6.1
CVE-2016-6607
- EPSS 0.54%
- Published 11.12.2016 02:59:11
- Last modified 12.04.2025 10:46:40
- Source cve@mitre.org
- Teams watchlist Login
- Open Login
XSS issues were discovered in phpMyAdmin. This affects Zoom search (specially crafted column content can be used to trigger an XSS attack); GIS editor (certain fields in the graphical GIS editor are not properly escaped and can be used to trigger an XSS attack); Relation view; the following Transformations: Formatted, Imagelink, JPEG: Upload, RegexValidation, JPEG inline, PNG inline, and transformation wrapper; XML export; MediaWiki export; Designer; When the MySQL server is running with a specially-crafted log_bin directive; Database tab; Replication feature; and Database search. All 4.6.x versions (prior to 4.6.4), 4.4.x versions (prior to 4.4.15.8), and 4.0.x versions (prior to 4.0.10.17) are affected.
Data is provided by the National Vulnerability Database (NVD)
Phpmyadmin ≫ Phpmyadmin Version4.4.0
Phpmyadmin ≫ Phpmyadmin Version4.4.1
Phpmyadmin ≫ Phpmyadmin Version4.4.1.1
Phpmyadmin ≫ Phpmyadmin Version4.4.2
Phpmyadmin ≫ Phpmyadmin Version4.4.3
Phpmyadmin ≫ Phpmyadmin Version4.4.4
Phpmyadmin ≫ Phpmyadmin Version4.4.5
Phpmyadmin ≫ Phpmyadmin Version4.4.6
Phpmyadmin ≫ Phpmyadmin Version4.4.6.1
Phpmyadmin ≫ Phpmyadmin Version4.4.7
Phpmyadmin ≫ Phpmyadmin Version4.4.8
Phpmyadmin ≫ Phpmyadmin Version4.4.9
Phpmyadmin ≫ Phpmyadmin Version4.4.10
Phpmyadmin ≫ Phpmyadmin Version4.4.11
Phpmyadmin ≫ Phpmyadmin Version4.4.12
Phpmyadmin ≫ Phpmyadmin Version4.4.13
Phpmyadmin ≫ Phpmyadmin Version4.4.13.1
Phpmyadmin ≫ Phpmyadmin Version4.4.14.1
Phpmyadmin ≫ Phpmyadmin Version4.4.15
Phpmyadmin ≫ Phpmyadmin Version4.4.15.1
Phpmyadmin ≫ Phpmyadmin Version4.4.15.2
Phpmyadmin ≫ Phpmyadmin Version4.4.15.3
Phpmyadmin ≫ Phpmyadmin Version4.4.15.4
Phpmyadmin ≫ Phpmyadmin Version4.4.15.5
Phpmyadmin ≫ Phpmyadmin Version4.4.15.6
Phpmyadmin ≫ Phpmyadmin Version4.4.15.7
Phpmyadmin ≫ Phpmyadmin Version4.0.0
Phpmyadmin ≫ Phpmyadmin Version4.0.0 Updaterc2
Phpmyadmin ≫ Phpmyadmin Version4.0.0 Updaterc3
Phpmyadmin ≫ Phpmyadmin Version4.0.1
Phpmyadmin ≫ Phpmyadmin Version4.0.2
Phpmyadmin ≫ Phpmyadmin Version4.0.3
Phpmyadmin ≫ Phpmyadmin Version4.0.4
Phpmyadmin ≫ Phpmyadmin Version4.0.4.1
Phpmyadmin ≫ Phpmyadmin Version4.0.4.2
Phpmyadmin ≫ Phpmyadmin Version4.0.5
Phpmyadmin ≫ Phpmyadmin Version4.0.6
Phpmyadmin ≫ Phpmyadmin Version4.0.7
Phpmyadmin ≫ Phpmyadmin Version4.0.8
Phpmyadmin ≫ Phpmyadmin Version4.0.9
Phpmyadmin ≫ Phpmyadmin Version4.0.10
Phpmyadmin ≫ Phpmyadmin Version4.0.10.1
Phpmyadmin ≫ Phpmyadmin Version4.0.10.2
Phpmyadmin ≫ Phpmyadmin Version4.0.10.3
Phpmyadmin ≫ Phpmyadmin Version4.0.10.4
Phpmyadmin ≫ Phpmyadmin Version4.0.10.5
Phpmyadmin ≫ Phpmyadmin Version4.0.10.6
Phpmyadmin ≫ Phpmyadmin Version4.0.10.7
Phpmyadmin ≫ Phpmyadmin Version4.0.10.8
Phpmyadmin ≫ Phpmyadmin Version4.0.10.9
Phpmyadmin ≫ Phpmyadmin Version4.0.10.10
Phpmyadmin ≫ Phpmyadmin Version4.0.10.11
Phpmyadmin ≫ Phpmyadmin Version4.0.10.12
Phpmyadmin ≫ Phpmyadmin Version4.0.10.13
Phpmyadmin ≫ Phpmyadmin Version4.0.10.14
Phpmyadmin ≫ Phpmyadmin Version4.0.10.15
Phpmyadmin ≫ Phpmyadmin Version4.0.10.16
Phpmyadmin ≫ Phpmyadmin Version4.6.0
Phpmyadmin ≫ Phpmyadmin Version4.6.0 Updatealpha1
Phpmyadmin ≫ Phpmyadmin Version4.6.0 Updaterc1
Phpmyadmin ≫ Phpmyadmin Version4.6.0 Updaterc2
Phpmyadmin ≫ Phpmyadmin Version4.6.1
Phpmyadmin ≫ Phpmyadmin Version4.6.2
Phpmyadmin ≫ Phpmyadmin Version4.6.3
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.54% | 0.666 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
nvd@nist.gov | 6.1 | 2.8 | 2.7 |
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
|
nvd@nist.gov | 4.3 | 8.6 | 2.9 |
AV:N/AC:M/Au:N/C:N/I:P/A:N
|
CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.