phpPgAdmin project phpPgAdmin 5.0.1

CPE Details

phpPgAdmin project phpPgAdmin 5.0.1
5.0.1
2014-05-14
16h01 +00:00
2014-05-14
21h57 +00:00
Alerte pour un CPE
Restez informé de toutes modifications pour un CPE spécifique.
Gestion des notifications

CPE Name: cpe:2.3:a:phppgadmin_project:phppgadmin:5.0.1:*:*:*:*:*:*:*

Informations

Vendor

phppgadmin_project

Product

phppgadmin

Version

5.0.1

Related CVE

Open and find in CVE List

CVE ID Publié Description Score Gravité
CVE-2023-40619 2023-09-19 22h00 +00:00 phpPgAdmin 7.14.4 and earlier is vulnerable to deserialization of untrusted data which may lead to remote code execution because user-controlled data is directly passed to the PHP 'unserialize()' function in multiple places. An example is the functionality to manage tables in 'tables.php' where the 'ma[]' POST parameter is deserialized.
9.8
Critique
CVE-2019-10784 2020-02-04 17h58 +00:00 phppgadmin through 7.12.1 allows sensitive actions to be performed without validating that the request originated from the application. One such area, "database.php" does not verify the source of an HTTP request. This can be leveraged by a remote attacker to trick a logged-in administrator to visit a malicious page with a CSRF exploit and execute arbitrary system commands on the server.
9.6
Critique
CVE-2012-1600 2014-05-13 22h00 +00:00 Multiple cross-site scripting (XSS) vulnerabilities in functions.php in phpPgAdmin before 5.0.4 allow remote attackers to inject arbitrary web script or HTML via the (1) name or (2) type of a function.
4.3