CVE-2004-1518
https://notcve.org/view.php?id=CVE-2004-1518
SQL injection vulnerability in follow.php in Phorum 5.0.12 and earlier allows remote authenticated users to execute arbitrary SQL command via the forum_id parameter. • http://lists.grok.org.uk/pipermail/full-disclosure/2004-November/028609.html http://marc.info/?l=bugtraq&m=110021385926870&w=2 http://secunia.com/advisories/13174 http://www.securityfocus.com/bid/11660 https://exchange.xforce.ibmcloud.com/vulnerabilities/18045 •
CVE-2004-2110
https://notcve.org/view.php?id=CVE-2004-2110
SQL injection vulnerability in register.php in Phorum before 3.4.6 allows remote attackers to execute arbitrary SQL commands via the hide_email parameter. • http://marc.info/?l=bugtraq&m=107487971405960&w=2 http://phorum.org •
CVE-2004-2242 – Phorum 5.0.7 - Search Script Cross-Site Scripting
https://notcve.org/view.php?id=CVE-2004-2242
Cross-site scripting (XSS) vulnerability in search.php in Phorum, possibly 5.0.7 beta and earlier, allows remote attackers to inject arbitrary HTML or web script via the subject parameter. • https://www.exploit-db.com/exploits/24331 http://phorum.org/cvs-changelog-5.txt http://securitytracker.com/id?1010787 http://www.securityfocus.com/bid/10822 https://exchange.xforce.ibmcloud.com/vulnerabilities/16831 •
CVE-2004-2241
https://notcve.org/view.php?id=CVE-2004-2241
Cross-site scripting (XSS) vulnerability in Phorum 5.0.11 and earlier allows remote attackers to inject arbitrary HTML or web script via search.php. NOTE: some sources have reported that the affected file is read.php, but this is inconsistent with the vendor's patch. • http://phorum.org/cvs-changelog-5.txt http://secunia.com/advisories/12980 http://securitytracker.com/id?1011921 http://www.securityfocus.com/bid/11538 https://exchange.xforce.ibmcloud.com/vulnerabilities/17846 •
CVE-2004-1938 – Phorum 3.4.x - Phorum_URIAuth SQL Injection
https://notcve.org/view.php?id=CVE-2004-1938
SQL injection vulnerability in userlogin.php in Phorum 3.4.7 allows remote attackers to execute arbitrary SQL commands via doubly hex-encoded characters such as "%2527", which is translated to "'", as demonstrated using the phorum_uriauth parameter to list.php. • https://www.exploit-db.com/exploits/24016 http://marc.info/?l=bugtraq&m=108239796512897&w=2 http://secunia.com/advisories/11407 http://www.securityfocus.com/bid/10173 http://www.waraxe.us/index.php?modname=sa&id=19 https://exchange.xforce.ibmcloud.com/vulnerabilities/15894 •