CVE-2005-0843 – Phorum 3.x/5.0.x - HTTP Response Splitting
https://notcve.org/view.php?id=CVE-2005-0843
CRLF injection vulnerability in search.php in Phorum 5.0.14a allows remote attackers to perform HTTP Response Splitting attacks via the body parameter, which is included in the resulting Location header. • https://www.exploit-db.com/exploits/25258 http://marc.info/?l=bugtraq&m=111151651621097&w=2 http://secunia.com/advisories/14680 •
CVE-2005-0784
https://notcve.org/view.php?id=CVE-2005-0784
Multiple cross-site scripting (XSS) vulnerabilities in Phorum before 5.0.15 allow remote attackers to inject arbitrary web script or HTML via (1) the subject line to follow.php or (2) the subject line in the user's personal control panel. • http://marc.info/?l=bugtraq&m=111083279031544&w=2 http://secunia.com/advisories/14554 http://www.securityfocus.com/bid/12800 •
CVE-2005-0783 – Phorum 5.0.14 - Multiple Subject and Attachment HTML Injection Vulnerabilities
https://notcve.org/view.php?id=CVE-2005-0783
Cross-site scripting (XSS) vulnerability in Phorum before 5.0.14a allows remote attackers to inject arbitrary web script or HTML via the filename of an attached file. • https://www.exploit-db.com/exploits/25223 http://marc.info/?l=bugtraq&m=111083279031544&w=2 http://secunia.com/advisories/14554 http://www.securityfocus.com/bid/12800 •
CVE-2004-2240
https://notcve.org/view.php?id=CVE-2004-2240
Multiple SQL injection vulnerabilities in Phorum 5.0.11 and earlier allow remote attackers to modify SQL statements via (1) the query string in read.php or (2) unknown vectors in file.php. • http://phorum.org/cvs-changelog-5.txt http://secunia.com/advisories/12980 http://securitytracker.com/id?1011921 http://www.maxpatrol.com/advdetails.asp?id=15 http://www.maxpatrol.com/mp_advisory.asp http://www.osvdb.org/11129 http://www.securityfocus.com/bid/11538 https://exchange.xforce.ibmcloud.com/vulnerabilities/17847 •
CVE-2004-2243
https://notcve.org/view.php?id=CVE-2004-2243
Phorum allows remote attackers to hijack sessions of other users by stealing and replaying the session hash in the phorum_uriauth parameter, as demonstrated using profile.php. NOTE: the affected version was reported to be 4.3.7, but this may be erroneous. • http://archives.neohapsis.com/archives/fulldisclosure/2004-05/0999.html http://securitytracker.com/id?1010219 https://exchange.xforce.ibmcloud.com/vulnerabilities/16215 •