Note:
This project will be discontinued after December 13, 2021. [more]
Product:
Phpmyfaq
(Phpmyfaq)Repositories | https://github.com/thorsten/phpMyFAQ |
#Vulnerabilities | 124 |
Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
2023-04-30 | CVE-2023-2428 | Cross-site Scripting (XSS) - Stored in GitHub repository thorsten/phpmyfaq prior to 3.1.13. | Phpmyfaq | 5.4 | ||
2023-04-30 | CVE-2023-2429 | Improper Access Control in GitHub repository thorsten/phpmyfaq prior to 3.1.13. | Phpmyfaq | 9.8 | ||
2004-12-31 | CVE-2004-2257 | phpMyFAQ 1.4.0 allows remote attackers to access the Image Manager to upload or delete images without authorization via a direct request. | Phpmyfaq | N/A | ||
2024-03-25 | CVE-2024-27299 | phpMyFAQ is an open source FAQ web application for PHP 8.1+ and MySQL, PostgreSQL and other databases. A SQL injection vulnerability has been discovered in the the "Add News" functionality due to improper escaping of the email address. This allows any authenticated user with the rights to add/edit FAQ news to exploit this vulnerability to exfiltrate data, take over accounts and in some cases, even achieve RCE. The vulnerable field lies in the `authorEmail` field which uses PHP's... | Phpmyfaq | 8.8 |