Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2011-3382 (GCVE-0-2011-3382)
Vulnerability from cvelistv5 – Published: 2011-09-08 18:00 – Updated: 2024-09-16 22:20
VLAI?
EPSS
Summary
Cross-site scripting (XSS) vulnerability in Phorum before 5.2.16 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T23:29:56.880Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "JVN#71435255",
"tags": [
"third-party-advisory",
"x_refsource_JVN",
"x_transferred"
],
"url": "http://jvn.jp/en/jp/JVN71435255/index.html"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://www.phorum.org/phorum5/read.php?64%2C147504"
},
{
"name": "JVNDB-2011-000068",
"tags": [
"third-party-advisory",
"x_refsource_JVNDB",
"x_transferred"
],
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2011-000068"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Cross-site scripting (XSS) vulnerability in Phorum before 5.2.16 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2011-09-08T18:00:00.000Z",
"orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"shortName": "jpcert"
},
"references": [
{
"name": "JVN#71435255",
"tags": [
"third-party-advisory",
"x_refsource_JVN"
],
"url": "http://jvn.jp/en/jp/JVN71435255/index.html"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://www.phorum.org/phorum5/read.php?64%2C147504"
},
{
"name": "JVNDB-2011-000068",
"tags": [
"third-party-advisory",
"x_refsource_JVNDB"
],
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2011-000068"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "vultures@jpcert.or.jp",
"ID": "CVE-2011-3382",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Cross-site scripting (XSS) vulnerability in Phorum before 5.2.16 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "JVN#71435255",
"refsource": "JVN",
"url": "http://jvn.jp/en/jp/JVN71435255/index.html"
},
{
"name": "http://www.phorum.org/phorum5/read.php?64,147504",
"refsource": "MISC",
"url": "http://www.phorum.org/phorum5/read.php?64,147504"
},
{
"name": "JVNDB-2011-000068",
"refsource": "JVNDB",
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2011-000068"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"assignerShortName": "jpcert",
"cveId": "CVE-2011-3382",
"datePublished": "2011-09-08T18:00:00.000Z",
"dateReserved": "2011-09-01T00:00:00.000Z",
"dateUpdated": "2024-09-16T22:20:49.793Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
FKIE_CVE-2011-3382
Vulnerability from fkie_nvd - Published: 2011-09-08 18:55 - Updated: 2025-04-11 00:51
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in Phorum before 5.2.16 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:phorum:phorum:*:*:*:*:*:*:*:*",
"matchCriteriaId": "38B3FD6E-D73A-4018-B4D5-158C0B288B1B",
"versionEndIncluding": "5.2.15",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:phorum:phorum:3.0.7:*:*:*:*:*:*:*",
"matchCriteriaId": "740F974F-D679-472C-966A-3E4C334E3C0A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:phorum:phorum:3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "32D7E47E-10F5-4F50-8940-951B2C0011CA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:phorum:phorum:3.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "16042FAE-7370-425C-8810-4F9363B7CAA4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:phorum:phorum:3.1.1_pre:*:*:*:*:*:*:*",
"matchCriteriaId": "B4A25A6F-62CA-4C76-9D4C-821B1E15FB1B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:phorum:phorum:3.1.1_rc2:*:*:*:*:*:*:*",
"matchCriteriaId": "6247DB0C-37B6-44EF-8B92-8CFCDA537039",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:phorum:phorum:3.1.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "4C46298C-2492-4102-A264-E2A1D45AD423",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:phorum:phorum:3.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "1A2AD59F-42DF-407A-8FCA-E6E0067A2B3A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:phorum:phorum:3.2:*:*:*:*:*:*:*",
"matchCriteriaId": "17E1044B-2101-4719-8749-17DD22F46055",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:phorum:phorum:3.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "B7E17261-A010-4929-99E5-A2511F205B72",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:phorum:phorum:3.2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "A461E2EB-9964-44DE-9C25-562D239201F6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:phorum:phorum:3.2.3a:*:*:*:*:*:*:*",
"matchCriteriaId": "9CB6A4EC-D351-4EF8-8C6A-294A47DDCCC7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:phorum:phorum:3.2.3b:*:*:*:*:*:*:*",
"matchCriteriaId": "2B10230A-7D72-418E-8A29-E9F20762C43A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:phorum:phorum:3.2.4:*:*:*:*:*:*:*",
"matchCriteriaId": "368C8142-836A-4FDB-9CD8-385FE06B9A62",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:phorum:phorum:3.2.5:*:*:*:*:*:*:*",
"matchCriteriaId": "1470761E-DA6E-4D2A-B226-1ED782FB3654",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:phorum:phorum:3.2.6:*:*:*:*:*:*:*",
"matchCriteriaId": "FEB3ED23-821D-42FA-A24F-F2EDDA43D7B6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:phorum:phorum:3.2.7:*:*:*:*:*:*:*",
"matchCriteriaId": "88BA8736-5998-42E0-81E4-76E3669F8112",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:phorum:phorum:3.2.8:*:*:*:*:*:*:*",
"matchCriteriaId": "DC9811C9-EE92-4115-B81F-7A3030390BD1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:phorum:phorum:3.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "5A196AD2-7E48-40F4-923E-437FA76C97D2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:phorum:phorum:3.3.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "91D147F0-FF83-4FF4-AEF1-71366E874876",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:phorum:phorum:3.3.2:*:*:*:*:*:*:*",
"matchCriteriaId": "C6D87C46-D9EC-418B-9C8C-71E7149C72D4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:phorum:phorum:3.3.2a:*:*:*:*:*:*:*",
"matchCriteriaId": "A7F6BE0A-7E2F-457D-B4BA-6BAE1B44E7D3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:phorum:phorum:3.3.2b3:*:*:*:*:*:*:*",
"matchCriteriaId": "C990B390-4768-41B0-BB8B-A56C2524623F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:phorum:phorum:3.4:*:*:*:*:*:*:*",
"matchCriteriaId": "6650BE9D-5F4B-4B22-BD7E-ABCC067D5455",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:phorum:phorum:3.4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "1B8E0CA9-F6D4-4DD3-A3EA-F3A40965261B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:phorum:phorum:3.4.2:*:*:*:*:*:*:*",
"matchCriteriaId": "7F67B233-3087-43E6-94F2-5DF39FAA36B7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:phorum:phorum:3.4.3:*:*:*:*:*:*:*",
"matchCriteriaId": "7725AEF3-1C47-46B4-A35E-97152A84E731",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:phorum:phorum:3.4.4:*:*:*:*:*:*:*",
"matchCriteriaId": "F3F6C52C-F602-4C2A-8C8F-4A19DA41186F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:phorum:phorum:3.4.5:*:*:*:*:*:*:*",
"matchCriteriaId": "45F290E5-6508-4F62-8572-31B33750D341",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:phorum:phorum:3.4.6:*:*:*:*:*:*:*",
"matchCriteriaId": "6D941B5F-B704-4596-8739-BFE34225DBA7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:phorum:phorum:3.4.7:*:*:*:*:*:*:*",
"matchCriteriaId": "FF13359B-162A-41DF-BB4F-DDD6CA2752F9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:phorum:phorum:3.4.8:*:*:*:*:*:*:*",
"matchCriteriaId": "7D1AE057-A85C-49D9-981A-3314BD945D08",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:phorum:phorum:3.4.8a:*:*:*:*:*:*:*",
"matchCriteriaId": "EAC1F375-34EF-4FEC-B0F4-6A081B6A3B53",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:phorum:phorum:4.3.7:*:*:*:*:*:*:*",
"matchCriteriaId": "1E532A66-A12D-48DD-B405-2345E5B715C9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:phorum:phorum:5.0.0_alpha:*:*:*:*:*:*:*",
"matchCriteriaId": "26E2C5A7-8B52-4BDF-80F1-5D45AEBE6E25",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:phorum:phorum:5.0.1_alpha:*:*:*:*:*:*:*",
"matchCriteriaId": "0E8DF602-0A22-45A9-A286-C237180701C7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:phorum:phorum:5.0.2_alpha:*:*:*:*:*:*:*",
"matchCriteriaId": "AB109C36-BF0F-41E3-A1F4-0DB264BD4A55",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:phorum:phorum:5.0.3_beta:*:*:*:*:*:*:*",
"matchCriteriaId": "9A31EA2D-2B01-4928-9B3E-9D666FD2758B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:phorum:phorum:5.0.4_beta:*:*:*:*:*:*:*",
"matchCriteriaId": "E87DE16C-7C68-4DA8-9BD9-C61D74E61D6E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:phorum:phorum:5.0.4a_beta:*:*:*:*:*:*:*",
"matchCriteriaId": "5001527E-FE93-4BE7-BF79-7717D64CAF2B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:phorum:phorum:5.0.5_beta:*:*:*:*:*:*:*",
"matchCriteriaId": "D15ED599-6B84-4E03-8BA4-36E1D55F1F75",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:phorum:phorum:5.0.6_beta:*:*:*:*:*:*:*",
"matchCriteriaId": "D491A2B9-949A-4A56-A41F-23A222C03BA4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:phorum:phorum:5.0.7_beta:*:*:*:*:*:*:*",
"matchCriteriaId": "01CFDB0B-6FBD-49F3-8238-81E92661297E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:phorum:phorum:5.0.7a_beta:*:*:*:*:*:*:*",
"matchCriteriaId": "EC73A23F-2399-41B0-B6BD-289DF63F2C6A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:phorum:phorum:5.0.8_rc:*:*:*:*:*:*:*",
"matchCriteriaId": "AD59DD99-1FC7-498B-9EA1-1AA8FE132EEE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:phorum:phorum:5.0.9:*:*:*:*:*:*:*",
"matchCriteriaId": "1655572D-7D56-4D9D-9E0F-A67DF23FC934",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:phorum:phorum:5.0.10:*:*:*:*:*:*:*",
"matchCriteriaId": "387E0B83-B240-4922-8C57-CE0CDB000888",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:phorum:phorum:5.0.11:*:*:*:*:*:*:*",
"matchCriteriaId": "CF5B09FF-92DF-4F8D-9A7B-E5086E2B954D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:phorum:phorum:5.0.12:*:*:*:*:*:*:*",
"matchCriteriaId": "D02321D7-2F3E-40F9-9A76-CFF339C93199",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:phorum:phorum:5.0.13:*:*:*:*:*:*:*",
"matchCriteriaId": "3B908D49-F64A-488F-95F3-163AB9DAB02D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:phorum:phorum:5.0.13a:*:*:*:*:*:*:*",
"matchCriteriaId": "1A26F8E5-0FFE-473D-BDA1-2D5340B5A4A5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:phorum:phorum:5.0.14:*:*:*:*:*:*:*",
"matchCriteriaId": "0FF0655C-7C83-4363-A444-993B35D7A7EA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:phorum:phorum:5.0.14a:*:*:*:*:*:*:*",
"matchCriteriaId": "B3D0F7C4-902D-4186-8EFF-3876D6D6633E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:phorum:phorum:5.0.15:*:*:*:*:*:*:*",
"matchCriteriaId": "6F87C476-6A55-4B19-97B0-24204E96A63E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:phorum:phorum:5.0.15a:*:*:*:*:*:*:*",
"matchCriteriaId": "83F8F544-1B09-4B22-B1F3-2CD1E8D7AECD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:phorum:phorum:5.0.16:*:*:*:*:*:*:*",
"matchCriteriaId": "8ACC6DD4-384B-44DE-9BC7-6F1DD374E6B0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:phorum:phorum:5.0.17:*:*:*:*:*:*:*",
"matchCriteriaId": "17D0AC3E-97F7-4A13-8E65-7E424D055E38",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:phorum:phorum:5.0.17a:*:*:*:*:*:*:*",
"matchCriteriaId": "D184385A-763A-4971-8051-20564D020787",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:phorum:phorum:5.0.18:*:*:*:*:*:*:*",
"matchCriteriaId": "04B508F8-CFCC-4841-BF70-1ABB28EB1ABC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:phorum:phorum:5.0.19:*:*:*:*:*:*:*",
"matchCriteriaId": "C365D62D-ACB1-44D3-935D-F79A79642684",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:phorum:phorum:5.0.20:*:*:*:*:*:*:*",
"matchCriteriaId": "F4B45305-FF8B-42F8-A726-F8604BADC323",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:phorum:phorum:5.1.13:*:*:*:*:*:*:*",
"matchCriteriaId": "70F4AB87-2D63-4208-8982-BBF978392285",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:phorum:phorum:5.1.14:*:*:*:*:*:*:*",
"matchCriteriaId": "149A6B5A-84FC-4B6F-B053-0AC881BC03D0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:phorum:phorum:5.1.17:*:*:*:*:*:*:*",
"matchCriteriaId": "375346D4-CEA4-4BAE-83DF-639E86C3DECC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:phorum:phorum:5.1.18:*:*:*:*:*:*:*",
"matchCriteriaId": "3C6E0429-3241-47B0-B853-66D3167CE4F6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:phorum:phorum:5.1.20:*:*:*:*:*:*:*",
"matchCriteriaId": "121F0F96-F901-479F-A64F-3DAE1AC0AFAF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:phorum:phorum:5.1.21:*:*:*:*:*:*:*",
"matchCriteriaId": "F837829B-28E5-41B3-9A23-C4D4A7FE636A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:phorum:phorum:5.1.25:*:*:*:*:*:*:*",
"matchCriteriaId": "700B9165-B956-4CAB-B980-42885FFA418F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:phorum:phorum:5.2:*:*:*:*:*:*:*",
"matchCriteriaId": "A4C4E79D-EBE6-456C-A74F-B94F32736383",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:phorum:phorum:5.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "D3596808-8399-4EA9-B885-5443CA91C3C3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:phorum:phorum:5.2.2:beta:*:*:*:*:*:*",
"matchCriteriaId": "B5409C8A-8B57-48FB-B01E-411C00153E9B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:phorum:phorum:5.2.3:rc1:*:*:*:*:*:*",
"matchCriteriaId": "74DB422C-E79C-46B2-BB52-8C457822A0BD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:phorum:phorum:5.2.4:rc2:*:*:*:*:*:*",
"matchCriteriaId": "37881B2C-0CD0-4E2A-A11D-9758772640E9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:phorum:phorum:5.2.5:*:*:*:*:*:*:*",
"matchCriteriaId": "66BE61C7-E1DD-4DA9-B433-0C698C482C57",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:phorum:phorum:5.2.8:*:*:*:*:*:*:*",
"matchCriteriaId": "FB5E063A-F59F-4CEB-9950-2FE8D25FF9FF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:phorum:phorum:5.2.9:*:*:*:*:*:*:*",
"matchCriteriaId": "F0A35F3F-6BBF-4B84-AE19-870F03C1E9DC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:phorum:phorum:5.2.10:*:*:*:*:*:*:*",
"matchCriteriaId": "90FC064F-B462-47F8-880F-CB26A340477E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:phorum:phorum:5.2.10:rc1:*:*:*:*:*:*",
"matchCriteriaId": "D083445E-48ED-4666-98A8-932B01A0F9B2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:phorum:phorum:5.2.11:*:*:*:*:*:*:*",
"matchCriteriaId": "A79911F1-C1C3-4DD1-BA37-AFC77D7B0D90",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:phorum:phorum:5.2.12:*:*:*:*:*:*:*",
"matchCriteriaId": "2200E549-30F8-4803-A570-FBF08B97B7CD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:phorum:phorum:5.2.12a:*:*:*:*:*:*:*",
"matchCriteriaId": "2798D56A-BEBC-4EC0-ACA3-D0B9E8E4D61D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:phorum:phorum:5.2.13:*:*:*:*:*:*:*",
"matchCriteriaId": "D9876C40-4537-4622-90D5-175AB59609D4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:phorum:phorum:5.2.14:*:*:*:*:*:*:*",
"matchCriteriaId": "51638139-DB4F-4B8C-B125-1FE9AFC86B21",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Cross-site scripting (XSS) vulnerability in Phorum before 5.2.16 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors."
},
{
"lang": "es",
"value": "Vulnerabilidad de ejecuci\u00f3n de secuencias de comandos en sitios cruzados (XSS) en Phorum antes de v5.2.16, permite a atacantes remotos inyectar secuencias de comandos web o HTML a trav\u00e9s de vectores no especificados."
}
],
"id": "CVE-2011-3382",
"lastModified": "2025-04-11T00:51:21.963",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
]
},
"published": "2011-09-08T18:55:01.723",
"references": [
{
"source": "vultures@jpcert.or.jp",
"url": "http://jvn.jp/en/jp/JVN71435255/index.html"
},
{
"source": "vultures@jpcert.or.jp",
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2011-000068"
},
{
"source": "vultures@jpcert.or.jp",
"url": "http://www.phorum.org/phorum5/read.php?64%2C147504"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://jvn.jp/en/jp/JVN71435255/index.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2011-000068"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.phorum.org/phorum5/read.php?64%2C147504"
}
],
"sourceIdentifier": "vultures@jpcert.or.jp",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-79"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
GSD-2011-3382
Vulnerability from gsd - Updated: 2023-12-13 01:19Details
Cross-site scripting (XSS) vulnerability in Phorum before 5.2.16 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
Aliases
Aliases
{
"GSD": {
"alias": "CVE-2011-3382",
"description": "Cross-site scripting (XSS) vulnerability in Phorum before 5.2.16 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.",
"id": "GSD-2011-3382"
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2011-3382"
],
"details": "Cross-site scripting (XSS) vulnerability in Phorum before 5.2.16 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.",
"id": "GSD-2011-3382",
"modified": "2023-12-13T01:19:09.224583Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "vultures@jpcert.or.jp",
"ID": "CVE-2011-3382",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Cross-site scripting (XSS) vulnerability in Phorum before 5.2.16 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "JVN#71435255",
"refsource": "JVN",
"url": "http://jvn.jp/en/jp/JVN71435255/index.html"
},
{
"name": "http://www.phorum.org/phorum5/read.php?64,147504",
"refsource": "MISC",
"url": "http://www.phorum.org/phorum5/read.php?64,147504"
},
{
"name": "JVNDB-2011-000068",
"refsource": "JVNDB",
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2011-000068"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:phorum:phorum:5.2.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:phorum:phorum:5.2.9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:phorum:phorum:5.2.10:rc1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:phorum:phorum:3.0.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:phorum:phorum:3.4.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:phorum:phorum:3.4.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:phorum:phorum:3.4.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:phorum:phorum:5.2.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:phorum:phorum:3.2.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:phorum:phorum:3.2.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:phorum:phorum:3.2.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:phorum:phorum:3.2.3b:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:phorum:phorum:5.1.13:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:phorum:phorum:3.1.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:phorum:phorum:5.2.4:rc2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:phorum:phorum:5.0.1_alpha:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:phorum:phorum:4.3.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:phorum:phorum:3.4.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:phorum:phorum:3.4.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:phorum:phorum:3.3.1a:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:phorum:phorum:3.2.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:phorum:phorum:3.2.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:phorum:phorum:5.1.21:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:phorum:phorum:3.1.1_pre:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:phorum:phorum:5.1.20:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:phorum:phorum:5.0.7a_beta:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:phorum:phorum:5.0.3_beta:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:phorum:phorum:5.0.2_alpha:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:phorum:phorum:5.0.15a:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:phorum:phorum:5.0.15:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:phorum:phorum:5.0.11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:phorum:phorum:5.2.13:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:phorum:phorum:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "5.2.15",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:phorum:phorum:5.2.2:beta:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:phorum:phorum:5.1.25:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:phorum:phorum:5.2.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:phorum:phorum:5.2.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:phorum:phorum:3.4.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:phorum:phorum:3.3.2b3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:phorum:phorum:3.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:phorum:phorum:3.3.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:phorum:phorum:3.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:phorum:phorum:3.1.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:phorum:phorum:3.1.1a:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:phorum:phorum:3.1.1_rc2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:phorum:phorum:5.0.4a_beta:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:phorum:phorum:5.0.5_beta:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:phorum:phorum:5.0.19:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:phorum:phorum:5.0.18:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:phorum:phorum:5.0.13:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:phorum:phorum:5.0.12:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:phorum:phorum:5.2.11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:phorum:phorum:5.2.12:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:phorum:phorum:5.2.12a:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:phorum:phorum:5.1.14:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:phorum:phorum:5.1.17:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:phorum:phorum:5.0.6_beta:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:phorum:phorum:5.0.7_beta:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:phorum:phorum:5.0.17a:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:phorum:phorum:5.0.17:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:phorum:phorum:5.0.14:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:phorum:phorum:5.0.13a:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:phorum:phorum:3.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:phorum:phorum:5.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:phorum:phorum:5.2.3:rc1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:phorum:phorum:5.0.0_alpha:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:phorum:phorum:3.4.8a:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:phorum:phorum:3.4.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:phorum:phorum:3.4.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:phorum:phorum:3.3.2a:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:phorum:phorum:3.3.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:phorum:phorum:3.2.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:phorum:phorum:3.2.3a:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:phorum:phorum:3.2.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:phorum:phorum:5.1.18:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:phorum:phorum:5.0.9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:phorum:phorum:5.0.8_rc:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:phorum:phorum:5.0.4_beta:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:phorum:phorum:5.0.20:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:phorum:phorum:5.0.16:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:phorum:phorum:5.0.14a:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:phorum:phorum:5.0.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:phorum:phorum:5.2.14:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "vultures@jpcert.or.jp",
"ID": "CVE-2011-3382"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "Cross-site scripting (XSS) vulnerability in Phorum before 5.2.16 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "JVN#71435255",
"refsource": "JVN",
"tags": [],
"url": "http://jvn.jp/en/jp/JVN71435255/index.html"
},
{
"name": "http://www.phorum.org/phorum5/read.php?64,147504",
"refsource": "MISC",
"tags": [
"Patch"
],
"url": "http://www.phorum.org/phorum5/read.php?64,147504"
},
{
"name": "JVNDB-2011-000068",
"refsource": "JVNDB",
"tags": [],
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2011-000068"
}
]
}
},
"impact": {
"baseMetricV2": {
"cvssV2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"userInteractionRequired": true
}
},
"lastModifiedDate": "2011-09-14T04:00Z",
"publishedDate": "2011-09-08T18:55Z"
}
}
}
JVNDB-2011-000068
Vulnerability from jvndb - Published: 2011-09-02 19:11 - Updated:2011-09-02 19:11Summary
Multiple vulnerabilities in Phorum
Details
Phorum contains multiple vulnerabilities.
Phorum is a message board software. Phorum contains cross-site request forgery and cross-site scripting vulnerabilities.
Daiki Fukumori of Cyber Defense Institute, Inc. reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
References
| Type | URL | |
|---|---|---|
|
|
||
{
"@rdf:about": "https://jvndb.jvn.jp/en/contents/2011/JVNDB-2011-000068.html",
"dc:date": "2011-09-02T19:11+09:00",
"dcterms:issued": "2011-09-02T19:11+09:00",
"dcterms:modified": "2011-09-02T19:11+09:00",
"description": "Phorum contains multiple vulnerabilities.\r\n\r\nPhorum is a message board software. Phorum contains cross-site request forgery and cross-site scripting vulnerabilities.\r\n\r\nDaiki Fukumori of Cyber Defense Institute, Inc. reported this vulnerability to IPA.\r\nJPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.",
"link": "https://jvndb.jvn.jp/en/contents/2011/JVNDB-2011-000068.html",
"sec:cpe": {
"#text": "cpe:/a:phorum:phorum",
"@product": "Phorum",
"@vendor": "Phorum",
"@version": "2.2"
},
"sec:cvss": {
"@score": "2.6",
"@severity": "Low",
"@type": "Base",
"@vector": "AV:N/AC:H/Au:N/C:N/I:P/A:N",
"@version": "2.0"
},
"sec:identifier": "JVNDB-2011-000068",
"sec:references": [
{
"#text": "https://jvn.jp/en/jp/JVN71435255/index.html",
"@id": "JVN#71435255",
"@source": "JVN"
},
{
"#text": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3381",
"@id": "CVE-2011-3381",
"@source": "CVE"
},
{
"#text": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3382",
"@id": "CVE-2011-3382",
"@source": "CVE"
},
{
"#text": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3381",
"@id": "CVE-2011-3381",
"@source": "NVD"
},
{
"#text": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3382",
"@id": "CVE-2011-3382",
"@source": "NVD"
},
{
"#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html",
"@id": "CWE-352",
"@title": "Cross-Site Request Forgery(CWE-352)"
},
{
"#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html",
"@id": "CWE-79",
"@title": "Cross-site Scripting(CWE-79)"
}
],
"title": "Multiple vulnerabilities in Phorum"
}
GHSA-3W28-7FFM-4XCG
Vulnerability from github – Published: 2022-05-17 05:39 – Updated: 2025-04-11 03:50
VLAI?
Details
Cross-site scripting (XSS) vulnerability in Phorum before 5.2.16 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
{
"affected": [],
"aliases": [
"CVE-2011-3382"
],
"database_specific": {
"cwe_ids": [
"CWE-79"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2011-09-08T18:55:00Z",
"severity": "MODERATE"
},
"details": "Cross-site scripting (XSS) vulnerability in Phorum before 5.2.16 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.",
"id": "GHSA-3w28-7ffm-4xcg",
"modified": "2025-04-11T03:50:17Z",
"published": "2022-05-17T05:39:24Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3382"
},
{
"type": "WEB",
"url": "http://jvn.jp/en/jp/JVN71435255/index.html"
},
{
"type": "WEB",
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2011-000068"
},
{
"type": "WEB",
"url": "http://www.phorum.org/phorum5/read.php?64%2C147504"
},
{
"type": "WEB",
"url": "http://www.phorum.org/phorum5/read.php?64,147504"
}
],
"schema_version": "1.4.0",
"severity": []
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…