Page 17 of 101 results (0.008 seconds)

CVSS: 5.0EPSS: 1%CPEs: 13EXPL: 0

CRLF injection vulnerability in phpMyAdmin before 2.6.4-pl4 allows remote attackers to conduct HTTP response splitting attacks via unspecified scripts. Vulnerabilidad de inyección de CRLF en phpMyAdmin anteriores a 2.6.4-pl4 permite a atacantes remotos conducir ataques de separación de respuesta HTTP mediante scripts no especificados. • http://secunia.com/advisories/17578 http://secunia.com/advisories/22781 http://securitytracker.com/id?1015213 http://www.debian.org/security/2006/dsa-1207 http://www.novell.com/linux/security/advisories/2005_28_sr.html http://www.phpmyadmin.net/home_page/security.php?issue=PMASA-2005-6 •

CVSS: 4.3EPSS: 0%CPEs: 4EXPL: 2

Multiple cross-site scripting (XSS) vulnerabilities in phpMyAdmin before 2.6.4-pl3 allow remote attackers to inject arbitrary web script or HTML via certain arguments to (1) left.php, (2) queryframe.php, or (3) server_databases.php. • https://www.exploit-db.com/exploits/26392 https://www.exploit-db.com/exploits/26393 http://secunia.com/advisories/17337 http://secunia.com/advisories/17559 http://secunia.com/advisories/17607 http://www.debian.org/security/2005/dsa-880 http://www.gentoo.org/security/en/glsa/glsa-200510-21.xml http://www.novell.com/linux/security/advisories/2005_28_sr.html http://www.novell.com/linux/security/advisories/2005_66_phpmyadmin.html http://www.phpmyadmin.net/home_page/sec •

CVSS: 5.0EPSS: 2%CPEs: 1EXPL: 0

The register_globals emulation layer in grab_globals.php for phpMyAdmin before 2.6.4-pl3 does not perform safety checks on values in the _FILES array for uploaded files, which allows remote attackers to include arbitrary files by using direct requests to library scripts that do not use grab_globals.php, then modifying certain configuration values for the theme. • http://archives.neohapsis.com/archives/fulldisclosure/2005-10/0478. http://marc.info/?l=bugtraq&m=113017591414699&w=2 http://secunia.com/advisories/17289 http://secunia.com/advisories/17337 http://secunia.com/advisories/17559 http://secunia.com/advisories/17607 http://securitytracker.com/id?1015091 http://www.debian.org/security/2005/dsa-880 http://www.gentoo.org/security/en/glsa/glsa-200510-21.xml http://www.hardened-php.net/advisory_162005.73.html http://www.nov •

CVSS: 5.0EPSS: 1%CPEs: 2EXPL: 3

PHP file inclusion vulnerability in grab_globals.lib.php in phpMyAdmin 2.6.4 and 2.6.4-pl1 allows remote attackers to include local files via the $__redirect parameter, possibly involving the subform array. • https://www.exploit-db.com/exploits/1244 https://github.com/RizeKishimaro/CVE-2005-3299 https://github.com/Cr0w-ui/-CVE-2005-3299- http://secunia.com/advisories/17137 http://securityreason.com/securityalert/69 http://www.gentoo.org/security/en/glsa/glsa-200510-16.xml http://www.phpmyadmin.net/home_page/security.php?issue=PMASA-2005-4 http://www.securityfocus.com/bid/15053 •

CVSS: 4.3EPSS: 26%CPEs: 46EXPL: 3

Multiple cross-site scripting (XSS) vulnerabilities in phpMyAdmin before 2.6.4 allow remote attackers to inject arbitrary web script or HTML via (1) the Username to libraries/auth/cookie.auth.lib.php or (2) the error parameter to error.php. • https://www.exploit-db.com/exploits/26199 http://secunia.com/advisories/16605 http://secunia.com/advisories/17337 http://secunia.com/advisories/17559 http://secunia.com/advisories/17607 http://sourceforge.net/tracker/index.php?func=detail&aid=1240880&group_id=23067&atid=377408 http://sourceforge.net/tracker/index.php?func=detail&aid=1265740&group_id=23067&atid=377408 http://www.debian.org/security/2005/dsa-880 http://www.novell.com/linux/security/advisories/2005_28_sr.html http •