Логотип exploitDog
bind:CVE-2025-60796
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2025-60796

Количество 5

Количество 5

ubuntu логотип

CVE-2025-60796

3 месяца назад

phpPgAdmin 7.13.0 and earlier contains multiple cross-site scripting (XSS) vulnerabilities across various components. User-supplied input from $_REQUEST parameters is reflected in HTML output without proper encoding or sanitization in multiple locations including sequences.php, indexes.php, admin.php, and other unspecified files. An attacker can exploit these vulnerabilities to execute arbitrary JavaScript in victims' browsers, potentially leading to session hijacking, credential theft, or other malicious actions.

CVSS3: 6.1
EPSS: Низкий
nvd логотип

CVE-2025-60796

3 месяца назад

phpPgAdmin 7.13.0 and earlier contains multiple cross-site scripting (XSS) vulnerabilities across various components. User-supplied input from $_REQUEST parameters is reflected in HTML output without proper encoding or sanitization in multiple locations including sequences.php, indexes.php, admin.php, and other unspecified files. An attacker can exploit these vulnerabilities to execute arbitrary JavaScript in victims' browsers, potentially leading to session hijacking, credential theft, or other malicious actions.

CVSS3: 6.1
EPSS: Низкий
debian логотип

CVE-2025-60796

3 месяца назад

phpPgAdmin 7.13.0 and earlier contains multiple cross-site scripting ( ...

CVSS3: 6.1
EPSS: Низкий
github логотип

GHSA-h369-cpjj-qfff

3 месяца назад

phppgadmin vulnerable to Cross-site Scripting

EPSS: Низкий
fstec логотип

BDU:2025-14877

3 месяца назад

Уязвимость сценариев sequites.php, indexes.php, admin.php веб-инструмента администрирования СУБД PostgreSQL phpPgAdmin, позволяющая нарушителю проводить межсайтовые сценарные атаки (XSS)

CVSS3: 6.1
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2025-60796

phpPgAdmin 7.13.0 and earlier contains multiple cross-site scripting (XSS) vulnerabilities across various components. User-supplied input from $_REQUEST parameters is reflected in HTML output without proper encoding or sanitization in multiple locations including sequences.php, indexes.php, admin.php, and other unspecified files. An attacker can exploit these vulnerabilities to execute arbitrary JavaScript in victims' browsers, potentially leading to session hijacking, credential theft, or other malicious actions.

CVSS3: 6.1
0%
Низкий
3 месяца назад
nvd логотип
CVE-2025-60796

phpPgAdmin 7.13.0 and earlier contains multiple cross-site scripting (XSS) vulnerabilities across various components. User-supplied input from $_REQUEST parameters is reflected in HTML output without proper encoding or sanitization in multiple locations including sequences.php, indexes.php, admin.php, and other unspecified files. An attacker can exploit these vulnerabilities to execute arbitrary JavaScript in victims' browsers, potentially leading to session hijacking, credential theft, or other malicious actions.

CVSS3: 6.1
0%
Низкий
3 месяца назад
debian логотип
CVE-2025-60796

phpPgAdmin 7.13.0 and earlier contains multiple cross-site scripting ( ...

CVSS3: 6.1
0%
Низкий
3 месяца назад
github логотип
GHSA-h369-cpjj-qfff

phppgadmin vulnerable to Cross-site Scripting

0%
Низкий
3 месяца назад
fstec логотип
BDU:2025-14877

Уязвимость сценариев sequites.php, indexes.php, admin.php веб-инструмента администрирования СУБД PostgreSQL phpPgAdmin, позволяющая нарушителю проводить межсайтовые сценарные атаки (XSS)

CVSS3: 6.1
0%
Низкий
3 месяца назад

Уязвимостей на страницу