Lucene search

K

14 matches found

CVE
CVE
added 2024/03/25 7:15 p.m.62 views

CVE-2024-27299

phpMyFAQ is an open source FAQ web application for PHP 8.1+ and MySQL, PostgreSQL and other databases. A SQL injection vulnerability has been discovered in the the "Add News" functionality due to improper escaping of the email address. This allows any authenticated user with the rights to add/edit ...

8.8CVSS8.8AI score0.01383EPSS
CVE
CVE
added 2024/03/26 3:15 a.m.58 views

CVE-2024-29196

phpMyFAQ is an open source FAQ web application for PHP 8.1+ and MySQL, PostgreSQL and other databases. There is a Path Traversal vulnerability in Attachments that allows attackers with admin rights to upload malicious files to other locations of the web root. This vulnerability is fixed in 3.2.6.

3.8CVSS4AI score0.00463EPSS
CVE
CVE
added 2024/03/25 7:15 p.m.53 views

CVE-2024-27300

phpMyFAQ is an open source FAQ web application for PHP 8.1+ and MySQL, PostgreSQL and other databases. The email field in phpMyFAQ's user control panel page is vulnerable to stored XSS attacks due to the inadequacy of PHP's FILTER_VALIDATE_EMAIL function, which only validates the email format, not ...

5.5CVSS5.5AI score0.00444EPSS
CVE
CVE
added 2024/03/25 7:15 p.m.53 views

CVE-2024-28106

phpMyFAQ is an open source FAQ web application for PHP 8.1+ and MySQL, PostgreSQL and other databases. By manipulating the news parameter in a POST request, an attacker can inject malicious JavaScript code. Upon browsing to the compromised news page, the XSS payload triggers. This vulnerability is ...

5.4CVSS4.3AI score0.00115EPSS
CVE
CVE
added 2024/03/25 7:15 p.m.52 views

CVE-2024-28107

phpMyFAQ is an open source FAQ web application for PHP 8.1+ and MySQL, PostgreSQL and other databases. A SQL injection vulnerability has been discovered in the insertentry & saveentry when modifying records due to improper escaping of the email address. This allows any authenticated user with the r...

8.8CVSS8.9AI score0.0045EPSS
CVE
CVE
added 2024/03/25 7:15 p.m.52 views

CVE-2024-28108

phpMyFAQ is an open source FAQ web application for PHP 8.1+ and MySQL, PostgreSQL and other databases. Due to insufficient validation on the contentLink parameter, it is possible for unauthenticated users to inject HTML code to the page which might affect other users. Also, requires that adding new...

6.1CVSS4.7AI score0.00463EPSS
CVE
CVE
added 2024/12/06 3:15 p.m.52 views

CVE-2024-54141

phpMyFAQ is an open source FAQ web application for PHP 8.1+ and MySQL, PostgreSQL and other databases. Prior to 4.0.0, phpMyFAQ exposes the database (ie postgreSQL) server's credential when connection to DB fails. This vulnerability is fixed in 4.0.0.

8.6CVSS8.5AI score0.00178EPSS
CVE
CVE
added 2024/03/25 9:15 p.m.50 views

CVE-2024-29179

phpMyFAQ is an open source FAQ web application for PHP 8.1+ and MySQL, PostgreSQL and other databases. An attacker with admin privileges can upload an attachment containing JS code without extension and the application will render it as HTML which allows for XSS attacks.

4.8CVSS4.6AI score0.00185EPSS
CVE
CVE
added 2024/02/05 9:15 p.m.47 views

CVE-2024-24574

phpMyFAQ is an open source FAQ web application for PHP 8.1+ and MySQL, PostgreSQL and other databases. Unsafe echo of filename in phpMyFAQ\phpmyfaq\admin\attachments.php leads to allowed execution of JavaScript code in client side (XSS). This vulnerability has been patched in version 3.2.5.

6.5CVSS6.3AI score0.02404EPSS
CVE
CVE
added 2024/03/25 7:15 p.m.47 views

CVE-2024-28105

phpMyFAQ is an open source FAQ web application for PHP 8.1+ and MySQL, PostgreSQL and other databases. The category image upload function in phpmyfaq is vulnerable to manipulation of the Content-type and lang parameters, allowing attackers to upload malicious files with a .php extension, potentiall...

7.2CVSS7.3AI score0.03042EPSS
CVE
CVE
added 2024/02/05 9:15 p.m.46 views

CVE-2024-22208

phpMyFAQ is an Open Source FAQ web application for PHP 8.1+ and MySQL, PostgreSQL and other databases. The 'sharing FAQ' functionality allows any unauthenticated actor to misuse the phpMyFAQ application to send arbitrary emails to a large range of targets. The phpMyFAQ application has a functionali...

6.5CVSS6.5AI score0.00907EPSS
CVE
CVE
added 2025/01/02 6:15 p.m.42 views

CVE-2024-56199

phpMyFAQ is an open source FAQ web application. Starting no later than version 3.2.10 and prior to version 4.0.2, an attacker can inject malicious HTML content into the FAQ editor at http[:]//localhost/admin/index[.]php?action=editentry, resulting in a complete disruption of the FAQ page's user int...

5.2CVSS5.4AI score0.00109EPSS
CVE
CVE
added 2024/12/13 2:15 p.m.38 views

CVE-2024-55889

phpMyFAQ is an open source FAQ web application. Prior to version 3.2.10, a vulnerability exists in the FAQ Record component where a privileged attacker can trigger a file download on a victim's machine upon page visit by embedding it in an element without user interaction or explicit consent. Vers...

4.9CVSS5AI score0.00875EPSS
CVE
CVE
added 2024/02/05 8:15 p.m.35 views

CVE-2024-22202

phpMyFAQ is an open source FAQ web application for PHP 8.1+ and MySQL, PostgreSQL and other databases. phpMyFAQ's user removal page allows an attacker to spoof another user's detail, and in turn make a compelling phishing case for removing another user's account. The front-end of this page doesn't ...

6.5CVSS6.3AI score0.00218EPSS