Search for packages
| purl | pkg:apk/alpine/phpmyadmin@4.8.4-r0?arch=aarch64&distroversion=v3.20&reponame=community |
| Vulnerability | Summary | Fixed by |
|---|---|---|
| This package is not known to be affected by vulnerabilities. | ||
| Vulnerability | Summary | Aliases |
|---|---|---|
| VCID-986a-3m4g-83ge | Cross-Site Request Forgery (CSRF) By deceiving a user into clicking on a crafted URL, it is possible to perform harmful SQL operations such as renaming databases, creating new `tables/routines`, deleting designer pages, `adding/deleting` users, updating user passwords, killing SQL processes. |
CVE-2018-19969
GHSA-xwf2-53mc-r8hx |
| VCID-ebk2-vjau-57h9 | Information Exposure An attacker can exploit phpMyAdm to leak the contents of a local file because of an error in the transformation feature. The attacker must have access to the phpMyAdmin Configuration Storage tables, although these can easily be created in any database to which the attacker has access. An attacker must have valid credentials to log in to phpMyAdmin; this vulnerability does not allow an attacker to circumvent the login system. |
CVE-2018-19968
GHSA-xc97-r49q-cxgc |
| VCID-qcra-cu62-43he | Cross-site Scripting In phpMyAdm, an XSS vulnerability was found in the navigation tree, where an attacker can deliver a payload to a user through a crafted `database/table` name. |
CVE-2018-19970
GHSA-8987-93fh-rcwq |
| Date | Actor | Action | Vulnerability | Source | VulnerableCode Version |
|---|---|---|---|---|---|
| 2026-04-06T04:48:11.160438+00:00 | Alpine Linux Importer | Fixing | VCID-986a-3m4g-83ge | https://secdb.alpinelinux.org/v3.20/community.json | 38.1.0 |
| 2026-04-01T19:02:16.318574+00:00 | Alpine Linux Importer | Fixing | VCID-ebk2-vjau-57h9 | https://secdb.alpinelinux.org/v3.20/community.json | 38.0.0 |
| 2026-04-01T18:52:58.904208+00:00 | Alpine Linux Importer | Fixing | VCID-qcra-cu62-43he | https://secdb.alpinelinux.org/v3.20/community.json | 38.0.0 |