Chadhaajay

Phpkb

119 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.32%
  • Veröffentlicht 12.03.2020 14:15:13
  • Zuletzt bearbeitet 21.11.2024 04:55:13

The way URIs are handled in admin/header.php in Chadha PHPKB Standard Multi-Language 9 allows Reflected XSS (injecting arbitrary web script or HTML) in admin/add-group.php by adding a question mark (?) followed by the payload.

Exploit
  • EPSS 0.32%
  • Veröffentlicht 12.03.2020 14:15:13
  • Zuletzt bearbeitet 21.11.2024 04:55:13

The way URIs are handled in admin/header.php in Chadha PHPKB Standard Multi-Language 9 allows Reflected XSS (injecting arbitrary web script or HTML) in admin/add-language.php by adding a question mark (?) followed by the payload.

Exploit
  • EPSS 0.32%
  • Veröffentlicht 12.03.2020 14:15:13
  • Zuletzt bearbeitet 21.11.2024 04:55:14

The way URIs are handled in admin/header.php in Chadha PHPKB Standard Multi-Language 9 allows Reflected XSS (injecting arbitrary web script or HTML) in admin/add-news.php by adding a question mark (?) followed by the payload.

Exploit
  • EPSS 0.32%
  • Veröffentlicht 12.03.2020 14:15:13
  • Zuletzt bearbeitet 21.11.2024 04:55:14

The way URIs are handled in admin/header.php in Chadha PHPKB Standard Multi-Language 9 allows Reflected XSS (injecting arbitrary web script or HTML) in admin/add-template.php by adding a question mark (?) followed by the payload.

Exploit
  • EPSS 0.32%
  • Veröffentlicht 12.03.2020 14:15:13
  • Zuletzt bearbeitet 21.11.2024 04:55:14

The way URIs are handled in admin/header.php in Chadha PHPKB Standard Multi-Language 9 allows Reflected XSS (injecting arbitrary web script or HTML) in admin/add-user.php by adding a question mark (?) followed by the payload.

Exploit
  • EPSS 0.32%
  • Veröffentlicht 12.03.2020 14:15:13
  • Zuletzt bearbeitet 21.11.2024 04:55:14

The way URIs are handled in admin/header.php in Chadha PHPKB Standard Multi-Language 9 allows Reflected XSS (injecting arbitrary web script or HTML) in admin/article-collaboration.php by adding a question mark (?) followed by the payload.

Exploit
  • EPSS 0.32%
  • Veröffentlicht 12.03.2020 14:15:13
  • Zuletzt bearbeitet 21.11.2024 04:55:14

The way URIs are handled in admin/header.php in Chadha PHPKB Standard Multi-Language 9 allows Reflected XSS (injecting arbitrary web script or HTML) in admin/edit-article.php by adding a question mark (?) followed by the payload.

Exploit
  • EPSS 12.79%
  • Veröffentlicht 12.03.2020 14:15:12
  • Zuletzt bearbeitet 21.11.2024 04:55:12

Path Traversal in admin/download.php in Chadha PHPKB Standard Multi-Language 9 allows remote attackers to download files from the server using a dot-dot-slash sequence (../) via the GET parameter file.

Exploit
  • EPSS 18.7%
  • Veröffentlicht 12.03.2020 13:15:12
  • Zuletzt bearbeitet 21.11.2024 04:55:12

admin/imagepaster/image-upload.php in Chadha PHPKB Standard Multi-Language 9 allows remote attackers to achieve Code Execution by uploading a .php file in the admin/js/ directory.