phpmyadmin

Description:Web-based administration for MySQL database in PHP
License: GPL-2
Homepage:https://www.phpmyadmin.net/
Location:Portage
Legend:
  • + - stable
  • ~ - unstable
  • M - hardmask
alpha amd64 arm hppa ia64 m68k mips ppc ppc64 s390 sh sparc x86
4.9.1 diff ~ ~ ~ ~ ~ - - ~ ~ - - ~ ~
4.9.0.1 diff ~ + ~ ~ ~ - - + + - - + +
4.8.5 ~ + ~ ~ ~ - - + + - - + +

USE flags

  • setup - Installs the phpMyAdmin setup utility. Users who don't use the utility should disable this USE flag for security reasons as the setup tool was the target of various exploits in the past.
  • vhosts - Add support for installing web-based applications into a virtual-hosting environment

Security Advisory

Date Severity Title
6 months normal phpMyAdmin: Multiple vulnerabilities
over 2 years normal phpMyAdmin: Security bypass
almost 3 years normal phpMyAdmin: Multiple vulnerabilities
over 4 years low phpMyAdmin: Multiple vulnerabilities
almost 6 years normal phpMyAdmin: Multiple vulnerabilities
almost 8 years high phpMyAdmin: Multiple vulnerabilities
over 10 years high phpMyAdmin: Multiple vulnerabilities
over 10 years normal phpMyAdmin: Multiple vulnerabilities
over 11 years low phpMyAdmin: Information disclosure
over 11 years low phpMyAdmin: SQL injection vulnerability
almost 14 years normal phpMyAdmin: Multiple vulnerabilities
almost 14 years normal phpMyAdmin: Local file inclusion and XSS vulnerabilities
about 14 years normal phpMyAdmin: Local file inclusion vulnerability
over 14 years normal phpMyAdmin: Insecure SQL script installation
over 14 years low phpMyAdmin: Cross-site scripting vulnerability
over 14 years normal phpMyAdmin: Multiple vulnerabilities
almost 15 years high phpMyAdmin: Multiple vulnerabilities
almost 15 years low phpMyAdmin: Multiple XSS vulnerabilities
about 15 years high phpMyAdmin: Vulnerability in MIME-based transformation system
about 15 years normal phpMyAdmin: Multiple vulnerabilities
over 15 years normal phpMyAdmin < 2.5.6-rc1: possible attack against export.php

Also available in: Atom

Thank you!