Multiple cross-site scripting (XSS) vulnerabilities in phpMyAdmin 4.0.x before 4.0.10.16, 4.4.x before 4.4.15.7, and 4.6.x before 4.6.3 allow remote attackers to inject arbitrary web script or HTML via vectors involving (1) a crafted table name that is mishandled during privilege checking in tablerow.phtml, (2) a crafted mysqld logbin directive that is mishandled in logselector.phtml, (3) the Transformation implementation, (4) AJAX error handling in js/ajax.js, (5) the Designer implementation, (6) the charts implementation in js/tblchart.js, or (7) the zoom-search implementation in rows_zoom.phtml.
{
"versions": [
{
"introduced": "0"
},
{
"last_affected": "4.0.0"
},
{
"introduced": "0"
},
{
"last_affected": "4.0.1"
},
{
"introduced": "0"
},
{
"last_affected": "4.0.2"
},
{
"introduced": "0"
},
{
"last_affected": "4.0.3"
},
{
"introduced": "0"
},
{
"last_affected": "4.0.4"
},
{
"introduced": "0"
},
{
"last_affected": "4.0.4.1"
},
{
"introduced": "0"
},
{
"last_affected": "4.0.4.2"
},
{
"introduced": "0"
},
{
"last_affected": "4.0.5"
},
{
"introduced": "0"
},
{
"last_affected": "4.0.6"
},
{
"introduced": "0"
},
{
"last_affected": "4.0.7"
},
{
"introduced": "0"
},
{
"last_affected": "4.0.8"
},
{
"introduced": "0"
},
{
"last_affected": "4.0.9"
},
{
"introduced": "0"
},
{
"last_affected": "4.0.10"
},
{
"introduced": "0"
},
{
"last_affected": "4.0.10.1"
},
{
"introduced": "0"
},
{
"last_affected": "4.0.10.2"
},
{
"introduced": "0"
},
{
"last_affected": "4.0.10.3"
},
{
"introduced": "0"
},
{
"last_affected": "4.0.10.4"
},
{
"introduced": "0"
},
{
"last_affected": "4.0.10.5"
},
{
"introduced": "0"
},
{
"last_affected": "4.0.10.6"
},
{
"introduced": "0"
},
{
"last_affected": "4.0.10.7"
},
{
"introduced": "0"
},
{
"last_affected": "4.0.10.8"
},
{
"introduced": "0"
},
{
"last_affected": "4.0.10.9"
},
{
"introduced": "0"
},
{
"last_affected": "4.0.10.10"
},
{
"introduced": "0"
},
{
"last_affected": "4.0.10.11"
},
{
"introduced": "0"
},
{
"last_affected": "4.0.10.12"
},
{
"introduced": "0"
},
{
"last_affected": "4.0.10.13"
},
{
"introduced": "0"
},
{
"last_affected": "4.0.10.14"
},
{
"introduced": "0"
},
{
"last_affected": "4.0.10.15"
},
{
"introduced": "0"
},
{
"last_affected": "4.4.0"
},
{
"introduced": "0"
},
{
"last_affected": "4.4.1"
},
{
"introduced": "0"
},
{
"last_affected": "4.4.1.1"
},
{
"introduced": "0"
},
{
"last_affected": "4.4.2"
},
{
"introduced": "0"
},
{
"last_affected": "4.4.3"
},
{
"introduced": "0"
},
{
"last_affected": "4.4.4"
},
{
"introduced": "0"
},
{
"last_affected": "4.4.5"
},
{
"introduced": "0"
},
{
"last_affected": "4.4.6"
},
{
"introduced": "0"
},
{
"last_affected": "4.4.6.1"
},
{
"introduced": "0"
},
{
"last_affected": "4.4.7"
},
{
"introduced": "0"
},
{
"last_affected": "4.4.8"
},
{
"introduced": "0"
},
{
"last_affected": "4.4.9"
},
{
"introduced": "0"
},
{
"last_affected": "4.4.10"
},
{
"introduced": "0"
},
{
"last_affected": "4.4.11"
},
{
"introduced": "0"
},
{
"last_affected": "4.4.12"
},
{
"introduced": "0"
},
{
"last_affected": "4.4.13"
},
{
"introduced": "0"
},
{
"last_affected": "4.4.13.1"
},
{
"introduced": "0"
},
{
"last_affected": "4.4.14.1"
},
{
"introduced": "0"
},
{
"last_affected": "4.4.15"
},
{
"introduced": "0"
},
{
"last_affected": "4.4.15.1"
},
{
"introduced": "0"
},
{
"last_affected": "4.4.15.2"
},
{
"introduced": "0"
},
{
"last_affected": "4.4.15.3"
},
{
"introduced": "0"
},
{
"last_affected": "4.4.15.4"
},
{
"introduced": "0"
},
{
"last_affected": "4.4.15.5"
},
{
"introduced": "0"
},
{
"last_affected": "4.4.15.6"
},
{
"introduced": "0"
},
{
"last_affected": "4.6.0"
},
{
"introduced": "0"
},
{
"last_affected": "4.6.0-alpha1"
},
{
"introduced": "0"
},
{
"last_affected": "4.6.0-rc1"
},
{
"introduced": "0"
},
{
"last_affected": "4.6.0-rc2"
},
{
"introduced": "0"
},
{
"last_affected": "4.6.1"
},
{
"introduced": "0"
},
{
"last_affected": "4.6.2"
}
]
}[
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "42.1"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "13.1"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "13.2"
}
]
}
]
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2016-5733.json"