An issue was discovered in phpMyAdmin. XSS is possible because of a weakness in a regular expression used in some JavaScript processing. All 4.6.x versions (prior to 4.6.5), 4.4.x versions (prior to 4.4.15.9), and 4.0.x versions (prior to 4.0.10.18) are affected.
Date Added | Due Date | Vulnerability Name | Required Action |
---|---|---|---|
N/A |
Type | Version | Base score | Base severity | Vector |
---|---|---|---|---|
Primary | 3.0 | 6.1 | MEDIUM | CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N |
Primary | 2.0 | 4.3 | MEDIUM | AV:N/AC:M/Au:N/C:N/I:P/A:N |
CWE ID | Type | Source |
---|---|---|
CWE-79 | Primary | nvd@nist.gov |
Hyperlink | Source | Resource |
---|---|---|
http://www.securityfocus.com/bid/94530 | cve@mitre.org | Third Party Advisory VDB Entry |
https://security.gentoo.org/glsa/201701-32 | cve@mitre.org | N/A |
https://www.phpmyadmin.net/security/PMASA-2016-64 | cve@mitre.org | Patch Vendor Advisory |
http://www.securityfocus.com/bid/94530 | af854a3a-2127-422b-91ae-364da2661108 | Third Party Advisory VDB Entry |
https://security.gentoo.org/glsa/201701-32 | af854a3a-2127-422b-91ae-364da2661108 | N/A |
https://www.phpmyadmin.net/security/PMASA-2016-64 | af854a3a-2127-422b-91ae-364da2661108 | Patch Vendor Advisory |