Page 7 of 53 results (0.004 seconds)

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

SQL injection vulnerability in register.php in Phorum before 3.4.6 allows remote attackers to execute arbitrary SQL commands via the hide_email parameter. • http://marc.info/?l=bugtraq&m=107487971405960&w=2 http://phorum.org •

CVSS: 4.3EPSS: 0%CPEs: 1EXPL: 3

Cross-site scripting (XSS) vulnerability in search.php in Phorum, possibly 5.0.7 beta and earlier, allows remote attackers to inject arbitrary HTML or web script via the subject parameter. • https://www.exploit-db.com/exploits/24331 http://phorum.org/cvs-changelog-5.txt http://securitytracker.com/id?1010787 http://www.securityfocus.com/bid/10822 https://exchange.xforce.ibmcloud.com/vulnerabilities/16831 •

CVSS: 4.3EPSS: 1%CPEs: 1EXPL: 1

Cross-site scripting (XSS) vulnerability in Phorum 5.0.11 and earlier allows remote attackers to inject arbitrary HTML or web script via search.php. NOTE: some sources have reported that the affected file is read.php, but this is inconsistent with the vendor's patch. • http://phorum.org/cvs-changelog-5.txt http://secunia.com/advisories/12980 http://securitytracker.com/id?1011921 http://www.securityfocus.com/bid/11538 https://exchange.xforce.ibmcloud.com/vulnerabilities/17846 •

CVSS: 7.5EPSS: 0%CPEs: 2EXPL: 4

SQL injection vulnerability in userlogin.php in Phorum 3.4.7 allows remote attackers to execute arbitrary SQL commands via doubly hex-encoded characters such as "%2527", which is translated to "'", as demonstrated using the phorum_uriauth parameter to list.php. • https://www.exploit-db.com/exploits/24016 http://marc.info/?l=bugtraq&m=108239796512897&w=2 http://secunia.com/advisories/11407 http://www.securityfocus.com/bid/10173 http://www.waraxe.us/index.php?modname=sa&id=19 https://exchange.xforce.ibmcloud.com/vulnerabilities/15894 •

CVSS: 4.3EPSS: 0%CPEs: 29EXPL: 3

Multiple cross-site scripting (XSS) vulnerabilities in Phorum 3.1 through 5.0.3 beta allow remote attackers to inject arbitrary web script or HTML via the (1) HTTP_REFERER parameter to login.php, (2) HTTP_REFERER parameter to register.php, or (3) target parameter to profile.php. • https://www.exploit-db.com/exploits/23819 https://www.exploit-db.com/exploits/23820 https://www.exploit-db.com/exploits/23818 http://marc.info/?l=bugtraq&m=107939479713136&w=2 http://phorum.org/changelog.txt http://secunia.com/advisories/11157 http://securitytracker.com/id?1009433 http://www.osvdb.org/4333 http://www.osvdb.org/4334 http://www.osvdb.org/4335 http://www.securityfocus.com/bid/9882 https://exchange.xforce.ibmcloud.com/vulnerabilities/15494 •