6 results (0.002 seconds)

CVSS: 7.5EPSS: 0%CPEs: 2EXPL: 3

Improper Access Control in Adminer versions 1.12.0 to 4.6.2 (fixed in version 4.6.3) allows an attacker to achieve Arbitrary File Read on the remote server by requesting the Adminer to connect to a remote MySQL database. Un control de acceso inapropiado en las versiones 1.12.0 a 4.6.2 de Adminer (corregido en la versión 4.6.3) permite a un atacante lograr una lectura arbitraria de archivos en el servidor remoto solicitando a Adminer que sea conectado a una base de datos MySQL remota • https://github.com/p0dalirius/CVE-2021-43008-AdminerRead https://github.com/vrana/adminer/releases/tag/v4.6.3 https://lists.debian.org/debian-lts-announce/2022/05/msg00012.html https://podalirius.net/en/cves/2021-43008 https://sansec.io/research/adminer-4.6.2-file-disclosure-vulnerability https://www.adminer.org •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 1

Adminer is open-source database management software. A cross-site scripting vulnerability in Adminer versions 4.6.1 to 4.8.0 affects users of MySQL, MariaDB, PgSQL and SQLite. XSS is in most cases prevented by strict CSP in all modern browsers. The only exception is when Adminer is using a `pdo_` extension to communicate with the database (it is used if the native extensions are not enabled). In browsers without CSP, Adminer versions 4.6.1 to 4.8.0 are affected. • https://github.com/vrana/adminer/commit/4043092ec2c0de2258d60a99d0c5958637d051a7 https://github.com/vrana/adminer/security/advisories/GHSA-2v82-5746-vwqc https://sourceforge.net/p/adminer/bugs-and-features/797 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 7.2EPSS: 2%CPEs: 2EXPL: 3

Adminer is an open-source database management in a single PHP file. In adminer from version 4.0.0 and before 4.7.9 there is a server-side request forgery vulnerability. Users of Adminer versions bundling all drivers (e.g. `adminer.php`) are affected. This is fixed in version 4.7.9. • https://github.com/llhala/CVE-2021-21311 https://github.com/omoknooni/CVE-2021-21311 https://github.com/vrana/adminer/commit/ccd2374b0b12bd547417bf0dacdf153826c83351 https://github.com/vrana/adminer/files/5957311/Adminer.SSRF.pdf https://github.com/vrana/adminer/security/advisories/GHSA-x5r2-hj5c-8jx6 https://lists.debian.org/debian-lts-announce/2021/03/msg00002.html https://packagist.org/packages/vrana/adminer • CWE-918: Server-Side Request Forgery (SSRF) •

CVSS: 6.1EPSS: 0%CPEs: 1EXPL: 1

Adminer through 4.7.8 allows XSS via the history parameter to the default URI. Adminer versiones hasta 4.7.8 permite un ataque de tipo XSS por medio del parámetro history en el URI predeterminado • https://sourceforge.net/p/adminer/bugs-and-features/775 https://sourceforge.net/p/adminer/news • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 10.0EPSS: 0%CPEs: 1EXPL: 0

The official adminer docker images before 4.7.0-fastcgi contain a blank password for a root user. System using the adminer docker container deployed by affected versions of the docker image may allow a remote attacker to achieve root access with a blank password. Las imágenes de docker de official adminer versiones anteriores a 4.7.0-fastcgi, contienen una contraseña en blanco para un usuario root. El sistema que usa el contenedor de docker adminer implementado por unas versiones afectadas de la imagen de docker puede permitir a un atacante remoto conseguir acceso root con una contraseña en blanco • https://github.com/koharin/koharin2/blob/main/CVE-2020-35186 • CWE-306: Missing Authentication for Critical Function •