Lucene search

K
nvd[email protected]NVD:CVE-2014-0813
HistoryFeb 14, 2014 - 4:55 p.m.

CVE-2014-0813

2014-02-1416:55:13
CWE-352
web.nvd.nist.gov

6.8 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

7.1 High

AI Score

Confidence

Low

0.003 Low

EPSS

Percentile

70.4%

Cross-site request forgery (CSRF) vulnerability in phpMyFAQ before 2.8.6 allows remote attackers to hijack the authentication of arbitrary users for requests that modify settings.

Affected configurations

NVD
Node
phpmyfaqphpmyfaqRange2.8.5
OR
phpmyfaqphpmyfaqMatch1.0
OR
phpmyfaqphpmyfaqMatch1.0.1
OR
phpmyfaqphpmyfaqMatch1.0.1a
OR
phpmyfaqphpmyfaqMatch1.1.0
OR
phpmyfaqphpmyfaqMatch1.1.1
OR
phpmyfaqphpmyfaqMatch1.1.2
OR
phpmyfaqphpmyfaqMatch1.1.3
OR
phpmyfaqphpmyfaqMatch1.1.4
OR
phpmyfaqphpmyfaqMatch1.1.4a
OR
phpmyfaqphpmyfaqMatch1.1.5
OR
phpmyfaqphpmyfaqMatch1.2.0
OR
phpmyfaqphpmyfaqMatch1.2.1
OR
phpmyfaqphpmyfaqMatch1.2.2
OR
phpmyfaqphpmyfaqMatch1.2.3
OR
phpmyfaqphpmyfaqMatch1.2.4
OR
phpmyfaqphpmyfaqMatch1.2.5
OR
phpmyfaqphpmyfaqMatch1.2.5a
OR
phpmyfaqphpmyfaqMatch1.2.5b
OR
phpmyfaqphpmyfaqMatch1.3.0
OR
phpmyfaqphpmyfaqMatch1.3.1
OR
phpmyfaqphpmyfaqMatch1.3.2
OR
phpmyfaqphpmyfaqMatch1.3.3
OR
phpmyfaqphpmyfaqMatch1.3.4
OR
phpmyfaqphpmyfaqMatch1.3.5
OR
phpmyfaqphpmyfaqMatch1.3.6
OR
phpmyfaqphpmyfaqMatch1.3.7
OR
phpmyfaqphpmyfaqMatch1.3.8
OR
phpmyfaqphpmyfaqMatch1.3.9
OR
phpmyfaqphpmyfaqMatch1.3.9pl1
OR
phpmyfaqphpmyfaqMatch1.3.10
OR
phpmyfaqphpmyfaqMatch1.3.11
OR
phpmyfaqphpmyfaqMatch1.3.12
OR
phpmyfaqphpmyfaqMatch1.3.13
OR
phpmyfaqphpmyfaqMatch1.3.14
OR
phpmyfaqphpmyfaqMatch1.4
OR
phpmyfaqphpmyfaqMatch1.4alpha1
OR
phpmyfaqphpmyfaqMatch1.4alpha2
OR
phpmyfaqphpmyfaqMatch1.4.0
OR
phpmyfaqphpmyfaqMatch1.4.0a
OR
phpmyfaqphpmyfaqMatch1.4.1
OR
phpmyfaqphpmyfaqMatch1.4.2
OR
phpmyfaqphpmyfaqMatch1.4.3
OR
phpmyfaqphpmyfaqMatch1.4.4
OR
phpmyfaqphpmyfaqMatch1.4.5
OR
phpmyfaqphpmyfaqMatch1.4.6
OR
phpmyfaqphpmyfaqMatch1.4.7
OR
phpmyfaqphpmyfaqMatch1.4.8
OR
phpmyfaqphpmyfaqMatch1.4.9
OR
phpmyfaqphpmyfaqMatch1.4.10
OR
phpmyfaqphpmyfaqMatch1.4.11
OR
phpmyfaqphpmyfaqMatch1.5
OR
phpmyfaqphpmyfaqMatch1.5alpha1
OR
phpmyfaqphpmyfaqMatch1.5alpha2
OR
phpmyfaqphpmyfaqMatch1.5beta1
OR
phpmyfaqphpmyfaqMatch1.5beta2
OR
phpmyfaqphpmyfaqMatch1.5beta3
OR
phpmyfaqphpmyfaqMatch1.5rc1
OR
phpmyfaqphpmyfaqMatch1.5rc2
OR
phpmyfaqphpmyfaqMatch1.5rc3
OR
phpmyfaqphpmyfaqMatch1.5rc4
OR
phpmyfaqphpmyfaqMatch1.5rc5
OR
phpmyfaqphpmyfaqMatch1.5.0
OR
phpmyfaqphpmyfaqMatch1.5.1
OR
phpmyfaqphpmyfaqMatch1.5.2
OR
phpmyfaqphpmyfaqMatch1.5.3
OR
phpmyfaqphpmyfaqMatch1.5.4
OR
phpmyfaqphpmyfaqMatch1.5.5
OR
phpmyfaqphpmyfaqMatch1.5.6
OR
phpmyfaqphpmyfaqMatch1.5.7
OR
phpmyfaqphpmyfaqMatch1.5.8
OR
phpmyfaqphpmyfaqMatch1.5.9
OR
phpmyfaqphpmyfaqMatch1.6.0
OR
phpmyfaqphpmyfaqMatch1.6.1
OR
phpmyfaqphpmyfaqMatch1.6.2
OR
phpmyfaqphpmyfaqMatch1.6.3
OR
phpmyfaqphpmyfaqMatch1.6.4
OR
phpmyfaqphpmyfaqMatch1.6.5
OR
phpmyfaqphpmyfaqMatch1.6.6
OR
phpmyfaqphpmyfaqMatch1.6.7
OR
phpmyfaqphpmyfaqMatch1.6.8
OR
phpmyfaqphpmyfaqMatch1.6.9
OR
phpmyfaqphpmyfaqMatch1.6.10
OR
phpmyfaqphpmyfaqMatch1.6.11
OR
phpmyfaqphpmyfaqMatch1.6.12
OR
phpmyfaqphpmyfaqMatch2.0.0
OR
phpmyfaqphpmyfaqMatch2.0.1
OR
phpmyfaqphpmyfaqMatch2.0.2
OR
phpmyfaqphpmyfaqMatch2.0.3
OR
phpmyfaqphpmyfaqMatch2.0.4
OR
phpmyfaqphpmyfaqMatch2.0.5
OR
phpmyfaqphpmyfaqMatch2.0.6
OR
phpmyfaqphpmyfaqMatch2.0.7
OR
phpmyfaqphpmyfaqMatch2.0.8
OR
phpmyfaqphpmyfaqMatch2.0.9
OR
phpmyfaqphpmyfaqMatch2.0.10
OR
phpmyfaqphpmyfaqMatch2.0.11
OR
phpmyfaqphpmyfaqMatch2.0.12
OR
phpmyfaqphpmyfaqMatch2.0.13
OR
phpmyfaqphpmyfaqMatch2.0.14
OR
phpmyfaqphpmyfaqMatch2.0.15
OR
phpmyfaqphpmyfaqMatch2.0.16
OR
phpmyfaqphpmyfaqMatch2.0.17
OR
phpmyfaqphpmyfaqMatch2.5.0
OR
phpmyfaqphpmyfaqMatch2.5.1
OR
phpmyfaqphpmyfaqMatch2.5.2
OR
phpmyfaqphpmyfaqMatch2.5.3
OR
phpmyfaqphpmyfaqMatch2.5.4
OR
phpmyfaqphpmyfaqMatch2.5.5
OR
phpmyfaqphpmyfaqMatch2.5.6
OR
phpmyfaqphpmyfaqMatch2.5.7
OR
phpmyfaqphpmyfaqMatch2.6.0
OR
phpmyfaqphpmyfaqMatch2.6.1
OR
phpmyfaqphpmyfaqMatch2.6.2
OR
phpmyfaqphpmyfaqMatch2.6.3
OR
phpmyfaqphpmyfaqMatch2.6.4
OR
phpmyfaqphpmyfaqMatch2.6.5
OR
phpmyfaqphpmyfaqMatch2.6.6
OR
phpmyfaqphpmyfaqMatch2.6.7
OR
phpmyfaqphpmyfaqMatch2.6.8
OR
phpmyfaqphpmyfaqMatch2.6.9
OR
phpmyfaqphpmyfaqMatch2.6.10
OR
phpmyfaqphpmyfaqMatch2.6.11
OR
phpmyfaqphpmyfaqMatch2.6.12
OR
phpmyfaqphpmyfaqMatch2.6.13
OR
phpmyfaqphpmyfaqMatch2.6.14
OR
phpmyfaqphpmyfaqMatch2.6.15
OR
phpmyfaqphpmyfaqMatch2.6.16
OR
phpmyfaqphpmyfaqMatch2.6.17
OR
phpmyfaqphpmyfaqMatch2.6.18
OR
phpmyfaqphpmyfaqMatch2.7.0
OR
phpmyfaqphpmyfaqMatch2.7.1
OR
phpmyfaqphpmyfaqMatch2.7.2
OR
phpmyfaqphpmyfaqMatch2.7.3
OR
phpmyfaqphpmyfaqMatch2.7.4
OR
phpmyfaqphpmyfaqMatch2.7.5
OR
phpmyfaqphpmyfaqMatch2.7.6
OR
phpmyfaqphpmyfaqMatch2.7.7
OR
phpmyfaqphpmyfaqMatch2.7.8
OR
phpmyfaqphpmyfaqMatch2.7.9
OR
phpmyfaqphpmyfaqMatch2.8.0
OR
phpmyfaqphpmyfaqMatch2.8.1
OR
phpmyfaqphpmyfaqMatch2.8.2
OR
phpmyfaqphpmyfaqMatch2.8.3
OR
phpmyfaqphpmyfaqMatch2.8.4

6.8 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

7.1 High

AI Score

Confidence

Low

0.003 Low

EPSS

Percentile

70.4%