vulnerability
FreeBSD: VID-f682a506-df7c-11e5-81e4-6805ca0b3d42 (CVE-2016-2562): phpmyadmin -- multiple XSS and a man-in-the-middle vulnerability
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 6 | (AV:N/AC:M/Au:N/C:P/I:P/A:N) | Mar 1, 2016 | Dec 10, 2025 | Dec 10, 2025 |
Severity
6
CVSS
(AV:N/AC:M/Au:N/C:P/I:P/A:N)
Published
Mar 1, 2016
Added
Dec 10, 2025
Modified
Dec 10, 2025
Description
The phpMyAdmin development team reports: XSS vulnerability in SQL parser. Using a crafted SQL query, it is possible to trigger an XSS attack through the SQL query page. We consider this vulnerability to be non-critical. Multiple XSS vulnerabilities. By sending a specially crafted URL as part of the HOST header, it is possible to trigger an XSS attack. A weakness was found that allows an XSS attack with Internet Explorer versions older than 8 and Safari on Windows using a specially crafted URL. Using a crafted SQL query, it is possible to trigger an XSS attack through the SQL query page. Using a crafted parameter value, it is possible to trigger an XSS attack in user accounts page. Using a crafted parameter value, it is possible to trigger an XSS attack in zoom search page. We consider this vulnerability to be non-critical. Multiple XSS vulnerabilities. With a crafted table/column name it is possible to trigger an XSS attack in the database normalization page. With a crafted parameter it is possible to trigger an XSS attack in the database structure page. With a crafted parameter it is possible to trigger an XSS attack in central columns page. We consider this vulnerability to be non-critical. Vulnerability allowing man-in-the-middle attack on API call to GitHub. A vulnerability in the API call to GitHub can be exploited to perform a man-in-the-middle attack. We consider this vulnerability to be serious.
Solution
freebsd-upgrade-package-phpmyadmin
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.