cpe:2.3:a:phpmyfaq:phpmyfaq:0.85:*:*:*:*:*:*:*
The admin backend in phpMyFAQ before 2.9.11 allows CSV injection in reports.
Max CVSS
9.0
EPSS Score
0.10%
Published
2018-09-07
Updated
2020-08-24
phpMyFAQ before 2.9.11 allows CSRF.
Max CVSS
8.8
EPSS Score
0.07%
Published
2018-09-07
Updated
2018-11-02
phpMyFAQ before 2.8.13 allows remote attackers to bypass the CAPTCHA protection mechanism by replaying the request.
Max CVSS
5.3
EPSS Score
0.15%
Published
2018-08-28
Updated
2018-10-23
phpMyFAQ before 2.8.13 allows remote authenticated users with admin privileges to bypass authorization via a crafted instance ID parameter.
Max CVSS
5.5
EPSS Score
0.08%
Published
2018-08-28
Updated
2018-10-23
phpMyFAQ before 2.8.13 allows remote attackers to read arbitrary attachments via a direct request.
Max CVSS
5.3
EPSS Score
0.17%
Published
2018-08-28
Updated
2018-10-23
phpMyFAQ before 2.8.13 allows remote authenticated users with certain permissions to read arbitrary attachments by leveraging incorrect "download an attachment" permission checks.
Max CVSS
5.3
EPSS Score
0.17%
Published
2018-08-28
Updated
2018-10-23
Multiple cross-site request forgery (CSRF) vulnerabilities in phpMyFAQ before 2.8.13 allow remote attackers to hijack the authentication of unspecified users for requests that (1) delete active users by leveraging improper validation of CSRF tokens or that (2) delete open questions, (3) activate users, (4) publish FAQs, (5) add or delete Glossary, (6) add or delete FAQ news, or (7) add or delete comments or add votes by leveraging lack of a CSRF token.
Max CVSS
8.8
EPSS Score
0.09%
Published
2018-08-28
Updated
2018-11-01
SQL injection vulnerability in phpMyFAQ before 2.8.13 allows remote authenticated users with certain permissions to execute arbitrary SQL commands via vectors involving the restore function.
Max CVSS
7.2
EPSS Score
0.11%
Published
2018-08-28
Updated
2018-10-31
8 vulnerabilities found
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!