U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Results (Refine Search)

Search Parameters:
  • CPE Product Version: cpe:/a:phpmyfaq:phpmyfaq:2.8.16
There are 89 matching records.
Displaying matches 1 through 20.
Vuln ID Summary CVSS Severity
CVE-2024-24574

phpMyFAQ is an open source FAQ web application for PHP 8.1+ and MySQL, PostgreSQL and other databases. Unsafe echo of filename in phpMyFAQ\phpmyfaq\admin\attachments.php leads to allowed execution of JavaScript code in client side (XSS). This vulnerability has been patched in version 3.2.5.

Published: February 05, 2024; 4:15:12 PM -0500
V3.1: 6.1 MEDIUM
V2.0:(not available)
CVE-2024-22208

phpMyFAQ is an Open Source FAQ web application for PHP 8.1+ and MySQL, PostgreSQL and other databases. The 'sharing FAQ' functionality allows any unauthenticated actor to misuse the phpMyFAQ application to send arbitrary emails to a large range of targets. The phpMyFAQ application has a functionality where anyone can share a FAQ item to others. The front-end of this functionality allows any phpMyFAQ articles to be shared with 5 email addresses. Any unauthenticated actor can perform this action. There is a CAPTCHA in place, however the amount of people you email with a single request is not limited to 5 by the backend. An attacker can thus solve a single CAPTCHA and send thousands of emails at once. An attacker can utilize the target application's email server to send phishing messages. This can get the server on a blacklist, causing all emails to end up in spam. It can also lead to reputation damages. This issue has been patched in version 3.2.5.

Published: February 05, 2024; 4:15:11 PM -0500
V3.1: 6.5 MEDIUM
V2.0:(not available)
CVE-2024-22202

phpMyFAQ is an open source FAQ web application for PHP 8.1+ and MySQL, PostgreSQL and other databases. phpMyFAQ's user removal page allows an attacker to spoof another user's detail, and in turn make a compelling phishing case for removing another user's account. The front-end of this page doesn't allow changing the form details, an attacker can utilize a proxy to intercept this request and submit other data. Upon submitting this form, an email is sent to the administrator informing them that this user wants to delete their account. An administrator has no way of telling the difference between the actual user wishing to delete their account or the attacker issuing this for an account they do not control. This issue has been patched in version 3.2.5.

Published: February 05, 2024; 3:15:55 PM -0500
V3.1: 6.5 MEDIUM
V2.0:(not available)
CVE-2023-6890

Cross-site Scripting (XSS) - Stored in GitHub repository thorsten/phpmyfaq prior to 3.1.17.

Published: December 16, 2023; 4:15:07 AM -0500
V3.1: 5.4 MEDIUM
V2.0:(not available)
CVE-2023-6889

Cross-site Scripting (XSS) - Stored in GitHub repository thorsten/phpmyfaq prior to 3.1.17.

Published: December 16, 2023; 4:15:07 AM -0500
V3.1: 5.4 MEDIUM
V2.0:(not available)
CVE-2023-5867

Cross-site Scripting (XSS) - Stored in GitHub repository thorsten/phpmyfaq prior to 3.2.2.

Published: October 30, 2023; 9:15:08 PM -0400
V3.1: 5.4 MEDIUM
V2.0:(not available)
CVE-2023-5866

Sensitive Cookie in HTTPS Session Without 'Secure' Attribute in GitHub repository thorsten/phpmyfaq prior to 3.2.1.

Published: October 30, 2023; 9:15:07 PM -0400
V3.1: 5.7 MEDIUM
V2.0:(not available)
CVE-2023-5865

Insufficient Session Expiration in GitHub repository thorsten/phpmyfaq prior to 3.2.2.

Published: October 30, 2023; 9:15:07 PM -0400
V3.1: 9.8 CRITICAL
V2.0:(not available)
CVE-2023-5864

Cross-site Scripting (XSS) - Stored in GitHub repository thorsten/phpmyfaq prior to 3.2.1.

Published: October 30, 2023; 9:15:07 PM -0400
V3.1: 4.8 MEDIUM
V2.0:(not available)
CVE-2023-5863

Cross-site Scripting (XSS) - Reflected in GitHub repository thorsten/phpmyfaq prior to 3.2.2.

Published: October 30, 2023; 9:15:07 PM -0400
V3.1: 6.1 MEDIUM
V2.0:(not available)
CVE-2023-5320

Cross-site Scripting (XSS) - DOM in GitHub repository thorsten/phpmyfaq prior to 3.1.18.

Published: September 29, 2023; 9:15:39 PM -0400
V3.1: 6.1 MEDIUM
V2.0:(not available)
CVE-2023-5319

Cross-site Scripting (XSS) - Stored in GitHub repository thorsten/phpmyfaq prior to 3.1.18.

Published: September 29, 2023; 9:15:39 PM -0400
V3.1: 5.4 MEDIUM
V2.0:(not available)
CVE-2023-5317

Cross-site Scripting (XSS) - Stored in GitHub repository thorsten/phpmyfaq prior to 3.1.18.

Published: September 29, 2023; 9:15:39 PM -0400
V3.1: 5.4 MEDIUM
V2.0:(not available)
CVE-2023-5316

Cross-site Scripting (XSS) - DOM in GitHub repository thorsten/phpmyfaq prior to 3.1.18.

Published: September 29, 2023; 9:15:39 PM -0400
V3.1: 6.1 MEDIUM
V2.0:(not available)
CVE-2023-5227

Unrestricted Upload of File with Dangerous Type in GitHub repository thorsten/phpmyfaq prior to 3.1.8.

Published: September 29, 2023; 9:15:39 PM -0400
V3.1: 9.8 CRITICAL
V2.0:(not available)
CVE-2023-4007

Cross-site Scripting (XSS) - Stored in GitHub repository thorsten/phpmyfaq prior to 3.1.16.

Published: July 30, 2023; 9:15:10 PM -0400
V3.1: 5.4 MEDIUM
V2.0:(not available)
CVE-2023-4006

Improper Neutralization of Formula Elements in a CSV File in GitHub repository thorsten/phpmyfaq prior to 3.1.16.

Published: July 30, 2023; 9:15:09 PM -0400
V3.1: 9.8 CRITICAL
V2.0:(not available)
CVE-2023-3469

Cross-site Scripting (XSS) - Reflected in GitHub repository thorsten/phpmyfaq prior to 3.2.0-beta.2.

Published: June 29, 2023; 9:15:08 PM -0400
V3.1: 4.8 MEDIUM
V2.0:(not available)
CVE-2023-2999

Cross-site Scripting (XSS) - Stored in GitHub repository thorsten/phpmyfaq prior to 3.1.14.

Published: May 30, 2023; 9:15:43 PM -0400
V3.1: 6.1 MEDIUM
V2.0:(not available)
CVE-2023-2998

Cross-site Scripting (XSS) - Stored in GitHub repository thorsten/phpmyfaq prior to 3.1.14.

Published: May 30, 2023; 9:15:43 PM -0400
V3.1: 6.1 MEDIUM
V2.0:(not available)