Page 23 of 116 results (0.004 seconds)

CVSS: 6.4EPSS: 1%CPEs: 1EXPL: 1

Directory traversal vulnerability in index.php in PhpMyFaq 1.5.1 allows remote attackers to read arbitrary files or include arbitrary PHP files via a .. (dot dot) in the LANGCODE parameter, which also allows direct code injection via the User Agent field in a request packet, which can be activated by using LANGCODE to reference the user tracking data file. • https://www.exploit-db.com/exploits/1226 http://marc.info/?l=bugtraq&m=112749230124091&w=2 http://rgod.altervista.org/phpmyfuck151.html http://www.osvdb.org/19672 •

CVSS: 5.0EPSS: 0%CPEs: 1EXPL: 1

PhpMyFaq 1.5.1 stores data files under the web document root with insufficient access control and predictable filenames, which allows remote attackers to obtain sensitive information via a direct request to the data/tracking[DATE] file. • http://marc.info/?l=bugtraq&m=112749230124091&w=2 http://rgod.altervista.org/phpmyfuck151.html http://secunia.com/advisories/16933 http://securitytracker.com/id?1014968 http://www.osvdb.org/19670 http://www.securityfocus.com/bid/14930 https://exchange.xforce.ibmcloud.com/vulnerabilities/22405 •

CVSS: 5.0EPSS: 0%CPEs: 5EXPL: 0

SQL injection vulnerability in phpMyFAQ 1.4 and 1.5 allows remote attackers to add FAQ records to the database via the username field in forum messages. • http://secunia.com/advisories/14516 http://www.phpmyfaq.de/advisory_2005-03-06.php •

CVSS: 6.4EPSS: 2%CPEs: 1EXPL: 0

Directory traversal vulnerability in phpMyFAQ 1.3.12 allows remote attackers to read arbitrary files, and possibly execute local PHP files, via the action variable, which is used as part of a template filename. • http://archives.neohapsis.com/archives/fulldisclosure/2004-05/0906.html http://secunia.com/advisories/11640 http://securitytracker.com/id?1010190 http://www.osvdb.org/6300 http://www.phpmyfaq.de/advisory_2004-05-18.php http://www.securityfocus.com/bid/10374 https://exchange.xforce.ibmcloud.com/vulnerabilities/16177 •

CVSS: 5.0EPSS: 2%CPEs: 1EXPL: 0

Directory traversal vulnerability in phpMyFAQ 1.4.0 alpha allows remote attackers to read arbitrary files, and possibly execute local PHP files, via .. sequences in the lang (language) variable. • http://archives.neohapsis.com/archives/fulldisclosure/2004-05/0906.html http://secunia.com/advisories/11640 http://securitytracker.com/id?1010190 http://www.phpmyfaq.de/advisory_2004-05-18.php http://www.securityfocus.com/archive/1/363636 http://www.securityfocus.com/bid/10377 https://exchange.xforce.ibmcloud.com/vulnerabilities/16223 •