Chadhaajay

Phpkb

119 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.32%
  • Veröffentlicht 12.03.2020 14:15:17
  • Zuletzt bearbeitet 21.11.2024 04:55:22

The way URIs are handled in admin/header.php in Chadha PHPKB Standard Multi-Language 9 allows Reflected XSS (injecting arbitrary web script or HTML) in admin/translate.php by adding a question mark (?) followed by the payload.

Exploit
  • EPSS 0.32%
  • Veröffentlicht 12.03.2020 14:15:16
  • Zuletzt bearbeitet 21.11.2024 04:55:19

The way URIs are handled in admin/header.php in Chadha PHPKB Standard Multi-Language 9 allows Reflected XSS (injecting arbitrary web script or HTML) in admin/manage-templates.php by adding a question mark (?) followed by the payload.

Exploit
  • EPSS 0.32%
  • Veröffentlicht 12.03.2020 14:15:16
  • Zuletzt bearbeitet 21.11.2024 04:55:19

The way URIs are handled in admin/header.php in Chadha PHPKB Standard Multi-Language 9 allows Reflected XSS (injecting arbitrary web script or HTML) in admin/manage-tickets.php by adding a question mark (?) followed by the payload.

Exploit
  • EPSS 0.32%
  • Veröffentlicht 12.03.2020 14:15:16
  • Zuletzt bearbeitet 21.11.2024 04:55:19

The way URIs are handled in admin/header.php in Chadha PHPKB Standard Multi-Language 9 allows Reflected XSS (injecting arbitrary web script or HTML) in admin/manage-users.php by adding a question mark (?) followed by the payload.

Exploit
  • EPSS 0.32%
  • Veröffentlicht 12.03.2020 14:15:16
  • Zuletzt bearbeitet 21.11.2024 04:55:19

The way URIs are handled in admin/header.php in Chadha PHPKB Standard Multi-Language 9 allows Reflected XSS (injecting arbitrary web script or HTML) in admin/manage-versions.php by adding a question mark (?) followed by the payload.

Exploit
  • EPSS 0.32%
  • Veröffentlicht 12.03.2020 14:15:16
  • Zuletzt bearbeitet 21.11.2024 04:55:19

The way URIs are handled in admin/header.php in Chadha PHPKB Standard Multi-Language 9 allows Reflected XSS (injecting arbitrary web script or HTML) in admin/my-languages.php by adding a question mark (?) followed by the payload.

Exploit
  • EPSS 0.32%
  • Veröffentlicht 12.03.2020 14:15:16
  • Zuletzt bearbeitet 21.11.2024 04:55:19

The way URIs are handled in admin/header.php in Chadha PHPKB Standard Multi-Language 9 allows Reflected XSS (injecting arbitrary web script or HTML) in admin/my-profile.php by adding a question mark (?) followed by the payload.

Exploit
  • EPSS 0.32%
  • Veröffentlicht 12.03.2020 14:15:16
  • Zuletzt bearbeitet 21.11.2024 04:55:20

The way URIs are handled in admin/header.php in Chadha PHPKB Standard Multi-Language 9 allows Reflected XSS (injecting arbitrary web script or HTML) in admin/optimize-database.php by adding a question mark (?) followed by the payload.

Exploit
  • EPSS 0.32%
  • Veröffentlicht 12.03.2020 14:15:16
  • Zuletzt bearbeitet 21.11.2024 04:55:20

The way URIs are handled in admin/header.php in Chadha PHPKB Standard Multi-Language 9 allows Reflected XSS (injecting arbitrary web script or HTML) in admin/reply-ticket.php by adding a question mark (?) followed by the payload.

Exploit
  • EPSS 0.32%
  • Veröffentlicht 12.03.2020 14:15:16
  • Zuletzt bearbeitet 21.11.2024 04:55:20

The way URIs are handled in admin/header.php in Chadha PHPKB Standard Multi-Language 9 allows Reflected XSS (injecting arbitrary web script or HTML) in admin/report-article-discussed.php by adding a question mark (?) followed by the payload.