Page 5 of 25 results (0.044 seconds)

CVSS: 6.5EPSS: 0%CPEs: 22EXPL: 0

Multiple SQL injection vulnerabilities in phpMyAdmin 3.5.x before 3.5.8.2 and 4.0.x before 4.0.4.2 allow remote authenticated users to execute arbitrary SQL commands via (1) the scale parameter to pmd_pdf.php or (2) the pdf_page_number parameter to schema_export.php. Múltiples vulnerabilidades de inyección SQL en phpMyAdmin 3.5.x anterior a 3.5.8.2 y 4.0.x anterior a 4.0.4.2, permite a usuarios autenticados remotamente ejecutar comandos SQL arbitrarios a través de (1)el parámetro "scale" a pmd_pdf.php o (2) el parámetro pdf_page_number a schema_export.php. • http://secunia.com/advisories/59832 http://www.phpmyadmin.net/home_page/security/PMASA-2013-15.php http://www.securityfocus.com/bid/61923 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 3.5EPSS: 0%CPEs: 22EXPL: 0

Cross-site scripting (XSS) vulnerability in phpMyAdmin 3.5.x before 3.5.8.2 and 4.0.x before 4.0.4.2 allows remote authenticated users to inject arbitrary web script or HTML via a crafted SQL query that is not properly handled during the display of row information. Vulnerabilidad XSS en phpMyAdmin 3.5.x anterior a 3.5.8.2 y 4.0.x anterior a 4.0.4.2, permite a usuarios autenticados remotamente inyectar secuencias de comandos web o HTML arbitrarias a través de una petición SQL que no está manejada adecuadamente cuando se muestra la información de la fila. • http://secunia.com/advisories/59832 http://www.phpmyadmin.net/home_page/security/PMASA-2013-8.php http://www.securityfocus.com/bid/61510 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 6.0EPSS: 97%CPEs: 13EXPL: 3

phpMyAdmin 3.5.x before 3.5.8 and 4.x before 4.0.0-rc3 allows remote authenticated users to execute arbitrary code via a /e\x00 sequence, which is not properly handled before making a preg_replace function call within the "Replace table prefix" feature. phpMyAdmin v3.5.x antes de v3.5.8 y v4.x antes de v4.0.0-RC3 permite a usuarios remotos autenticados ejecutar código arbitrario a través de una secuencia /e\x00, que no se utilizan con cuidado antes de hacer una llamada a la función preg_replace en el "Replace table prefix". phpMyAdmin versions 3.5.8 and 4.0.0-RC2 suffer from multiple remote code execution, local file inclusion, and array overwrite vulnerabilities. • https://www.exploit-db.com/exploits/25136 https://www.exploit-db.com/exploits/25003 http://archives.neohapsis.com/archives/bugtraq/2013-04/0217.html http://lists.fedoraproject.org/pipermail/package-announce/2013-May/104725.html http://lists.fedoraproject.org/pipermail/package-announce/2013-May/104770.html http://lists.fedoraproject.org/pipermail/package-announce/2013-May/104936.html http://lists.opensuse.org/opensuse-updates/2013-06/msg00181.html http://www.exploit-db.com/exploits/25136 http •

CVSS: 4.6EPSS: 4%CPEs: 13EXPL: 2

phpMyAdmin 3.5.x before 3.5.8 and 4.x before 4.0.0-rc3, when a SaveDir directory is configured, allows remote authenticated users to execute arbitrary code by using a double extension in the filename of an export file, leading to interpretation of this file as an executable file by the Apache HTTP Server, as demonstrated by a .php.sql filename. phpMyAdmin v3.5.x antes de v3.5.8 y v4.x antes de v4.0.0-RC3, cuando se configura un directorio SaveDir, permite a los usuarios remotos autenticados ejecutar código arbitrario mediante una doble extensión del nombre de archivo de un archivo de exportación, lo que lleva a la interpretación de este archivo como un archivo ejecutable por el Apache HTTP Server, como se demuestra por un nombre de archivo .php.sql phpMyAdmin versions 3.5.8 and 4.0.0-RC2 suffer from multiple remote code execution, local file inclusion, and array overwrite vulnerabilities. • https://www.exploit-db.com/exploits/25003 http://archives.neohapsis.com/archives/bugtraq/2013-04/0217.html http://lists.fedoraproject.org/pipermail/package-announce/2013-May/104725.html http://lists.fedoraproject.org/pipermail/package-announce/2013-May/104770.html http://lists.fedoraproject.org/pipermail/package-announce/2013-May/104936.html http://lists.opensuse.org/opensuse-updates/2013-06/msg00181.html http://www.mandriva.com/security/advisories?name=MDVSA-2013:160 http://www.phpmyadmin.net/h • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVSS: 6.1EPSS: 1%CPEs: 12EXPL: 3

Multiple cross-site scripting (XSS) vulnerabilities in tbl_gis_visualization.php in phpMyAdmin 3.5.x before 3.5.8 might allow remote attackers to inject arbitrary web script or HTML via the (1) visualizationSettings[width] or (2) visualizationSettings[height] parameter. NOTE: a third party reports that this is "not exploitable. ** EN DISPUTA ** Múltiples vulnerabilidades Cross-Site Scripting (XSS) en tbl_gis_visualization.php en phpMyAdmin, en versiones 3.5.x anteriores a la 3.5.8, permiten que atacantes remotos inyecten scripts web o HTML arbitrarios mediante los parámetros (1) visualizationSettings[width] o (2) visualizationSettings[height]. NOTA: un tercero reporta que esto "no puede explotarse". • https://www.exploit-db.com/exploits/38440 http://archives.neohapsis.com/archives/fulldisclosure/2013-04/0101.html http://immunityservices.blogspot.com/2019/02/cvss.html http://lists.fedoraproject.org/pipermail/package-announce/2013-April/103184.html http://lists.fedoraproject.org/pipermail/package-announce/2013-April/103188.html http://lists.fedoraproject.org/pipermail/package-announce/2013-April/103195.html http://lists.opensuse.org/opensuse-updates/2013-06/msg00181.html http://openwall.com/lists/oss • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •