Количество 5
Количество 5
CVE-2023-40619
phpPgAdmin 7.14.4 and earlier is vulnerable to deserialization of untrusted data which may lead to remote code execution because user-controlled data is directly passed to the PHP 'unserialize()' function in multiple places. An example is the functionality to manage tables in 'tables.php' where the 'ma[]' POST parameter is deserialized.
CVE-2023-40619
phpPgAdmin 7.14.4 and earlier is vulnerable to deserialization of untrusted data which may lead to remote code execution because user-controlled data is directly passed to the PHP 'unserialize()' function in multiple places. An example is the functionality to manage tables in 'tables.php' where the 'ma[]' POST parameter is deserialized.
CVE-2023-40619
phpPgAdmin 7.14.4 and earlier is vulnerable to deserialization of untr ...
GHSA-r8pf-p598-jhpm
phpPgAdmin 7.14.4 and earlier is vulnerable to deserialization of untrusted data which may lead to remote code execution because user-controlled data is directly passed to the PHP 'unserialize()' function in multiple places. An example is the functionality to manage tables in 'tables.php' where the 'ma[]' POST parameter is deserialized.
BDU:2023-06085
Уязвимость функции unserialize() веб-инструмента администрирования СУБД PostgreSQL phpPgAdmin, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2023-40619 phpPgAdmin 7.14.4 and earlier is vulnerable to deserialization of untrusted data which may lead to remote code execution because user-controlled data is directly passed to the PHP 'unserialize()' function in multiple places. An example is the functionality to manage tables in 'tables.php' where the 'ma[]' POST parameter is deserialized. | CVSS3: 9.8 | 3% Низкий | больше 2 лет назад | |
CVE-2023-40619 phpPgAdmin 7.14.4 and earlier is vulnerable to deserialization of untrusted data which may lead to remote code execution because user-controlled data is directly passed to the PHP 'unserialize()' function in multiple places. An example is the functionality to manage tables in 'tables.php' where the 'ma[]' POST parameter is deserialized. | CVSS3: 9.8 | 3% Низкий | больше 2 лет назад | |
CVE-2023-40619 phpPgAdmin 7.14.4 and earlier is vulnerable to deserialization of untr ... | CVSS3: 9.8 | 3% Низкий | больше 2 лет назад | |
GHSA-r8pf-p598-jhpm phpPgAdmin 7.14.4 and earlier is vulnerable to deserialization of untrusted data which may lead to remote code execution because user-controlled data is directly passed to the PHP 'unserialize()' function in multiple places. An example is the functionality to manage tables in 'tables.php' where the 'ma[]' POST parameter is deserialized. | CVSS3: 9.8 | 3% Низкий | больше 2 лет назад | |
BDU:2023-06085 Уязвимость функции unserialize() веб-инструмента администрирования СУБД PostgreSQL phpPgAdmin, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации | CVSS3: 9.8 | 3% Низкий | больше 2 лет назад |
Уязвимостей на страницу