Exploits found on the INTERNET

This is live excerpt from our database. Available also using API

Date Name Status
2019-09-14PhpMyAdmin Cross Site Request ForgeryPublished
2019-06-13PhpMyAdmin 4.8 Cross Site Request ForgeryPublished
2018-11-27PhpMyAdmin 4.8.1 Authenticated Local File InclusionPublished
2018-08-29PhpMyAdmin 4.7.x Cross-Site Request ForgeryPublished
2018-07-13PhpMyAdmin 4.8.1 Authenticated Remote Code Execution metasploitPublished
2018-06-22PhpMyAdmin 4.8.1 Authenticated Local File InclusionPublished
2018-06-18PhpMyAdmin 4.x Remote Code ExecutionPublished
2018-04-24PhpMyAdmin 4.8.0 < 4.8.0-1 Cross-Site Request ForgeryPublished
2015-05-14PhpMyAdmin 4.4.6 Man-In-the-Middle to API GithubPublished
2014-12-15PhpMyAdmin 4.0.x, 4.1.x, 4.2.x Denial of ServicePublished
2014-04-07XAMPP & phpMyAdmin <= 4.1.6 multiple vulnerabilitesPublished
2013-07-31PhpMyAdmin 3.5.x/4.0.x privilege escalationPublished
2013-07-05PhpMyAdmin 4.0.4 change the configuration vulnerabilityPublished
2013-04-30PhpMyAdmin 3.5.8 Authenticated Remote Code Execution ExploitPublished
2013-04-25PhpMyAdmin 3.5.8 LFI & Array Overwrite & Remote code executionPublished
2012-09-26PhpMyAdmin server_sync.php backdoorPublished
2012-01-18PhpMyAdmin 3.3.X and 3.4.X - Local File Inclusion via XXE InjectionPublished
2011-08-06PhpMyAdmin 3.x Conditional Session ManipulationPublished
2011-07-25PhpMyAdmin 3.x Multiple Remote Code ExecutionsPublished
2011-07-14PhpMyAdmin 3.x Remote Code ExecutionPublished
2011-02-03PhpMyAdmin 3.4.x Stored Cross Site ScriptingPublished
2010-12-23PhpMyAdmin 3.3.8 CSRF sql code executionPublished
2010-08-27PhpMyAdmin 3.3.5 / 2.11.10 <= Cross Site Scripting XSSPublished
2009-10-26PhpMyAdmin XSS and SQL Injection VulnerabilitiesPublished
2009-06-12PhpMyAdmin Remote Code Execution Proof of ConceptPublished
2008-12-22PhpMyAdmin 3.1.0 XSRF SQL Injection VulnerabilityPublished
2007-04-24PhpMyAdmin 2.6.1 Local Cross Site ScriptingPublished

Copyright © 2024 Exploitalert v1 BETA.
About us & Partners This information is provided for TESTING and LEGAL RESEARCH purposes only.
All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use and Privacy Policy