Show filters
18 Total Results
Displaying 1-10 of 18
Sort by:
Attacker Value
Unknown
PHP forms generated using the PHP FormMail Generator are vulnerable to stored c…
Disclosure Date: July 13, 2018 (last updated November 27, 2024)
The code generated by PHP FormMail Generator prior to 17 December 2016 is vulnerable to stored cross-site scripting. In the generated form.lib.php file, upload file types are checked against a hard-coded list of dangerous extensions. This list does not include all variations of PHP files, which may lead to execution of the contained PHP code if the attacker can guess the uploaded filename. The form by default appends a short random string to the end of the filename.
0
Attacker Value
Unknown
PHP FormMail Generator generates PHP code for standard web forms, and the code …
Disclosure Date: July 13, 2018 (last updated November 27, 2024)
The PHP form code generated by PHP FormMail Generator deserializes untrusted input as part of the phpfmg_filman_download() function. A remote unauthenticated attacker may be able to use this vulnerability to inject PHP code, or along with CVE-2016-9484 to perform local file inclusion attacks and obtain files from the server.
0
Attacker Value
Unknown
PHP FormMail Generator generates PHP code for standard web forms, and the code …
Disclosure Date: July 13, 2018 (last updated November 27, 2024)
Code generated by PHP FormMail Generator may allow a remote unauthenticated user to bypass authentication in the to access the administrator panel by navigating directly to /admin.php?mod=admin&func=panel
0
Attacker Value
Unknown
PHP FormMail Generator generates PHP code for standard web forms, and the code …
Disclosure Date: July 13, 2018 (last updated November 27, 2024)
The generated PHP form code does not properly validate user input folder directories, allowing a remote unauthenticated attacker to perform a path traversal and access arbitrary files on the server. The PHP FormMail Generator website does not use version numbers and is updated continuously. Any PHP form code generated by this website prior to 2016-12-06 may be vulnerable.
0
Attacker Value
Unknown
PHP forms generated using the PHP FormMail Generator are vulnerable to unrestri…
Disclosure Date: July 13, 2018 (last updated November 27, 2024)
The code generated by PHP FormMail Generator prior to 17 December 2016 is vulnerable to unrestricted upload of dangerous file types. In the generated form.lib.php file, upload file types are checked against a hard-coded list of dangerous extensions. This list does not include all variations of PHP files, which may lead to execution of the contained PHP code if the attacker can guess the uploaded filename. The form by default appends a short random string to the end of the filename.
0
Attacker Value
Unknown
CVE-2016-1000146
Disclosure Date: October 10, 2016 (last updated November 25, 2024)
Reflected XSS in wordpress plugin pondol-formmail v1.1
0
Attacker Value
Unknown
CVE-2016-1230
Disclosure Date: June 05, 2016 (last updated November 25, 2024)
Cross-site scripting (XSS) vulnerability in NTT PC Communications WebARENA Service formmail before 2.2.1 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
0
Attacker Value
Unknown
CVE-2010-1332
Disclosure Date: April 09, 2010 (last updated October 04, 2023)
Cross-site scripting (XSS) vulnerability in PrettyBook PrettyFormMail allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
0
Attacker Value
Unknown
CVE-2009-2378
Disclosure Date: July 08, 2009 (last updated October 04, 2023)
PHP remote file inclusion vulnerability in formmailer.admin.inc.php in Jax FormMailer 3.0.0 allows remote attackers to execute arbitrary PHP code via a URL in the BASE_DIR[jax_formmailer] parameter.
0
Attacker Value
Unknown
CVE-2009-1776
Disclosure Date: May 22, 2009 (last updated October 04, 2023)
Multiple cross-site scripting (XSS) vulnerabilities in FormMail.pl in Matt Wright FormMail 1.92, and possibly earlier, allow remote attackers to inject arbitrary web script or HTML via javascript: URIs in the (1) request and (2) return_link_url parameters.
0