{"id":15900,"date":"2019-12-12T19:49:31","date_gmt":"2019-12-13T02:49:31","guid":{"rendered":"https:\/\/webdev.securin.xyz\/?post_type=zerodays&p=15900"},"modified":"2023-03-07T20:16:43","modified_gmt":"2023-03-08T03:16:43","slug":"cve-2020-5504-sql-injection-with-missing-functional-level-access-in-phpmyadmin","status":"publish","type":"zerodays","link":"https:\/\/10.42.32.162\/zerodays\/cve-2020-5504-sql-injection-with-missing-functional-level-access-in-phpmyadmin\/","title":{"rendered":"CVE-2020-5504 – SQL Injection with Missing Functional Level Access in phpMyAdmin"},"content":{"rendered":"

A SQL injection (SQLi) refers to an injection attack wherein an attacker can execute malicious SQL statements that control a web application’s database server. Missing functional level access flaws allow attackers to access unauthorized functionality. SQL injection (SQLi) vulnerability was identified with the conjunction of missing function level access in the latest version of the phpMyAdmin database. The vulnerability affects http:\/\/localhost\/phpmyadmin\/server_privileges.php, username.<\/p>\n","protected":false},"featured_media":7809,"parent":0,"menu_order":0,"template":"","meta":{"content-type":""},"acf":[],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/10.42.32.162\/wp-json\/wp\/v2\/zerodays\/15900"}],"collection":[{"href":"https:\/\/10.42.32.162\/wp-json\/wp\/v2\/zerodays"}],"about":[{"href":"https:\/\/10.42.32.162\/wp-json\/wp\/v2\/types\/zerodays"}],"version-history":[{"count":15,"href":"https:\/\/10.42.32.162\/wp-json\/wp\/v2\/zerodays\/15900\/revisions"}],"predecessor-version":[{"id":15906,"href":"https:\/\/10.42.32.162\/wp-json\/wp\/v2\/zerodays\/15900\/revisions\/15906"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/10.42.32.162\/wp-json\/wp\/v2\/media\/7809"}],"wp:attachment":[{"href":"https:\/\/10.42.32.162\/wp-json\/wp\/v2\/media?parent=15900"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}