phpMyFAQ is an open source FAQ web application for PHP 8.1+ and MySQL, PostgreSQL and other databases. Unsafe echo of filename in phpMyFAQ\phpmyfaq\admin\attachments.php leads to allowed execution of JavaScript code in client side (XSS). This vulnerability has been patched in version 3.2.5.
Metrics
Affected Vendors & Products
References
History
No history.

Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2024-08-01T23:19:52.930Z
Reserved: 2024-01-25T15:09:40.211Z
Link: CVE-2024-24574

No data.

Status : Modified
Published: 2024-02-05T21:15:12.340
Modified: 2024-11-21T08:59:27.143
Link: CVE-2024-24574

No data.