what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 24 of 24 RSS Feed

Files

phpMyFAQ 2.9.9 Code Injection
Posted Nov 17, 2017
Authored by tomplixsee

phpMyFAQ version 2.9.9 suffers from an issue where an administrative account can execute arbitrary code on the server by modifying LANG_CONF[main.metaDescription].

tags | exploit, arbitrary
SHA-256 | a6d03297b6d015d54d53b8b82104789e4468707199c9c312ad5200a4beca9306

Related Files

phpMyFAQ 2.9.8 Cross Site Scripting
Posted Oct 13, 2017
Authored by Ishaq Mohammed

phpMyFAQ version 2.9.8 suffers from a persistent cross site scripting vulnerability where an attacker can embed malicious script code in the title of the faq.

tags | exploit, xss
advisories | CVE-2017-14619
SHA-256 | 2886abf85bb7d159d238a029d4735a38ee38240d0de808755f12e5f6b44da496
phpMyFAQ 2.9.8 Cross Site Scripting
Posted Sep 21, 2017
Authored by Ishaq Mohammed

phpMyFAQ version 2.9.8 suffers from a persistent cross site scripting vulnerability.

tags | exploit, xss
advisories | CVE-2017-14618
SHA-256 | 341b845511d328e01e97ed403a18ff1aabc3cd35bc0e0eea9412ac77ac089f2f
phpMyFAQ 2.9.0 Cross Site Scripting
Posted Jun 9, 2016
Authored by Kacper Szurek

phpMyFAQ version 2.9.0 suffers from a persistent cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 689de19daf66f0242804f0df49c4ccacb8627d0a227c57d7faf13fa652c312e3
phpMyFAQ 2.8.26 / 2.9.0-RC2 Cross Site Request Forgery
Posted Apr 20, 2016
Authored by High-Tech Bridge SA | Site htbridge.com

phpMyFAQ versions 2.8.26 and 2.9.0-RC2 suffer from a cross site request forgery vulnerability.

tags | exploit, csrf
SHA-256 | b4b19a666863c0731be2d532693b5b2ccf810e9441b2e6245193a4737cfe146a
phpMyFAQ 2.7.9 PHP Code Injection
Posted Dec 21, 2015
Authored by indoushka

phpMyFAQ version 2.7.9 remote PHP code injection exploit.

tags | exploit, remote, php
SHA-256 | 28ef4ddf5dbc1a91285aed596e0f9920e5a063689c5832161b764725803d58b4
phpMyFAQ 2.7.0 Code Execution
Posted Nov 6, 2011
Authored by EgiX

phpMyFAQ versions 2.7.0 and below remote code execution exploit that leverages ajax_create_folder.php.

tags | exploit, remote, php, code execution
SHA-256 | ba3e9685c5a69d2b4d1d266c9d15ff200bd3b38ecfe6aab41ad602def5057334
Secunia Security Advisory 46582
Posted Oct 26, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in phpMyFAQ, which can be exploited by malicious users to compromise a vulnerable system.

tags | advisory
SHA-256 | d8134060f6cf7e86c0f727c8a79c53c33c1b6c2caa82f4288990b6c481b602e3
Secunia Security Advisory 42622
Posted Dec 26, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A security issue has been reported in phpMyFAQ, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
SHA-256 | 113d9c793945a2e625e01719bd3c7d60579bffacd471083be288aca5429a4d0a
phpMyFAQ 2.6.8 Cross Site Scripting
Posted Sep 29, 2010
Authored by Yam Mesicka

phpMyFAQ version 2.6.8 suffers from a cross site scripting vulnerability.

tags | exploit, xss
advisories | CVE-2010-4821
SHA-256 | bdf113fa510428b3fcf4f236cf53cf6cd6e82e46c5c6b61bde7b36706a89d2d1
Secunia Security Advisory 41625
Posted Sep 29, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Multiple vulnerabilities have been reported in phpMyFAQ, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, vulnerability, xss
SHA-256 | 7498a49f97a797cece60261cc8eb86ac0c02fe198e3a660bcc5711fe85f5a9f5
phpMyFAQ 2.5.4 Cross Site Scripting
Posted Dec 3, 2009
Authored by Amol Naik

phpMyFAQ versions 2.5.4 and below suffer from cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss
SHA-256 | 295a8c687d620a3ce6e91c5619c7fe37d66845b84f36c8dcaa9295aa53062b3e
Secunia Security Advisory 37520
Posted Dec 2, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Amol Naik has discovered some vulnerabilities in phpMyFAQ, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, vulnerability, xss
SHA-256 | 885dfd1e972e7014877398066b3f0ab9358f38d412b42f3cc4ceaab333f0fa91
Secunia Security Advisory 37354
Posted Nov 16, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in phpMyFAQ, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
SHA-256 | ee1d437b432c4fa5152adb9087abc043b8d2c8647c0ecf7878001b57a892a0dd
Secunia Security Advisory 31845
Posted Sep 11, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in phpMyFAQ, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
SHA-256 | 784a5793787208f1afb34b80c39c316b809df9859f7769994e11260eafe76926
Secunia Security Advisory 24230
Posted Feb 19, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in phpMyFAQ, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
SHA-256 | 9a1ec566f8cac2f851932bd3daef1f54e45976c2fe779323ffc206db8a9230ab
Secunia Security Advisory 17649
Posted Nov 22, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Tobias Klein has reported some vulnerabilities in phpMyFAQ, which can be exploited by malicious people to conduct script insertion attacks.

tags | advisory, vulnerability
SHA-256 | 1e0be890b61274ac74d5f4efb14819af33e247b3bdbcbdfe3ade36a2a86cfa6e
TKADV2005-11-004.txt
Posted Nov 20, 2005
Authored by Tobias Klein

Versions 1.5.3 and below of phpMyFAQ contain multiple persistent cross site scripting vulnerabilities. Exploitation details provided.

tags | exploit, vulnerability, xss
SHA-256 | 1604f67bacec514f508f5c7fc8b04b4dd59120438f0d160be0c7d0947450916d
Secunia Security Advisory 16933
Posted Sep 27, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - rgod has discovered some vulnerabilities in phpMyFAQ, which can be exploited by malicious people to conduct cross-site scripting and SQL injection attacks, disclose system and sensitive information, and compromise a vulnerable system.

tags | advisory, vulnerability, xss, sql injection
SHA-256 | a252003545360d6e5859ca4abbb5acac59aa8f9f3248a3dd298de3424e40a876
phpmyfuck151.html
Posted Sep 23, 2005
Authored by rgod | Site retrogod.altervista.org

PhpMyFaq version 1.5.1 is susceptible to SQL injection, board takeover, user information disclosure, and remote code execution flaws. Detailed exploitation provided. Earlier versions are also possibly vulnerable.

tags | exploit, remote, code execution, sql injection, info disclosure
SHA-256 | ff2c0eb1e5ce104f2bbf34ecf0fad2a1b0def7e5f349f3033ec8cf1329d34db7
Secunia Security Advisory 16441
Posted Aug 17, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in phpMyFAQ, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
SHA-256 | 57d5a87a4d67e51c415c250e162cb20d5feb6141c40841d6132fb0f494c7e6a4
Secunia Security Advisory 15810
Posted Jul 1, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in phpMyFAQ, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
SHA-256 | 42f609ce3692d089d52b87fb28683f47030fd1269c93651ebcc2d508a9e10004
Secunia Security Advisory 14516
Posted Mar 15, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Sven Michels has reported a vulnerability in phpMyFaq, which can be exploited by malicious users to conduct SQL injection attacks.

tags | advisory, sql injection
SHA-256 | 5db99b76755b34847730826b0018ba4e0c959d572693b91627819b7cb196e0d4
phpMyFAQ Security Advisory 2004-07-27
Posted Jul 28, 2004
Authored by The phpMyFAQ Team | Site phpmyfaq.de

A flaw in phpMyFaq version 1.4.0 allows malicious users the ability to upload or delete arbitrary images.

tags | advisory, arbitrary
SHA-256 | a95f22c88cf675223d49ae295c041d7cc10be88f9073b173b71766fd0da99725
052004.txt
Posted May 19, 2004
Authored by Stefan Esser | Site security.e-matters.de

Within phpMyFAQ an input validation problem exists which allows an attacker to include arbitrary local files. With known tricks to inject PHP code into log or session files this could lead to remote PHP code execution. Versions affected are 1.3.12 and below for the stable releases, and 1.4.0-alpha1 and below for the developer releases.

tags | advisory, remote, arbitrary, local, php, code execution
SHA-256 | cc512101e9d54c9eba31343dacb2a44138d5ce10c2a326dca09787990a61a49c
Page 1 of 1
Back1Next

File Archive:

October 2022

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Oct 1st
    10 Files
  • 2
    Oct 2nd
    0 Files
  • 3
    Oct 3rd
    0 Files
  • 4
    Oct 4th
    0 Files
  • 5
    Oct 5th
    0 Files
  • 6
    Oct 6th
    0 Files
  • 7
    Oct 7th
    0 Files
  • 8
    Oct 8th
    0 Files
  • 9
    Oct 9th
    0 Files
  • 10
    Oct 10th
    0 Files
  • 11
    Oct 11th
    0 Files
  • 12
    Oct 12th
    0 Files
  • 13
    Oct 13th
    0 Files
  • 14
    Oct 14th
    0 Files
  • 15
    Oct 15th
    0 Files
  • 16
    Oct 16th
    0 Files
  • 17
    Oct 17th
    0 Files
  • 18
    Oct 18th
    0 Files
  • 19
    Oct 19th
    0 Files
  • 20
    Oct 20th
    0 Files
  • 21
    Oct 21st
    0 Files
  • 22
    Oct 22nd
    0 Files
  • 23
    Oct 23rd
    0 Files
  • 24
    Oct 24th
    0 Files
  • 25
    Oct 25th
    0 Files
  • 26
    Oct 26th
    0 Files
  • 27
    Oct 27th
    0 Files
  • 28
    Oct 28th
    0 Files
  • 29
    Oct 29th
    0 Files
  • 30
    Oct 30th
    0 Files
  • 31
    Oct 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Hosting By
Rokasec
close