Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2019-6799
Vulnerability from cvelistv5
Published
2019-01-26 17:00
Modified
2024-08-04 20:31
Severity ?
EPSS score ?
Summary
An issue was discovered in phpMyAdmin before 4.8.5. When the AllowArbitraryServer configuration setting is set to true, with the use of a rogue MySQL server, an attacker can read any file on the server that the web server's user can access. This is related to the mysql.allow_local_infile PHP configuration, and the inadvertent ignoring of "options(MYSQLI_OPT_LOCAL_INFILE" calls.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://www.securityfocus.com/bid/106736 | Third Party Advisory, VDB Entry | |
cve@mitre.org | https://lists.debian.org/debian-lts-announce/2019/02/msg00039.html | Mailing List, Third Party Advisory | |
cve@mitre.org | https://www.phpmyadmin.net/security/PMASA-2019-1/ | Mitigation, Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/106736 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://lists.debian.org/debian-lts-announce/2019/02/msg00039.html | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.phpmyadmin.net/security/PMASA-2019-1/ | Mitigation, Patch, Vendor Advisory |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T20:31:04.093Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.phpmyadmin.net/security/PMASA-2019-1/" }, { "name": "[debian-lts-announce] 20190227 [SECURITY] [DLA 1692-1] phpmyadmin security update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2019/02/msg00039.html" }, { "name": "106736", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/106736" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2019-01-26T00:00:00", "descriptions": [ { "lang": "en", "value": "An issue was discovered in phpMyAdmin before 4.8.5. When the AllowArbitraryServer configuration setting is set to true, with the use of a rogue MySQL server, an attacker can read any file on the server that the web server\u0027s user can access. This is related to the mysql.allow_local_infile PHP configuration, and the inadvertent ignoring of \"options(MYSQLI_OPT_LOCAL_INFILE\" calls." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-02-28T10:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.phpmyadmin.net/security/PMASA-2019-1/" }, { "name": "[debian-lts-announce] 20190227 [SECURITY] [DLA 1692-1] phpmyadmin security update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2019/02/msg00039.html" }, { "name": "106736", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/106736" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2019-6799", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An issue was discovered in phpMyAdmin before 4.8.5. When the AllowArbitraryServer configuration setting is set to true, with the use of a rogue MySQL server, an attacker can read any file on the server that the web server\u0027s user can access. This is related to the mysql.allow_local_infile PHP configuration, and the inadvertent ignoring of \"options(MYSQLI_OPT_LOCAL_INFILE\" calls." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.phpmyadmin.net/security/PMASA-2019-1/", "refsource": "CONFIRM", "url": "https://www.phpmyadmin.net/security/PMASA-2019-1/" }, { "name": "[debian-lts-announce] 20190227 [SECURITY] [DLA 1692-1] phpmyadmin security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2019/02/msg00039.html" }, { "name": "106736", "refsource": "BID", "url": "http://www.securityfocus.com/bid/106736" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2019-6799", "datePublished": "2019-01-26T17:00:00", "dateReserved": "2019-01-24T00:00:00", "dateUpdated": "2024-08-04T20:31:04.093Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2019-6799\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2019-01-26T17:29:00.450\",\"lastModified\":\"2024-11-21T04:47:10.920\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"An issue was discovered in phpMyAdmin before 4.8.5. When the AllowArbitraryServer configuration setting is set to true, with the use of a rogue MySQL server, an attacker can read any file on the server that the web server\u0027s user can access. This is related to the mysql.allow_local_infile PHP configuration, and the inadvertent ignoring of \\\"options(MYSQLI_OPT_LOCAL_INFILE\\\" calls.\"},{\"lang\":\"es\",\"value\":\"Se ha descubierto un problema en phpMyAdmin en versiones anteriores a la 4.8.5. Cuando el ajuste de configuraci\u00f3n \\\"AllowArbitraryServer\\\" se establece en \\\"true\\\" con el uso de un servidor MySQL no autorizado, un atacante puede leer cualquier archivo en el servidor que sea accesible por cualquier usuario del servido web. Esto est\u00e1 relacionado con la configuraci\u00f3n PHP mysql.allow_local_infile y la omisi\u00f3n inadvertida de llamadas \\\"options(MYSQLI_OPT_LOCAL_INFILE\\\".\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N\",\"baseScore\":5.9,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":2.2,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:P/I:N/A:N\",\"baseScore\":4.3,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-noinfo\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:phpmyadmin:phpmyadmin:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.0.0\",\"versionEndIncluding\":\"4.8.4\",\"matchCriteriaId\":\"E29381E7-0E75-4B66-B2BD-30C8C1F2C499\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43\"}]}]}],\"references\":[{\"url\":\"http://www.securityfocus.com/bid/106736\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2019/02/msg00039.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://www.phpmyadmin.net/security/PMASA-2019-1/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mitigation\",\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/106736\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2019/02/msg00039.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://www.phpmyadmin.net/security/PMASA-2019-1/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mitigation\",\"Patch\",\"Vendor Advisory\"]}]}}" } }
fkie_cve-2019-6799
Vulnerability from fkie_nvd
Published
2019-01-26 17:29
Modified
2024-11-21 04:47
Severity ?
Summary
An issue was discovered in phpMyAdmin before 4.8.5. When the AllowArbitraryServer configuration setting is set to true, with the use of a rogue MySQL server, an attacker can read any file on the server that the web server's user can access. This is related to the mysql.allow_local_infile PHP configuration, and the inadvertent ignoring of "options(MYSQLI_OPT_LOCAL_INFILE" calls.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://www.securityfocus.com/bid/106736 | Third Party Advisory, VDB Entry | |
cve@mitre.org | https://lists.debian.org/debian-lts-announce/2019/02/msg00039.html | Mailing List, Third Party Advisory | |
cve@mitre.org | https://www.phpmyadmin.net/security/PMASA-2019-1/ | Mitigation, Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/106736 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://lists.debian.org/debian-lts-announce/2019/02/msg00039.html | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.phpmyadmin.net/security/PMASA-2019-1/ | Mitigation, Patch, Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
phpmyadmin | phpmyadmin | * | |
debian | debian_linux | 8.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:*:*:*:*:*:*:*:*", "matchCriteriaId": "E29381E7-0E75-4B66-B2BD-30C8C1F2C499", "versionEndIncluding": "4.8.4", "versionStartIncluding": "4.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered in phpMyAdmin before 4.8.5. When the AllowArbitraryServer configuration setting is set to true, with the use of a rogue MySQL server, an attacker can read any file on the server that the web server\u0027s user can access. This is related to the mysql.allow_local_infile PHP configuration, and the inadvertent ignoring of \"options(MYSQLI_OPT_LOCAL_INFILE\" calls." }, { "lang": "es", "value": "Se ha descubierto un problema en phpMyAdmin en versiones anteriores a la 4.8.5. Cuando el ajuste de configuraci\u00f3n \"AllowArbitraryServer\" se establece en \"true\" con el uso de un servidor MySQL no autorizado, un atacante puede leer cualquier archivo en el servidor que sea accesible por cualquier usuario del servido web. Esto est\u00e1 relacionado con la configuraci\u00f3n PHP mysql.allow_local_infile y la omisi\u00f3n inadvertida de llamadas \"options(MYSQLI_OPT_LOCAL_INFILE\"." } ], "id": "CVE-2019-6799", "lastModified": "2024-11-21T04:47:10.920", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "exploitabilityScore": 2.2, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-01-26T17:29:00.450", "references": [ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/106736" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2019/02/msg00039.html" }, { "source": "cve@mitre.org", "tags": [ "Mitigation", "Patch", "Vendor Advisory" ], "url": "https://www.phpmyadmin.net/security/PMASA-2019-1/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/106736" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2019/02/msg00039.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mitigation", "Patch", "Vendor Advisory" ], "url": "https://www.phpmyadmin.net/security/PMASA-2019-1/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
ghsa-c8wj-q36q-3wg4
Vulnerability from github
Published
2022-05-13 01:22
Modified
2024-04-24 18:14
Severity ?
Summary
phpMyAdmin Arbitrary file read vulnerability
Details
An issue was discovered in phpMyAdmin before 4.8.5. When the AllowArbitraryServer configuration setting is set to true, with the use of a rogue MySQL server, an attacker can read any file on the server that the web server's user can access. This is related to the mysql.allow_local_infile PHP configuration, and the inadvertent ignoring of "options(MYSQLI_OPT_LOCAL_INFILE" calls.
{ "affected": [ { "package": { "ecosystem": "Packagist", "name": "phpmyadmin/phpmyadmin" }, "ranges": [ { "events": [ { "introduced": "4.8" }, { "fixed": "4.8.5" } ], "type": "ECOSYSTEM" } ] } ], "aliases": [ "CVE-2019-6799" ], "database_specific": { "cwe_ids": [ "CWE-22" ], "github_reviewed": true, "github_reviewed_at": "2024-04-24T18:14:13Z", "nvd_published_at": "2019-01-26T17:29:00Z", "severity": "MODERATE" }, "details": "An issue was discovered in phpMyAdmin before 4.8.5. When the AllowArbitraryServer configuration setting is set to true, with the use of a rogue MySQL server, an attacker can read any file on the server that the web server\u0027s user can access. This is related to the mysql.allow_local_infile PHP configuration, and the inadvertent ignoring of \"options(MYSQLI_OPT_LOCAL_INFILE\" calls.", "id": "GHSA-c8wj-q36q-3wg4", "modified": "2024-04-24T18:14:13Z", "published": "2022-05-13T01:22:46Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-6799" }, { "type": "PACKAGE", "url": "https://github.com/phpmyadmin/composer" }, { "type": "WEB", "url": "https://lists.debian.org/debian-lts-announce/2019/02/msg00039.html" }, { "type": "WEB", "url": "https://www.phpmyadmin.net/security/PMASA-2019-1" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/106736" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "type": "CVSS_V3" } ], "summary": "phpMyAdmin Arbitrary file read vulnerability" }
gsd-2019-6799
Vulnerability from gsd
Modified
2023-12-13 01:23
Details
An issue was discovered in phpMyAdmin before 4.8.5. When the AllowArbitraryServer configuration setting is set to true, with the use of a rogue MySQL server, an attacker can read any file on the server that the web server's user can access. This is related to the mysql.allow_local_infile PHP configuration, and the inadvertent ignoring of "options(MYSQLI_OPT_LOCAL_INFILE" calls.
Aliases
Aliases
{ "GSD": { "alias": "CVE-2019-6799", "description": "An issue was discovered in phpMyAdmin before 4.8.5. When the AllowArbitraryServer configuration setting is set to true, with the use of a rogue MySQL server, an attacker can read any file on the server that the web server\u0027s user can access. This is related to the mysql.allow_local_infile PHP configuration, and the inadvertent ignoring of \"options(MYSQLI_OPT_LOCAL_INFILE\" calls.", "id": "GSD-2019-6799", "references": [ "https://www.suse.com/security/cve/CVE-2019-6799.html", "https://ubuntu.com/security/CVE-2019-6799" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2019-6799" ], "details": "An issue was discovered in phpMyAdmin before 4.8.5. When the AllowArbitraryServer configuration setting is set to true, with the use of a rogue MySQL server, an attacker can read any file on the server that the web server\u0027s user can access. This is related to the mysql.allow_local_infile PHP configuration, and the inadvertent ignoring of \"options(MYSQLI_OPT_LOCAL_INFILE\" calls.", "id": "GSD-2019-6799", "modified": "2023-12-13T01:23:49.443072Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2019-6799", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An issue was discovered in phpMyAdmin before 4.8.5. When the AllowArbitraryServer configuration setting is set to true, with the use of a rogue MySQL server, an attacker can read any file on the server that the web server\u0027s user can access. This is related to the mysql.allow_local_infile PHP configuration, and the inadvertent ignoring of \"options(MYSQLI_OPT_LOCAL_INFILE\" calls." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.phpmyadmin.net/security/PMASA-2019-1/", "refsource": "CONFIRM", "url": "https://www.phpmyadmin.net/security/PMASA-2019-1/" }, { "name": "[debian-lts-announce] 20190227 [SECURITY] [DLA 1692-1] phpmyadmin security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2019/02/msg00039.html" }, { "name": "106736", "refsource": "BID", "url": "http://www.securityfocus.com/bid/106736" } ] } }, "gitlab.com": { "advisories": [ { "affected_range": "\u003e=4.0.0,\u003c=4.8.4", "affected_versions": "All versions starting from 4.0.0 up to 4.8.4", "cvss_v2": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "cvss_v3": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "cwe_ids": [ "CWE-1035", "CWE-937" ], "date": "2019-02-28", "description": "When the `AllowArbitraryServer` configuration setting is set to true, with the use of a rogue MySQL server, an attacker can read any file on the server that the web server\u0027s user can access. This is related to the `mysql.allow_local_infile` PHP configuration, and the inadvertent ignoring of `options(MYSQLI_OPT_LOCAL_INFILE` calls.", "fixed_versions": [ "4.8.5" ], "identifier": "CVE-2019-6799", "identifiers": [ "CVE-2019-6799" ], "not_impacted": "All versions before 4.0.0, all versions after 4.8.4", "package_slug": "packagist/phpmyadmin/phpmyadmin", "pubdate": "2019-01-26", "solution": "Upgrade to version 4.8.5 or above.", "title": "Information Exposure", "urls": [ "https://nvd.nist.gov/vuln/detail/CVE-2019-6799", "http://www.securityfocus.com/bid/106736", "https://www.phpmyadmin.net/security/PMASA-2019-1/" ], "uuid": "b5f43782-adf8-4aac-acf3-17dc020ea846" } ] }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:phpmyadmin:phpmyadmin:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "4.8.4", "versionStartIncluding": "4.0.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2019-6799" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "An issue was discovered in phpMyAdmin before 4.8.5. When the AllowArbitraryServer configuration setting is set to true, with the use of a rogue MySQL server, an attacker can read any file on the server that the web server\u0027s user can access. This is related to the mysql.allow_local_infile PHP configuration, and the inadvertent ignoring of \"options(MYSQLI_OPT_LOCAL_INFILE\" calls." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.phpmyadmin.net/security/PMASA-2019-1/", "refsource": "CONFIRM", "tags": [ "Mitigation", "Patch", "Vendor Advisory" ], "url": "https://www.phpmyadmin.net/security/PMASA-2019-1/" }, { "name": "106736", "refsource": "BID", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/106736" }, { "name": "[debian-lts-announce] 20190227 [SECURITY] [DLA 1692-1] phpmyadmin security update", "refsource": "MLIST", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2019/02/msg00039.html" } ] } }, "impact": { "baseMetricV2": { "acInsufInfo": false, "cvssV2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false }, "baseMetricV3": { "cvssV3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "exploitabilityScore": 2.2, "impactScore": 3.6 } }, "lastModifiedDate": "2020-08-24T17:37Z", "publishedDate": "2019-01-26T17:29Z" } } }
opensuse-su-2019:0194-1
Vulnerability from csaf_opensuse
Published
2019-03-23 10:57
Modified
2019-03-23 10:57
Summary
Security update for phpMyAdmin
Notes
Title of the patch
Security update for phpMyAdmin
Description of the patch
This update for phpMyAdmin to version 4.8.5 fixes the following issues:
Security issues fixed:
- CVE-2019-6799: Fixed an arbitrary file read vulnerability (boo#1123272)
- CVE-2019-6798: Fixed a SQL injection in the designer interface (boo#1123271)
Other changes:
* Fix rxport to SQL format not available
* Fix QR code not shown when adding two-factor authentication to a user account
* Fix issue with adding a new user in MySQL 8.0.11 and newer
* Fix frozen interface relating to Text_Plain_Sql plugin
* Fix missing table level operations tab
Patchnames
openSUSE-2019-194
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for phpMyAdmin", "title": "Title of the patch" }, { "category": "description", "text": "This update for phpMyAdmin to version 4.8.5 fixes the following issues:\n\nSecurity issues fixed:\n\n- CVE-2019-6799: Fixed an arbitrary file read vulnerability (boo#1123272)\n- CVE-2019-6798: Fixed a SQL injection in the designer interface (boo#1123271)\n\nOther changes:\n\n* Fix rxport to SQL format not available\n* Fix QR code not shown when adding two-factor authentication to a user account\n* Fix issue with adding a new user in MySQL 8.0.11 and newer\n* Fix frozen interface relating to Text_Plain_Sql plugin\n* Fix missing table level operations tab\n", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-2019-194", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2019_0194-1.json" }, { "category": "self", "summary": "URL for openSUSE-SU-2019:0194-1", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AUV4H47SLYAJV3ZDW2UOJQWF7VJAKJNU/#AUV4H47SLYAJV3ZDW2UOJQWF7VJAKJNU" }, { "category": "self", "summary": "E-Mail link for openSUSE-SU-2019:0194-1", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AUV4H47SLYAJV3ZDW2UOJQWF7VJAKJNU/#AUV4H47SLYAJV3ZDW2UOJQWF7VJAKJNU" }, { "category": "self", "summary": "SUSE Bug 1123271", "url": "https://bugzilla.suse.com/1123271" }, { "category": "self", "summary": "SUSE Bug 1123272", "url": "https://bugzilla.suse.com/1123272" }, { "category": "self", "summary": "SUSE CVE CVE-2019-6798 page", "url": "https://www.suse.com/security/cve/CVE-2019-6798/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-6799 page", "url": "https://www.suse.com/security/cve/CVE-2019-6799/" } ], "title": "Security update for phpMyAdmin", "tracking": { "current_release_date": "2019-03-23T10:57:13Z", "generator": { "date": "2019-03-23T10:57:13Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2019:0194-1", "initial_release_date": "2019-03-23T10:57:13Z", "revision_history": [ { "date": "2019-03-23T10:57:13Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "phpMyAdmin-4.8.5-bp150.3.9.1.noarch", "product": { "name": "phpMyAdmin-4.8.5-bp150.3.9.1.noarch", "product_id": "phpMyAdmin-4.8.5-bp150.3.9.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_name", "name": "SUSE Package Hub 12", "product": { "name": "SUSE Package Hub 12", "product_id": "SUSE Package Hub 12", "product_identification_helper": { "cpe": "cpe:/o:suse:packagehub:12" } } }, { "category": "product_name", "name": "SUSE Package Hub 15", "product": { "name": "SUSE Package Hub 15", "product_id": "SUSE Package Hub 15" } }, { "category": "product_name", "name": "openSUSE Leap 15.0", "product": { "name": "openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0", "product_identification_helper": { "cpe": "cpe:/o:opensuse:leap:15.0" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "phpMyAdmin-4.8.5-bp150.3.9.1.noarch as component of SUSE Package Hub 12", "product_id": "SUSE Package Hub 12:phpMyAdmin-4.8.5-bp150.3.9.1.noarch" }, "product_reference": "phpMyAdmin-4.8.5-bp150.3.9.1.noarch", "relates_to_product_reference": "SUSE Package Hub 12" }, { "category": "default_component_of", "full_product_name": { "name": "phpMyAdmin-4.8.5-bp150.3.9.1.noarch as component of SUSE Package Hub 15", "product_id": "SUSE Package Hub 15:phpMyAdmin-4.8.5-bp150.3.9.1.noarch" }, "product_reference": "phpMyAdmin-4.8.5-bp150.3.9.1.noarch", "relates_to_product_reference": "SUSE Package Hub 15" }, { "category": "default_component_of", "full_product_name": { "name": "phpMyAdmin-4.8.5-bp150.3.9.1.noarch as component of openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0:phpMyAdmin-4.8.5-bp150.3.9.1.noarch" }, "product_reference": "phpMyAdmin-4.8.5-bp150.3.9.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.0" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-6798", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-6798" } ], "notes": [ { "category": "general", "text": "An issue was discovered in phpMyAdmin before 4.8.5. A vulnerability was reported where a specially crafted username can be used to trigger a SQL injection attack through the designer feature.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Package Hub 12:phpMyAdmin-4.8.5-bp150.3.9.1.noarch", "SUSE Package Hub 15:phpMyAdmin-4.8.5-bp150.3.9.1.noarch", "openSUSE Leap 15.0:phpMyAdmin-4.8.5-bp150.3.9.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2019-6798", "url": "https://www.suse.com/security/cve/CVE-2019-6798" }, { "category": "external", "summary": "SUSE Bug 1123271 for CVE-2019-6798", "url": "https://bugzilla.suse.com/1123271" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Package Hub 12:phpMyAdmin-4.8.5-bp150.3.9.1.noarch", "SUSE Package Hub 15:phpMyAdmin-4.8.5-bp150.3.9.1.noarch", "openSUSE Leap 15.0:phpMyAdmin-4.8.5-bp150.3.9.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Package Hub 12:phpMyAdmin-4.8.5-bp150.3.9.1.noarch", "SUSE Package Hub 15:phpMyAdmin-4.8.5-bp150.3.9.1.noarch", "openSUSE Leap 15.0:phpMyAdmin-4.8.5-bp150.3.9.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2019-03-23T10:57:13Z", "details": "important" } ], "title": "CVE-2019-6798" }, { "cve": "CVE-2019-6799", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-6799" } ], "notes": [ { "category": "general", "text": "An issue was discovered in phpMyAdmin before 4.8.5. When the AllowArbitraryServer configuration setting is set to true, with the use of a rogue MySQL server, an attacker can read any file on the server that the web server\u0027s user can access. This is related to the mysql.allow_local_infile PHP configuration, and the inadvertent ignoring of \"options(MYSQLI_OPT_LOCAL_INFILE\" calls.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Package Hub 12:phpMyAdmin-4.8.5-bp150.3.9.1.noarch", "SUSE Package Hub 15:phpMyAdmin-4.8.5-bp150.3.9.1.noarch", "openSUSE Leap 15.0:phpMyAdmin-4.8.5-bp150.3.9.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2019-6799", "url": "https://www.suse.com/security/cve/CVE-2019-6799" }, { "category": "external", "summary": "SUSE Bug 1123272 for CVE-2019-6799", "url": "https://bugzilla.suse.com/1123272" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Package Hub 12:phpMyAdmin-4.8.5-bp150.3.9.1.noarch", "SUSE Package Hub 15:phpMyAdmin-4.8.5-bp150.3.9.1.noarch", "openSUSE Leap 15.0:phpMyAdmin-4.8.5-bp150.3.9.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Package Hub 12:phpMyAdmin-4.8.5-bp150.3.9.1.noarch", "SUSE Package Hub 15:phpMyAdmin-4.8.5-bp150.3.9.1.noarch", "openSUSE Leap 15.0:phpMyAdmin-4.8.5-bp150.3.9.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2019-03-23T10:57:13Z", "details": "moderate" } ], "title": "CVE-2019-6799" } ] }
opensuse-su-2024:11171-1
Vulnerability from csaf_opensuse
Published
2024-06-15 00:00
Modified
2024-06-15 00:00
Summary
phpMyAdmin-5.1.1-1.2 on GA media
Notes
Title of the patch
phpMyAdmin-5.1.1-1.2 on GA media
Description of the patch
These are all security issues fixed in the phpMyAdmin-5.1.1-1.2 package on the GA media of openSUSE Tumbleweed.
Patchnames
openSUSE-Tumbleweed-2024-11171
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "phpMyAdmin-5.1.1-1.2 on GA media", "title": "Title of the patch" }, { "category": "description", "text": "These are all security issues fixed in the phpMyAdmin-5.1.1-1.2 package on the GA media of openSUSE Tumbleweed.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-Tumbleweed-2024-11171", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_11171-1.json" }, { "category": "self", "summary": "SUSE CVE CVE-2005-2869 page", "url": "https://www.suse.com/security/cve/CVE-2005-2869/" }, { "category": "self", "summary": "SUSE CVE CVE-2006-1804 page", "url": "https://www.suse.com/security/cve/CVE-2006-1804/" }, { "category": "self", "summary": "SUSE CVE CVE-2006-2031 page", "url": "https://www.suse.com/security/cve/CVE-2006-2031/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8980 page", "url": "https://www.suse.com/security/cve/CVE-2015-8980/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-1000013 page", "url": "https://www.suse.com/security/cve/CVE-2017-1000013/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-1000014 page", "url": "https://www.suse.com/security/cve/CVE-2017-1000014/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-1000015 page", "url": "https://www.suse.com/security/cve/CVE-2017-1000015/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-1000016 page", "url": "https://www.suse.com/security/cve/CVE-2017-1000016/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-1000017 page", "url": "https://www.suse.com/security/cve/CVE-2017-1000017/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-1000018 page", "url": "https://www.suse.com/security/cve/CVE-2017-1000018/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-1000499 page", "url": "https://www.suse.com/security/cve/CVE-2017-1000499/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-10188 page", "url": "https://www.suse.com/security/cve/CVE-2018-10188/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-12581 page", "url": "https://www.suse.com/security/cve/CVE-2018-12581/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-12613 page", "url": "https://www.suse.com/security/cve/CVE-2018-12613/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-15605 page", "url": "https://www.suse.com/security/cve/CVE-2018-15605/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-19968 page", "url": "https://www.suse.com/security/cve/CVE-2018-19968/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-19969 page", "url": "https://www.suse.com/security/cve/CVE-2018-19969/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-19970 page", "url": "https://www.suse.com/security/cve/CVE-2018-19970/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-7260 page", "url": "https://www.suse.com/security/cve/CVE-2018-7260/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11768 page", "url": "https://www.suse.com/security/cve/CVE-2019-11768/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-12616 page", "url": "https://www.suse.com/security/cve/CVE-2019-12616/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-12922 page", "url": "https://www.suse.com/security/cve/CVE-2019-12922/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-18622 page", "url": "https://www.suse.com/security/cve/CVE-2019-18622/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-6798 page", "url": "https://www.suse.com/security/cve/CVE-2019-6798/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-6799 page", "url": "https://www.suse.com/security/cve/CVE-2019-6799/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10802 page", "url": "https://www.suse.com/security/cve/CVE-2020-10802/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10803 page", "url": "https://www.suse.com/security/cve/CVE-2020-10803/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10804 page", "url": "https://www.suse.com/security/cve/CVE-2020-10804/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-26934 page", "url": "https://www.suse.com/security/cve/CVE-2020-26934/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-26935 page", "url": "https://www.suse.com/security/cve/CVE-2020-26935/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-5504 page", "url": "https://www.suse.com/security/cve/CVE-2020-5504/" } ], "title": "phpMyAdmin-5.1.1-1.2 on GA media", "tracking": { "current_release_date": "2024-06-15T00:00:00Z", "generator": { "date": "2024-06-15T00:00:00Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2024:11171-1", "initial_release_date": "2024-06-15T00:00:00Z", "revision_history": [ { "date": "2024-06-15T00:00:00Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "phpMyAdmin-5.1.1-1.2.aarch64", "product": { "name": "phpMyAdmin-5.1.1-1.2.aarch64", "product_id": "phpMyAdmin-5.1.1-1.2.aarch64" } }, { "category": "product_version", "name": "phpMyAdmin-apache-5.1.1-1.2.aarch64", "product": { "name": "phpMyAdmin-apache-5.1.1-1.2.aarch64", "product_id": "phpMyAdmin-apache-5.1.1-1.2.aarch64" } }, { "category": "product_version", "name": "phpMyAdmin-lang-5.1.1-1.2.aarch64", "product": { "name": "phpMyAdmin-lang-5.1.1-1.2.aarch64", "product_id": "phpMyAdmin-lang-5.1.1-1.2.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "phpMyAdmin-5.1.1-1.2.ppc64le", "product": { "name": "phpMyAdmin-5.1.1-1.2.ppc64le", "product_id": "phpMyAdmin-5.1.1-1.2.ppc64le" } }, { "category": "product_version", "name": "phpMyAdmin-apache-5.1.1-1.2.ppc64le", "product": { "name": "phpMyAdmin-apache-5.1.1-1.2.ppc64le", "product_id": "phpMyAdmin-apache-5.1.1-1.2.ppc64le" } }, { "category": "product_version", "name": "phpMyAdmin-lang-5.1.1-1.2.ppc64le", "product": { "name": "phpMyAdmin-lang-5.1.1-1.2.ppc64le", "product_id": "phpMyAdmin-lang-5.1.1-1.2.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "phpMyAdmin-5.1.1-1.2.s390x", "product": { "name": "phpMyAdmin-5.1.1-1.2.s390x", "product_id": "phpMyAdmin-5.1.1-1.2.s390x" } }, { "category": "product_version", "name": "phpMyAdmin-apache-5.1.1-1.2.s390x", "product": { "name": "phpMyAdmin-apache-5.1.1-1.2.s390x", "product_id": "phpMyAdmin-apache-5.1.1-1.2.s390x" } }, { "category": "product_version", "name": "phpMyAdmin-lang-5.1.1-1.2.s390x", "product": { "name": "phpMyAdmin-lang-5.1.1-1.2.s390x", "product_id": "phpMyAdmin-lang-5.1.1-1.2.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "phpMyAdmin-5.1.1-1.2.x86_64", "product": { "name": "phpMyAdmin-5.1.1-1.2.x86_64", "product_id": "phpMyAdmin-5.1.1-1.2.x86_64" } }, { "category": "product_version", "name": "phpMyAdmin-apache-5.1.1-1.2.x86_64", "product": { "name": "phpMyAdmin-apache-5.1.1-1.2.x86_64", "product_id": "phpMyAdmin-apache-5.1.1-1.2.x86_64" } }, { "category": "product_version", "name": "phpMyAdmin-lang-5.1.1-1.2.x86_64", "product": { "name": "phpMyAdmin-lang-5.1.1-1.2.x86_64", "product_id": "phpMyAdmin-lang-5.1.1-1.2.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Tumbleweed", "product": { "name": "openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed", "product_identification_helper": { "cpe": "cpe:/o:opensuse:tumbleweed" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "phpMyAdmin-5.1.1-1.2.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.aarch64" }, "product_reference": "phpMyAdmin-5.1.1-1.2.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "phpMyAdmin-5.1.1-1.2.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.ppc64le" }, "product_reference": "phpMyAdmin-5.1.1-1.2.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "phpMyAdmin-5.1.1-1.2.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.s390x" }, "product_reference": "phpMyAdmin-5.1.1-1.2.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "phpMyAdmin-5.1.1-1.2.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.x86_64" }, "product_reference": "phpMyAdmin-5.1.1-1.2.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "phpMyAdmin-apache-5.1.1-1.2.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.aarch64" }, "product_reference": "phpMyAdmin-apache-5.1.1-1.2.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "phpMyAdmin-apache-5.1.1-1.2.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.ppc64le" }, "product_reference": "phpMyAdmin-apache-5.1.1-1.2.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "phpMyAdmin-apache-5.1.1-1.2.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.s390x" }, "product_reference": "phpMyAdmin-apache-5.1.1-1.2.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "phpMyAdmin-apache-5.1.1-1.2.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.x86_64" }, "product_reference": "phpMyAdmin-apache-5.1.1-1.2.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "phpMyAdmin-lang-5.1.1-1.2.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.aarch64" }, "product_reference": "phpMyAdmin-lang-5.1.1-1.2.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "phpMyAdmin-lang-5.1.1-1.2.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.ppc64le" }, "product_reference": "phpMyAdmin-lang-5.1.1-1.2.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "phpMyAdmin-lang-5.1.1-1.2.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.s390x" }, "product_reference": "phpMyAdmin-lang-5.1.1-1.2.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "phpMyAdmin-lang-5.1.1-1.2.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.x86_64" }, "product_reference": "phpMyAdmin-lang-5.1.1-1.2.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" } ] }, "vulnerabilities": [ { "cve": "CVE-2005-2869", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2005-2869" } ], "notes": [ { "category": "general", "text": "Multiple cross-site scripting (XSS) vulnerabilities in phpMyAdmin before 2.6.4 allow remote attackers to inject arbitrary web script or HTML via (1) the Username to libraries/auth/cookie.auth.lib.php or (2) the error parameter to error.php.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2005-2869", "url": "https://www.suse.com/security/cve/CVE-2005-2869" }, { "category": "external", "summary": "SUSE Bug 130226 for CVE-2005-2869", "url": "https://bugzilla.suse.com/130226" }, { "category": "external", "summary": "SUSE Bug 133818 for CVE-2005-2869", "url": "https://bugzilla.suse.com/133818" }, { "category": "external", "summary": "SUSE Bug 134373 for CVE-2005-2869", "url": "https://bugzilla.suse.com/134373" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2005-2869" }, { "cve": "CVE-2006-1804", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2006-1804" } ], "notes": [ { "category": "general", "text": "SQL injection vulnerability in sql.php in phpMyAdmin 2.7.0-pl1 allows remote attackers to execute arbitrary SQL commands via the sql_query parameter.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2006-1804", "url": "https://www.suse.com/security/cve/CVE-2006-1804" }, { "category": "external", "summary": "SUSE Bug 165772 for CVE-2006-1804", "url": "https://bugzilla.suse.com/165772" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2006-1804" }, { "cve": "CVE-2006-2031", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2006-2031" } ], "notes": [ { "category": "general", "text": "Cross-site scripting (XSS) vulnerability in index.php in phpMyAdmin 2.8.0.3, 2.8.0.2, 2.8.1-dev, and 2.9.0-dev allows remote attackers to inject arbitrary web script or HTML via the lang parameter.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2006-2031", "url": "https://www.suse.com/security/cve/CVE-2006-2031" }, { "category": "external", "summary": "SUSE Bug 170529 for CVE-2006-2031", "url": "https://bugzilla.suse.com/170529" }, { "category": "external", "summary": "SUSE Bug 177091 for CVE-2006-2031", "url": "https://bugzilla.suse.com/177091" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2006-2031" }, { "cve": "CVE-2015-8980", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8980" } ], "notes": [ { "category": "general", "text": "The plural form formula in ngettext family of calls in php-gettext before 1.0.12 allows remote attackers to execute arbitrary code.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8980", "url": "https://www.suse.com/security/cve/CVE-2015-8980" }, { "category": "external", "summary": "SUSE Bug 1020489 for CVE-2015-8980", "url": "https://bugzilla.suse.com/1020489" }, { "category": "external", "summary": "SUSE Bug 1021597 for CVE-2015-8980", "url": "https://bugzilla.suse.com/1021597" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2015-8980" }, { "cve": "CVE-2017-1000013", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-1000013" } ], "notes": [ { "category": "general", "text": "phpMyAdmin 4.0, 4.4, and 4.6 are vulnerable to an open redirect weakness", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-1000013", "url": "https://www.suse.com/security/cve/CVE-2017-1000013" }, { "category": "external", "summary": "SUSE Bug 1021597 for CVE-2017-1000013", "url": "https://bugzilla.suse.com/1021597" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-1000013" }, { "cve": "CVE-2017-1000014", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-1000014" } ], "notes": [ { "category": "general", "text": "phpMyAdmin 4.0, 4.4, and 4.6 are vulnerable to a DOS weakness in the table editing functionality", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-1000014", "url": "https://www.suse.com/security/cve/CVE-2017-1000014" }, { "category": "external", "summary": "SUSE Bug 1021597 for CVE-2017-1000014", "url": "https://bugzilla.suse.com/1021597" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-1000014" }, { "cve": "CVE-2017-1000015", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-1000015" } ], "notes": [ { "category": "general", "text": "phpMyAdmin 4.0, 4.4, and 4.6 are vulnerable to a CSS injection attack through crafted cookie parameters", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-1000015", "url": "https://www.suse.com/security/cve/CVE-2017-1000015" }, { "category": "external", "summary": "SUSE Bug 1021597 for CVE-2017-1000015", "url": "https://bugzilla.suse.com/1021597" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-1000015" }, { "cve": "CVE-2017-1000016", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-1000016" } ], "notes": [ { "category": "general", "text": "A weakness was discovered where an attacker can inject arbitrary values in to the browser cookies. This is a re-issue of an incomplete fix from PMASA-2016-18.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-1000016", "url": "https://www.suse.com/security/cve/CVE-2017-1000016" }, { "category": "external", "summary": "SUSE Bug 1021597 for CVE-2017-1000016", "url": "https://bugzilla.suse.com/1021597" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-1000016" }, { "cve": "CVE-2017-1000017", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-1000017" } ], "notes": [ { "category": "general", "text": "phpMyAdmin 4.0, 4.4 and 4.6 are vulnerable to a weakness where a user with appropriate permissions is able to connect to an arbitrary MySQL server", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-1000017", "url": "https://www.suse.com/security/cve/CVE-2017-1000017" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-1000017" }, { "cve": "CVE-2017-1000018", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-1000018" } ], "notes": [ { "category": "general", "text": "phpMyAdmin 4.0, 4.4., and 4.6 are vulnerable to a DOS attack in the replication status by using a specially crafted table name", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-1000018", "url": "https://www.suse.com/security/cve/CVE-2017-1000018" }, { "category": "external", "summary": "SUSE Bug 1021597 for CVE-2017-1000018", "url": "https://bugzilla.suse.com/1021597" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-1000018" }, { "cve": "CVE-2017-1000499", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-1000499" } ], "notes": [ { "category": "general", "text": "phpMyAdmin versions 4.7.x (prior to 4.7.6.1/4.7.7) are vulnerable to a CSRF weakness. By deceiving a user to click on a crafted URL, it is possible to perform harmful database operations such as deleting records, dropping/truncating tables etc.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-1000499", "url": "https://www.suse.com/security/cve/CVE-2017-1000499" }, { "category": "external", "summary": "SUSE Bug 1074066 for CVE-2017-1000499", "url": "https://bugzilla.suse.com/1074066" }, { "category": "external", "summary": "SUSE Bug 1075319 for CVE-2017-1000499", "url": "https://bugzilla.suse.com/1075319" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-1000499" }, { "cve": "CVE-2018-10188", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-10188" } ], "notes": [ { "category": "general", "text": "phpMyAdmin 4.8.0 before 4.8.0-1 has CSRF, allowing an attacker to execute arbitrary SQL statements, related to js/db_operations.js, js/tbl_operations.js, libraries/classes/Operations.php, and sql.php.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-10188", "url": "https://www.suse.com/security/cve/CVE-2018-10188" }, { "category": "external", "summary": "SUSE Bug 1090309 for CVE-2018-10188", "url": "https://bugzilla.suse.com/1090309" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-10188" }, { "cve": "CVE-2018-12581", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-12581" } ], "notes": [ { "category": "general", "text": "An issue was discovered in js/designer/move.js in phpMyAdmin before 4.8.2. A Cross-Site Scripting vulnerability has been found where an attacker can use a crafted database name to trigger an XSS attack when that database is referenced from the Designer feature.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-12581", "url": "https://www.suse.com/security/cve/CVE-2018-12581" }, { "category": "external", "summary": "SUSE Bug 1098752 for CVE-2018-12581", "url": "https://bugzilla.suse.com/1098752" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2018-12581" }, { "cve": "CVE-2018-12613", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-12613" } ], "notes": [ { "category": "general", "text": "An issue was discovered in phpMyAdmin 4.8.x before 4.8.2, in which an attacker can include (view and potentially execute) files on the server. The vulnerability comes from a portion of code where pages are redirected and loaded within phpMyAdmin, and an improper test for whitelisted pages. An attacker must be authenticated, except in the \"$cfg[\u0027AllowArbitraryServer\u0027] = true\" case (where an attacker can specify any host he/she is already in control of, and execute arbitrary code on phpMyAdmin) and the \"$cfg[\u0027ServerDefault\u0027] = 0\" case (which bypasses the login requirement and runs the vulnerable code without any authentication).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-12613", "url": "https://www.suse.com/security/cve/CVE-2018-12613" }, { "category": "external", "summary": "SUSE Bug 1098735 for CVE-2018-12613", "url": "https://bugzilla.suse.com/1098735" }, { "category": "external", "summary": "SUSE Bug 1098744 for CVE-2018-12613", "url": "https://bugzilla.suse.com/1098744" }, { "category": "external", "summary": "SUSE Bug 1098751 for CVE-2018-12613", "url": "https://bugzilla.suse.com/1098751" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-12613" }, { "cve": "CVE-2018-15605", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-15605" } ], "notes": [ { "category": "general", "text": "An issue was discovered in phpMyAdmin before 4.8.3. A Cross-Site Scripting vulnerability has been found where an attacker can use a crafted file to manipulate an authenticated user who loads that file through the import feature.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-15605", "url": "https://www.suse.com/security/cve/CVE-2018-15605" }, { "category": "external", "summary": "SUSE Bug 1105726 for CVE-2018-15605", "url": "https://bugzilla.suse.com/1105726" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2018-15605" }, { "cve": "CVE-2018-19968", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-19968" } ], "notes": [ { "category": "general", "text": "An attacker can exploit phpMyAdmin before 4.8.4 to leak the contents of a local file because of an error in the transformation feature. The attacker must have access to the phpMyAdmin Configuration Storage tables, although these can easily be created in any database to which the attacker has access. An attacker must have valid credentials to log in to phpMyAdmin; this vulnerability does not allow an attacker to circumvent the login system.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-19968", "url": "https://www.suse.com/security/cve/CVE-2018-19968" }, { "category": "external", "summary": "SUSE Bug 1119245 for CVE-2018-19968", "url": "https://bugzilla.suse.com/1119245" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-19968" }, { "cve": "CVE-2018-19969", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-19969" } ], "notes": [ { "category": "general", "text": "phpMyAdmin 4.7.x and 4.8.x versions prior to 4.8.4 are affected by a series of CSRF flaws. By deceiving a user into clicking on a crafted URL, it is possible to perform harmful SQL operations such as renaming databases, creating new tables/routines, deleting designer pages, adding/deleting users, updating user passwords, killing SQL processes, etc.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-19969", "url": "https://www.suse.com/security/cve/CVE-2018-19969" }, { "category": "external", "summary": "SUSE Bug 1119245 for CVE-2018-19969", "url": "https://bugzilla.suse.com/1119245" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-19969" }, { "cve": "CVE-2018-19970", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-19970" } ], "notes": [ { "category": "general", "text": "In phpMyAdmin before 4.8.4, an XSS vulnerability was found in the navigation tree, where an attacker can deliver a payload to a user through a crafted database/table name.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-19970", "url": "https://www.suse.com/security/cve/CVE-2018-19970" }, { "category": "external", "summary": "SUSE Bug 1119245 for CVE-2018-19970", "url": "https://bugzilla.suse.com/1119245" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-19970" }, { "cve": "CVE-2018-7260", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-7260" } ], "notes": [ { "category": "general", "text": "Cross-site scripting (XSS) vulnerability in db_central_columns.php in phpMyAdmin before 4.7.8 allows remote authenticated users to inject arbitrary web script or HTML via a crafted URL.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-7260", "url": "https://www.suse.com/security/cve/CVE-2018-7260" }, { "category": "external", "summary": "SUSE Bug 1082188 for CVE-2018-7260", "url": "https://bugzilla.suse.com/1082188" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2018-7260" }, { "cve": "CVE-2019-11768", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11768" } ], "notes": [ { "category": "general", "text": "An issue was discovered in phpMyAdmin before 4.9.0.1. A vulnerability was reported where a specially crafted database name can be used to trigger an SQL injection attack through the designer feature.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11768", "url": "https://www.suse.com/security/cve/CVE-2019-11768" }, { "category": "external", "summary": "SUSE Bug 1137496 for CVE-2019-11768", "url": "https://bugzilla.suse.com/1137496" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-11768" }, { "cve": "CVE-2019-12616", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-12616" } ], "notes": [ { "category": "general", "text": "An issue was discovered in phpMyAdmin before 4.9.0. A vulnerability was found that allows an attacker to trigger a CSRF attack against a phpMyAdmin user. The attacker can trick the user, for instance through a broken \u003cimg\u003e tag pointing at the victim\u0027s phpMyAdmin database, and the attacker can potentially deliver a payload (such as a specific INSERT or DELETE statement) to the victim.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-12616", "url": "https://www.suse.com/security/cve/CVE-2019-12616" }, { "category": "external", "summary": "SUSE Bug 1137497 for CVE-2019-12616", "url": "https://bugzilla.suse.com/1137497" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-12616" }, { "cve": "CVE-2019-12922", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-12922" } ], "notes": [ { "category": "general", "text": "A CSRF issue in phpMyAdmin 4.9.0.1 allows deletion of any server in the Setup page.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-12922", "url": "https://www.suse.com/security/cve/CVE-2019-12922" }, { "category": "external", "summary": "SUSE Bug 1150914 for CVE-2019-12922", "url": "https://bugzilla.suse.com/1150914" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-12922" }, { "cve": "CVE-2019-18622", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-18622" } ], "notes": [ { "category": "general", "text": "An issue was discovered in phpMyAdmin before 4.9.2. A crafted database/table name can be used to trigger a SQL injection attack through the designer feature.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-18622", "url": "https://www.suse.com/security/cve/CVE-2019-18622" }, { "category": "external", "summary": "SUSE Bug 1157614 for CVE-2019-18622", "url": "https://bugzilla.suse.com/1157614" }, { "category": "external", "summary": "SUSE Bug 1158801 for CVE-2019-18622", "url": "https://bugzilla.suse.com/1158801" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2019-18622" }, { "cve": "CVE-2019-6798", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-6798" } ], "notes": [ { "category": "general", "text": "An issue was discovered in phpMyAdmin before 4.8.5. A vulnerability was reported where a specially crafted username can be used to trigger a SQL injection attack through the designer feature.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-6798", "url": "https://www.suse.com/security/cve/CVE-2019-6798" }, { "category": "external", "summary": "SUSE Bug 1123271 for CVE-2019-6798", "url": "https://bugzilla.suse.com/1123271" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-6798" }, { "cve": "CVE-2019-6799", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-6799" } ], "notes": [ { "category": "general", "text": "An issue was discovered in phpMyAdmin before 4.8.5. When the AllowArbitraryServer configuration setting is set to true, with the use of a rogue MySQL server, an attacker can read any file on the server that the web server\u0027s user can access. This is related to the mysql.allow_local_infile PHP configuration, and the inadvertent ignoring of \"options(MYSQLI_OPT_LOCAL_INFILE\" calls.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-6799", "url": "https://www.suse.com/security/cve/CVE-2019-6799" }, { "category": "external", "summary": "SUSE Bug 1123272 for CVE-2019-6799", "url": "https://bugzilla.suse.com/1123272" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-6799" }, { "cve": "CVE-2020-10802", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10802" } ], "notes": [ { "category": "general", "text": "In phpMyAdmin 4.x before 4.9.5 and 5.x before 5.0.2, a SQL injection vulnerability has been discovered where certain parameters are not properly escaped when generating certain queries for search actions in libraries/classes/Controllers/Table/TableSearchController.php. An attacker can generate a crafted database or table name. The attack can be performed if a user attempts certain search operations on the malicious database or table.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10802", "url": "https://www.suse.com/security/cve/CVE-2020-10802" }, { "category": "external", "summary": "SUSE Bug 1167336 for CVE-2020-10802", "url": "https://bugzilla.suse.com/1167336" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-10802" }, { "cve": "CVE-2020-10803", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10803" } ], "notes": [ { "category": "general", "text": "In phpMyAdmin 4.x before 4.9.5 and 5.x before 5.0.2, a SQL injection vulnerability was discovered where malicious code could be used to trigger an XSS attack through retrieving and displaying results (in tbl_get_field.php and libraries/classes/Display/Results.php). The attacker must be able to insert crafted data into certain database tables, which when retrieved (for instance, through the Browse tab) can trigger the XSS attack.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10803", "url": "https://www.suse.com/security/cve/CVE-2020-10803" }, { "category": "external", "summary": "SUSE Bug 1167337 for CVE-2020-10803", "url": "https://bugzilla.suse.com/1167337" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-10803" }, { "cve": "CVE-2020-10804", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10804" } ], "notes": [ { "category": "general", "text": "In phpMyAdmin 4.x before 4.9.5 and 5.x before 5.0.2, a SQL injection vulnerability was found in retrieval of the current username (in libraries/classes/Server/Privileges.php and libraries/classes/UserPassword.php). A malicious user with access to the server could create a crafted username, and then trick the victim into performing specific actions with that user account (such as editing its privileges).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10804", "url": "https://www.suse.com/security/cve/CVE-2020-10804" }, { "category": "external", "summary": "SUSE Bug 1167335 for CVE-2020-10804", "url": "https://bugzilla.suse.com/1167335" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-10804" }, { "cve": "CVE-2020-26934", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-26934" } ], "notes": [ { "category": "general", "text": "phpMyAdmin before 4.9.6 and 5.x before 5.0.3 allows XSS through the transformation feature via a crafted link.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-26934", "url": "https://www.suse.com/security/cve/CVE-2020-26934" }, { "category": "external", "summary": "SUSE Bug 1177561 for CVE-2020-26934", "url": "https://bugzilla.suse.com/1177561" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-26934" }, { "cve": "CVE-2020-26935", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-26935" } ], "notes": [ { "category": "general", "text": "An issue was discovered in SearchController in phpMyAdmin before 4.9.6 and 5.x before 5.0.3. A SQL injection vulnerability was discovered in how phpMyAdmin processes SQL statements in the search feature. An attacker could use this flaw to inject malicious SQL in to a query.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-26935", "url": "https://www.suse.com/security/cve/CVE-2020-26935" }, { "category": "external", "summary": "SUSE Bug 1177562 for CVE-2020-26935", "url": "https://bugzilla.suse.com/1177562" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2020-26935" }, { "cve": "CVE-2020-5504", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-5504" } ], "notes": [ { "category": "general", "text": "In phpMyAdmin 4 before 4.9.4 and 5 before 5.0.1, SQL injection exists in the user accounts page. A malicious user could inject custom SQL in place of their own username when creating queries to this page. An attacker must have a valid MySQL account to access the server.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-5504", "url": "https://www.suse.com/security/cve/CVE-2020-5504" }, { "category": "external", "summary": "SUSE Bug 1160456 for CVE-2020-5504", "url": "https://bugzilla.suse.com/1160456" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2.x86_64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.aarch64", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.ppc64le", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.s390x", "openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-5504" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.