CVE-2005-2836
https://notcve.org/view.php?id=CVE-2005-2836
Multiple cross-site scripting (XSS) vulnerabilities in Phorum 5.0.17a and earlier allow remote attackers to inject arbitrary web script or HTML via (1) the username parameter to register.php or (2) a signature of a logged-in user in "My Control Center," which is not properly handled by control.php. • http://archives.neohapsis.com/archives/fulldisclosure/2005-09/0018.html http://archives.neohapsis.com/archives/fulldisclosure/2005-09/0048.html http://secunia.com/advisories/16667 •
CVE-2005-0843 – Phorum 3.x/5.0.x - HTTP Response Splitting
https://notcve.org/view.php?id=CVE-2005-0843
CRLF injection vulnerability in search.php in Phorum 5.0.14a allows remote attackers to perform HTTP Response Splitting attacks via the body parameter, which is included in the resulting Location header. • https://www.exploit-db.com/exploits/25258 http://marc.info/?l=bugtraq&m=111151651621097&w=2 http://secunia.com/advisories/14680 •
CVE-2005-0784
https://notcve.org/view.php?id=CVE-2005-0784
Multiple cross-site scripting (XSS) vulnerabilities in Phorum before 5.0.15 allow remote attackers to inject arbitrary web script or HTML via (1) the subject line to follow.php or (2) the subject line in the user's personal control panel. • http://marc.info/?l=bugtraq&m=111083279031544&w=2 http://secunia.com/advisories/14554 http://www.securityfocus.com/bid/12800 •
CVE-2005-0783 – Phorum 5.0.14 - Multiple Subject and Attachment HTML Injection Vulnerabilities
https://notcve.org/view.php?id=CVE-2005-0783
Cross-site scripting (XSS) vulnerability in Phorum before 5.0.14a allows remote attackers to inject arbitrary web script or HTML via the filename of an attached file. • https://www.exploit-db.com/exploits/25223 http://marc.info/?l=bugtraq&m=111083279031544&w=2 http://secunia.com/advisories/14554 http://www.securityfocus.com/bid/12800 •
CVE-2004-2240
https://notcve.org/view.php?id=CVE-2004-2240
Multiple SQL injection vulnerabilities in Phorum 5.0.11 and earlier allow remote attackers to modify SQL statements via (1) the query string in read.php or (2) unknown vectors in file.php. • http://phorum.org/cvs-changelog-5.txt http://secunia.com/advisories/12980 http://securitytracker.com/id?1011921 http://www.maxpatrol.com/advdetails.asp?id=15 http://www.maxpatrol.com/mp_advisory.asp http://www.osvdb.org/11129 http://www.securityfocus.com/bid/11538 https://exchange.xforce.ibmcloud.com/vulnerabilities/17847 •