CVE ID | Publié | Description | Score | Gravité |
---|---|---|---|---|
phpMyFAQ is an open source FAQ web application for PHP 8.1+ and MySQL, PostgreSQL and other databases. Unsafe echo of filename in phpMyFAQ\phpmyfaq\admin\attachments.php leads to allowed execution of JavaScript code in client side (XSS). This vulnerability has been patched in version 3.2.5. | 6.5 |
Moyen |
||
phpMyFAQ is an Open Source FAQ web application for PHP 8.1+ and MySQL, PostgreSQL and other databases. The 'sharing FAQ' functionality allows any unauthenticated actor to misuse the phpMyFAQ application to send arbitrary emails to a large range of targets. The phpMyFAQ application has a functionality where anyone can share a FAQ item to others. The front-end of this functionality allows any phpMyFAQ articles to be shared with 5 email addresses. Any unauthenticated actor can perform this action. There is a CAPTCHA in place, however the amount of people you email with a single request is not limited to 5 by the backend. An attacker can thus solve a single CAPTCHA and send thousands of emails at once. An attacker can utilize the target application's email server to send phishing messages. This can get the server on a blacklist, causing all emails to end up in spam. It can also lead to reputation damages. This issue has been patched in version 3.2.5. | 6.5 |
Moyen |
||
phpMyFAQ is an open source FAQ web application for PHP 8.1+ and MySQL, PostgreSQL and other databases. phpMyFAQ's user removal page allows an attacker to spoof another user's detail, and in turn make a compelling phishing case for removing another user's account. The front-end of this page doesn't allow changing the form details, an attacker can utilize a proxy to intercept this request and submit other data. Upon submitting this form, an email is sent to the administrator informing them that this user wants to delete their account. An administrator has no way of telling the difference between the actual user wishing to delete their account or the attacker issuing this for an account they do not control. This issue has been patched in version 3.2.5. | 6.5 |
Moyen |
||
Cross-site Scripting (XSS) - Stored in GitHub repository thorsten/phpmyfaq prior to 3.1.17. | 5.4 |
Moyen |
||
Cross-site Scripting (XSS) - Stored in GitHub repository thorsten/phpmyfaq prior to 3.1.17. | 5.4 |
Moyen |
||
Sensitive Cookie in HTTPS Session Without 'Secure' Attribute in GitHub repository thorsten/phpmyfaq prior to 3.2.1. | 5.7 |
Moyen |
||
Cross-site Scripting (XSS) - Stored in GitHub repository thorsten/phpmyfaq prior to 3.2.2. | 5.4 |
Moyen |
||
Insufficient Session Expiration in GitHub repository thorsten/phpmyfaq prior to 3.2.2. | 9.8 |
Critique |
||
Cross-site Scripting (XSS) - Stored in GitHub repository thorsten/phpmyfaq prior to 3.2.1. | 4.8 |
Moyen |
||
Cross-site Scripting (XSS) - Reflected in GitHub repository thorsten/phpmyfaq prior to 3.2.2. | 6.1 |
Moyen |
||
Cross-site Scripting (XSS) - DOM in GitHub repository thorsten/phpmyfaq prior to 3.1.18. | 6.1 |
Moyen |
||
Cross-site Scripting (XSS) - Stored in GitHub repository thorsten/phpmyfaq prior to 3.1.18. | 5.4 |
Moyen |
||
Cross-site Scripting (XSS) - DOM in GitHub repository thorsten/phpmyfaq prior to 3.1.18. | 6.1 |
Moyen |
||
Cross-site Scripting (XSS) - Stored in GitHub repository thorsten/phpmyfaq prior to 3.1.18. | 5.4 |
Moyen |
||
Unrestricted Upload of File with Dangerous Type in GitHub repository thorsten/phpmyfaq prior to 3.1.8. | 9.8 |
Critique |
||
Cross-site Scripting (XSS) - Stored in GitHub repository thorsten/phpmyfaq prior to 3.1.16. | 5.4 |
Moyen |
||
Improper Neutralization of Formula Elements in a CSV File in GitHub repository thorsten/phpmyfaq prior to 3.1.16. | 9.8 |
Critique |
||
Cross-site Scripting (XSS) - Reflected in GitHub repository thorsten/phpmyfaq prior to 3.2.0-beta.2. | 4.8 |
Moyen |
||
Cross-site Scripting (XSS) - Stored in GitHub repository thorsten/phpmyfaq prior to 3.1.14. | 6.1 |
Moyen |
||
Cross-site Scripting (XSS) - Stored in GitHub repository thorsten/phpmyfaq prior to 3.1.14. | 6.1 |
Moyen |
||
Cross-site Scripting (XSS) - Stored in GitHub repository thorsten/phpmyfaq prior to 3.2.0-beta. | 5.4 |
Moyen |
||
Cross-site Scripting (XSS) - Stored in GitHub repository thorsten/phpmyfaq prior to 3.2.0-beta. | 5.4 |
Moyen |
||
Cross-site Scripting (XSS) - Reflected in GitHub repository thorsten/phpmyfaq prior to 3.1.13. | 4.8 |
Moyen |
||
Cross-site Scripting (XSS) - Stored in GitHub repository thorsten/phpmyfaq prior to 3.1.13. | 4.8 |
Moyen |
||
Cross-site Scripting (XSS) - Stored in GitHub repository thorsten/phpmyfaq prior to 3.1.13. | 5.4 |
Moyen |
||
Improper Access Control in GitHub repository thorsten/phpmyfaq prior to 3.1.13. | 9.8 |
Critique |
||
Cross-site Scripting (XSS) - Stored in GitHub repository thorsten/phpmyfaq prior to 3.1.12. | 5.4 |
Moyen |
||
Cross-site Scripting (XSS) - Stored in GitHub repository thorsten/phpmyfaq prior to 3.1.12. | 5.4 |
Moyen |
||
Cross-site Scripting (XSS) - Stored in GitHub repository thorsten/phpmyfaq prior to 3.1.12. | 5.4 |
Moyen |
||
Failure to Sanitize Special Elements into a Different Plane (Special Element Injection) in GitHub repository thorsten/phpmyfaq prior to 3.1.12. | 5.4 |
Moyen |
||
Cross-site Scripting (XSS) - Stored in GitHub repository thorsten/phpmyfaq prior to 3.1.12. | 5.4 |
Moyen |
||
Cross-site Scripting (XSS) - Stored in GitHub repository thorsten/phpmyfaq prior to 3.1.12. | 5.4 |
Moyen |
||
Cross-site Scripting (XSS) - Reflected in GitHub repository thorsten/phpmyfaq prior to 3.1.12. | 6.1 |
Moyen |
||
Cross-site Scripting (XSS) - DOM in GitHub repository thorsten/phpmyfaq prior to 3.1.12. | 5.4 |
Moyen |
||
Improper Access Control in GitHub repository thorsten/phpmyfaq prior to 3.1.12. | 5.4 |
Moyen |
||
Cross-site Scripting (XSS) - Generic in GitHub repository thorsten/phpmyfaq prior to 3.1.12. | 6.1 |
Moyen |
||
Cross-site Scripting (XSS) - Stored in GitHub repository thorsten/phpmyfaq prior to 3.1.12. | 6.3 |
Moyen |
||
Authentication Bypass by Capture-replay in GitHub repository thorsten/phpmyfaq prior to 3.1.12. | 9.8 |
Critique |
||
Business Logic Errors in GitHub repository thorsten/phpmyfaq prior to 3.1.12. | 4.3 |
Moyen |
||
Weak Password Requirements in GitHub repository thorsten/phpmyfaq prior to 3.1.12. | 9.8 |
Critique |
||
Improper Neutralization of Input During Web Page Generation in GitHub repository thorsten/phpmyfaq prior to 3.1.12. | 4.7 |
Moyen |
||
Cross-site Scripting (XSS) - Generic in GitHub repository thorsten/phpmyfaq prior to 3.1.12. | 5.4 |
Moyen |
||
Cross-site Scripting (XSS) - Stored in GitHub repository thorsten/phpmyfaq prior to 3.1.12. | 4.8 |
Moyen |
||
Cross-site Scripting (XSS) - Stored in GitHub repository thorsten/phpmyfaq prior to 3.1.12. | 4.8 |
Moyen |
||
Cross-site Scripting in GitHub repository thorsten/phpmyfaq prior to 3.1.12. | 6.3 |
Moyen |
||
Improper Privilege Management in GitHub repository thorsten/phpmyfaq prior to 3.1.12. | 8.8 |
Haute |
||
Misinterpretation of Input in GitHub repository thorsten/phpmyfaq prior to 3.1.11. | 8.3 |
Haute |
||
Cross-site Scripting (XSS) - Generic in GitHub repository thorsten/phpmyfaq prior to 3.1.11. | 8.4 |
Haute |
||
Cross-site Scripting (XSS) - Generic in GitHub repository thorsten/phpmyfaq prior to 3.1.11. | 8.1 |
Haute |
||
Code Injection in GitHub repository thorsten/phpmyfaq prior to 3.1.11. | 9.8 |
Critique |
||
Command Injection in GitHub repository thorsten/phpmyfaq prior to 3.1.11. | 9.8 |
Critique |
||
Uncaught Exception in GitHub repository thorsten/phpmyfaq prior to 3.1.11. | 8.8 |
Haute |
||
Cross-site Scripting (XSS) - Stored in GitHub repository thorsten/phpmyfaq prior to 3.1.11. | 8.3 |
Haute |
||
Code Injection in GitHub repository thorsten/phpmyfaq prior to 3.1.11. | 6.5 |
Moyen |
||
Weak Password Requirements in GitHub repository thorsten/phpmyfaq prior to 3.1.11. | 8.8 |
Haute |
||
Cross-site Scripting (XSS) - Stored in GitHub repository thorsten/phpmyfaq prior to 3.1.11. | 8.3 |
Haute |
||
Cross-site Scripting (XSS) - Stored in GitHub repository thorsten/phpmyfaq prior to 3.1.10. | 5.4 |
Moyen |
||
Weak Password Requirements in GitHub repository thorsten/phpmyfaq prior to 3.1.10. | 9.8 |
Critique |
||
Cross-site Scripting (XSS) - Stored in GitHub repository thorsten/phpmyfaq prior to 3.1.10. | 5.4 |
Moyen |
||
Cross-site Scripting (XSS) - Stored in GitHub repository thorsten/phpmyfaq prior to 3.1.10. | 5.4 |
Moyen |
||
Cross-site Scripting (XSS) - Stored in GitHub repository thorsten/phpmyfaq prior to 3.1.10. | 5.4 |
Moyen |
||
Improper Authentication in GitHub repository thorsten/phpmyfaq prior to 3.1.10. | 9.8 |
Critique |
||
Cross-site Scripting (XSS) - Stored in GitHub repository thorsten/phpmyfaq prior to 3.1.10. | 6.1 |
Moyen |
||
Cross-site Scripting (XSS) - Stored in GitHub repository thorsten/phpmyfaq prior to 3.1.10. | 5.4 |
Moyen |
||
Cross-site Scripting (XSS) - Reflected in GitHub repository thorsten/phpmyfaq prior to 3.1.10. | 6.1 |
Moyen |
||
Cross-site Scripting (XSS) - Reflected in GitHub repository thorsten/phpmyfaq prior to 3.1.9. | 6.1 |
Moyen |
||
Cross-site Scripting (XSS) - Stored in GitHub repository thorsten/phpmyfaq prior to 3.1.9. | 5.4 |
Moyen |
||
Sensitive Cookie in HTTPS Session Without 'Secure' Attribute in GitHub repository thorsten/phpmyfaq prior to 3.1.9. | 7.5 |
Haute |
||
Cross-site Scripting (XSS) - Stored in GitHub repository thorsten/phpmyfaq prior to 3.1.8. | 5.4 |
Moyen |
||
Cross-site Scripting (XSS) - Reflected in GitHub repository thorsten/phpmyfaq prior to 3.1.8. | 6.1 |
Moyen |
||
Weak Password Requirements in GitHub repository thorsten/phpmyfaq prior to 3.1.8. | 9.8 |
Critique |
||
Cross-site Scripting (XSS) - Stored in GitHub repository thorsten/phpmyfaq prior to 3.2.0-alpha. | 8.4 |
Haute |
||
phpMyFAQ before 2.9.11 allows CSRF. | 8.8 |
Haute |
||
The admin backend in phpMyFAQ before 2.9.11 allows CSV injection in reports. | 7.2 |
Haute |
||
SQL injection vulnerability in phpMyFAQ before 2.8.13 allows remote authenticated users with certain permissions to execute arbitrary SQL commands via vectors involving the restore function. | 7.2 |
Haute |
||
Multiple cross-site request forgery (CSRF) vulnerabilities in phpMyFAQ before 2.8.13 allow remote attackers to hijack the authentication of unspecified users for requests that (1) delete active users by leveraging improper validation of CSRF tokens or that (2) delete open questions, (3) activate users, (4) publish FAQs, (5) add or delete Glossary, (6) add or delete FAQ news, or (7) add or delete comments or add votes by leveraging lack of a CSRF token. | 8.8 |
Haute |
||
phpMyFAQ before 2.8.13 allows remote authenticated users with certain permissions to read arbitrary attachments by leveraging incorrect "download an attachment" permission checks. | 5.3 |
Moyen |
||
phpMyFAQ before 2.8.13 allows remote attackers to read arbitrary attachments via a direct request. | 5.3 |
Moyen |
||
phpMyFAQ before 2.8.13 allows remote authenticated users with admin privileges to bypass authorization via a crafted instance ID parameter. | 2.7 |
Bas |
||
phpMyFAQ before 2.8.13 allows remote attackers to bypass the CAPTCHA protection mechanism by replaying the request. | 5.3 |
Moyen |
||
In phpMyFaq before 2.9.9, there is CSRF in admin/ajax.config.php. | 8.8 |
Haute |
||
In phpMyFaq before 2.9.9, there is XSS in admin/tags.main.php via a crafted tag. | 6.1 |
Moyen |
||
In phpMyFAQ before 2.9.9, there is Stored Cross-site Scripting (XSS) via metaDescription or metaKeywords. | 4.8 |
Moyen |
||
In phpMyFAQ before 2.9.9, there is Cross-Site Request Forgery (CSRF) for adding a glossary. | 8.8 |
Haute |
||
In phpMyFAQ before 2.9.9, there is Cross-Site Request Forgery (CSRF) in admin/stat.adminlog.php. | 8.8 |
Haute |
||
In phpMyFAQ before 2.9.9, there is Cross-Site Request Forgery (CSRF) in admin/news.php. | 8.8 |
Haute |
||
In phpMyFAQ before 2.9.9, there is Cross-Site Request Forgery (CSRF) in admin/ajax.attachment.php and admin/att.main.php. | 8.8 |
Haute |
||
In phpMyFAQ before 2.9.9, there is Cross-Site Request Forgery (CSRF) in admin/stat.main.php. | 8.8 |
Haute |
||
In phpMyFAQ before 2.9.9, there is Cross-Site Request Forgery (CSRF) for modifying a glossary. | 8.8 |
Haute |
||
In phpMyFAQ before 2.9.9, there is Stored Cross-site Scripting (XSS) via an HTML attachment. | 5.4 |
Moyen |
||
In phpMyFAQ before 2.9.9, there is Cross-Site Request Forgery (CSRF) in admin/stat.ratings.php. | 8.8 |
Haute |
||
Cross-site scripting (XSS) vulnerability in inc/PMF/Faq.php in phpMyFAQ through 2.9.8 allows remote attackers to inject arbitrary web script or HTML via the Questions field in an "Add New FAQ" action. | 4.8 |
Moyen |
||
Cross-site scripting (XSS) vulnerability in phpMyFAQ through 2.9.8 allows remote attackers to inject arbitrary web script or HTML via the "Title of your FAQ" field in the Configuration Module. | 6.1 |
Moyen |
||
phpMyFAQ before 2.9.8 does not properly mitigate brute-force attacks that try many passwords in attempted logins quickly. | 9.8 |
Critique |
||
inc/PMF/Faq.php in phpMyFAQ before 2.9.7 has XSS in the question field. | 6.1 |
Moyen |
||
Cross-site request forgery (CSRF) vulnerability in phpMyFAQ before 2.8.6 allows remote attackers to hijack the authentication of arbitrary users for requests that modify settings. | 6.8 |
|||
Cross-site scripting (XSS) vulnerability in phpMyFAQ before 2.8.6 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. | 4.3 |