Vulnerabilities (CVE)

Filtered by vendor Phpmyfaq Subscribe
Filtered by product Phpmyfaq
Total 135 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2005-3049 1 Phpmyfaq 1 Phpmyfaq 2025-04-03 5.0 MEDIUM N/A
PhpMyFaq 1.5.1 stores data files under the web document root with insufficient access control and predictable filenames, which allows remote attackers to obtain sensitive information via a direct request to the data/tracking[DATE] file.
CVE-2005-3050 1 Phpmyfaq 1 Phpmyfaq 2025-04-03 5.0 MEDIUM N/A
PhpMyFaq 1.5.1 allows remote attackers to obtain sensitive information via a LANGCODE parameter that does not exist, which reveals the path in an error message.
CVE-2004-2257 1 Phpmyfaq 1 Phpmyfaq 2025-04-03 5.0 MEDIUM 5.3 MEDIUM
phpMyFAQ 1.4.0 allows remote attackers to access the Image Manager to upload or delete images without authorization via a direct request.
CVE-2005-3046 1 Phpmyfaq 1 Phpmyfaq 2025-04-03 6.8 MEDIUM N/A
SQL injection vulnerability in password.php in PhpMyFaq 1.5.1 allows remote attackers to modify SQL queries and gain administrator privileges via the user field.
CVE-2004-2256 1 Phpmyfaq 1 Phpmyfaq 2025-04-03 5.0 MEDIUM N/A
Directory traversal vulnerability in phpMyFAQ 1.4.0 alpha allows remote attackers to read arbitrary files, and possibly execute local PHP files, via .. sequences in the lang (language) variable.
CVE-2005-3047 1 Phpmyfaq 1 Phpmyfaq 2025-04-03 4.3 MEDIUM N/A
Multiple cross-site scripting (XSS) vulnerabilities in PhpMyFaq 1.5.1 allow remote attackers to inject arbitrary web script or HTML via the (1) PMF_CONF[version] parameter to footer.php or (2) PMF_LANG[metaLanguage] to header.php.
CVE-2004-2255 1 Phpmyfaq 1 Phpmyfaq 2025-04-03 6.4 MEDIUM N/A
Directory traversal vulnerability in phpMyFAQ 1.3.12 allows remote attackers to read arbitrary files, and possibly execute local PHP files, via the action variable, which is used as part of a template filename.
CVE-2023-0794 1 Phpmyfaq 1 Phpmyfaq 2025-03-21 N/A 8.3 HIGH
Cross-site Scripting (XSS) - Stored in GitHub repository thorsten/phpmyfaq prior to 3.1.11.
CVE-2023-0791 1 Phpmyfaq 1 Phpmyfaq 2025-03-21 N/A 8.3 HIGH
Cross-site Scripting (XSS) - Stored in GitHub repository thorsten/phpmyfaq prior to 3.1.11.
CVE-2023-0789 1 Phpmyfaq 1 Phpmyfaq 2025-03-21 N/A 8.1 HIGH
Command Injection in GitHub repository thorsten/phpmyfaq prior to 3.1.11.
CVE-2023-0788 1 Phpmyfaq 1 Phpmyfaq 2025-03-21 N/A 8.1 HIGH
Code Injection in GitHub repository thorsten/phpmyfaq prior to 3.1.11.
CVE-2023-2429 1 Phpmyfaq 1 Phpmyfaq 2025-01-30 N/A 9.8 CRITICAL
Improper Access Control in GitHub repository thorsten/phpmyfaq prior to 3.1.13.
CVE-2023-2428 1 Phpmyfaq 1 Phpmyfaq 2025-01-30 N/A 5.4 MEDIUM
Cross-site Scripting (XSS) - Stored in GitHub repository thorsten/phpmyfaq prior to 3.1.13.
CVE-2024-28106 1 Phpmyfaq 1 Phpmyfaq 2025-01-09 N/A 4.3 MEDIUM
phpMyFAQ is an open source FAQ web application for PHP 8.1+ and MySQL, PostgreSQL and other databases. By manipulating the news parameter in a POST request, an attacker can inject malicious JavaScript code. Upon browsing to the compromised news page, the XSS payload triggers. This vulnerability is fixed in 3.2.6.
CVE-2024-27299 1 Phpmyfaq 1 Phpmyfaq 2025-01-09 N/A 8.8 HIGH
phpMyFAQ is an open source FAQ web application for PHP 8.1+ and MySQL, PostgreSQL and other databases. A SQL injection vulnerability has been discovered in the the "Add News" functionality due to improper escaping of the email address. This allows any authenticated user with the rights to add/edit FAQ news to exploit this vulnerability to exfiltrate data, take over accounts and in some cases, even achieve RCE. The vulnerable field lies in the `authorEmail` field which uses PHP's `FILTER_VALIDATE_EMAIL` filter. This filter is insufficient in protecting against SQL injection attacks and should still be properly escaped. However, in this version of phpMyFAQ (3.2.5), this field is not escaped properly can be used together with other fields to fully exploit the SQL injection vulnerability. This vulnerability is fixed in 3.2.6.
CVE-2024-27300 1 Phpmyfaq 1 Phpmyfaq 2025-01-09 N/A 5.5 MEDIUM
phpMyFAQ is an open source FAQ web application for PHP 8.1+ and MySQL, PostgreSQL and other databases. The `email` field in phpMyFAQ's user control panel page is vulnerable to stored XSS attacks due to the inadequacy of PHP's `FILTER_VALIDATE_EMAIL` function, which only validates the email format, not its content. This vulnerability enables an attacker to execute arbitrary client-side JavaScript within the context of another user's phpMyFAQ session. This vulnerability is fixed in 3.2.6.
CVE-2024-28105 1 Phpmyfaq 1 Phpmyfaq 2025-01-09 N/A 7.2 HIGH
phpMyFAQ is an open source FAQ web application for PHP 8.1+ and MySQL, PostgreSQL and other databases. The category image upload function in phpmyfaq is vulnerable to manipulation of the `Content-type` and `lang` parameters, allowing attackers to upload malicious files with a .php extension, potentially leading to remote code execution (RCE) on the system. This vulnerability is fixed in 3.2.6.
CVE-2024-28107 1 Phpmyfaq 1 Phpmyfaq 2025-01-09 N/A 8.8 HIGH
phpMyFAQ is an open source FAQ web application for PHP 8.1+ and MySQL, PostgreSQL and other databases. A SQL injection vulnerability has been discovered in the `insertentry` & `saveentry` when modifying records due to improper escaping of the email address. This allows any authenticated user with the rights to add/edit FAQ news to exploit this vulnerability to exfiltrate data, take over accounts and in some cases, even achieve RCE. This vulnerability is fixed in 3.2.6.
CVE-2024-28108 1 Phpmyfaq 1 Phpmyfaq 2025-01-09 N/A 4.7 MEDIUM
phpMyFAQ is an open source FAQ web application for PHP 8.1+ and MySQL, PostgreSQL and other databases. Due to insufficient validation on the `contentLink` parameter, it is possible for unauthenticated users to inject HTML code to the page which might affect other users. _Also, requires that adding new FAQs is allowed for guests and that the admin doesn't check the content of a newly added FAQ._ This vulnerability is fixed in 3.2.6.
CVE-2024-29179 1 Phpmyfaq 1 Phpmyfaq 2025-01-09 N/A 4.8 MEDIUM
phpMyFAQ is an open source FAQ web application for PHP 8.1+ and MySQL, PostgreSQL and other databases. An attacker with admin privileges can upload an attachment containing JS code without extension and the application will render it as HTML which allows for XSS attacks.