Page 51 of 270 results (0.011 seconds)

CVSS: 4.3EPSS: 0%CPEs: 4EXPL: 2

Multiple cross-site scripting (XSS) vulnerabilities in phpMyAdmin before 2.6.4-pl3 allow remote attackers to inject arbitrary web script or HTML via certain arguments to (1) left.php, (2) queryframe.php, or (3) server_databases.php. • https://www.exploit-db.com/exploits/26392 https://www.exploit-db.com/exploits/26393 http://secunia.com/advisories/17337 http://secunia.com/advisories/17559 http://secunia.com/advisories/17607 http://www.debian.org/security/2005/dsa-880 http://www.gentoo.org/security/en/glsa/glsa-200510-21.xml http://www.novell.com/linux/security/advisories/2005_28_sr.html http://www.novell.com/linux/security/advisories/2005_66_phpmyadmin.html http://www.phpmyadmin.net/home_page/sec •

CVSS: 5.0EPSS: 1%CPEs: 2EXPL: 3

PHP file inclusion vulnerability in grab_globals.lib.php in phpMyAdmin 2.6.4 and 2.6.4-pl1 allows remote attackers to include local files via the $__redirect parameter, possibly involving the subform array. • https://www.exploit-db.com/exploits/1244 https://github.com/RizeKishimaro/CVE-2005-3299 https://github.com/Cr0w-ui/-CVE-2005-3299- http://secunia.com/advisories/17137 http://securityreason.com/securityalert/69 http://www.gentoo.org/security/en/glsa/glsa-200510-16.xml http://www.phpmyadmin.net/home_page/security.php?issue=PMASA-2005-4 http://www.securityfocus.com/bid/15053 •

CVSS: 5.0EPSS: 1%CPEs: 1EXPL: 0

The register_globals emulation layer in grab_globals.php for phpMyAdmin before 2.6.4-pl3 does not perform safety checks on values in the _FILES array for uploaded files, which allows remote attackers to include arbitrary files by using direct requests to library scripts that do not use grab_globals.php, then modifying certain configuration values for the theme. • http://archives.neohapsis.com/archives/fulldisclosure/2005-10/0478. http://marc.info/?l=bugtraq&m=113017591414699&w=2 http://secunia.com/advisories/17289 http://secunia.com/advisories/17337 http://secunia.com/advisories/17559 http://secunia.com/advisories/17607 http://securitytracker.com/id?1015091 http://www.debian.org/security/2005/dsa-880 http://www.gentoo.org/security/en/glsa/glsa-200510-21.xml http://www.hardened-php.net/advisory_162005.73.html http://www.nov •

CVSS: 4.3EPSS: 26%CPEs: 46EXPL: 3

Multiple cross-site scripting (XSS) vulnerabilities in phpMyAdmin before 2.6.4 allow remote attackers to inject arbitrary web script or HTML via (1) the Username to libraries/auth/cookie.auth.lib.php or (2) the error parameter to error.php. • https://www.exploit-db.com/exploits/26199 http://secunia.com/advisories/16605 http://secunia.com/advisories/17337 http://secunia.com/advisories/17559 http://secunia.com/advisories/17607 http://sourceforge.net/tracker/index.php?func=detail&aid=1240880&group_id=23067&atid=377408 http://sourceforge.net/tracker/index.php?func=detail&aid=1265740&group_id=23067&atid=377408 http://www.debian.org/security/2005/dsa-880 http://www.novell.com/linux/security/advisories/2005_28_sr.html http •

CVSS: 4.6EPSS: 0%CPEs: 1EXPL: 0

The SQL install script in phpMyAdmin 2.6.2 is created with world-readable permissions, which allows local users to obtain the initial database password by reading the script. • http://bugs.gentoo.org/show_bug.cgi?id=88831 http://security.gentoo.org/glsa/glsa-200504-30.xml http://www.osvdb.org/16053 http://www.vupen.com/english/advisories/2005/0436 •