Page 5 of 142 results (0.004 seconds)

CVSS: 6.5EPSS: 0%CPEs: 22EXPL: 0

Multiple SQL injection vulnerabilities in phpMyAdmin 3.5.x before 3.5.8.2 and 4.0.x before 4.0.4.2 allow remote authenticated users to execute arbitrary SQL commands via (1) the scale parameter to pmd_pdf.php or (2) the pdf_page_number parameter to schema_export.php. Múltiples vulnerabilidades de inyección SQL en phpMyAdmin 3.5.x anterior a 3.5.8.2 y 4.0.x anterior a 4.0.4.2, permite a usuarios autenticados remotamente ejecutar comandos SQL arbitrarios a través de (1)el parámetro "scale" a pmd_pdf.php o (2) el parámetro pdf_page_number a schema_export.php. • http://secunia.com/advisories/59832 http://www.phpmyadmin.net/home_page/security/PMASA-2013-15.php http://www.securityfocus.com/bid/61923 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 4.3EPSS: 0%CPEs: 14EXPL: 0

Multiple cross-site scripting (XSS) vulnerabilities in phpMyAdmin 3.5.x before 3.5.8.2 allow remote attackers to inject arbitrary web script or HTML via vectors involving a JavaScript event in (1) an anchor identifier to setup/index.php or (2) a chartTitle (aka chart title) value. Múltiples vulnerabilidades de XSS en phpMyAdmin 3.5.x anterior a 3.5.8.2, permite a atacantes remotos inyectar secuencias de comandos web y HTML arbitrarias a través de vectores que involucran un evento JavaScript en (1) un identificador de ancla a setup/index.php oa (2) un valor chartTitle (aka chart title). • http://www.phpmyadmin.net/home_page/security/PMASA-2013-9.php • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 5.0EPSS: 0%CPEs: 22EXPL: 0

phpMyAdmin 3.5.x before 3.5.8.2 and 4.0.x before 4.0.4.2 allows remote attackers to obtain sensitive information via an invalid request, which reveals the installation path in an error message, related to pmd_common.php and other files. phpMyAdmin 3.5.x anterior a 3.5.8.2 y 4.0.x anterior a 4.0.4.2, permite a atacantes remotos obtener información sensible a través de una petición inválida, que revela la ruta de instalación en un mensaje de error. Relacionado con pmd_common.php y otros archivos. • http://www.phpmyadmin.net/home_page/security/PMASA-2013-12.php • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 5.0EPSS: 0%CPEs: 14EXPL: 0

phpMyAdmin 3.5.x before 3.5.8.2 allows remote attackers to obtain sensitive information via an invalid request, which reveals the installation path in an error message, related to config.default.php and other files. phpMyAdmin 3.5.x anterior a 3.5.8.2, permite a a atacantes remotos obtener información sensible a través de una petición inválida, que muestra la ruta de instalación en un mensaje de error. Relacionado con config.default.php y otros archivos. • http://www.phpmyadmin.net/home_page/security/PMASA-2013-12.php • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 6.0EPSS: 97%CPEs: 13EXPL: 3

phpMyAdmin 3.5.x before 3.5.8 and 4.x before 4.0.0-rc3 allows remote authenticated users to execute arbitrary code via a /e\x00 sequence, which is not properly handled before making a preg_replace function call within the "Replace table prefix" feature. phpMyAdmin v3.5.x antes de v3.5.8 y v4.x antes de v4.0.0-RC3 permite a usuarios remotos autenticados ejecutar código arbitrario a través de una secuencia /e\x00, que no se utilizan con cuidado antes de hacer una llamada a la función preg_replace en el "Replace table prefix". phpMyAdmin versions 3.5.8 and 4.0.0-RC2 suffer from multiple remote code execution, local file inclusion, and array overwrite vulnerabilities. • https://www.exploit-db.com/exploits/25136 https://www.exploit-db.com/exploits/25003 http://archives.neohapsis.com/archives/bugtraq/2013-04/0217.html http://lists.fedoraproject.org/pipermail/package-announce/2013-May/104725.html http://lists.fedoraproject.org/pipermail/package-announce/2013-May/104770.html http://lists.fedoraproject.org/pipermail/package-announce/2013-May/104936.html http://lists.opensuse.org/opensuse-updates/2013-06/msg00181.html http://www.exploit-db.com/exploits/25136 http •