Lucene search

K
cve[email protected]CVE-2014-0814
HistoryFeb 14, 2014 - 4:55 p.m.

CVE-2014-0814

2014-02-1416:55:13
CWE-79
web.nvd.nist.gov
19
cve-2014-0814
phpmyfaq
xss
vulnerability
web script
html
nvd

4.3 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

5.7 Medium

AI Score

Confidence

High

0.003 Low

EPSS

Percentile

66.0%

Cross-site scripting (XSS) vulnerability in phpMyFAQ before 2.8.6 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.

Affected configurations

NVD
Node
phpmyfaqphpmyfaqRange2.8.5
OR
phpmyfaqphpmyfaqMatch1.0
OR
phpmyfaqphpmyfaqMatch1.0.1
OR
phpmyfaqphpmyfaqMatch1.0.1a
OR
phpmyfaqphpmyfaqMatch1.1.0
OR
phpmyfaqphpmyfaqMatch1.1.1
OR
phpmyfaqphpmyfaqMatch1.1.2
OR
phpmyfaqphpmyfaqMatch1.1.3
OR
phpmyfaqphpmyfaqMatch1.1.4
OR
phpmyfaqphpmyfaqMatch1.1.4a
OR
phpmyfaqphpmyfaqMatch1.1.5
OR
phpmyfaqphpmyfaqMatch1.2.0
OR
phpmyfaqphpmyfaqMatch1.2.1
OR
phpmyfaqphpmyfaqMatch1.2.2
OR
phpmyfaqphpmyfaqMatch1.2.3
OR
phpmyfaqphpmyfaqMatch1.2.4
OR
phpmyfaqphpmyfaqMatch1.2.5
OR
phpmyfaqphpmyfaqMatch1.2.5a
OR
phpmyfaqphpmyfaqMatch1.2.5b
OR
phpmyfaqphpmyfaqMatch1.3.0
OR
phpmyfaqphpmyfaqMatch1.3.1
OR
phpmyfaqphpmyfaqMatch1.3.2
OR
phpmyfaqphpmyfaqMatch1.3.3
OR
phpmyfaqphpmyfaqMatch1.3.4
OR
phpmyfaqphpmyfaqMatch1.3.5
OR
phpmyfaqphpmyfaqMatch1.3.6
OR
phpmyfaqphpmyfaqMatch1.3.7
OR
phpmyfaqphpmyfaqMatch1.3.8
OR
phpmyfaqphpmyfaqMatch1.3.9
OR
phpmyfaqphpmyfaqMatch1.3.9pl1
OR
phpmyfaqphpmyfaqMatch1.3.10
OR
phpmyfaqphpmyfaqMatch1.3.11
OR
phpmyfaqphpmyfaqMatch1.3.12
OR
phpmyfaqphpmyfaqMatch1.3.13
OR
phpmyfaqphpmyfaqMatch1.3.14
OR
phpmyfaqphpmyfaqMatch1.4
OR
phpmyfaqphpmyfaqMatch1.4alpha1
OR
phpmyfaqphpmyfaqMatch1.4alpha2
OR
phpmyfaqphpmyfaqMatch1.4.0
OR
phpmyfaqphpmyfaqMatch1.4.0a
OR
phpmyfaqphpmyfaqMatch1.4.1
OR
phpmyfaqphpmyfaqMatch1.4.2
OR
phpmyfaqphpmyfaqMatch1.4.3
OR
phpmyfaqphpmyfaqMatch1.4.4
OR
phpmyfaqphpmyfaqMatch1.4.5
OR
phpmyfaqphpmyfaqMatch1.4.6
OR
phpmyfaqphpmyfaqMatch1.4.7
OR
phpmyfaqphpmyfaqMatch1.4.8
OR
phpmyfaqphpmyfaqMatch1.4.9
OR
phpmyfaqphpmyfaqMatch1.4.10
OR
phpmyfaqphpmyfaqMatch1.4.11
OR
phpmyfaqphpmyfaqMatch1.5
OR
phpmyfaqphpmyfaqMatch1.5alpha1
OR
phpmyfaqphpmyfaqMatch1.5alpha2
OR
phpmyfaqphpmyfaqMatch1.5beta1
OR
phpmyfaqphpmyfaqMatch1.5beta2
OR
phpmyfaqphpmyfaqMatch1.5beta3
OR
phpmyfaqphpmyfaqMatch1.5rc1
OR
phpmyfaqphpmyfaqMatch1.5rc2
OR
phpmyfaqphpmyfaqMatch1.5rc3
OR
phpmyfaqphpmyfaqMatch1.5rc4
OR
phpmyfaqphpmyfaqMatch1.5rc5
OR
phpmyfaqphpmyfaqMatch1.5.0
OR
phpmyfaqphpmyfaqMatch1.5.1
OR
phpmyfaqphpmyfaqMatch1.5.2
OR
phpmyfaqphpmyfaqMatch1.5.3
OR
phpmyfaqphpmyfaqMatch1.5.4
OR
phpmyfaqphpmyfaqMatch1.5.5
OR
phpmyfaqphpmyfaqMatch1.5.6
OR
phpmyfaqphpmyfaqMatch1.5.7
OR
phpmyfaqphpmyfaqMatch1.5.8
OR
phpmyfaqphpmyfaqMatch1.5.9
OR
phpmyfaqphpmyfaqMatch1.6.0
OR
phpmyfaqphpmyfaqMatch1.6.1
OR
phpmyfaqphpmyfaqMatch1.6.2
OR
phpmyfaqphpmyfaqMatch1.6.3
OR
phpmyfaqphpmyfaqMatch1.6.4
OR
phpmyfaqphpmyfaqMatch1.6.5
OR
phpmyfaqphpmyfaqMatch1.6.6
OR
phpmyfaqphpmyfaqMatch1.6.7
OR
phpmyfaqphpmyfaqMatch1.6.8
OR
phpmyfaqphpmyfaqMatch1.6.9
OR
phpmyfaqphpmyfaqMatch1.6.10
OR
phpmyfaqphpmyfaqMatch1.6.11
OR
phpmyfaqphpmyfaqMatch1.6.12
OR
phpmyfaqphpmyfaqMatch2.0.0
OR
phpmyfaqphpmyfaqMatch2.0.1
OR
phpmyfaqphpmyfaqMatch2.0.2
OR
phpmyfaqphpmyfaqMatch2.0.3
OR
phpmyfaqphpmyfaqMatch2.0.4
OR
phpmyfaqphpmyfaqMatch2.0.5
OR
phpmyfaqphpmyfaqMatch2.0.6
OR
phpmyfaqphpmyfaqMatch2.0.7
OR
phpmyfaqphpmyfaqMatch2.0.8
OR
phpmyfaqphpmyfaqMatch2.0.9
OR
phpmyfaqphpmyfaqMatch2.0.10
OR
phpmyfaqphpmyfaqMatch2.0.11
OR
phpmyfaqphpmyfaqMatch2.0.12
OR
phpmyfaqphpmyfaqMatch2.0.13
OR
phpmyfaqphpmyfaqMatch2.0.14
OR
phpmyfaqphpmyfaqMatch2.0.15
OR
phpmyfaqphpmyfaqMatch2.0.16
OR
phpmyfaqphpmyfaqMatch2.0.17
OR
phpmyfaqphpmyfaqMatch2.5.0
OR
phpmyfaqphpmyfaqMatch2.5.1
OR
phpmyfaqphpmyfaqMatch2.5.2
OR
phpmyfaqphpmyfaqMatch2.5.3
OR
phpmyfaqphpmyfaqMatch2.5.4
OR
phpmyfaqphpmyfaqMatch2.5.5
OR
phpmyfaqphpmyfaqMatch2.5.6
OR
phpmyfaqphpmyfaqMatch2.5.7
OR
phpmyfaqphpmyfaqMatch2.6.0
OR
phpmyfaqphpmyfaqMatch2.6.1
OR
phpmyfaqphpmyfaqMatch2.6.2
OR
phpmyfaqphpmyfaqMatch2.6.3
OR
phpmyfaqphpmyfaqMatch2.6.4
OR
phpmyfaqphpmyfaqMatch2.6.5
OR
phpmyfaqphpmyfaqMatch2.6.6
OR
phpmyfaqphpmyfaqMatch2.6.7
OR
phpmyfaqphpmyfaqMatch2.6.8
OR
phpmyfaqphpmyfaqMatch2.6.9
OR
phpmyfaqphpmyfaqMatch2.6.10
OR
phpmyfaqphpmyfaqMatch2.6.11
OR
phpmyfaqphpmyfaqMatch2.6.12
OR
phpmyfaqphpmyfaqMatch2.6.13
OR
phpmyfaqphpmyfaqMatch2.6.14
OR
phpmyfaqphpmyfaqMatch2.6.15
OR
phpmyfaqphpmyfaqMatch2.6.16
OR
phpmyfaqphpmyfaqMatch2.6.17
OR
phpmyfaqphpmyfaqMatch2.6.18
OR
phpmyfaqphpmyfaqMatch2.7.0
OR
phpmyfaqphpmyfaqMatch2.7.1
OR
phpmyfaqphpmyfaqMatch2.7.2
OR
phpmyfaqphpmyfaqMatch2.7.3
OR
phpmyfaqphpmyfaqMatch2.7.4
OR
phpmyfaqphpmyfaqMatch2.7.5
OR
phpmyfaqphpmyfaqMatch2.7.6
OR
phpmyfaqphpmyfaqMatch2.7.7
OR
phpmyfaqphpmyfaqMatch2.7.8
OR
phpmyfaqphpmyfaqMatch2.7.9
OR
phpmyfaqphpmyfaqMatch2.8.0
OR
phpmyfaqphpmyfaqMatch2.8.1
OR
phpmyfaqphpmyfaqMatch2.8.2
OR
phpmyfaqphpmyfaqMatch2.8.3
OR
phpmyfaqphpmyfaqMatch2.8.4

4.3 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

5.7 Medium

AI Score

Confidence

High

0.003 Low

EPSS

Percentile

66.0%