Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2016-9865

Опубликовано: 11 дек. 2016
Источник: debian
EPSS Низкий

Описание

An issue was discovered in phpMyAdmin. Due to a bug in serialized string parsing, it was possible to bypass the protection offered by PMA_safeUnserialize() function. All 4.6.x versions (prior to 4.6.5), 4.4.x versions (prior to 4.4.15.9), and 4.0.x versions (prior to 4.0.10.18) are affected.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
phpmyadminfixed4:4.6.5.1-1package

Примечания

  • https://www.phpmyadmin.net/security/PMASA-2016-70/

  • https://github.com/phpmyadmin/phpmyadmin/commit/17b34be (RELEASE_4_6_5)

  • https://github.com/phpmyadmin/phpmyadmin/commit/1fc004d (MAINT_4_4_15)

EPSS

Процентиль: 70%
0.00662
Низкий

Связанные уязвимости

CVSS3: 9.8
ubuntu
больше 8 лет назад

An issue was discovered in phpMyAdmin. Due to a bug in serialized string parsing, it was possible to bypass the protection offered by PMA_safeUnserialize() function. All 4.6.x versions (prior to 4.6.5), 4.4.x versions (prior to 4.4.15.9), and 4.0.x versions (prior to 4.0.10.18) are affected.

CVSS3: 9.8
nvd
больше 8 лет назад

An issue was discovered in phpMyAdmin. Due to a bug in serialized string parsing, it was possible to bypass the protection offered by PMA_safeUnserialize() function. All 4.6.x versions (prior to 4.6.5), 4.4.x versions (prior to 4.4.15.9), and 4.0.x versions (prior to 4.0.10.18) are affected.

CVSS3: 9.8
github
около 3 лет назад

An issue was discovered in phpMyAdmin. Due to a bug in serialized string parsing, it was possible to bypass the protection offered by PMA_safeUnserialize() function. All 4.6.x versions (prior to 4.6.5), 4.4.x versions (prior to 4.4.15.9), and 4.0.x versions (prior to 4.0.10.18) are affected.

EPSS

Процентиль: 70%
0.00662
Низкий