Chadhaajay

Phpkb

119 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.32%
  • Veröffentlicht 12.03.2020 14:15:17
  • Zuletzt bearbeitet 21.11.2024 04:55:21

The way URIs are handled in admin/header.php in Chadha PHPKB Standard Multi-Language 9 allows Reflected XSS (injecting arbitrary web script or HTML) in admin/report-article.php by adding a question mark (?) followed by the payload.

Exploit
  • EPSS 0.32%
  • Veröffentlicht 12.03.2020 14:15:17
  • Zuletzt bearbeitet 21.11.2024 04:55:21

The way URIs are handled in admin/header.php in Chadha PHPKB Standard Multi-Language 9 allows Reflected XSS (injecting arbitrary web script or HTML) in admin/report-category.php by adding a question mark (?) followed by the payload.

Exploit
  • EPSS 0.32%
  • Veröffentlicht 12.03.2020 14:15:17
  • Zuletzt bearbeitet 21.11.2024 04:55:21

The way URIs are handled in admin/header.php in Chadha PHPKB Standard Multi-Language 9 allows Reflected XSS (injecting arbitrary web script or HTML) in admin/report-failed-login.php by adding a question mark (?) followed by the payload.

Exploit
  • EPSS 0.32%
  • Veröffentlicht 12.03.2020 14:15:17
  • Zuletzt bearbeitet 21.11.2024 04:55:21

The way URIs are handled in admin/header.php in Chadha PHPKB Standard Multi-Language 9 allows Reflected XSS (injecting arbitrary web script or HTML) in admin/report-referrers.php by adding a question mark (?) followed by the payload.

Exploit
  • EPSS 0.32%
  • Veröffentlicht 12.03.2020 14:15:17
  • Zuletzt bearbeitet 21.11.2024 04:55:21

The way URIs are handled in admin/header.php in Chadha PHPKB Standard Multi-Language 9 allows Reflected XSS (injecting arbitrary web script or HTML) in admin/report-search.php by adding a question mark (?) followed by the payload.

Exploit
  • EPSS 0.32%
  • Veröffentlicht 12.03.2020 14:15:17
  • Zuletzt bearbeitet 21.11.2024 04:55:21

The way URIs are handled in admin/header.php in Chadha PHPKB Standard Multi-Language 9 allows Reflected XSS (injecting arbitrary web script or HTML) in admin/report-traffic.php by adding a question mark (?) followed by the payload.

Exploit
  • EPSS 0.32%
  • Veröffentlicht 12.03.2020 14:15:17
  • Zuletzt bearbeitet 21.11.2024 04:55:22

The way URIs are handled in admin/header.php in Chadha PHPKB Standard Multi-Language 9 allows Reflected XSS (injecting arbitrary web script or HTML) in admin/report-user.php by adding a question mark (?) followed by the payload.

Exploit
  • EPSS 0.32%
  • Veröffentlicht 12.03.2020 14:15:17
  • Zuletzt bearbeitet 21.11.2024 04:55:22

The way URIs are handled in admin/header.php in Chadha PHPKB Standard Multi-Language 9 allows Reflected XSS (injecting arbitrary web script or HTML) in admin/save-article.php by adding a question mark (?) followed by the payload.

Exploit
  • EPSS 0.32%
  • Veröffentlicht 12.03.2020 14:15:17
  • Zuletzt bearbeitet 21.11.2024 04:55:22

The way URIs are handled in admin/header.php in Chadha PHPKB Standard Multi-Language 9 allows Reflected XSS (injecting arbitrary web script or HTML) in admin/search-users.php by adding a question mark (?) followed by the payload.

Exploit
  • EPSS 0.32%
  • Veröffentlicht 12.03.2020 14:15:17
  • Zuletzt bearbeitet 21.11.2024 04:55:22

The way URIs are handled in admin/header.php in Chadha PHPKB Standard Multi-Language 9 allows Reflected XSS (injecting arbitrary web script or HTML) in admin/sitemap-generator.php by adding a question mark (?) followed by the payload.