CWE
79
Advisory Published
CVE Published
Updated

CVE-2009-4780: XSS

First published: Wed Apr 21 2010(Updated: )

Multiple cross-site scripting (XSS) vulnerabilities in index.php in phpMyFAQ before 2.5.5 allow remote attackers to inject arbitrary web script or HTML via (1) the lang parameter in a sitemap action, (2) the search parameter in a search action, (3) the tagging_id parameter in a search action, (4) the highlight parameter in an artikel action, (5) the artlang parameter in an artikel action, (6) the letter parameter in a sitemap action, (7) the lang parameter in a show action, (8) the cat parameter in a show action, (9) the newslang parameter in a news action, (10) the artlang parameter in a send2friend action, (11) the cat parameter in a send2friend action, (12) the id parameter in a send2friend action, (13) the srclang parameter in a translate action, (14) the id parameter in a translate action, (15) the cat parameter in a translate action, (16) the cat parameter in an add action, or (17) the question parameter in an add action. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.

Credit: cve@mitre.org

Affected SoftwareAffected VersionHow to fix
Phpmyfaq Phpmyfaq=1.1.4
Phpmyfaq Phpmyfaq=2.0.14
Phpmyfaq Phpmyfaq=1.4.10
Phpmyfaq Phpmyfaq=1.1.0
Phpmyfaq Phpmyfaq=1.5.7
Phpmyfaq Phpmyfaq=1.1.2
Phpmyfaq Phpmyfaq=1.3.10
Phpmyfaq Phpmyfaq=1.2.3
Phpmyfaq Phpmyfaq=2.0.9
Phpmyfaq Phpmyfaq=1.3.6
Phpmyfaq Phpmyfaq=1.3.13
Phpmyfaq Phpmyfaq=1.6.5
Phpmyfaq Phpmyfaq=1.5-beta2
Phpmyfaq Phpmyfaq=1.3.3
Phpmyfaq Phpmyfaq=2.0.12
Phpmyfaq Phpmyfaq=1.5.9
Phpmyfaq Phpmyfaq=1.0.1
Phpmyfaq Phpmyfaq=1.4-alpha2
Phpmyfaq Phpmyfaq=1.5-beta3
Phpmyfaq Phpmyfaq=1.6.11
Phpmyfaq Phpmyfaq=0.65
Phpmyfaq Phpmyfaq=1.5-rc2
Phpmyfaq Phpmyfaq=0.70
Phpmyfaq Phpmyfaq=1.6.9
Phpmyfaq Phpmyfaq=0.95
Phpmyfaq Phpmyfaq=2.5.2
Phpmyfaq Phpmyfaq=1.5.1
Phpmyfaq Phpmyfaq=2.0.4
Phpmyfaq Phpmyfaq=2.5.3
Phpmyfaq Phpmyfaq=1.3.7
Phpmyfaq Phpmyfaq=1.3.9
Phpmyfaq Phpmyfaq=1.4.0
Phpmyfaq Phpmyfaq=1.6.10
Phpmyfaq Phpmyfaq=1.5.3
Phpmyfaq Phpmyfaq=1.3.11
Phpmyfaq Phpmyfaq=2.0.3
Phpmyfaq Phpmyfaq=0.60
Phpmyfaq Phpmyfaq=2.0.6
Phpmyfaq Phpmyfaq<=2.5.4
Phpmyfaq Phpmyfaq=1.4.3
Phpmyfaq Phpmyfaq=1.4-alpha1
Phpmyfaq Phpmyfaq=1.3.4
Phpmyfaq Phpmyfaq=1.4.2
Phpmyfaq Phpmyfaq=0.87
Phpmyfaq Phpmyfaq=1.0.1a
Phpmyfaq Phpmyfaq=2.0.5
Phpmyfaq Phpmyfaq=1.3.8
Phpmyfaq Phpmyfaq=1.1.3
Phpmyfaq Phpmyfaq=2.0.11
Phpmyfaq Phpmyfaq=1.5-rc3
Phpmyfaq Phpmyfaq=1.1.5
Phpmyfaq Phpmyfaq=1.4.6
Phpmyfaq Phpmyfaq=1.5-beta1
Phpmyfaq Phpmyfaq=1.1.1
Phpmyfaq Phpmyfaq=0.85
Phpmyfaq Phpmyfaq=1.2.0
Phpmyfaq Phpmyfaq=1.4.9
Phpmyfaq Phpmyfaq=1.3.9-pl1
Phpmyfaq Phpmyfaq=1.3.14
Phpmyfaq Phpmyfaq=2.0.17
Phpmyfaq Phpmyfaq=1.5.2
Phpmyfaq Phpmyfaq=1.5.8
Phpmyfaq Phpmyfaq=0.80a
Phpmyfaq Phpmyfaq=1.5-alpha2
Phpmyfaq Phpmyfaq=1.4
Phpmyfaq Phpmyfaq=1.6.2
Phpmyfaq Phpmyfaq=1.2.5a
Phpmyfaq Phpmyfaq=0.90
Phpmyfaq Phpmyfaq=1.4.4
Phpmyfaq Phpmyfaq=1.6.8
Phpmyfaq Phpmyfaq=1.3.2
Phpmyfaq Phpmyfaq=1.5-alpha1
Phpmyfaq Phpmyfaq=1.4.8
Phpmyfaq Phpmyfaq=1.5-rc4
Phpmyfaq Phpmyfaq=1.4.0a
Phpmyfaq Phpmyfaq=1.2.1
Phpmyfaq Phpmyfaq=1.3.1
Phpmyfaq Phpmyfaq=2.0.0
Phpmyfaq Phpmyfaq=1.6.1
Phpmyfaq Phpmyfaq=2.0.15
Phpmyfaq Phpmyfaq=2.5.1
Phpmyfaq Phpmyfaq=1.5.4
Phpmyfaq Phpmyfaq=1.6.4
Phpmyfaq Phpmyfaq=1.4.7
Phpmyfaq Phpmyfaq=1.2.4
Phpmyfaq Phpmyfaq=1.6.12
Phpmyfaq Phpmyfaq=1.4.1
Phpmyfaq Phpmyfaq=1.5-rc5
Phpmyfaq Phpmyfaq=1.6.7
Phpmyfaq Phpmyfaq=1.5.5
Phpmyfaq Phpmyfaq=0.80
Phpmyfaq Phpmyfaq=1.4.11
Phpmyfaq Phpmyfaq=1.4.5
Phpmyfaq Phpmyfaq=1.3.0
Phpmyfaq Phpmyfaq=1.2.5b
Phpmyfaq Phpmyfaq=1.5.0
Phpmyfaq Phpmyfaq=1.1.4a
Phpmyfaq Phpmyfaq=1.3.12
Phpmyfaq Phpmyfaq=1.6.3
Phpmyfaq Phpmyfaq=2.0.13
Phpmyfaq Phpmyfaq=1.5.6
Phpmyfaq Phpmyfaq=2.0.8
Phpmyfaq Phpmyfaq=2.0.16
Phpmyfaq Phpmyfaq=2.0.1
Phpmyfaq Phpmyfaq=2.0.10
Phpmyfaq Phpmyfaq=1.0
Phpmyfaq Phpmyfaq=2.0.7
Phpmyfaq Phpmyfaq=0.86
Phpmyfaq Phpmyfaq=2.5.0
Phpmyfaq Phpmyfaq=1.5
Phpmyfaq Phpmyfaq=1.5-rc1
Phpmyfaq Phpmyfaq=1.2.2
Phpmyfaq Phpmyfaq=1.3.5
Phpmyfaq Phpmyfaq=0.666
Phpmyfaq Phpmyfaq=1.6.6
Phpmyfaq Phpmyfaq=2.0.2
Phpmyfaq Phpmyfaq=1.4a
Phpmyfaq Phpmyfaq=1.2.5
Phpmyfaq Phpmyfaq=1.6.0

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203