Page 4 of 30 results (0.005 seconds)

CVSS: 6.8EPSS: 0%CPEs: 1EXPL: 0

Cross-site scripting (XSS) vulnerability in the core in Phorum before 5.1.18 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. Vulnerabilidad de secuencias de comandos en sitios cruzados (XSS) en el núcleo de Phorum anterior a 5.1.18 permite a atacantes remotos inyectar secuencias de comandos web o HTML de su elección a través de vectores no especificados. • http://osvdb.org/34727 http://www.phorum.org/phorum5/read.php?12%2C119757 http://www.vupen.com/english/advisories/2007/0410 https://exchange.xforce.ibmcloud.com/vulnerabilities/44201 •

CVSS: 5.5EPSS: 0%CPEs: 62EXPL: 2

Directory traversal vulnerability in pm.php in Phorum 5 allows remote authenticated users to include and execute arbitrary local files via directory traversal sequences in the GLOBALS[template] parameter, as demonstrated by injecting PHP sequences into a log file, which is then included by pm.php. Vulnerabilidad de salto de directorio en pm.php de Phorum 5 permite a atacantes remotos autenticados incluir y ejecutar ficheros locales mediante secuencias de salto de directorio en el parámetro GLOBALS[template], como ha sido demostrado inyectando secuencias PHP en un fichero de log, el cual cual es incluido por pm.php. • https://www.exploit-db.com/exploits/2008 http://retrogod.altervista.org/phorum5_local_incl_xpl.html http://www.phorum.org/phorum5/read.php?14%2C114358 http://www.securityfocus.com/archive/1/439976/100/0/threaded http://www.vupen.com/english/advisories/2006/2794 •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

SQL injection vulnerability in search.php in Phorum 5.1.14 and earlier allows remote attackers to execute arbitrary SQL commands via the page parameter. NOTE: the vendor has disputed this report, stating "If a non positive integer or non-integer is used for the page parameter for a search URL, the search query will use a negative number for the LIMIT clause. This causes the query to break, showing no results. It IS NOT however a sql injection error." While the original report is from a researcher with mixed accuracy, as of 20060703, CVE does not have any additional information regarding this issue ** DISCUTIDA ** Vulnerabilidad de inyección SQL en search.php en Phorum v5.1.14 y anteriores permite a atacantes remotos ejecutar comandos SQL de su elección a través del parámetro page. • http://pridels0.blogspot.com/2006/06/phorum-sql-injection-vuln.html http://www.osvdb.org/27165 http://www.phorum.org/cgi-bin/trac.cgi/ticket/382#preview http://www.phorum.org/phorum5/read.php?14%2C114358 https://exchange.xforce.ibmcloud.com/vulnerabilities/27369 •

CVSS: 7.5EPSS: 8%CPEs: 44EXPL: 2

PHP remote file inclusion vulnerability in common.php in PHORUM 5.1.13 and earlier allows remote attackers to execute arbitrary PHP code via a URL in the PHORUM[http_path] parameter. NOTE: this issue has been disputed by the vendor, who states "common.php is checked on the very first line of non-comment code that it is not being called directly. It has been this way in all 5.x version of Phorum." CVE analysis concurs with the vendor ** EN DISPUTA ** PHP vulnerabilidad de inclusión de archivo remoto en common.php en Phorum v5.1.13 y anteriores permite a atacantes remotos ejecutar código PHP arbitrario a través de una URL en el parámetro Phorum [http_path]. NOTA: este problema ha sido discutido por el vendedor, quien afirma que "common.php se comprueba en la primera línea de código no comment-que no se está llamando directamente Ha sido así en todas las versiones 5.x de Phorum." • https://www.exploit-db.com/exploits/27363 http://securityreason.com/securityalert/1103 http://www.securityfocus.com/archive/1/436863/100/0/threaded http://www.securityfocus.com/archive/1/437988/100/0/threaded http://www.securityfocus.com/bid/16977 https://exchange.xforce.ibmcloud.com/vulnerabilities/27064 •

CVSS: 4.3EPSS: 0%CPEs: 42EXPL: 1

Multiple cross-site scripting (XSS) vulnerabilities in Phorum 5.0.17a and earlier allow remote attackers to inject arbitrary web script or HTML via (1) the username parameter to register.php or (2) a signature of a logged-in user in "My Control Center," which is not properly handled by control.php. • http://archives.neohapsis.com/archives/fulldisclosure/2005-09/0018.html http://archives.neohapsis.com/archives/fulldisclosure/2005-09/0048.html http://secunia.com/advisories/16667 •