header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Cross-site scripting vulnerabilities in phpMyChat

The phpMyChat application fails to properly sanitize user-supplied input, leading to multiple cross-site scripting vulnerabilities. An attacker can exploit these vulnerabilities to execute arbitrary script code in the browser of a victim user, potentially allowing them to steal authentication credentials and launch other attacks.

Multiple Cross-Site Scripting Vulnerabilities in phpMyChat

phpMyChat is prone to multiple cross-site scripting vulnerabilities because it fails to properly sanitize user-supplied input. An attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and to launch other attacks.

phpMyChat Multiple Local File-Include Vulnerabilities

phpMyChat is prone to multiple local file-include vulnerabilities because it fails to properly sanitize user-supplied input. Exploiting these issues may allow an unauthorized user to view files and execute local scripts. phpMyChat Plus 1.9 and prior versions are vulnerable to these issues; other versions may also be affected.

phpMyChat Cross-Site Scripting Vulnerability

phpMyChat is prone to a cross-site scripting vulnerability because it fails to properly sanitize user-supplied input. An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may help the attacker steal cookie-based authentication credentials and launch other attacks.

phpMyChat Plus v1.94 RC1 Multiple Remote Vulnerabilities

The phpMyChat Plus v1.94 RC1 is vulnerable to Remote Blind SQL Injection, Remote File Inclusion, Local File Inclusion, and XSS. For Remote Blind SQL Injection, an attacker can use some automatic blind SQL injection to get database information. For Remote File Inclusion, the allow_url_include must be set to On. For Local File Inclusion, the magic_quotes_gpc must be set to Off. For XSS, an attacker must have a good brain.

PHPMyChat <= 0.14.5 "SYS enter" remote cmmnds xctn 0day

A vulnerability exists in PHPMyChat <= 0.14.5 which allows an attacker to execute arbitrary commands remotely. This is due to the lack of sanitization of the 'T' argument in the chat/messagesL.php3 file which is used in an INSERT query. The vulnerable code is located near lines 56-60 and the eval() function is used near line 197.

Recent Exploits: