Page 10 of 51 results (0.009 seconds)

CVSS: 4.3EPSS: 0%CPEs: 13EXPL: 0

Multiple cross-site scripting (XSS) vulnerabilities in phpMyAdmin before 2.6.4-pl4 allow remote attackers to inject arbitrary web script or HTML via (1) the cookie-based login panel, (2) the title parameter and (3) the table creation dialog. • http://secunia.com/advisories/17578 http://secunia.com/advisories/18618 http://www.phpmyadmin.net/home_page/security.php?issue=PMASA-2005-7 http://www.securityfocus.com/archive/1/423142/100/0/threaded http://www.securityfocus.com/bid/16389 •

CVSS: 5.0EPSS: 1%CPEs: 15EXPL: 0

phpMyAdmin 2.7.0-beta1 and earlier allows remote attackers to obtain the full path of the server via direct requests to multiple scripts in the libraries directory. phpMyAdmin 2.7.0-beta1 y anteriores permiten a atacantes remotos obtener la ruta completa del servidor mediante peticiones directas a varios scripts en el directorio de bibliotecas. • http://marc.info/?l=bugtraq&m=113208319104035&w=2 http://securityreason.com/securityalert/185 http://securitytracker.com/id?1015213 http://www.fitsec.com/advisories/FS-05-02.txt http://www.osvdb.org/20911 http://www.osvdb.org/20912 http://www.osvdb.org/20913 http://www.osvdb.org/20914 •

CVSS: 5.0EPSS: 1%CPEs: 13EXPL: 0

CRLF injection vulnerability in phpMyAdmin before 2.6.4-pl4 allows remote attackers to conduct HTTP response splitting attacks via unspecified scripts. Vulnerabilidad de inyección de CRLF en phpMyAdmin anteriores a 2.6.4-pl4 permite a atacantes remotos conducir ataques de separación de respuesta HTTP mediante scripts no especificados. • http://secunia.com/advisories/17578 http://secunia.com/advisories/22781 http://securitytracker.com/id?1015213 http://www.debian.org/security/2006/dsa-1207 http://www.novell.com/linux/security/advisories/2005_28_sr.html http://www.phpmyadmin.net/home_page/security.php?issue=PMASA-2005-6 •

CVSS: 4.3EPSS: 0%CPEs: 4EXPL: 2

Multiple cross-site scripting (XSS) vulnerabilities in phpMyAdmin before 2.6.4-pl3 allow remote attackers to inject arbitrary web script or HTML via certain arguments to (1) left.php, (2) queryframe.php, or (3) server_databases.php. • https://www.exploit-db.com/exploits/26392 https://www.exploit-db.com/exploits/26393 http://secunia.com/advisories/17337 http://secunia.com/advisories/17559 http://secunia.com/advisories/17607 http://www.debian.org/security/2005/dsa-880 http://www.gentoo.org/security/en/glsa/glsa-200510-21.xml http://www.novell.com/linux/security/advisories/2005_28_sr.html http://www.novell.com/linux/security/advisories/2005_66_phpmyadmin.html http://www.phpmyadmin.net/home_page/sec •

CVSS: 5.0EPSS: 2%CPEs: 1EXPL: 0

The register_globals emulation layer in grab_globals.php for phpMyAdmin before 2.6.4-pl3 does not perform safety checks on values in the _FILES array for uploaded files, which allows remote attackers to include arbitrary files by using direct requests to library scripts that do not use grab_globals.php, then modifying certain configuration values for the theme. • http://archives.neohapsis.com/archives/fulldisclosure/2005-10/0478. http://marc.info/?l=bugtraq&m=113017591414699&w=2 http://secunia.com/advisories/17289 http://secunia.com/advisories/17337 http://secunia.com/advisories/17559 http://secunia.com/advisories/17607 http://securitytracker.com/id?1015091 http://www.debian.org/security/2005/dsa-880 http://www.gentoo.org/security/en/glsa/glsa-200510-21.xml http://www.hardened-php.net/advisory_162005.73.html http://www.nov •