Page 6 of 29 results (0.002 seconds)

CVSS: 6.8EPSS: 1%CPEs: 1EXPL: 1

Cross-site scripting (XSS) vulnerability in Phorum before 3.4.3 allows remote attackers to inject arbitrary web script and HTML tags via a message with a "<<" before a tag name in the (1) subject, (2) author's name, or (3) author's e-mail. Vulnerabilidad de secuencias de comandos en sitios cruzados en Phorum anterior a la 3.4.3 permite que atacantes remotos inyecten script web arbitrario y tags HTML mediante un mensaje con una "<<" anterior a un nombre de etiqueta en (1) asunto, (2) nombre de autor, ó (3) dirección de correo electrónico del autor. • https://www.exploit-db.com/exploits/22579 http://marc.info/?l=bugtraq&m=105251043821533&w=2 http://marc.info/?l=bugtraq&m=105251421925394&w=2 http://www.securityfocus.com/bid/7545 https://exchange.xforce.ibmcloud.com/vulnerabilities/11974 •

CVSS: 4.3EPSS: 0%CPEs: 1EXPL: 1

Cross-site scripting (XSS) vulnerability in read.php in Phorum 3.3.2a allows remote attackers to inject arbitrary web script or HTML via (1) the t parameter or (2) the body of an email response. • http://marc.info/?l=vuln-dev&m=102121925428844&w=2 http://www.ifrance.com/kitetoua/tuto/5holes5.txt http://www.phorum.org/changelog.txt http://www.securityfocus.com/bid/4739 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 7.5EPSS: 81%CPEs: 1EXPL: 2

Phorum 3.3.2a allows remote attackers to execute arbitrary commands via an HTTP request to (1) plugin.php, (2) admin.php, or (3) del.php that modifies the PHORUM[settings_dir] variable to point to a directory that contains a PHP file with the commands. • https://www.exploit-db.com/exploits/21459 http://archives.neohapsis.com/archives/bugtraq/2002-05/0147.html http://archives.neohapsis.com/archives/bugtraq/2002-05/0153.html http://www.iss.net/security_center/static/9107.php http://www.phorum.org http://www.securityfocus.com/bid/4763 •

CVSS: 5.0EPSS: 0%CPEs: 1EXPL: 0

Phorum 3.3.2 allows remote attackers to determine the email addresses of the 10 most active users via a direct HTTP request to the stats.php program, which does not require authentication. • http://marc.info/?l=bugtraq&m=101508207206900&w=2 http://www.iss.net/security_center/static/8344.php http://www.securityfocus.com/bid/4226 •