Description
Multiple cross-site scripting (XSS) vulnerabilities in w-Agora 4.1.6a allow remote attackers to execute arbitrary web script or HTML via the (1) thread parameter to download_thread.php, (2) loginuser parameter to login.php, or (3) userid parameter to forgot_password.php.
Exploits (3)
exploitdb
WRITEUP
VERIFIED
by Alexander Antipov · textwebappsphp
https://www.exploit-db.com/exploits/24652
exploitdb
WRITEUP
VERIFIED
by Alexander Antipov · textwebappsphp
https://www.exploit-db.com/exploits/24649
exploitdb
WRITEUP
VERIFIED
by Alexander Antipov · textwebappsphp
https://www.exploit-db.com/exploits/24650
References (6)
Core 6
Core References
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/17553
Third Party Advisory, VDB Entry vdb-entry
x_refsource_sectrack
http://securitytracker.com/id?1011463
Patch, Vendor Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/12695
Exploit vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/11283
Mailing List mailing-list
x_refsource_bugtraq
http://marc.info/?l=bugtraq&m=109655691512298&w=2
Exploit, Vendor Advisory mailing-list
x_refsource_fulldisc
http://lists.grok.org.uk/pipermail/full-disclosure/2004-September/027040.html
Scores
EPSS
0.0058
EPSS Percentile
68.9%
Details
Status
published
Products (1)
w-agora/w-agora
4.1.6a
Published
Dec 31, 2004
Tracked Since
Feb 18, 2026