The pgAdmin server's HTTP API in versions prior to 6.17 allows unauthenticated users to execute arbitrary executables
Reporter | Title | Published | Views | Family All 13 |
---|---|---|---|---|
![]() | CVE-2022-4223 | 13 Dec 202200:00 | β | cvelist |
![]() | Fedora: Security Advisory for pgadmin4 (FEDORA-2022-2d5a6f48e1) | 18 Dec 202200:00 | β | openvas |
![]() | pgadmin4 vulnerable to Code Injection | 13 Dec 202218:30 | β | github |
![]() | CVE-2022-4223 | 13 Dec 202216:15 | β | osv |
![]() | pgadmin4 vulnerable to Code Injection | 13 Dec 202218:30 | β | osv |
![]() | Path traversal | 13 Dec 202216:15 | β | prion |
![]() | pgAdmin 4 Remote Code Execution Vulnerability | 8 Dec 202200:00 | β | cnvd |
![]() | [SECURITY] Fedora 37 Update: pgadmin4-6.17-2.fc37 | 18 Dec 202201:41 | β | fedora |
![]() | CVE-2022-4223 | 13 Dec 202216:15 | β | nvd |
![]() | Remote Code Execution (RCE) | 14 Dec 202202:27 | β | veracode |
[
{
"vendor": "n/a",
"product": "pgadmin4",
"versions": [
{
"version": "pgadmin4 6.17",
"status": "affected"
}
]
}
]
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. ContactΒ us for a demo andΒ discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo