8 results (0.001 seconds)

CVSS: 7.5EPSS: 0%CPEs: 2EXPL: 0

24 Jun 2024 — Adminer and AdminerEvo are vulnerable to SSRF via database connection fields. This could allow an unauthenticated remote attacker to enumerate or access systems the attacker would not otherwise have access to. Adminer is no longer supported, but this issue was fixed in AdminerEvo version 4.8.4. Adminer and AdminerEvo are vulnerable to SSRF via database connection fields. This could allow an unauthenticated remote attacker to enumerate or access systems the attacker would not otherwise have access to. • https://github.com/adminerevo/adminerevo/pull/102/commits/18f3167bbcbec3bc746f62db72e016aa99144efc • CWE-918: Server-Side Request Forgery (SSRF) •

CVSS: 7.5EPSS: 0%CPEs: 2EXPL: 0

24 Jun 2024 — Adminer and AdminerEvo allow an unauthenticated remote attacker to cause a denial of service by connecting to an attacker-controlled service that responds with HTTP redirects. The denial of service is subject to PHP configuration limits. Adminer is no longer supported, but this issue was fixed in AdminerEvo version 4.8.4. Adminer and AdminerEvo allow an unauthenticated remote attacker to cause a denial of service by connecting to an attacker-controlled service that responds with HTTP redirects. The denial o... • https://github.com/adminerevo/adminerevo/pull/102/commits/23e7cdc0a32b3739e13d19ae504be0fe215142b6 • CWE-400: Uncontrolled Resource Consumption •

CVSS: 7.5EPSS: 84%CPEs: 2EXPL: 3

05 Apr 2022 — Improper Access Control in Adminer versions 1.12.0 to 4.6.2 (fixed in version 4.6.3) allows an attacker to achieve Arbitrary File Read on the remote server by requesting the Adminer to connect to a remote MySQL database. Un control de acceso inapropiado en las versiones 1.12.0 a 4.6.2 de Adminer (corregido en la versión 4.6.3) permite a un atacante lograr una lectura arbitraria de archivos en el servidor remoto solicitando a Adminer que sea conectado a una base de datos MySQL remota • https://github.com/p0dalirius/CVE-2021-43008-AdminerRead •

CVSS: 7.5EPSS: 71%CPEs: 1EXPL: 1

19 May 2021 — Adminer is open-source database management software. A cross-site scripting vulnerability in Adminer versions 4.6.1 to 4.8.0 affects users of MySQL, MariaDB, PgSQL and SQLite. XSS is in most cases prevented by strict CSP in all modern browsers. The only exception is when Adminer is using a `pdo_` extension to communicate with the database (it is used if the native extensions are not enabled). In browsers without CSP, Adminer versions 4.6.1 to 4.8.0 are affected. • https://github.com/vrana/adminer/commit/4043092ec2c0de2258d60a99d0c5958637d051a7 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 7.2EPSS: 88%CPEs: 2EXPL: 3

11 Feb 2021 — Adminer is an open-source database management in a single PHP file. In adminer from version 4.0.0 and before 4.7.9 there is a server-side request forgery vulnerability. Users of Adminer versions bundling all drivers (e.g. `adminer.php`) are affected. This is fixed in version 4.7.9. • https://github.com/llhala/CVE-2021-21311 • CWE-918: Server-Side Request Forgery (SSRF) •

CVSS: 6.1EPSS: 13%CPEs: 1EXPL: 1

09 Feb 2021 — Adminer through 4.7.8 allows XSS via the history parameter to the default URI. Adminer versiones hasta 4.7.8 permite un ataque de tipo XSS por medio del parámetro history en el URI predeterminado • https://sourceforge.net/p/adminer/bugs-and-features/775 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 9.8EPSS: 14%CPEs: 1EXPL: 1

05 Mar 2018 — Adminer through 4.3.1 has SSRF via the server parameter. Adminer hasta la versión 4.3.1 tiene SSRF mediante el parámetro server. • http://hyp3rlinx.altervista.org/advisories/ADMINER-UNAUTHENTICATED-SERVER-SIDE-REQUEST-FORGERY.txt • CWE-918: Server-Side Request Forgery (SSRF) •

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 1

03 Mar 2017 — A vulnerability has been found in Adminer Login 1.4.4 and classified as problematic. This vulnerability affects unknown code. The manipulation leads to improper access controls. It is possible to launch the attack on the local host. The exploit has been disclosed to the public and may be used. • http://seclists.org/fulldisclosure/2017/Feb/96 • CWE-284: Improper Access Control CWE-863: Incorrect Authorization •