www.exploit-db.com/exploits/1385 http://secunia.com/advisories/18190 http://securityreason.com/securityalert/272 http://www.osvdb.org/22049 http://www.securityfocus.com/archive/1/420109/100/0/threaded http://www.vupen.com/english/advisories/2005/3063 •

CVSS: 4.3EPSS: 1%CPEs: 6EXPL: 2

Multiple cross-site scripting (XSS) vulnerabilities in PHP-Fusion 6.00.200 through 6.00.300 allow remote attackers to inject arbitrary web script or HTML via (1) the sortby parameter in members.php and (2) IMG tags. • https://www.exploit-db.com/exploits/26872 http://secunia.com/advisories/18190 http://securityreason.com/securityalert/272 http://www.osvdb.org/22048 http://www.osvdb.org/22050 http://www.securityfocus.com/archive/1/420109/100/0/threaded http://www.securityfocus.com/bid/15931 http://www.vupen.com/english/advisories/2005/3063 •

CVSS: 5.0EPSS: 1%CPEs: 1EXPL: 0

Unspecified vulnerability in subheader.php in PHP-Fusion 6.00.206 and earlier allows remote attackers to obtain the full path via unspecified vectors. Vulnerabilidad no especificada en subheader.php de PHP-Fusion 6.00.206 y anteriores permite a atacantes remotos obtener la ruta completa mediante vectores no especificados. • http://myblog.it-security23.net/advisories/advisory-6.txt http://seclists.org/lists/bugtraq/2005/Nov/0232.html http://seclists.org/lists/bugtraq/2005/Nov/0237.html http://secunia.com/advisories/17664 http://www.osvdb.org/20990 http://www.vupen.com/english/advisories/2005/2504 •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 2

Multiple SQL injection vulnerabilities in PHP-Fusion 6.00.206 and earlier allow remote attackers to execute arbitrary SQL commands via (1) the forum_id parameter to options.php or (2) lastvisited parameter to viewforum.php. Múltiples vulnerabilidades de inyección de SQL en PHP-Fusion 6.00.206 y anteriores permiten a atacantes remotos ejecutar comandos SQL de su elección mediante (1) el parámetro "forum_id" de options.php, o (2) el parámetro "lastvisited" de viewforum.php. • http://myblog.it-security23.net/advisories/advisory-6.txt http://seclists.org/lists/bugtraq/2005/Nov/0232.html http://seclists.org/lists/bugtraq/2005/Nov/0237.html http://secunia.com/advisories/17664 http://www.osvdb.org/20991 http://www.osvdb.org/20992 http://www.securityfocus.com/bid/15502 http://www.vupen.com/english/advisories/2005/2504 •