Логотип exploitDog
bind:CVE-2023-40619
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2023-40619

Количество 5

Количество 5

ubuntu логотип

CVE-2023-40619

больше 2 лет назад

phpPgAdmin 7.14.4 and earlier is vulnerable to deserialization of untrusted data which may lead to remote code execution because user-controlled data is directly passed to the PHP 'unserialize()' function in multiple places. An example is the functionality to manage tables in 'tables.php' where the 'ma[]' POST parameter is deserialized.

CVSS3: 9.8
EPSS: Низкий
nvd логотип

CVE-2023-40619

больше 2 лет назад

phpPgAdmin 7.14.4 and earlier is vulnerable to deserialization of untrusted data which may lead to remote code execution because user-controlled data is directly passed to the PHP 'unserialize()' function in multiple places. An example is the functionality to manage tables in 'tables.php' where the 'ma[]' POST parameter is deserialized.

CVSS3: 9.8
EPSS: Низкий
debian логотип

CVE-2023-40619

больше 2 лет назад

phpPgAdmin 7.14.4 and earlier is vulnerable to deserialization of untr ...

CVSS3: 9.8
EPSS: Низкий
github логотип

GHSA-r8pf-p598-jhpm

больше 2 лет назад

phpPgAdmin 7.14.4 and earlier is vulnerable to deserialization of untrusted data which may lead to remote code execution because user-controlled data is directly passed to the PHP 'unserialize()' function in multiple places. An example is the functionality to manage tables in 'tables.php' where the 'ma[]' POST parameter is deserialized.

CVSS3: 9.8
EPSS: Низкий
fstec логотип

BDU:2023-06085

больше 2 лет назад

Уязвимость функции unserialize() веб-инструмента администрирования СУБД PostgreSQL phpPgAdmin, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации

CVSS3: 9.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2023-40619

phpPgAdmin 7.14.4 and earlier is vulnerable to deserialization of untrusted data which may lead to remote code execution because user-controlled data is directly passed to the PHP 'unserialize()' function in multiple places. An example is the functionality to manage tables in 'tables.php' where the 'ma[]' POST parameter is deserialized.

CVSS3: 9.8
3%
Низкий
больше 2 лет назад
nvd логотип
CVE-2023-40619

phpPgAdmin 7.14.4 and earlier is vulnerable to deserialization of untrusted data which may lead to remote code execution because user-controlled data is directly passed to the PHP 'unserialize()' function in multiple places. An example is the functionality to manage tables in 'tables.php' where the 'ma[]' POST parameter is deserialized.

CVSS3: 9.8
3%
Низкий
больше 2 лет назад
debian логотип
CVE-2023-40619

phpPgAdmin 7.14.4 and earlier is vulnerable to deserialization of untr ...

CVSS3: 9.8
3%
Низкий
больше 2 лет назад
github логотип
GHSA-r8pf-p598-jhpm

phpPgAdmin 7.14.4 and earlier is vulnerable to deserialization of untrusted data which may lead to remote code execution because user-controlled data is directly passed to the PHP 'unserialize()' function in multiple places. An example is the functionality to manage tables in 'tables.php' where the 'ma[]' POST parameter is deserialized.

CVSS3: 9.8
3%
Низкий
больше 2 лет назад
fstec логотип
BDU:2023-06085

Уязвимость функции unserialize() веб-инструмента администрирования СУБД PostgreSQL phpPgAdmin, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации

CVSS3: 9.8
3%
Низкий
больше 2 лет назад

Уязвимостей на страницу