Filtered by vendor Quicksilver Forums
Subscribe
Total
6 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2008-7064 | 1 Quicksilver Forums | 1 Quicksilver Forums | 2024-02-14 | 7.5 HIGH | N/A |
Directory traversal vulnerability in the get_lang function in global.php in Quicksilver Forums 1.4.2 and earlier, as used in QSF Portal before 1.4.5, when running on Windows, allows remote attackers to include and execute arbitrary local files via a "\" (backslash) in the lang parameter to index.php, which bypasses a protection mechanism that only checks for "/" (forward slash), as demonstrated by uploading and including PHP code in an avatar file. | |||||
CVE-2008-3601 | 1 Quicksilver Forums | 1 Quicksilver Forums | 2024-02-04 | 7.5 HIGH | N/A |
SQL injection vulnerability in index.php in Quicksilver Forums 1.4.1 allows remote attackers to execute arbitrary SQL commands via the forums array parameter in a search action. | |||||
CVE-2007-5172 | 1 Quicksilver Forums | 1 Quicksilver Forums | 2024-02-04 | 5.0 MEDIUM | N/A |
Quicksilver Forums before 1.4.1 allows remote attackers to obtain sensitive information by causing unspecified connection errors, which reveals the database password in the resulting error message. | |||||
CVE-2007-5171 | 1 Quicksilver Forums | 1 Quicksilver Forums | 2024-02-04 | 5.0 MEDIUM | N/A |
Unspecified vulnerability in Quicksilver Forums before 1.4.1 allows remote attackers to delete arbitrary PMs via unspecified vectors. | |||||
CVE-2006-4824 | 1 Quicksilver Forums | 1 Quicksilver Forums | 2024-02-04 | 7.5 HIGH | N/A |
PHP remote file inclusion vulnerability in lib/activeutil.php in Quicksilver Forums (QSF) 1.2.1 and earlier allows remote attackers to execute arbitrary PHP code via a URL in the set[include_path] parameter. | |||||
CVE-2005-4030 | 1 Quicksilver Forums | 1 Quicksilver Forums | 2024-02-04 | 5.1 MEDIUM | N/A |
SQL injection vulnerability in Quicksilver Forums before 1.5.1 allows remote attackers to execute arbitrary SQL commands via the HTTP_USER_AGENT header. |