<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">phpMyAdmin-5.1.1-1.2 on GA media</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2024:11171</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2024-06-17T21:45:33Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2024-06-17T21:45:33Z</InitialReleaseDate>
    <CurrentReleaseDate>2024-06-17T21:45:33Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">phpMyAdmin-5.1.1-1.2 on GA media</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">These are all security issues fixed in the phpMyAdmin-5.1.1-1.2 package on the GA media of openSUSE Tumbleweed.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-Tumbleweed-2024-11171</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL/>
      <Description>E-Mail link for openSUSE-SU-2024:11171</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2005-2869/</URL>
      <Description>SUSE CVE CVE-2005-2869 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2006-1804/</URL>
      <Description>SUSE CVE CVE-2006-1804 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2006-2031/</URL>
      <Description>SUSE CVE CVE-2006-2031 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-8980/</URL>
      <Description>SUSE CVE CVE-2015-8980 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-1000013/</URL>
      <Description>SUSE CVE CVE-2017-1000013 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-1000014/</URL>
      <Description>SUSE CVE CVE-2017-1000014 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-1000015/</URL>
      <Description>SUSE CVE CVE-2017-1000015 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-1000016/</URL>
      <Description>SUSE CVE CVE-2017-1000016 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-1000017/</URL>
      <Description>SUSE CVE CVE-2017-1000017 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-1000018/</URL>
      <Description>SUSE CVE CVE-2017-1000018 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-1000499/</URL>
      <Description>SUSE CVE CVE-2017-1000499 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-10188/</URL>
      <Description>SUSE CVE CVE-2018-10188 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-12581/</URL>
      <Description>SUSE CVE CVE-2018-12581 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-12613/</URL>
      <Description>SUSE CVE CVE-2018-12613 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-15605/</URL>
      <Description>SUSE CVE CVE-2018-15605 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-19968/</URL>
      <Description>SUSE CVE CVE-2018-19968 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-19969/</URL>
      <Description>SUSE CVE CVE-2018-19969 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-19970/</URL>
      <Description>SUSE CVE CVE-2018-19970 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-7260/</URL>
      <Description>SUSE CVE CVE-2018-7260 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-11768/</URL>
      <Description>SUSE CVE CVE-2019-11768 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-12616/</URL>
      <Description>SUSE CVE CVE-2019-12616 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-12922/</URL>
      <Description>SUSE CVE CVE-2019-12922 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-18622/</URL>
      <Description>SUSE CVE CVE-2019-18622 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-6798/</URL>
      <Description>SUSE CVE CVE-2019-6798 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-6799/</URL>
      <Description>SUSE CVE CVE-2019-6799 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-10802/</URL>
      <Description>SUSE CVE CVE-2020-10802 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-10803/</URL>
      <Description>SUSE CVE CVE-2020-10803 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-10804/</URL>
      <Description>SUSE CVE CVE-2020-10804 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-26934/</URL>
      <Description>SUSE CVE CVE-2020-26934 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-26935/</URL>
      <Description>SUSE CVE CVE-2020-26935 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-5504/</URL>
      <Description>SUSE CVE CVE-2020-5504 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Tumbleweed">
      <Branch Type="Product Name" Name="openSUSE Tumbleweed">
        <FullProductName ProductID="openSUSE Tumbleweed" CPE="cpe:/o:opensuse:tumbleweed">openSUSE Tumbleweed</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="phpMyAdmin-5.1.1-1.2">
      <FullProductName ProductID="phpMyAdmin-5.1.1-1.2">phpMyAdmin-5.1.1-1.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="phpMyAdmin-apache-5.1.1-1.2">
      <FullProductName ProductID="phpMyAdmin-apache-5.1.1-1.2">phpMyAdmin-apache-5.1.1-1.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="phpMyAdmin-lang-5.1.1-1.2">
      <FullProductName ProductID="phpMyAdmin-lang-5.1.1-1.2">phpMyAdmin-lang-5.1.1-1.2</FullProductName>
    </Branch>
    <Relationship ProductReference="phpMyAdmin-5.1.1-1.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2">phpMyAdmin-5.1.1-1.2 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="phpMyAdmin-apache-5.1.1-1.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2">phpMyAdmin-apache-5.1.1-1.2 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="phpMyAdmin-lang-5.1.1-1.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2">phpMyAdmin-lang-5.1.1-1.2 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Multiple cross-site scripting (XSS) vulnerabilities in phpMyAdmin before 2.6.4 allow remote attackers to inject arbitrary web script or HTML via (1) the Username to libraries/auth/cookie.auth.lib.php or (2) the error parameter to error.php.</Note>
    </Notes>
    <CVE>CVE-2005-2869</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2005-2869.html</URL>
        <Description>CVE-2005-2869</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/130226</URL>
        <Description>SUSE Bug 130226</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/133818</URL>
        <Description>SUSE Bug 133818</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/134373</URL>
        <Description>SUSE Bug 134373</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">SQL injection vulnerability in sql.php in phpMyAdmin 2.7.0-pl1 allows remote attackers to execute arbitrary SQL commands via the sql_query parameter.</Note>
    </Notes>
    <CVE>CVE-2006-1804</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2006-1804.html</URL>
        <Description>CVE-2006-1804</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/165772</URL>
        <Description>SUSE Bug 165772</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Cross-site scripting (XSS) vulnerability in index.php in phpMyAdmin 2.8.0.3, 2.8.0.2, 2.8.1-dev, and 2.9.0-dev allows remote attackers to inject arbitrary web script or HTML via the lang parameter.</Note>
    </Notes>
    <CVE>CVE-2006-2031</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2006-2031.html</URL>
        <Description>CVE-2006-2031</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/170529</URL>
        <Description>SUSE Bug 170529</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/177091</URL>
        <Description>SUSE Bug 177091</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The plural form formula in ngettext family of calls in php-gettext before 1.0.12 allows remote attackers to execute arbitrary code.</Note>
    </Notes>
    <CVE>CVE-2015-8980</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-8980.html</URL>
        <Description>CVE-2015-8980</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1020489</URL>
        <Description>SUSE Bug 1020489</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1021597</URL>
        <Description>SUSE Bug 1021597</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">phpMyAdmin 4.0, 4.4, and 4.6 are vulnerable to an open redirect weakness</Note>
    </Notes>
    <CVE>CVE-2017-1000013</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-1000013.html</URL>
        <Description>CVE-2017-1000013</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1021597</URL>
        <Description>SUSE Bug 1021597</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">phpMyAdmin 4.0, 4.4, and 4.6 are vulnerable to a DOS weakness in the table editing functionality</Note>
    </Notes>
    <CVE>CVE-2017-1000014</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-1000014.html</URL>
        <Description>CVE-2017-1000014</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1021597</URL>
        <Description>SUSE Bug 1021597</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">phpMyAdmin 4.0, 4.4, and 4.6 are vulnerable to a CSS injection attack through crafted cookie parameters</Note>
    </Notes>
    <CVE>CVE-2017-1000015</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-1000015.html</URL>
        <Description>CVE-2017-1000015</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1021597</URL>
        <Description>SUSE Bug 1021597</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A weakness was discovered where an attacker can inject arbitrary values in to the browser cookies. This is a re-issue of an incomplete fix from PMASA-2016-18.</Note>
    </Notes>
    <CVE>CVE-2017-1000016</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-1000016.html</URL>
        <Description>CVE-2017-1000016</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1021597</URL>
        <Description>SUSE Bug 1021597</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="9">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">phpMyAdmin 4.0, 4.4 and 4.6 are vulnerable to a weakness where a user with appropriate permissions is able to connect to an arbitrary MySQL server</Note>
    </Notes>
    <CVE>CVE-2017-1000017</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-1000017.html</URL>
        <Description>CVE-2017-1000017</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="10">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">phpMyAdmin 4.0, 4.4., and 4.6 are vulnerable to a DOS attack in the replication status by using a specially crafted table name</Note>
    </Notes>
    <CVE>CVE-2017-1000018</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-1000018.html</URL>
        <Description>CVE-2017-1000018</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1021597</URL>
        <Description>SUSE Bug 1021597</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="11">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">phpMyAdmin versions 4.7.x (prior to 4.7.6.1/4.7.7) are vulnerable to a CSRF weakness. By deceiving a user to click on a crafted URL, it is possible to perform harmful database operations such as deleting records, dropping/truncating tables etc.</Note>
    </Notes>
    <CVE>CVE-2017-1000499</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-1000499.html</URL>
        <Description>CVE-2017-1000499</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1074066</URL>
        <Description>SUSE Bug 1074066</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1075319</URL>
        <Description>SUSE Bug 1075319</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="12">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">phpMyAdmin 4.8.0 before 4.8.0-1 has CSRF, allowing an attacker to execute arbitrary SQL statements, related to js/db_operations.js, js/tbl_operations.js, libraries/classes/Operations.php, and sql.php.</Note>
    </Notes>
    <CVE>CVE-2018-10188</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-10188.html</URL>
        <Description>CVE-2018-10188</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1090309</URL>
        <Description>SUSE Bug 1090309</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="13">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in js/designer/move.js in phpMyAdmin before 4.8.2. A Cross-Site Scripting vulnerability has been found where an attacker can use a crafted database name to trigger an XSS attack when that database is referenced from the Designer feature.</Note>
    </Notes>
    <CVE>CVE-2018-12581</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-12581.html</URL>
        <Description>CVE-2018-12581</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1098752</URL>
        <Description>SUSE Bug 1098752</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="14">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in phpMyAdmin 4.8.x before 4.8.2, in which an attacker can include (view and potentially execute) files on the server. The vulnerability comes from a portion of code where pages are redirected and loaded within phpMyAdmin, and an improper test for whitelisted pages. An attacker must be authenticated, except in the "$cfg['AllowArbitraryServer'] = true" case (where an attacker can specify any host he/she is already in control of, and execute arbitrary code on phpMyAdmin) and the "$cfg['ServerDefault'] = 0" case (which bypasses the login requirement and runs the vulnerable code without any authentication).</Note>
    </Notes>
    <CVE>CVE-2018-12613</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-12613.html</URL>
        <Description>CVE-2018-12613</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1098735</URL>
        <Description>SUSE Bug 1098735</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1098744</URL>
        <Description>SUSE Bug 1098744</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1098751</URL>
        <Description>SUSE Bug 1098751</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="15">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in phpMyAdmin before 4.8.3. A Cross-Site Scripting vulnerability has been found where an attacker can use a crafted file to manipulate an authenticated user who loads that file through the import feature.</Note>
    </Notes>
    <CVE>CVE-2018-15605</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-15605.html</URL>
        <Description>CVE-2018-15605</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1105726</URL>
        <Description>SUSE Bug 1105726</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="16">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An attacker can exploit phpMyAdmin before 4.8.4 to leak the contents of a local file because of an error in the transformation feature. The attacker must have access to the phpMyAdmin Configuration Storage tables, although these can easily be created in any database to which the attacker has access. An attacker must have valid credentials to log in to phpMyAdmin; this vulnerability does not allow an attacker to circumvent the login system.</Note>
    </Notes>
    <CVE>CVE-2018-19968</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-19968.html</URL>
        <Description>CVE-2018-19968</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1119245</URL>
        <Description>SUSE Bug 1119245</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="17">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">phpMyAdmin 4.7.x and 4.8.x versions prior to 4.8.4 are affected by a series of CSRF flaws. By deceiving a user into clicking on a crafted URL, it is possible to perform harmful SQL operations such as renaming databases, creating new tables/routines, deleting designer pages, adding/deleting users, updating user passwords, killing SQL processes, etc.</Note>
    </Notes>
    <CVE>CVE-2018-19969</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-19969.html</URL>
        <Description>CVE-2018-19969</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1119245</URL>
        <Description>SUSE Bug 1119245</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="18">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In phpMyAdmin before 4.8.4, an XSS vulnerability was found in the navigation tree, where an attacker can deliver a payload to a user through a crafted database/table name.</Note>
    </Notes>
    <CVE>CVE-2018-19970</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-19970.html</URL>
        <Description>CVE-2018-19970</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1119245</URL>
        <Description>SUSE Bug 1119245</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="19">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Cross-site scripting (XSS) vulnerability in db_central_columns.php in phpMyAdmin before 4.7.8 allows remote authenticated users to inject arbitrary web script or HTML via a crafted URL.</Note>
    </Notes>
    <CVE>CVE-2018-7260</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-7260.html</URL>
        <Description>CVE-2018-7260</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1082188</URL>
        <Description>SUSE Bug 1082188</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="20">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in phpMyAdmin before 4.9.0.1. A vulnerability was reported where a specially crafted database name can be used to trigger an SQL injection attack through the designer feature.</Note>
    </Notes>
    <CVE>CVE-2019-11768</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-11768.html</URL>
        <Description>CVE-2019-11768</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1137496</URL>
        <Description>SUSE Bug 1137496</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="21">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in phpMyAdmin before 4.9.0. A vulnerability was found that allows an attacker to trigger a CSRF attack against a phpMyAdmin user. The attacker can trick the user, for instance through a broken &lt;img&gt; tag pointing at the victim's phpMyAdmin database, and the attacker can potentially deliver a payload (such as a specific INSERT or DELETE statement) to the victim.</Note>
    </Notes>
    <CVE>CVE-2019-12616</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-12616.html</URL>
        <Description>CVE-2019-12616</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1137497</URL>
        <Description>SUSE Bug 1137497</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="22">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A CSRF issue in phpMyAdmin 4.9.0.1 allows deletion of any server in the Setup page.</Note>
    </Notes>
    <CVE>CVE-2019-12922</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-12922.html</URL>
        <Description>CVE-2019-12922</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1150914</URL>
        <Description>SUSE Bug 1150914</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="23">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in phpMyAdmin before 4.9.2. A crafted database/table name can be used to trigger a SQL injection attack through the designer feature.</Note>
    </Notes>
    <CVE>CVE-2019-18622</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-18622.html</URL>
        <Description>CVE-2019-18622</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1157614</URL>
        <Description>SUSE Bug 1157614</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1158801</URL>
        <Description>SUSE Bug 1158801</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="24">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in phpMyAdmin before 4.8.5. A vulnerability was reported where a specially crafted username can be used to trigger a SQL injection attack through the designer feature.</Note>
    </Notes>
    <CVE>CVE-2019-6798</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-6798.html</URL>
        <Description>CVE-2019-6798</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1123271</URL>
        <Description>SUSE Bug 1123271</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="25">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in phpMyAdmin before 4.8.5. When the AllowArbitraryServer configuration setting is set to true, with the use of a rogue MySQL server, an attacker can read any file on the server that the web server's user can access. This is related to the mysql.allow_local_infile PHP configuration, and the inadvertent ignoring of "options(MYSQLI_OPT_LOCAL_INFILE" calls.</Note>
    </Notes>
    <CVE>CVE-2019-6799</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-6799.html</URL>
        <Description>CVE-2019-6799</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1123272</URL>
        <Description>SUSE Bug 1123272</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="26">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In phpMyAdmin 4.x before 4.9.5 and 5.x before 5.0.2, a SQL injection vulnerability has been discovered where certain parameters are not properly escaped when generating certain queries for search actions in libraries/classes/Controllers/Table/TableSearchController.php. An attacker can generate a crafted database or table name. The attack can be performed if a user attempts certain search operations on the malicious database or table.</Note>
    </Notes>
    <CVE>CVE-2020-10802</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-10802.html</URL>
        <Description>CVE-2020-10802</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1167336</URL>
        <Description>SUSE Bug 1167336</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="27">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In phpMyAdmin 4.x before 4.9.5 and 5.x before 5.0.2, a SQL injection vulnerability was discovered where malicious code could be used to trigger an XSS attack through retrieving and displaying results (in tbl_get_field.php and libraries/classes/Display/Results.php). The attacker must be able to insert crafted data into certain database tables, which when retrieved (for instance, through the Browse tab) can trigger the XSS attack.</Note>
    </Notes>
    <CVE>CVE-2020-10803</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-10803.html</URL>
        <Description>CVE-2020-10803</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1167337</URL>
        <Description>SUSE Bug 1167337</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="28">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In phpMyAdmin 4.x before 4.9.5 and 5.x before 5.0.2, a SQL injection vulnerability was found in retrieval of the current username (in libraries/classes/Server/Privileges.php and libraries/classes/UserPassword.php). A malicious user with access to the server could create a crafted username, and then trick the victim into performing specific actions with that user account (such as editing its privileges).</Note>
    </Notes>
    <CVE>CVE-2020-10804</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-10804.html</URL>
        <Description>CVE-2020-10804</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1167335</URL>
        <Description>SUSE Bug 1167335</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="29">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">phpMyAdmin before 4.9.6 and 5.x before 5.0.3 allows XSS through the transformation feature via a crafted link.</Note>
    </Notes>
    <CVE>CVE-2020-26934</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-26934.html</URL>
        <Description>CVE-2020-26934</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1177561</URL>
        <Description>SUSE Bug 1177561</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="30">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in SearchController in phpMyAdmin before 4.9.6 and 5.x before 5.0.3. A SQL injection vulnerability was discovered in how phpMyAdmin processes SQL statements in the search feature. An attacker could use this flaw to inject malicious SQL in to a query.</Note>
    </Notes>
    <CVE>CVE-2020-26935</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-26935.html</URL>
        <Description>CVE-2020-26935</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1177562</URL>
        <Description>SUSE Bug 1177562</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="31">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In phpMyAdmin 4 before 4.9.4 and 5 before 5.0.1, SQL injection exists in the user accounts page. A malicious user could inject custom SQL in place of their own username when creating queries to this page. An attacker must have a valid MySQL account to access the server.</Note>
    </Notes>
    <CVE>CVE-2020-5504</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:phpMyAdmin-5.1.1-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:phpMyAdmin-apache-5.1.1-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:phpMyAdmin-lang-5.1.1-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-5504.html</URL>
        <Description>CVE-2020-5504</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1160456</URL>
        <Description>SUSE Bug 1160456</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
