This CPE summary could be partial or incomplete. Please contact us for a detailed listing.

Summary

Detail
Vendor Phpmyfaq First view 2011-12-14
Product Phpmyfaq Last view 2024-02-05
Version 2.6.7 Type Application
Update *  
Edition *  
Language *  
Sofware Edition *  
Target Software *  
Target Hardware *  
Other *  
 
CPE Product cpe:2.3:a:phpmyfaq:phpmyfaq

Activity : Overall

Related : CVE

This CPE have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
  Date Alert Description
6.1 2024-02-05 CVE-2024-24574

phpMyFAQ is an open source FAQ web application for PHP 8.1+ and MySQL, PostgreSQL and other databases. Unsafe echo of filename in phpMyFAQ\phpmyfaq\admin\attachments.php leads to allowed execution of JavaScript code in client side (XSS). This vulnerability has been patched in version 3.2.5.

6.5 2024-02-05 CVE-2024-22208

phpMyFAQ is an Open Source FAQ web application for PHP 8.1+ and MySQL, PostgreSQL and other databases. The 'sharing FAQ' functionality allows any unauthenticated actor to misuse the phpMyFAQ application to send arbitrary emails to a large range of targets. The phpMyFAQ application has a functionality where anyone can share a FAQ item to others. The front-end of this functionality allows any phpMyFAQ articles to be shared with 5 email addresses. Any unauthenticated actor can perform this action. There is a CAPTCHA in place, however the amount of people you email with a single request is not limited to 5 by the backend. An attacker can thus solve a single CAPTCHA and send thousands of emails at once. An attacker can utilize the target application's email server to send phishing messages. This can get the server on a blacklist, causing all emails to end up in spam. It can also lead to reputation damages. This issue has been patched in version 3.2.5.

6.5 2024-02-05 CVE-2024-22202

phpMyFAQ is an open source FAQ web application for PHP 8.1+ and MySQL, PostgreSQL and other databases. phpMyFAQ's user removal page allows an attacker to spoof another user's detail, and in turn make a compelling phishing case for removing another user's account. The front-end of this page doesn't allow changing the form details, an attacker can utilize a proxy to intercept this request and submit other data. Upon submitting this form, an email is sent to the administrator informing them that this user wants to delete their account. An administrator has no way of telling the difference between the actual user wishing to delete their account or the attacker issuing this for an account they do not control. This issue has been patched in version 3.2.5.

5.4 2023-12-16 CVE-2023-6890

Cross-site Scripting (XSS) - Stored in GitHub repository thorsten/phpmyfaq prior to 3.1.17.

5.4 2023-12-16 CVE-2023-6889

Cross-site Scripting (XSS) - Stored in GitHub repository thorsten/phpmyfaq prior to 3.1.17.

5.4 2023-10-31 CVE-2023-5867

Cross-site Scripting (XSS) - Stored in GitHub repository thorsten/phpmyfaq prior to 3.2.2.

5.7 2023-10-31 CVE-2023-5866

Sensitive Cookie in HTTPS Session Without 'Secure' Attribute in GitHub repository thorsten/phpmyfaq prior to 3.2.1.

9.8 2023-10-31 CVE-2023-5865

Insufficient Session Expiration in GitHub repository thorsten/phpmyfaq prior to 3.2.2.

4.8 2023-10-31 CVE-2023-5864

Cross-site Scripting (XSS) - Stored in GitHub repository thorsten/phpmyfaq prior to 3.2.1.

6.1 2023-10-31 CVE-2023-5863

Cross-site Scripting (XSS) - Reflected in GitHub repository thorsten/phpmyfaq prior to 3.2.2.

6.1 2023-09-30 CVE-2023-5320

Cross-site Scripting (XSS) - DOM in GitHub repository thorsten/phpmyfaq prior to 3.1.18.

5.4 2023-09-30 CVE-2023-5319

Cross-site Scripting (XSS) - Stored in GitHub repository thorsten/phpmyfaq prior to 3.1.18.

5.4 2023-09-30 CVE-2023-5317

Cross-site Scripting (XSS) - Stored in GitHub repository thorsten/phpmyfaq prior to 3.1.18.

6.1 2023-09-30 CVE-2023-5316

Cross-site Scripting (XSS) - DOM in GitHub repository thorsten/phpmyfaq prior to 3.1.18.

9.8 2023-09-30 CVE-2023-5227

Unrestricted Upload of File with Dangerous Type in GitHub repository thorsten/phpmyfaq prior to 3.1.8.

5.4 2023-07-31 CVE-2023-4007

Cross-site Scripting (XSS) - Stored in GitHub repository thorsten/phpmyfaq prior to 3.1.16.

9.8 2023-07-31 CVE-2023-4006

Improper Neutralization of Formula Elements in a CSV File in GitHub repository thorsten/phpmyfaq prior to 3.1.16.

4.8 2023-06-30 CVE-2023-3469

Cross-site Scripting (XSS) - Reflected in GitHub repository thorsten/phpmyfaq prior to 3.2.0-beta.2.

6.1 2023-05-31 CVE-2023-2999

Cross-site Scripting (XSS) - Stored in GitHub repository thorsten/phpmyfaq prior to 3.1.14.

6.1 2023-05-31 CVE-2023-2998

Cross-site Scripting (XSS) - Stored in GitHub repository thorsten/phpmyfaq prior to 3.1.14.

5.4 2023-05-17 CVE-2023-2753

Cross-site Scripting (XSS) - Stored in GitHub repository thorsten/phpmyfaq prior to 3.2.0-beta.

5.4 2023-05-17 CVE-2023-2752

Cross-site Scripting (XSS) - Stored in GitHub repository thorsten/phpmyfaq prior to 3.2.0-beta.

4.8 2023-05-05 CVE-2023-2550

Cross-site Scripting (XSS) - Stored in GitHub repository thorsten/phpmyfaq prior to 3.1.13.

4.8 2023-05-05 CVE-2023-2427

Cross-site Scripting (XSS) - Reflected in GitHub repository thorsten/phpmyfaq prior to 3.1.13.

9.8 2023-04-30 CVE-2023-2429

Improper Access Control in GitHub repository thorsten/phpmyfaq prior to 3.1.13.

CWE : Common Weakness Enumeration

%idName
59% (57) CWE-79 Failure to Preserve Web Page Structure ('Cross-site Scripting')
11% (11) CWE-352 Cross-Site Request Forgery (CSRF)
4% (4) CWE-521 Weak Password Requirements
3% (3) CWE-284 Access Control (Authorization) Issues
3% (3) CWE-94 Failure to Control Generation of Code ('Code Injection')
1% (1) CWE-614 Sensitive Cookie in HTTPS Session Without 'Secure' Attribute
1% (1) CWE-613 Insufficient Session Expiration
1% (1) CWE-434 Unrestricted Upload of File with Dangerous Type
1% (1) CWE-311 Missing Encryption of Sensitive Data
1% (1) CWE-307 Improper Restriction of Excessive Authentication Attempts
1% (1) CWE-294 Authentication Bypass by Capture-replay
1% (1) CWE-287 Improper Authentication
1% (1) CWE-285 Improper Access Control (Authorization)
1% (1) CWE-275 Permission Issues
1% (1) CWE-269 Improper Privilege Management
1% (1) CWE-254 Security Features
1% (1) CWE-248 Uncaught Exception
1% (1) CWE-200 Information Exposure
1% (1) CWE-115 Misinterpretation of Input
1% (1) CWE-89 Improper Sanitization of Special Elements used in an SQL Command ('...
1% (1) CWE-80 Improper Sanitization of Script-Related HTML Tags in a Web Page (Basic XSS)
1% (1) CWE-77 Improper Sanitization of Special Elements used in a Command ('Comma...
1% (1) CWE-75 Failure to Sanitize Special Elements into a Different Plane (Special Ele...

Open Source Vulnerability Database (OSVDB)

id Description
76928 Ajax File and Image Manager /ajaxfilemanager/ajax_create_folder.php Unspecifi...

OpenVAS Exploits

id Description
2012-06-18 Name : Log1 CMS 'data.php' PHP Code Injection Vulnerability
File : nvt/gb_log1_cms_50523.nasl
2011-11-07 Name : Ajax File and Image Manager 'data.php' PHP Code Injection Vulnerability
File : nvt/gb_afim_50523.nasl

Nessus® Vulnerability Scanner

id Description
2018-11-02 Name: The remote FreeBSD host is missing a security-related update.
File: freebsd_pkg_e0ab177307c146c691704c5e81c00927.nasl - Type: ACT_GATHER_INFO
2017-10-02 Name: The remote FreeBSD host is missing a security-related update.
File: freebsd_pkg_33888815631e4bbab776a9b46fe177b5.nasl - Type: ACT_GATHER_INFO
2014-02-07 Name: The remote FreeBSD host is missing a security-related update.
File: freebsd_pkg_4dd575b88f8211e3bb110025905a4771.nasl - Type: ACT_GATHER_INFO