![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.0.127278 |
Category: | Web application abuses |
Title: | phpMyFAQ < 3.1.9 Multiple Vulnerabilities |
Summary: | phpMyFAQ is prone to multiple vulnerabilities. |
Description: | Summary: phpMyFAQ is prone to multiple vulnerabilities. Vulnerability Insight: The following vulnerabilities exist: - CVE-2022-4407: Reflected cross-site scripting (XSS) - CVE-2022-4408: Stored cross-site scripting (XSS) - CVE-2022-4409: TLS Cookie without `secure` flag at roy.demo.phpmyfaq.de Vulnerability Impact: Attacker can execute javascript, send queries with abusive words, steal the cookie or redirect to any URL. Affected Software/OS: phpMyFAQ prior to version 3.1.9. Solution: Update to version 3.1.9 or later. CVSS Score: 7.8 CVSS Vector: AV:N/AC:L/Au:N/C:C/I:N/A:N |
Cross-Ref: |
Common Vulnerability Exposure (CVE) ID: CVE-2022-4407 https://huntr.dev/bounties/a1649f43-78c9-4927-b313-36911872a84b https://github.com/thorsten/phpmyfaq/commit/1d73af34bf42764f9f9491c7ba5e9495d70e3ca5 Common Vulnerability Exposure (CVE) ID: CVE-2022-4408 https://huntr.dev/bounties/2ec4ddd4-de22-4f2d-ba92-3382b452bfea https://github.com/thorsten/phpmyfaq/commit/e2ea332a2b5e798f2c39203b2489a2dabe831751 Common Vulnerability Exposure (CVE) ID: CVE-2022-4409 https://huntr.dev/bounties/5915ed4c-5fe2-42e7-8fac-5dd0d032727c https://github.com/thorsten/phpmyfaq/commit/8b47f38 |
Copyright | Copyright (C) 2022 Greenbone AG |
This is only one of 146377 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |