Логотип exploitDog
product: "phpmyadmin"
Консоль
Логотип exploitDog

exploitDog

product: "phpmyadmin"
phpMyAdmin

phpMyAdminвеб-приложение с открытым кодом, написанное на языке PHP и представляющее собой веб-интерфейс для администрирования СУБД MySQL.

Релизный цикл, информация об уязвимостях

Продукт: phpMyAdmin
Вендор: phpmyadmin

График релизов

4.74.84.95.05.15.22017201820192020202120222023202420252026

Недавние уязвимости phpMyAdmin

Количество 1 093

github логотип

GHSA-p632-5w74-x8xx

около 3 лет назад

phpMyAdmin Cross-site scripting (XSS) vulnerability via pageNumber value

EPSS: Низкий
github логотип

GHSA-vf9x-fp9j-gp8c

около 3 лет назад

Multiple SQL injection vulnerabilities in phpMyAdmin 3.5.x before 3.5.8.2 and 4.0.x before 4.0.4.2 allow remote authenticated users to execute arbitrary SQL commands via (1) the scale parameter to pmd_pdf.php or (2) the pdf_page_number parameter to schema_export.php.

EPSS: Низкий
github логотип

GHSA-r57r-r9wp-wc2v

около 3 лет назад

An issue was discovered in phpMyAdmin. A user can be tricked into following a link leading to phpMyAdmin, which after authentication redirects to another malicious site. The attacker must sniff the user's valid phpMyAdmin token. All 4.0.x versions (prior to 4.0.10.16) are affected.

CVSS3: 4.4
EPSS: Низкий
github логотип

GHSA-gcvp-cwgw-wx8j

около 3 лет назад

phpMyAdmin XSS Vulnerability

CVSS3: 6.1
EPSS: Низкий
github логотип

GHSA-xqw9-ffx7-g998

около 3 лет назад

phpMyAdmin cookie-attribute injection

CVSS3: 3.7
EPSS: Низкий
github логотип

GHSA-qrm4-w2r7-479c

около 3 лет назад

XSS issues were discovered in phpMyAdmin. This affects Zoom search (specially crafted column content can be used to trigger an XSS attack); GIS editor (certain fields in the graphical GIS editor are not properly escaped and can be used to trigger an XSS attack); Relation view; the following Transformations: Formatted, Imagelink, JPEG: Upload, RegexValidation, JPEG inline, PNG inline, and transformation wrapper; XML export; MediaWiki export; Designer; When the MySQL server is running with a specially-crafted log_bin directive; Database tab; Replication feature; and Database search. All 4.6.x versions (prior to 4.6.4), 4.4.x versions (prior to 4.4.15.8), and 4.0.x versions (prior to 4.0.10.17) are affected.

CVSS3: 6.1
EPSS: Низкий
github логотип

GHSA-3q28-xfw3-2q35

около 3 лет назад

phpMyAdmin XSS Vulnerability

CVSS3: 6.1
EPSS: Низкий
github логотип

GHSA-rv57-479x-x4qv

около 3 лет назад

phpMyAdmin Code Injection vulnerability

CVSS3: 9.8
EPSS: Высокий
github логотип

GHSA-8pvh-2357-g3c2

около 3 лет назад

An issue was discovered in cookie encryption in phpMyAdmin. The decryption of the username/password is vulnerable to a padding oracle attack. This can allow an attacker who has access to a user's browser cookie file to decrypt the username and password. Furthermore, the same initialization vector (IV) is used to hash the username and password stored in the phpMyAdmin cookie. If a user has the same password as their username, an attacker who examines the browser cookie can see that they are the same - but the attacker can not directly decode these values from the cookie as it is still hashed. All 4.6.x versions (prior to 4.6.4), 4.4.x versions (prior to 4.4.15.8), and 4.0.x versions (prior to 4.0.10.17) are affected.

CVSS3: 8.1
EPSS: Низкий
github логотип

GHSA-qc6p-fjq3-q3x8

около 3 лет назад

A full path disclosure vulnerability was discovered in phpMyAdmin where a user can trigger a particular error in the export mechanism to discover the full path of phpMyAdmin on the disk. All 4.6.x versions (prior to 4.6.4), 4.4.x versions (prior to 4.4.15.8), and 4.0.x versions (prior to 4.0.10.17) are affected.

CVSS3: 4.3
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
1
github логотип
GHSA-p632-5w74-x8xx

phpMyAdmin Cross-site scripting (XSS) vulnerability via pageNumber value

0%
Низкий
около 3 лет назад
github логотип
GHSA-vf9x-fp9j-gp8c

Multiple SQL injection vulnerabilities in phpMyAdmin 3.5.x before 3.5.8.2 and 4.0.x before 4.0.4.2 allow remote authenticated users to execute arbitrary SQL commands via (1) the scale parameter to pmd_pdf.php or (2) the pdf_page_number parameter to schema_export.php.

0%
Низкий
около 3 лет назад
github логотип
GHSA-r57r-r9wp-wc2v

An issue was discovered in phpMyAdmin. A user can be tricked into following a link leading to phpMyAdmin, which after authentication redirects to another malicious site. The attacker must sniff the user's valid phpMyAdmin token. All 4.0.x versions (prior to 4.0.10.16) are affected.

CVSS3: 4.4
0%
Низкий
около 3 лет назад
github логотип
GHSA-gcvp-cwgw-wx8j

phpMyAdmin XSS Vulnerability

CVSS3: 6.1
0%
Низкий
около 3 лет назад
github логотип
GHSA-xqw9-ffx7-g998

phpMyAdmin cookie-attribute injection

CVSS3: 3.7
0%
Низкий
около 3 лет назад
github логотип
GHSA-qrm4-w2r7-479c

XSS issues were discovered in phpMyAdmin. This affects Zoom search (specially crafted column content can be used to trigger an XSS attack); GIS editor (certain fields in the graphical GIS editor are not properly escaped and can be used to trigger an XSS attack); Relation view; the following Transformations: Formatted, Imagelink, JPEG: Upload, RegexValidation, JPEG inline, PNG inline, and transformation wrapper; XML export; MediaWiki export; Designer; When the MySQL server is running with a specially-crafted log_bin directive; Database tab; Replication feature; and Database search. All 4.6.x versions (prior to 4.6.4), 4.4.x versions (prior to 4.4.15.8), and 4.0.x versions (prior to 4.0.10.17) are affected.

CVSS3: 6.1
1%
Низкий
около 3 лет назад
github логотип
GHSA-3q28-xfw3-2q35

phpMyAdmin XSS Vulnerability

CVSS3: 6.1
0%
Низкий
около 3 лет назад
github логотип
GHSA-rv57-479x-x4qv

phpMyAdmin Code Injection vulnerability

CVSS3: 9.8
73%
Высокий
около 3 лет назад
github логотип
GHSA-8pvh-2357-g3c2

An issue was discovered in cookie encryption in phpMyAdmin. The decryption of the username/password is vulnerable to a padding oracle attack. This can allow an attacker who has access to a user's browser cookie file to decrypt the username and password. Furthermore, the same initialization vector (IV) is used to hash the username and password stored in the phpMyAdmin cookie. If a user has the same password as their username, an attacker who examines the browser cookie can see that they are the same - but the attacker can not directly decode these values from the cookie as it is still hashed. All 4.6.x versions (prior to 4.6.4), 4.4.x versions (prior to 4.4.15.8), and 4.0.x versions (prior to 4.0.10.17) are affected.

CVSS3: 8.1
0%
Низкий
около 3 лет назад
github логотип
GHSA-qc6p-fjq3-q3x8

A full path disclosure vulnerability was discovered in phpMyAdmin where a user can trigger a particular error in the export mechanism to discover the full path of phpMyAdmin on the disk. All 4.6.x versions (prior to 4.6.4), 4.4.x versions (prior to 4.4.15.8), and 4.0.x versions (prior to 4.0.10.17) are affected.

CVSS3: 4.3
0%
Низкий
около 3 лет назад

Уязвимостей на страницу


Поделиться