Search for packages
| purl | pkg:composer/phpmyadmin/phpmyadmin@4.9.1 |
| Vulnerability | Summary | Fixed by |
|---|---|---|
|
VCID-2jjv-4en4-e3gx
Aliases: CVE-2020-22278 |
phpMyAdmin through 5.0.2 allows CSV injection via Export Section. NOTE: the vendor disputes this because "the CSV file is accurately generated based on the database contents. |
Affected by 3 other vulnerabilities. |
|
VCID-2y3v-jnph-hfh4
Aliases: CVE-2020-26935 GHSA-7ff4-cv53-4cjq |
Multiple vulnerabilities have been found in phpMyAdmin, allowing remote attackers to conduct XSS. |
Affected by 4 other vulnerabilities. Affected by 3 other vulnerabilities. |
|
VCID-5657-kcyh-7bc2
Aliases: CVE-2020-5504 GHSA-fgj8-93xx-f6g6 |
phpMyAdmin SQL injection in user accounts page In phpMyAdmin 4 before 4.9.4 and 5 before 5.0.1, SQL injection exists in the user accounts page. A malicious user could inject custom SQL in place of their own username when creating queries to this page. An attacker must have a valid MySQL account to access the server. |
Affected by 9 other vulnerabilities. Affected by 10 other vulnerabilities. |
|
VCID-g6ud-92qe-hqcx
Aliases: CVE-2019-19617 GHSA-pgph-mc4p-f8c3 |
phpMyAdmin unsanitized Git information phpMyAdmin before 4.9.2 does not escape certain Git information, related to `libraries/classes/Display/GitRevision.php and libraries/classes/Footer.php`. |
Affected by 10 other vulnerabilities. |
|
VCID-gu4y-aeqx-mqak
Aliases: CVE-2019-18622 GHSA-jgjc-332c-8cmc |
SQL injection in phpMyAdmin An issue was discovered in phpMyAdmin before 4.9.2. A crafted database/table name can be used to trigger a SQL injection attack through the designer feature. |
Affected by 10 other vulnerabilities. Affected by 11 other vulnerabilities. |
|
VCID-mk34-h4nz-b3ey
Aliases: CVE-2020-26934 GHSA-6349-53vr-7hcr |
Multiple vulnerabilities have been found in phpMyAdmin, allowing remote attackers to conduct XSS. |
Affected by 4 other vulnerabilities. Affected by 3 other vulnerabilities. |
|
VCID-na3j-h3qr-k7dc
Aliases: CVE-2022-23807 GHSA-8wf2-3ggj-78q9 |
Improper Authentication An issue was discovered in phpMyAdm. A valid user who is already authenticated to phpMyAdmin can manipulate their account to bypass two-factor authentication for future login instances. |
Affected by 2 other vulnerabilities. Affected by 11 other vulnerabilities. Affected by 2 other vulnerabilities. |
|
VCID-ngtc-xtjn-xbhp
Aliases: CVE-2020-10802 GHSA-f4cr-3xmc-2wpm |
phpMyAdmin SQL injection vulnerability In phpMyAdmin 4.x before 4.9.5 and 5.x before 5.0.2, a SQL injection vulnerability has been discovered where certain parameters are not properly escaped when generating certain queries for search actions in libraries/classes/Controllers/Table/TableSearchController.php. An attacker can generate a crafted database or table name. The attack can be performed if a user attempts certain search operations on the malicious database or table. |
Affected by 6 other vulnerabilities. Affected by 7 other vulnerabilities. |
|
VCID-rqy8-n6fr-hqey
Aliases: CVE-2022-0813 GHSA-vx8q-j7h9-vf6q |
Exposure of Sensitive Information to an Unauthorized Actor PhpMyAdmin 5.1.1 and before allows an attacker to retrieve potentially sensitive information by creating invalid requests. This affects the lang parameter, the pma_parameter, and the cookie section. |
Affected by 2 other vulnerabilities. Affected by 2 other vulnerabilities. |
|
VCID-tks3-6uv4-kygf
Aliases: CVE-2020-10804 GHSA-h65r-8fp8-w7cx |
phpMyAdmin SQL Injection In phpMyAdmin 4.x before 4.9.5 and 5.x before 5.0.2, a SQL injection vulnerability was found in retrieval of the current username (in libraries/classes/Server/Privileges.php and libraries/classes/UserPassword.php). A malicious user with access to the server could create a crafted username, and then trick the victim into performing specific actions with that user account (such as editing its privileges). |
Affected by 6 other vulnerabilities. Affected by 7 other vulnerabilities. |
|
VCID-ym9b-4su6-6fbr
Aliases: CVE-2023-25727 GHSA-6hr3-44gx-g6wh |
Cross-site Scripting vulnerability in drag-and-drop upload of phpMyAdmin In phpMyAdmin before 4.9.11 and 5.x before 5.2.1, an authenticated user can trigger Cross-site Scripting (XSS) by uploading a crafted .sql file through the drag-and-drop interface. By disabling the configuration directive `$cfg['enable_drag_drop_import']`, users will be unable to use the drag and drop upload which would protect against the vulnerability. |
Affected by 0 other vulnerabilities. Affected by 1 other vulnerability. |
|
VCID-znfm-ak2t-mqdd
Aliases: CVE-2020-10803 GHSA-fcww-8wvc-38q9 |
phpMyAdmin SQL injection vulnerability In phpMyAdmin 4.x before 4.9.5 and 5.x before 5.0.2, a SQL injection vulnerability was discovered where malicious code could be used to trigger an XSS attack through retrieving and displaying results (in tbl_get_field.php and libraries/classes/Display/Results.php). The attacker must be able to insert crafted data into certain database tables, which when retrieved (for instance, through the Browse tab) can trigger the XSS attack. |
Affected by 6 other vulnerabilities. Affected by 7 other vulnerabilities. |
| Vulnerability | Summary | Aliases |
|---|---|---|
| VCID-zyzp-aqd8-e3a9 | phpMyAdmin Cross-Site Request Forgery (CSRF) A CSRF issue in phpMyAdmin 4.9.0.1 allows deletion of any server in the Setup page. |
CVE-2019-12922
GHSA-4c9q-64gq-xhx4 |