vulnerability

FreeBSD: VID-f682a506-df7c-11e5-81e4-6805ca0b3d42 (CVE-2016-2561): phpmyadmin -- multiple XSS and a man-in-the-middle vulnerability

Severity
3
CVSS
(AV:N/AC:M/Au:S/C:N/I:P/A:N)
Published
Mar 1, 2016
Added
Dec 10, 2025
Modified
Dec 10, 2025

Description

The phpMyAdmin development team reports: XSS vulnerability in SQL parser. Using a crafted SQL query, it is possible to trigger an XSS attack through the SQL query page. We consider this vulnerability to be non-critical. Multiple XSS vulnerabilities. By sending a specially crafted URL as part of the HOST header, it is possible to trigger an XSS attack. A weakness was found that allows an XSS attack with Internet Explorer versions older than 8 and Safari on Windows using a specially crafted URL. Using a crafted SQL query, it is possible to trigger an XSS attack through the SQL query page. Using a crafted parameter value, it is possible to trigger an XSS attack in user accounts page. Using a crafted parameter value, it is possible to trigger an XSS attack in zoom search page. We consider this vulnerability to be non-critical. Multiple XSS vulnerabilities. With a crafted table/column name it is possible to trigger an XSS attack in the database normalization page. With a crafted parameter it is possible to trigger an XSS attack in the database structure page. With a crafted parameter it is possible to trigger an XSS attack in central columns page. We consider this vulnerability to be non-critical. Vulnerability allowing man-in-the-middle attack on API call to GitHub. A vulnerability in the API call to GitHub can be exploited to perform a man-in-the-middle attack. We consider this vulnerability to be serious.

Solution

freebsd-upgrade-package-phpmyadmin
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.