First published: Thu Mar 26 2009(Updated: )
Setup script used to generate configuration can be fooled using a crafted POST request to include arbitrary PHP code in generated configuration file.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
phpMyAdmin phpMyAdmin | =2.11.4 | |
phpMyAdmin phpMyAdmin | =2.11.1.2 | |
phpMyAdmin phpMyAdmin | =2.11.5.1 | |
phpMyAdmin phpMyAdmin | =2.11.1 | |
phpMyAdmin phpMyAdmin | =2.11.5.0 | |
phpMyAdmin phpMyAdmin | =3.1.2 | |
phpMyAdmin phpMyAdmin | =2.11.9.0 | |
phpMyAdmin phpMyAdmin | =2.11.9.1 | |
phpMyAdmin phpMyAdmin | =2.11.0-beta1 | |
phpMyAdmin phpMyAdmin | =2.11.2 | |
phpMyAdmin phpMyAdmin | =2.11.7 | |
phpMyAdmin phpMyAdmin | =3.1.0 | |
phpMyAdmin phpMyAdmin | =2.11.5 | |
phpMyAdmin phpMyAdmin | =2.11.5.2 | |
phpMyAdmin phpMyAdmin | =2.11.2.2 | |
phpMyAdmin phpMyAdmin | =2.11.1-rc1 | |
phpMyAdmin phpMyAdmin | =2.11.5-rc1 | |
phpMyAdmin phpMyAdmin | =2.11.8 | |
phpMyAdmin phpMyAdmin | =2.11.3 | |
phpMyAdmin phpMyAdmin | =2.11.2.1 | |
phpMyAdmin phpMyAdmin | =3.1.1-rc1 | |
phpMyAdmin phpMyAdmin | =2.11.3-rc1 | |
phpMyAdmin phpMyAdmin | =2.11.0-rc1 | |
phpMyAdmin phpMyAdmin | =3.1.1 | |
phpMyAdmin phpMyAdmin | =2.11.6.0 | |
phpMyAdmin phpMyAdmin | =2.11.7.0 | |
phpMyAdmin phpMyAdmin | =3.1.3-rc1 | |
phpMyAdmin phpMyAdmin | =2.11.2.0 | |
phpMyAdmin phpMyAdmin | =2.11.9.2 | |
phpMyAdmin phpMyAdmin | =2.11.9.3 | |
phpMyAdmin phpMyAdmin | =2.11.4-rc1 | |
phpMyAdmin phpMyAdmin | =2.11.1.1 | |
phpMyAdmin phpMyAdmin | =2.11.6 | |
phpMyAdmin phpMyAdmin | =2.11.9 | |
phpMyAdmin phpMyAdmin | =2.11.9.4 | |
phpMyAdmin phpMyAdmin | =2.11.3.0 | |
phpMyAdmin phpMyAdmin | =3.1.2-rc1 | |
phpMyAdmin phpMyAdmin | <=3.1.3 | |
phpMyAdmin phpMyAdmin | =2.11.6-rc1 | |
phpMyAdmin phpMyAdmin | =2.11.1.0 | |
phpMyAdmin phpMyAdmin | =2.11.0 | |
phpMyAdmin phpMyAdmin | ||
phpMyAdmin phpMyAdmin | >=2.11.0<2.11.9.5 | |
phpMyAdmin phpMyAdmin | >=3.0.0<3.1.3.1 | |
Debian Debian Linux | =4.0 | |
Debian Debian Linux | =5.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.