UBUNTU-CVE-2016-6633

Source
https://ubuntu.com/security/CVE-2016-6633
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2016/UBUNTU-CVE-2016-6633.json
JSON Data
https://api.test.osv.dev/v1/vulns/UBUNTU-CVE-2016-6633
Upstream
Published
2016-12-11T02:59:00Z
Modified
2025-07-16T07:50:00.324854Z
Severity
  • 8.1 (High) CVSS_V3 - CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
  • Ubuntu - low
Summary
[none]
Details

An issue was discovered in phpMyAdmin. phpMyAdmin can be used to trigger a remote code execution attack against certain PHP installations that are running with the dbase extension. All 4.6.x versions (prior to 4.6.4), 4.4.x versions (prior to 4.4.15.8), and 4.0.x versions (prior to 4.0.10.17) are affected.

References

Affected packages

Ubuntu:Pro:14.04:LTS / phpmyadmin

Package

Name
phpmyadmin
Purl
pkg:deb/ubuntu/phpmyadmin@4:4.0.10-1ubuntu0.1+esm4?arch=source&distro=esm-infra-legacy/trusty

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

4:4.*

4:4.0.6-1
4:4.0.8-1
4:4.0.9-1
4:4.0.10-1
4:4.0.10-1ubuntu0.1
4:4.0.10-1ubuntu0.1+esm1
4:4.0.10-1ubuntu0.1+esm2
4:4.0.10-1ubuntu0.1+esm3
4:4.0.10-1ubuntu0.1+esm4