Vulnerability Description
Cross-site Scripting (XSS) - Generic in GitHub repository thorsten/phpmyfaq prior to 3.1.11.
CVSS Score
8.1
HIGH
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Phpmyfaq | Phpmyfaq | < 3.1.11 |
Related Weaknesses (CWE)
References
- https://github.com/thorsten/phpmyfaq/commit/b76d58321a7a595eeaf4f7a30403ca6cd850Patch
- https://huntr.dev/bounties/87397c71-7b84-4617-a66e-fa6c73be9024ExploitThird Party Advisory
- https://github.com/thorsten/phpmyfaq/commit/b76d58321a7a595eeaf4f7a30403ca6cd850Patch
- https://huntr.dev/bounties/87397c71-7b84-4617-a66e-fa6c73be9024ExploitThird Party Advisory
FAQ
What is CVE-2023-0787?
CVE-2023-0787 is a vulnerability with a CVSS score of 8.1 (HIGH). Cross-site Scripting (XSS) - Generic in GitHub repository thorsten/phpmyfaq prior to 3.1.11.
How severe is CVE-2023-0787?
CVE-2023-0787 has been rated HIGH with a CVSS base score of 8.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-0787?
Check the references section above for vendor advisories and patch information. Affected products include: Phpmyfaq Phpmyfaq.