3 results (0.007 seconds)

CVSS: 6.8EPSS: 0%CPEs: 1EXPL: 0

02 Jan 2025 — phpMyFAQ is an open source FAQ web application. Starting no later than version 3.2.10 and prior to version 4.0.2, an attacker can inject malicious HTML content into the FAQ editor at `http[:]//localhost/admin/index[.]php?action=editentry`, resulting in a complete disruption of the FAQ page's user interface. By injecting malformed HTML elements styled to cover the entire screen, an attacker can render the page unusable. This injection manipulates the page structure by introducing overlapping buttons, images,... • https://github.com/thorsten/phpMyFAQ/security/advisories/GHSA-ww33-jppq-qfrp • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') CWE-80: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) •

CVSS: 6.1EPSS: 0%CPEs: 1EXPL: 1

13 Dec 2024 — phpMyFAQ is an open source FAQ web application. Prior to version 3.2.10, a vulnerability exists in the FAQ Record component where a privileged attacker can trigger a file download on a victim's machine upon page visit by embedding it in an <iframe> element without user interaction or explicit consent. Version 3.2.10 fixes the issue. phpMyFAQ version 3.2.10 suffers from an unintended file download vulnerability. • https://packetstorm.news/files/id/190501 • CWE-451: User Interface (UI) Misrepresentation of Critical Information •

CVSS: 9.0EPSS: 0%CPEs: 1EXPL: 0

06 Dec 2024 — phpMyFAQ is an open source FAQ web application for PHP 8.1+ and MySQL, PostgreSQL and other databases. Prior to 4.0.0, phpMyFAQ exposes the database (ie postgreSQL) server's credential when connection to DB fails. This vulnerability is fixed in 4.0.0. • https://github.com/thorsten/phpMyFAQ/commit/b9289a0b2233df864361c131cd177b6715fbb0fe • CWE-209: Generation of Error Message Containing Sensitive Information •