The remote host is vulnerable to an HTML injection attack.
The remote host is running Phorum, a web-based content management system written in PHP. This version of Phorum is vulnerable to a remote HTML injection flaw. An attacker exploiting this flaw would only need to be able to send HTTP requests to the vulnerable application. A successful exploit would result in potential theft of confidential data (configuration data, browser cookies, and more) or browser-side code execution. In addition, the version of Phorum installed on the remote host does not properly sanitize input used in the Location response header. An attacker can exploit this flaw with a specially-crafted request to inject malicious code into HTTP headers, which may allow execution of arbitrary HTML and script code in a user's browser within the context of the remote host.
Upgrade to version 5.0.15 or higher.