Filtered by vendor Chadhaajay
Subscriptions
Filtered by product Phpkb
Subscriptions
Total
119 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2020-10464 | 1 Chadhaajay | 1 Phpkb | 2024-11-21 | 4.8 Medium |
Reflected XSS in admin/edit-article.php in Chadha PHPKB Standard Multi-Language 9 allows attackers to inject arbitrary web script or HTML via the GET parameter p. | ||||
CVE-2020-10463 | 1 Chadhaajay | 1 Phpkb | 2024-11-21 | 4.8 Medium |
Reflected XSS in admin/edit-template.php in Chadha PHPKB Standard Multi-Language 9 allows attackers to inject arbitrary web script or HTML via the GET parameter p. | ||||
CVE-2020-10462 | 1 Chadhaajay | 1 Phpkb | 2024-11-21 | 4.8 Medium |
Reflected XSS in admin/edit-field.php in Chadha PHPKB Standard Multi-Language 9 allows attackers to inject arbitrary web script or HTML via the GET parameter p. | ||||
CVE-2020-10461 | 1 Chadhaajay | 1 Phpkb | 2024-11-21 | 6.1 Medium |
The way comments in article.php (vulnerable function in include/functions-article.php) are handled in Chadha PHPKB Standard Multi-Language 9 allows attackers to execute Stored (Blind) XSS (injecting arbitrary web script or HTML) in admin/manage-comments.php, via the GET parameter cmt. | ||||
CVE-2020-10460 | 1 Chadhaajay | 1 Phpkb | 2024-11-21 | 4.9 Medium |
admin/include/operations.php (via admin/email-harvester.php) in Chadha PHPKB Standard Multi-Language 9 allows attackers to inject untrusted input inside CSV files via the POST parameter data. | ||||
CVE-2020-10459 | 1 Chadhaajay | 1 Phpkb | 2024-11-21 | 2.7 Low |
Path Traversal in admin/assetmanager/assetmanager.php (vulnerable function saved in admin/assetmanager/functions.php) in Chadha PHPKB Standard Multi-Language 9 allows attackers to list the files that are stored on the webserver using a dot-dot-slash sequence (../) via the POST parameter inpCurrFolder. | ||||
CVE-2020-10458 | 1 Chadhaajay | 1 Phpkb | 2024-11-21 | 6.5 Medium |
Path Traversal in admin/imagepaster/operations.php in Chadha PHPKB Standard Multi-Language 9 allows attackers to delete any folder on the webserver using a dot-dot-slash sequence (../) via the GET parameter crdir, when the GET parameter action is set to df, causing a Denial of Service. | ||||
CVE-2020-10457 | 1 Chadhaajay | 1 Phpkb | 2024-11-21 | 2.7 Low |
Path Traversal in admin/imagepaster/image-renaming.php in Chadha PHPKB Standard Multi-Language 9 allows attackers to rename any file on the webserver using a dot-dot-slash sequence (../) via the POST parameter imgName (for the new name) and imgUrl (for the current file to be renamed). | ||||
CVE-2020-10456 | 1 Chadhaajay | 1 Phpkb | 2024-11-21 | 4.8 Medium |
The way URIs are handled in admin/header.php in Chadha PHPKB Standard Multi-Language 9 allows Reflected XSS (injecting arbitrary web script or HTML) in admin/trash-box.php by adding a question mark (?) followed by the payload. | ||||
CVE-2020-10455 | 1 Chadhaajay | 1 Phpkb | 2024-11-21 | 4.8 Medium |
The way URIs are handled in admin/header.php in Chadha PHPKB Standard Multi-Language 9 allows Reflected XSS (injecting arbitrary web script or HTML) in admin/translate.php by adding a question mark (?) followed by the payload. | ||||
CVE-2020-10454 | 1 Chadhaajay | 1 Phpkb | 2024-11-21 | 4.8 Medium |
The way URIs are handled in admin/header.php in Chadha PHPKB Standard Multi-Language 9 allows Reflected XSS (injecting arbitrary web script or HTML) in admin/sitemap-generator.php by adding a question mark (?) followed by the payload. | ||||
CVE-2020-10453 | 1 Chadhaajay | 1 Phpkb | 2024-11-21 | 4.8 Medium |
The way URIs are handled in admin/header.php in Chadha PHPKB Standard Multi-Language 9 allows Reflected XSS (injecting arbitrary web script or HTML) in admin/search-users.php by adding a question mark (?) followed by the payload. | ||||
CVE-2020-10452 | 1 Chadhaajay | 1 Phpkb | 2024-11-21 | 4.8 Medium |
The way URIs are handled in admin/header.php in Chadha PHPKB Standard Multi-Language 9 allows Reflected XSS (injecting arbitrary web script or HTML) in admin/save-article.php by adding a question mark (?) followed by the payload. | ||||
CVE-2020-10451 | 1 Chadhaajay | 1 Phpkb | 2024-11-21 | 4.8 Medium |
The way URIs are handled in admin/header.php in Chadha PHPKB Standard Multi-Language 9 allows Reflected XSS (injecting arbitrary web script or HTML) in admin/report-user.php by adding a question mark (?) followed by the payload. | ||||
CVE-2020-10450 | 1 Chadhaajay | 1 Phpkb | 2024-11-21 | 4.8 Medium |
The way URIs are handled in admin/header.php in Chadha PHPKB Standard Multi-Language 9 allows Reflected XSS (injecting arbitrary web script or HTML) in admin/report-traffic.php by adding a question mark (?) followed by the payload. | ||||
CVE-2020-10449 | 1 Chadhaajay | 1 Phpkb | 2024-11-21 | 4.8 Medium |
The way URIs are handled in admin/header.php in Chadha PHPKB Standard Multi-Language 9 allows Reflected XSS (injecting arbitrary web script or HTML) in admin/report-search.php by adding a question mark (?) followed by the payload. | ||||
CVE-2020-10448 | 1 Chadhaajay | 1 Phpkb | 2024-11-21 | 4.8 Medium |
The way URIs are handled in admin/header.php in Chadha PHPKB Standard Multi-Language 9 allows Reflected XSS (injecting arbitrary web script or HTML) in admin/report-referrers.php by adding a question mark (?) followed by the payload. | ||||
CVE-2020-10447 | 1 Chadhaajay | 1 Phpkb | 2024-11-21 | 4.8 Medium |
The way URIs are handled in admin/header.php in Chadha PHPKB Standard Multi-Language 9 allows Reflected XSS (injecting arbitrary web script or HTML) in admin/report-failed-login.php by adding a question mark (?) followed by the payload. | ||||
CVE-2020-10446 | 1 Chadhaajay | 1 Phpkb | 2024-11-21 | 4.8 Medium |
The way URIs are handled in admin/header.php in Chadha PHPKB Standard Multi-Language 9 allows Reflected XSS (injecting arbitrary web script or HTML) in admin/report-category.php by adding a question mark (?) followed by the payload. | ||||
CVE-2020-10445 | 1 Chadhaajay | 1 Phpkb | 2024-11-21 | 4.8 Medium |
The way URIs are handled in admin/header.php in Chadha PHPKB Standard Multi-Language 9 allows Reflected XSS (injecting arbitrary web script or HTML) in admin/report-article.php by adding a question mark (?) followed by the payload. |