High Severity Vulnerabilities

Found 5135 vulnerabilities at High severity.

Reference
Title
Technology
phpMyAdmin Improper Neutralization of Special Elements used in an SQL Command (SQL Injection) Vulnerability
phpMyAdmin Improper Control of Generation of Code (Code Injection) Vulnerability
phpMyAdmin Permissions Privileges and Access Controls Vulnerability
phpMyAdmin Improper Authentication Vulnerability
phpMyAdmin Improper Neutralization of Special Elements used in an SQL Command (SQL Injection) Vulnerability
phpMyAdmin Cross-Site Request Forgery (CSRF) Vulnerability
phpMyAdmin Cross-Site Request Forgery (CSRF) Vulnerability
phpMyAdmin Server-Side Request Forgery (SSRF) Vulnerability
phpMyAdmin Improper Input Validation Vulnerability
phpMyAdmin Improper Input Validation Vulnerability
phpMyAdmin 7PK - Security Features Vulnerability
phpMyAdmin Resource Management Errors Vulnerability
phpMyAdmin Exposure of Sensitive Information to an Unauthorized Actor Vulnerability
phpMyAdmin Other Vulnerability
phpMyAdmin Server-Side Request Forgery (SSRF) Vulnerability
phpMyAdmin Improper Neutralization of Special Elements used in an SQL Command (SQL Injection) Vulnerability
phpMyAdmin Improper Neutralization of Special Elements used in an SQL Command (SQL Injection) Vulnerability
phpMyAdmin Improper Neutralization of Special Elements used in a Command (Command Injection) Vulnerability
phpMyAdmin Cross-Site Request Forgery (CSRF) Vulnerability
phpMyAdmin Improper Neutralization of Special Elements used in an SQL Command (SQL Injection) Vulnerability
phpMyAdmin Improper Input Validation Vulnerability
phpMyAdmin Improper Input Validation Vulnerability
phpMyAdmin Other Vulnerability
phpMyAdmin Other Vulnerability
phpMyAdmin Other Vulnerability
phpMyAdmin Other Vulnerability
phpMyAdmin Improper Neutralization of Special Elements used in an SQL Command (SQL Injection) Vulnerability
phpMyAdmin Improper Input Validation Vulnerability
phpMyAdmin Improper Control of Generation of Code (Code Injection) Vulnerability
phpMyAdmin 7PK - Security Features Vulnerability