Chadhaajay

Phpkb

119 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.32%
  • Veröffentlicht 12.03.2020 14:15:16
  • Zuletzt bearbeitet 21.11.2024 04:55:20

The way URIs are handled in admin/header.php in Chadha PHPKB Standard Multi-Language 9 allows Reflected XSS (injecting arbitrary web script or HTML) in admin/report-article-mailed.php by adding a question mark (?) followed by the payload.

Exploit
  • EPSS 0.32%
  • Veröffentlicht 12.03.2020 14:15:16
  • Zuletzt bearbeitet 21.11.2024 04:55:20

The way URIs are handled in admin/header.php in Chadha PHPKB Standard Multi-Language 9 allows Reflected XSS (injecting arbitrary web script or HTML) in admin/report-article-monthly.php by adding a question mark (?) followed by the payload.

Exploit
  • EPSS 0.32%
  • Veröffentlicht 12.03.2020 14:15:16
  • Zuletzt bearbeitet 21.11.2024 04:55:20

The way URIs are handled in admin/header.php in Chadha PHPKB Standard Multi-Language 9 allows Reflected XSS (injecting arbitrary web script or HTML) in admin/report-article-popular.php by adding a question mark (?) followed by the payload.

Exploit
  • EPSS 0.32%
  • Veröffentlicht 12.03.2020 14:15:16
  • Zuletzt bearbeitet 21.11.2024 04:55:20

The way URIs are handled in admin/header.php in Chadha PHPKB Standard Multi-Language 9 allows Reflected XSS (injecting arbitrary web script or HTML) in admin/report-article-printed.php by adding a question mark (?) followed by the payload.

Exploit
  • EPSS 0.32%
  • Veröffentlicht 12.03.2020 14:15:15
  • Zuletzt bearbeitet 21.11.2024 04:55:16

The way URIs are handled in admin/header.php in Chadha PHPKB Standard Multi-Language 9 allows Reflected XSS (injecting arbitrary web script or HTML) in admin/kb-backup.php by adding a question mark (?) followed by the payload.

Exploit
  • EPSS 0.32%
  • Veröffentlicht 12.03.2020 14:15:15
  • Zuletzt bearbeitet 21.11.2024 04:55:16

The way URIs are handled in admin/header.php in Chadha PHPKB Standard Multi-Language 9 allows Reflected XSS (injecting arbitrary web script or HTML) in admin/manage-articles.php by adding a question mark (?) followed by the payload.

Exploit
  • EPSS 0.32%
  • Veröffentlicht 12.03.2020 14:15:15
  • Zuletzt bearbeitet 21.11.2024 04:55:17

The way URIs are handled in admin/header.php in Chadha PHPKB Standard Multi-Language 9 allows Reflected XSS (injecting arbitrary web script or HTML) in admin/manage-attachments.php by adding a question mark (?) followed by the payload.

Exploit
  • EPSS 0.32%
  • Veröffentlicht 12.03.2020 14:15:15
  • Zuletzt bearbeitet 21.11.2024 04:55:17

The way URIs are handled in admin/header.php in Chadha PHPKB Standard Multi-Language 9 allows Reflected XSS (injecting arbitrary web script or HTML) in admin/manage-categories.php by adding a question mark (?) followed by the payload.

Exploit
  • EPSS 0.32%
  • Veröffentlicht 12.03.2020 14:15:15
  • Zuletzt bearbeitet 21.11.2024 04:55:17

The way URIs are handled in admin/header.php in Chadha PHPKB Standard Multi-Language 9 allows Reflected XSS (injecting arbitrary web script or HTML) in admin/manage-comments.php by adding a question mark (?) followed by the payload.

Exploit
  • EPSS 0.32%
  • Veröffentlicht 12.03.2020 14:15:15
  • Zuletzt bearbeitet 21.11.2024 04:55:17

The way URIs are handled in admin/header.php in Chadha PHPKB Standard Multi-Language 9 allows Reflected XSS (injecting arbitrary web script or HTML) in admin/manage-departments.php by adding a question mark (?) followed by the payload.