Summary
Detail | |||
---|---|---|---|
Vendor | Phpmyfaq | First view | 2011-12-14 |
Product | Phpmyfaq | Last view | 2024-02-05 |
Version | 2.6.7 | Type | Application |
Update | * | ||
Edition | * | ||
Language | * | ||
Sofware Edition | * | ||
Target Software | * | ||
Target Hardware | * | ||
Other | * | ||
CPE Product | cpe:2.3:a:phpmyfaq:phpmyfaq |
Activity : Overall
Related : CVE
Date | Alert | Description | |
---|---|---|---|
6.1 | 2024-02-05 | CVE-2024-24574 | phpMyFAQ is an open source FAQ web application for PHP 8.1+ and MySQL, PostgreSQL and other databases. Unsafe echo of filename in phpMyFAQ\phpmyfaq\admin\attachments.php leads to allowed execution of JavaScript code in client side (XSS). This vulnerability has been patched in version 3.2.5. |
6.5 | 2024-02-05 | CVE-2024-22208 | phpMyFAQ is an Open Source FAQ web application for PHP 8.1+ and MySQL, PostgreSQL and other databases. The 'sharing FAQ' functionality allows any unauthenticated actor to misuse the phpMyFAQ application to send arbitrary emails to a large range of targets. The phpMyFAQ application has a functionality where anyone can share a FAQ item to others. The front-end of this functionality allows any phpMyFAQ articles to be shared with 5 email addresses. Any unauthenticated actor can perform this action. There is a CAPTCHA in place, however the amount of people you email with a single request is not limited to 5 by the backend. An attacker can thus solve a single CAPTCHA and send thousands of emails at once. An attacker can utilize the target application's email server to send phishing messages. This can get the server on a blacklist, causing all emails to end up in spam. It can also lead to reputation damages. This issue has been patched in version 3.2.5. |
6.5 | 2024-02-05 | CVE-2024-22202 | phpMyFAQ is an open source FAQ web application for PHP 8.1+ and MySQL, PostgreSQL and other databases. phpMyFAQ's user removal page allows an attacker to spoof another user's detail, and in turn make a compelling phishing case for removing another user's account. The front-end of this page doesn't allow changing the form details, an attacker can utilize a proxy to intercept this request and submit other data. Upon submitting this form, an email is sent to the administrator informing them that this user wants to delete their account. An administrator has no way of telling the difference between the actual user wishing to delete their account or the attacker issuing this for an account they do not control. This issue has been patched in version 3.2.5. |
5.4 | 2023-12-16 | CVE-2023-6890 | Cross-site Scripting (XSS) - Stored in GitHub repository thorsten/phpmyfaq prior to 3.1.17. |
5.4 | 2023-12-16 | CVE-2023-6889 | Cross-site Scripting (XSS) - Stored in GitHub repository thorsten/phpmyfaq prior to 3.1.17. |
5.4 | 2023-10-31 | CVE-2023-5867 | Cross-site Scripting (XSS) - Stored in GitHub repository thorsten/phpmyfaq prior to 3.2.2. |
5.7 | 2023-10-31 | CVE-2023-5866 | Sensitive Cookie in HTTPS Session Without 'Secure' Attribute in GitHub repository thorsten/phpmyfaq prior to 3.2.1. |
9.8 | 2023-10-31 | CVE-2023-5865 | Insufficient Session Expiration in GitHub repository thorsten/phpmyfaq prior to 3.2.2. |
4.8 | 2023-10-31 | CVE-2023-5864 | Cross-site Scripting (XSS) - Stored in GitHub repository thorsten/phpmyfaq prior to 3.2.1. |
6.1 | 2023-10-31 | CVE-2023-5863 | Cross-site Scripting (XSS) - Reflected in GitHub repository thorsten/phpmyfaq prior to 3.2.2. |
6.1 | 2023-09-30 | CVE-2023-5320 | Cross-site Scripting (XSS) - DOM in GitHub repository thorsten/phpmyfaq prior to 3.1.18. |
5.4 | 2023-09-30 | CVE-2023-5319 | Cross-site Scripting (XSS) - Stored in GitHub repository thorsten/phpmyfaq prior to 3.1.18. |
5.4 | 2023-09-30 | CVE-2023-5317 | Cross-site Scripting (XSS) - Stored in GitHub repository thorsten/phpmyfaq prior to 3.1.18. |
6.1 | 2023-09-30 | CVE-2023-5316 | Cross-site Scripting (XSS) - DOM in GitHub repository thorsten/phpmyfaq prior to 3.1.18. |
9.8 | 2023-09-30 | CVE-2023-5227 | Unrestricted Upload of File with Dangerous Type in GitHub repository thorsten/phpmyfaq prior to 3.1.8. |
5.4 | 2023-07-31 | CVE-2023-4007 | Cross-site Scripting (XSS) - Stored in GitHub repository thorsten/phpmyfaq prior to 3.1.16. |
9.8 | 2023-07-31 | CVE-2023-4006 | Improper Neutralization of Formula Elements in a CSV File in GitHub repository thorsten/phpmyfaq prior to 3.1.16. |
4.8 | 2023-06-30 | CVE-2023-3469 | Cross-site Scripting (XSS) - Reflected in GitHub repository thorsten/phpmyfaq prior to 3.2.0-beta.2. |
6.1 | 2023-05-31 | CVE-2023-2999 | Cross-site Scripting (XSS) - Stored in GitHub repository thorsten/phpmyfaq prior to 3.1.14. |
6.1 | 2023-05-31 | CVE-2023-2998 | Cross-site Scripting (XSS) - Stored in GitHub repository thorsten/phpmyfaq prior to 3.1.14. |
5.4 | 2023-05-17 | CVE-2023-2753 | Cross-site Scripting (XSS) - Stored in GitHub repository thorsten/phpmyfaq prior to 3.2.0-beta. |
5.4 | 2023-05-17 | CVE-2023-2752 | Cross-site Scripting (XSS) - Stored in GitHub repository thorsten/phpmyfaq prior to 3.2.0-beta. |
4.8 | 2023-05-05 | CVE-2023-2550 | Cross-site Scripting (XSS) - Stored in GitHub repository thorsten/phpmyfaq prior to 3.1.13. |
4.8 | 2023-05-05 | CVE-2023-2427 | Cross-site Scripting (XSS) - Reflected in GitHub repository thorsten/phpmyfaq prior to 3.1.13. |
9.8 | 2023-04-30 | CVE-2023-2429 | Improper Access Control in GitHub repository thorsten/phpmyfaq prior to 3.1.13. |
CWE : Common Weakness Enumeration
% | id | Name |
---|---|---|
59% (57) | CWE-79 | Failure to Preserve Web Page Structure ('Cross-site Scripting') |
11% (11) | CWE-352 | Cross-Site Request Forgery (CSRF) |
4% (4) | CWE-521 | Weak Password Requirements |
3% (3) | CWE-284 | Access Control (Authorization) Issues |
3% (3) | CWE-94 | Failure to Control Generation of Code ('Code Injection') |
1% (1) | CWE-614 | Sensitive Cookie in HTTPS Session Without 'Secure' Attribute |
1% (1) | CWE-613 | Insufficient Session Expiration |
1% (1) | CWE-434 | Unrestricted Upload of File with Dangerous Type |
1% (1) | CWE-311 | Missing Encryption of Sensitive Data |
1% (1) | CWE-307 | Improper Restriction of Excessive Authentication Attempts |
1% (1) | CWE-294 | Authentication Bypass by Capture-replay |
1% (1) | CWE-287 | Improper Authentication |
1% (1) | CWE-285 | Improper Access Control (Authorization) |
1% (1) | CWE-275 | Permission Issues |
1% (1) | CWE-269 | Improper Privilege Management |
1% (1) | CWE-254 | Security Features |
1% (1) | CWE-248 | Uncaught Exception |
1% (1) | CWE-200 | Information Exposure |
1% (1) | CWE-115 | Misinterpretation of Input |
1% (1) | CWE-89 | Improper Sanitization of Special Elements used in an SQL Command ('... |
1% (1) | CWE-80 | Improper Sanitization of Script-Related HTML Tags in a Web Page (Basic XSS) |
1% (1) | CWE-77 | Improper Sanitization of Special Elements used in a Command ('Comma... |
1% (1) | CWE-75 | Failure to Sanitize Special Elements into a Different Plane (Special Ele... |
Open Source Vulnerability Database (OSVDB)
id | Description |
---|---|
76928 | Ajax File and Image Manager /ajaxfilemanager/ajax_create_folder.php Unspecifi... |
OpenVAS Exploits
id | Description |
---|---|
2012-06-18 | Name : Log1 CMS 'data.php' PHP Code Injection Vulnerability File : nvt/gb_log1_cms_50523.nasl |
2011-11-07 | Name : Ajax File and Image Manager 'data.php' PHP Code Injection Vulnerability File : nvt/gb_afim_50523.nasl |
Nessus® Vulnerability Scanner
id | Description |
---|---|
2018-11-02 | Name: The remote FreeBSD host is missing a security-related update. File: freebsd_pkg_e0ab177307c146c691704c5e81c00927.nasl - Type: ACT_GATHER_INFO |
2017-10-02 | Name: The remote FreeBSD host is missing a security-related update. File: freebsd_pkg_33888815631e4bbab776a9b46fe177b5.nasl - Type: ACT_GATHER_INFO |
2014-02-07 | Name: The remote FreeBSD host is missing a security-related update. File: freebsd_pkg_4dd575b88f8211e3bb110025905a4771.nasl - Type: ACT_GATHER_INFO |