9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:C/I:C/A:C
0.051 Low
EPSS
Percentile
92.9%
The phpmyadmin development team reports:
Weakness with cookie encryption
Multiple XSS vulnerabilities
Multiple XSS vulnerabilities
PHP code injection
Full path disclosure
SQL injection attack
Local file exposure
Local file exposure through symlinks with
UploadDir
Path traversal with SaveDir and UploadDir
Multiple XSS vulnerabilities
SQL injection attack
SQL injection attack
Denial of service (DOS) attack in transformation
feature
SQL injection attack as control user
Unvalidated data passed to unserialize()
DOS attack with forced persistent connections
Denial of service (DOS) attack by for loops
IPv6 and proxy server IP-based authentication rule
circumvention
Detect if user is logged in
Bypass URL redirect protection
Referrer leak in url.php
Reflected File Download attack
ArbitraryServerRegexp bypass
Denial of service (DOS) attack by changing password to a
very long string
Remote code execution vulnerability when run as CGI
Summary
Denial of service (DOS) attack with dbase extension
Remote code execution vulnerability when PHP is running
with dbase extension
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
FreeBSD | any | noarch | phpmyadmin | = 4.6.0 | UNKNOWN |
FreeBSD | any | noarch | phpmyadmin | < 4.6.4 | UNKNOWN |
www.phpmyadmin.net/security/PMASA-2016-29/
www.phpmyadmin.net/security/PMASA-2016-30/
www.phpmyadmin.net/security/PMASA-2016-31/
www.phpmyadmin.net/security/PMASA-2016-32/
www.phpmyadmin.net/security/PMASA-2016-33/
www.phpmyadmin.net/security/PMASA-2016-34/
www.phpmyadmin.net/security/PMASA-2016-35/
www.phpmyadmin.net/security/PMASA-2016-36/
www.phpmyadmin.net/security/PMASA-2016-37/
www.phpmyadmin.net/security/PMASA-2016-38/
www.phpmyadmin.net/security/PMASA-2016-39/
www.phpmyadmin.net/security/PMASA-2016-40/
www.phpmyadmin.net/security/PMASA-2016-41/
www.phpmyadmin.net/security/PMASA-2016-42/
www.phpmyadmin.net/security/PMASA-2016-43/
www.phpmyadmin.net/security/PMASA-2016-45/
www.phpmyadmin.net/security/PMASA-2016-46/
www.phpmyadmin.net/security/PMASA-2016-47/
www.phpmyadmin.net/security/PMASA-2016-48/
www.phpmyadmin.net/security/PMASA-2016-49/
www.phpmyadmin.net/security/PMASA-2016-50/
www.phpmyadmin.net/security/PMASA-2016-51/
www.phpmyadmin.net/security/PMASA-2016-52/
www.phpmyadmin.net/security/PMASA-2016-53/
www.phpmyadmin.net/security/PMASA-2016-54/
www.phpmyadmin.net/security/PMASA-2016-55/
www.phpmyadmin.net/security/PMASA-2016-56/
9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:C/I:C/A:C
0.051 Low
EPSS
Percentile
92.9%