Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2013-3241

Опубликовано: 26 апр. 2013
Источник: debian
EPSS Низкий

Описание

export.php (aka the export script) in phpMyAdmin 4.x before 4.0.0-rc3 overwrites global variables on the basis of the contents of the POST superglobal array, which allows remote authenticated users to inject values via a crafted request.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
phpmyadminnot-affectedpackage

EPSS

Процентиль: 89%
0.04679
Низкий

Связанные уязвимости

ubuntu
около 12 лет назад

export.php (aka the export script) in phpMyAdmin 4.x before 4.0.0-rc3 overwrites global variables on the basis of the contents of the POST superglobal array, which allows remote authenticated users to inject values via a crafted request.

nvd
около 12 лет назад

export.php (aka the export script) in phpMyAdmin 4.x before 4.0.0-rc3 overwrites global variables on the basis of the contents of the POST superglobal array, which allows remote authenticated users to inject values via a crafted request.

github
около 3 лет назад

export.php (aka the export script) in phpMyAdmin 4.x before 4.0.0-rc3 overwrites global variables on the basis of the contents of the POST superglobal array, which allows remote authenticated users to inject values via a crafted request.

EPSS

Процентиль: 89%
0.04679
Низкий