Page 7 of 57 results (0.007 seconds)

CVSS: 4.3EPSS: 0%CPEs: 1EXPL: 2

Cross-site scripting (XSS) vulnerability in Phorum before 5.0.14a allows remote attackers to inject arbitrary web script or HTML via the filename of an attached file. • https://www.exploit-db.com/exploits/25223 http://marc.info/?l=bugtraq&m=111083279031544&w=2 http://secunia.com/advisories/14554 http://www.securityfocus.com/bid/12800 •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 3

Multiple SQL injection vulnerabilities in Phorum 5.0.11 and earlier allow remote attackers to modify SQL statements via (1) the query string in read.php or (2) unknown vectors in file.php. • http://phorum.org/cvs-changelog-5.txt http://secunia.com/advisories/12980 http://securitytracker.com/id?1011921 http://www.maxpatrol.com/advdetails.asp?id=15 http://www.maxpatrol.com/mp_advisory.asp http://www.osvdb.org/11129 http://www.securityfocus.com/bid/11538 https://exchange.xforce.ibmcloud.com/vulnerabilities/17847 •

CVSS: 7.5EPSS: 1%CPEs: 1EXPL: 0

Phorum allows remote attackers to hijack sessions of other users by stealing and replaying the session hash in the phorum_uriauth parameter, as demonstrated using profile.php. NOTE: the affected version was reported to be 4.3.7, but this may be erroneous. • http://archives.neohapsis.com/archives/fulldisclosure/2004-05/0999.html http://securitytracker.com/id?1010219 https://exchange.xforce.ibmcloud.com/vulnerabilities/16215 •

CVSS: 4.6EPSS: 0%CPEs: 6EXPL: 2

SQL injection vulnerability in follow.php in Phorum 5.0.12 and earlier allows remote authenticated users to execute arbitrary SQL command via the forum_id parameter. • http://lists.grok.org.uk/pipermail/full-disclosure/2004-November/028609.html http://marc.info/?l=bugtraq&m=110021385926870&w=2 http://secunia.com/advisories/13174 http://www.securityfocus.com/bid/11660 https://exchange.xforce.ibmcloud.com/vulnerabilities/18045 •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

SQL injection vulnerability in register.php in Phorum before 3.4.6 allows remote attackers to execute arbitrary SQL commands via the hide_email parameter. • http://marc.info/?l=bugtraq&m=107487971405960&w=2 http://phorum.org •