Cross Site Scripting (XSS) exists in Jamroom before 4.2.7 via the Status Update field.
Max CVSS
6.1
EPSS Score
0.13%
Published
2017-06-04
Updated
2017-06-09
Directory traversal vulnerability in index.php in Jamroom 3.1.2, 3.2.3 through 3.2.6, 4.0.2, and possibly other versions before 3.4.0 allows remote attackers to include arbitrary files via directory traversal sequences in the t parameter.
Max CVSS
6.5
EPSS Score
1.35%
Published
2009-04-17
Updated
2017-09-29
Multiple unspecified vulnerabilities in JamRoom before 3.4.0 have unknown impact and attack vectors.
Max CVSS
10.0
EPSS Score
0.16%
Published
2008-07-30
Updated
2008-09-05
The jrCookie function in includes/jamroom-misc.inc.php in JamRoom before 3.4.0 allows remote attackers to bypass authentication and gain administrative access via a boolean value within serialized data in a JMU_Cookie cookie.
Max CVSS
7.5
EPSS Score
8.08%
Published
2008-07-30
Updated
2018-10-11
PHP remote file inclusion vulnerability in include/plugins/jrBrowser/purchase.php in Jamroom 3.3.0 through 3.3.5, when register_globals is enabled, allows remote attackers to execute arbitrary PHP code via a URL in the jamroom[jm_dir] parameter.
Max CVSS
9.3
EPSS Score
1.35%
Published
2008-06-27
Updated
2017-09-29
PHP remote file inclusion vulnerability in include/plugins/jrBrowser/payment.php in Jamroom 3.3.0 through 3.3.5 allows remote attackers to execute arbitrary PHP code via a URL in the jamroom[jm_dir] parameter. NOTE: some of these details are obtained from third party information.
Max CVSS
7.5
EPSS Score
0.60%
Published
2008-06-26
Updated
2017-09-29
Cross-site scripting (XSS) vulnerability in login.php in Jamroom 3.0.16 and possibly earlier allows remote attackers to inject arbitrary web script or HTML via the forgot parameter in the forgot mode.
Max CVSS
5.1
EPSS Score
4.68%
Published
2006-09-28
Updated
2018-10-17
7 vulnerabilities found
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!