Page 8 of 55 results (0.004 seconds)

CVSS: 7.1EPSS: 4%CPEs: 1EXPL: 0

The PMA_ArrayWalkRecursive function in libraries/common.lib.php in phpMyAdmin before 2.10.0.2 does not limit recursion on arrays provided by users, which allows context-dependent attackers to cause a denial of service (web server crash) via an array with many dimensions. NOTE: it could be argued that this vulnerability is caused by a problem in PHP (CVE-2006-1549) and the proper fix should be in PHP; if so, then this should not be treated as a vulnerability in phpMyAdmin. La función PMA_ArrayWalkRecursive en el libraries/common.lib.php del phpMyAdmin anterior al 2.10.0.2 no tiene límite en la recursividad de los arrays proporcionados por los usuarios, lo que permite a atacantes dependientes del contexto provocar una denegación de servicio (caída del servidor web) mediante un array con múltiples dimensiones. NOTA: puede ser discutido que esta vulnerabilidad está provocada por un problema en el PHP (CVE-2006-1549) y la solución adecuada debe de ser en PHP; con lo cual esto no debería ser tratado como una vulnerabilidad en el phpMyAdmin. • http://osvdb.org/36834 http://secunia.com/advisories/26733 http://sourceforge.net/tracker/index.php?func=detail&aid=1671813&group_id=23067&atid=377408 http://www.mandriva.com/security/advisories?name=MDKSA-2007:199 http://www.php-security.org/MOPB/MOPB-02-2007.html http://www.php.net/ChangeLog-4.php http://www.php.net/releases/4_4_8.php http://www.phpmyadmin.net/home_page/security.php?issue=PMASA-2007-3 http://www.securityfocus.com/bid/22841 http://www.us. •

CVSS: 6.8EPSS: 0%CPEs: 11EXPL: 4

Multiple cross-site scripting (XSS) vulnerabilities in PhpMyAdmin before 2.9.1.1 allow remote attackers to inject arbitrary HTML or web script via (1) a comment for a table name, as exploited through (a) db_operations.php, (2) the db parameter to (b) db_create.php, (3) the newname parameter to db_operations.php, the (4) query_history_latest, (5) query_history_latest_db, and (6) querydisplay_tab parameters to (c) querywindow.php, and (7) the pos parameter to (d) sql.php. Múltiples vulnerabilidades de secuencias de comandos en sitios cruzados (XSS) en PhpMyAdmin versiones anteriores a 2.9.1.1 permite a atacantes remotos inyectar scripts web o HTML de su elección mediante (1) un comentario en un nombre de talba, tal y como se explota a través de (a) db_operations.php, (2) el parámetro db en (b) db_create.php, (3) el parámetro newname en db_operations.php, el parámetro(4) query_history_latest, (5) query_history_latest_db, y (6) querydisplay_tab en (c) querywindow.php, y (7) el parámetro pos en(d) sql.php. • https://www.exploit-db.com/exploits/29058 https://www.exploit-db.com/exploits/29059 https://www.exploit-db.com/exploits/29060 https://www.exploit-db.com/exploits/29061 http://marc.info/?l=bugtraq&m=116370414309444&w=2 http://secunia.com/advisories/26733 http://www.phpmyadmin.net/home_page/security.php?issue=PMASA-2006-7 http://www.securityfocus.com/bid/21137 http://www.us.debian.org/security/2007/dsa-1370 http://www.vupen.com/english/advisories/2006/4572 https&# • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 5.0EPSS: 0%CPEs: 9EXPL: 1

PhpMyAdmin before 2.9.1.1 allows remote attackers to obtain the full server path via direct requests to (a) scripts/check_lang.php and (b) themes/darkblue_orange/layout.inc.php; and via the (1) lang[], (2) target[], (3) db[], (4) goto[], (5) table[], and (6) tbl_group[] array arguments to (c) index.php, and the (7) back[] argument to (d) sql.php; and an invalid (8) sort_by parameter to (e) server_databases.php and (9) db parameter to (f) db_printview.php. PhpMyAdmin en versiones anteriores a 2.9.1.1 permite a atacantes remotos obtener la ruta completa del servidor a través de peticiones directas a (a) scripts/check_lang.php y (b) themes/darkblue_orange/layout.inc.php; y a través de los argumentos de array (1) lang[], (2) target[], (3) db[], (4) goto[], (5) table[] y (6) tbl_group[] en (c) index.php y el argumento (7) back[] en(d) sql.php; y un parámetro no válido (8) sort_by en (e) server_databases.php y (9) el parámetro db en (f) db_printview.php. • https://www.exploit-db.com/exploits/29062 http://marc.info/?l=bugtraq&m=116370414309444&w=2 http://www.phpmyadmin.net/home_page/security.php?issue=PMASA-2006-8 http://www.securityfocus.com/bid/21137 • CWE-20: Improper Input Validation •

CVSS: 7.5EPSS: 1%CPEs: 9EXPL: 0

phpMyAdmin before 2.9.1.1 allows remote attackers to bypass Allow/Deny access rules that use IP addresses via false headers. phpMyAdmin versiones anteriores a 2.9.1.1 permite a atacantes remotos evitar reglas de acceso Permitir/Denegar que usan direcciones IP mediante cabeceras falsas. • http://secunia.com/advisories/26733 http://www.phpmyadmin.net/home_page/security.php?issue=PMASA-2006-9 http://www.us.debian.org/security/2007/dsa-1370 http://www.vupen.com/english/advisories/2006/4572 •

CVSS: 10.0EPSS: 0%CPEs: 1EXPL: 0

Multiple unspecified vulnerabilities in phpMyAdmin before 2.9.2-rc1 have unknown impact and attack vectors. Múltiples vulnerabilidades no especificadas en phpMyAdmin versiones anteriores a 2.9.2-rc1 tienen un impacto desconocido y vectores de ataque. • http://osvdb.org/32666 http://secunia.com/advisories/23702 http://www.mandriva.com/security/advisories?name=MDKSA-2007:199 http://www.phpmyadmin.net/home_page/downloads.php?relnotes=0 http://www.securityfocus.com/bid/21987 http://www.vupen.com/english/advisories/2007/0125 •