Page 21 of 104 results (0.008 seconds)

CVSS: 6.8EPSS: 0%CPEs: 78EXPL: 0

Unspecified vulnerability in phpMyFAQ 1.6.9 and earlier, when register_globals is enabled, allows remote attackers to "gain the privilege for uploading files on the server." Una vulnerabilidad no especificada en phpMyFAQ versión 1.6.9 y anteriores, cuando register_globals está habilitado, permite a atacantes remotos "gain the privilege for uploading files on the server." • http://osvdb.org/32603 http://secunia.com/advisories/24230 http://www.phpmyfaq.de/advisory_2007-02-18.php https://exchange.xforce.ibmcloud.com/vulnerabilities/32573 •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 1

SQL injection vulnerability in phpMyFAQ 1.6.7 and earlier allows remote attackers to execute arbitrary SQL commands via unspecified vectors, possibly the userfile or filename parameter. Vulnerabilidad de inyección de SQL en el phpMyFAQ 1.6.7 y versiones anteriores, permite a atacantes remotos ejecutar comandos SQL de su elección mediante vectores sin especificar. • https://www.exploit-db.com/exploits/3393 http://secunia.com/advisories/23651 http://www.phpmyfaq.de/advisory_2006-12-15.php http://www.securityfocus.com/bid/21944 http://www.vupen.com/english/advisories/2007/0077 https://exchange.xforce.ibmcloud.com/vulnerabilities/32802 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 7.5EPSS: 1%CPEs: 1EXPL: 0

Unspecified vulnerability in phpMyFAQ 1.6.7 and earlier allows remote attackers to upload arbitrary PHP scripts via unspecified vectors. Vulnerabilidad no especificada en phpMyFAQ 1.6.7 y anteriores permite a atacantes remotos enviar secuencias de comandos PHP de su elección a través de vectores no especificados. • http://secunia.com/advisories/23651 http://www.phpmyfaq.de/advisory_2006-12-15.php http://www.securityfocus.com/bid/21945 http://www.vupen.com/english/advisories/2007/0077 •

CVSS: 6.4EPSS: 2%CPEs: 1EXPL: 0

Directory traversal vulnerability in phpMyFAQ 1.3.12 allows remote attackers to read arbitrary files, and possibly execute local PHP files, via the action variable, which is used as part of a template filename. • http://archives.neohapsis.com/archives/fulldisclosure/2004-05/0906.html http://secunia.com/advisories/11640 http://securitytracker.com/id?1010190 http://www.osvdb.org/6300 http://www.phpmyfaq.de/advisory_2004-05-18.php http://www.securityfocus.com/bid/10374 https://exchange.xforce.ibmcloud.com/vulnerabilities/16177 •