CVE-2005-0345 – PHP-Fusion 4.0 - 'Viewthread.php' Information Disclosure
https://notcve.org/view.php?id=CVE-2005-0345
viewthread.php in php-fusion 4.x does not check the (1) forum_id or (2) forum_cat parameters, which allows remote attackers to view protected forums via the thread_id parameter. • https://www.exploit-db.com/exploits/25089 http://marc.info/?l=bugtraq&m=110788267311132&w=2 http://www.securityfocus.com/bid/12482 https://exchange.xforce.ibmcloud.com/vulnerabilities/19257 •
CVE-2004-2438
https://notcve.org/view.php?id=CVE-2004-2438
Cross-site scripting (XSS) vulnerability in PHP-Fusion 4.01 allows remote attackers to inject arbitrary web script or HTML via the (1) Submit News, (2) Submit Link or (3) Submit Article field. • http://secunia.com/advisories/12686 http://www.osvdb.org/10439 http://www.securityfocus.com/bid/11296 https://exchange.xforce.ibmcloud.com/vulnerabilities/17548 •
CVE-2004-1723
https://notcve.org/view.php?id=CVE-2004-1723
The (1) updateuser.php and (2) forums_prune.php scripts in PHP-Fusion 4.00 allow remote attackers to obtain sensitive information via a direct HTTP request, which reveals the installation path in an error message. • http://marc.info/?l=bugtraq&m=109285292901685&w=2 https://exchange.xforce.ibmcloud.com/vulnerabilities/17036 •
CVE-2004-2437
https://notcve.org/view.php?id=CVE-2004-2437
SQL injection vulnerability in PHP-Fusion 4.01 allows remote attackers to execute arbitrary SQL commands via the rowstart parameter to (1) index.php or (2) members.php, or (3) the comment_id parameter to comments.php. • http://secunia.com/advisories/12686 http://www.osvdb.org/10437 http://www.osvdb.org/10438 http://www.securityfocus.com/bid/11296 https://exchange.xforce.ibmcloud.com/vulnerabilities/17546 •
CVE-2004-1724 – PHP-Fusion Database Backup - Information Disclosure
https://notcve.org/view.php?id=CVE-2004-1724
The ReadMe First.txt file in PHP-Fusion 4.0 instructs users to set the permissions on the fusion_admin/db_backups directory to world read/write/execute (777), which allows remote attackers to download or view database backups, which have easily guessable filenames and contain the administrator username and password. • https://www.exploit-db.com/exploits/24384 http://marc.info/?l=bugtraq&m=109285292901685&w=2 http://secunia.com/advisories/12336 http://www.securityfocus.com/bid/10974 https://exchange.xforce.ibmcloud.com/vulnerabilities/17037 •