Page 4 of 27 results (0.008 seconds)

CVSS: 7.5EPSS: 0%CPEs: 6EXPL: 2

SQL injection vulnerability in messages.php in PHP-Fusion allows remote attackers to execute arbitrary SQL commands via the msg_view parameter, a different vulnerability than CVE-2005-3157 and CVE-2005-3158. • https://www.exploit-db.com/exploits/26102 http://marc.info/?l=bugtraq&m=112811077320676&w=2 http://www.osvdb.org/18708 http://www.s4a.cc/forum/archive/index.php/t-3585.html http://www.securityfocus.com/bid/14489 •

CVSS: 4.3EPSS: 0%CPEs: 7EXPL: 2

Cross-site scripting (XSS) vulnerability in PHP-Fusion 6.00.107 and earlier allows remote attackers to inject arbitrary web script or HTML via nested, malformed URL BBCode tags. • https://www.exploit-db.com/exploits/26209 http://marc.info/?l=bugtraq&m=112533836103267&w=2 http://secunia.com/advisories/16632 http://www.securityfocus.com/bid/14688 https://exchange.xforce.ibmcloud.com/vulnerabilities/22056 •

CVSS: 5.0EPSS: 0%CPEs: 6EXPL: 0

PHP-Fusion allows remote attackers to inject arbitrary Cascading Style Sheets (CSS) via the BBCode color tag. PHP-Fusion permite que atacantes remotos inyecten CSS arbitrario mediante el tag de color BBCode. • http://secunia.com/advisories/16096 http://www.osvdb.org/18111 http://www.securityfocus.com/bid/14332 •

CVSS: 5.0EPSS: 1%CPEs: 2EXPL: 2

PHP-Fusion 5.0 and 6.0 stores the database file with a predictable filename under the web document root with insufficient access control, which allows remote attackers to obtain sensitive information via a direct request to the filename in the administration/db_backups directory in PHP-Fusion 6.0 or the fusion_admin/db_backups directory in 5.0. • https://www.exploit-db.com/exploits/1068 http://dark-assassins.com/forum/viewtopic.php?t=142 http://secunia.com/advisories/15830 http://www.vupen.com/english/advisories/2005/0888 •

CVSS: 4.3EPSS: 0%CPEs: 1EXPL: 0

Cross-site scripting (XSS) vulnerability in PHP-Fusion 6.0.105 allows remote attackers to inject arbitrary web script or HTML via a news or article post, possibly involving the (1) news_body, (2) article_description, or (3) article_body parameters to submit.php. • http://dark-assassins.com/forum/viewtopic.php?t=145 http://secunia.com/advisories/15830 http://www.securityfocus.com/bid/14066 http://www.vupen.com/english/advisories/2005/0888 •