CVE-2012-4345
Published Aug 21, 2012
Last updated 12 years ago
Overview
- Description
- Multiple cross-site scripting (XSS) vulnerabilities in the Database Structure page in phpMyAdmin 3.4.x before 3.4.11.1 and 3.5.x before 3.5.2.2 allow remote authenticated users to inject arbitrary web script or HTML via (1) a crafted table name during table creation, or a (2) Empty link or (3) Drop link for a crafted table name.
- Source
- cve@mitre.org
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 3.5
- Impact score
- 2.9
- Exploitability score
- 6.8
- Vector string
- AV:N/AC:M/Au:S/C:N/I:P/A:N
Weaknesses
- nvd@nist.gov
- CWE-79
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:3.4.0.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2C714361-7AE3-4DC2-994C-7C67B41226B0" }, { "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:3.4.1.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2A3CED16-3ECE-49F6-A52B-0222B14DBC88" }, { "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:3.4.2.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E4938BCE-1365-469A-B714-A5D9C451FA20" }, { "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:3.4.3.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "35F46942-E054-43E4-9543-E126738845E2" }, { "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:3.4.3.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A1A24EBE-D760-4251-972E-86B71EC8A07D" }, { "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:3.4.3.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9AC8F001-B2D6-49AD-94E7-673E8BEC958C" }, { "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:3.4.4.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AE9EFA08-1838-46A9-A851-A0540C60739D" }, { "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:3.4.5.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B231B0D4-F971-4D4F-97CE-74951DF2B681" }, { "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:3.4.6.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FF6604AE-12E8-43F8-9170-557009F34928" }, { "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:3.4.7.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CD67845D-C1AD-46EF-A2EF-6C979E3363BF" }, { "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:3.4.7.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8C36E012-A028-4A47-9EAB-553D18F5E053" }, { "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:3.4.8.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6044293D-28C5-4B35-B046-E8984A2AA029" }, { "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:3.4.9.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C774C482-4EE2-47DE-BCC4-35020E02A9AD" }, { "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:3.4.10.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "10F44BD9-A868-420B-9B9F-9CC4809A9C49" }, { "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:3.4.10.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "706127A4-C6E2-4A6C-81EC-3B890E677273" }, { "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:3.4.10.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4DB17D6D-14FD-4CEB-96C7-20FCB823D495" }, { "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:3.4.11:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "82EB3D89-67EB-482B-B254-0AB658610E3E" }, { "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.0.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2577DB75-9893-4496-B9B8-22F4D7C70D8B" }, { "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.1.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3BBC76AB-567B-4081-8520-D4BB2211CA91" }, { "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.2.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EDFD7186-12C3-4FA6-951E-288063262EAE" }, { "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.2.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C4E23EA5-8FD8-441A-8CB6-F1E77AA0D73B" } ], "operator": "OR" } ] } ]