U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Vulnerability Change Records for CVE-2009-1151

Change History

Modified Analysis by NIST 7/16/2024 1:48:50 PM

Action Type Old Value New Value
Added CPE Configuration

								
							
							
						
OR
     *cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
     *cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
Changed CPE Configuration
OR
     *cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.0:*:*:*:*:*:*:*
     *cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.0:beta1:*:*:*:*:*:*
     *cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.0:rc1:*:*:*:*:*:*
     *cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.1:*:*:*:*:*:*:*
     *cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.1:rc1:*:*:*:*:*:*
     *cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.1.0:*:*:*:*:*:*:*
     *cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.1.1:*:*:*:*:*:*:*
     *cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.1.2:*:*:*:*:*:*:*
     *cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.2:*:*:*:*:*:*:*
     *cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.2.0:*:*:*:*:*:*:*
     *cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.2.1:*:*:*:*:*:*:*
     *cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.2.2:*:*:*:*:*:*:*
     *cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.3:*:*:*:*:*:*:*
     *cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.3:rc1:*:*:*:*:*:*
     *cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.3.0:*:*:*:*:*:*:*
     *cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.4:*:*:*:*:*:*:*
     *cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.4:rc1:*:*:*:*:*:*
     *cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.5:*:*:*:*:*:*:*
     *cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.5:rc1:*:*:*:*:*:*
     *cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.5.0:*:*:*:*:*:*:*
     *cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.5.1:*:*:*:*:*:*:*
     *cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.5.2:*:*:*:*:*:*:*
     *cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.6:*:*:*:*:*:*:*
     *cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.6:rc1:*:*:*:*:*:*
     *cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.6.0:*:*:*:*:*:*:*
     *cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.7:*:*:*:*:*:*:*
     *cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.7.0:*:*:*:*:*:*:*
     *cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.8:*:*:*:*:*:*:*
     *cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.9:*:*:*:*:*:*:*
     *cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.9.0:*:*:*:*:*:*:*
     *cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.9.1:*:*:*:*:*:*:*
     *cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.9.2:*:*:*:*:*:*:*
     *cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.9.3:*:*:*:*:*:*:*
     *cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.9.4:*:*:*:*:*:*:*
     *cpe:2.3:a:phpmyadmin:phpmyadmin:3.1.0:*:*:*:*:*:*:*
     *cpe:2.3:a:phpmyadmin:phpmyadmin:3.1.1:*:*:*:*:*:*:*
     *cpe:2.3:a:phpmyadmin:phpmyadmin:3.1.1:rc1:*:*:*:*:*:*
     *cpe:2.3:a:phpmyadmin:phpmyadmin:3.1.2:*:*:*:*:*:*:*
     *cpe:2.3:a:phpmyadmin:phpmyadmin:3.1.2:rc1:*:*:*:*:*:*
     *cpe:2.3:a:phpmyadmin:phpmyadmin:3.1.3:rc1:*:*:*:*:*:*
     *cpe:2.3:a:phpmyadmin:phpmyadmin:*:*:*:*:*:*:*:* versions up to (including) 3.1.3
OR
     *cpe:2.3:a:phpmyadmin:phpmyadmin:*:*:*:*:*:*:*:* versions from (including) 2.11.0 up to (excluding) 2.11.9.5
     *cpe:2.3:a:phpmyadmin:phpmyadmin:*:*:*:*:*:*:*:* versions from (including) 3.0.0 up to (excluding) 3.1.3.1
Added CVSS V3.1

								
							
							
						
NIST AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Changed Reference Type
http://labs.neohapsis.com/2009/04/06/about-cve-2009-1151/ No Types Assigned
http://labs.neohapsis.com/2009/04/06/about-cve-2009-1151/ Broken Link
Changed Reference Type
http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00003.html No Types Assigned
http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00003.html Product
Changed Reference Type
http://secunia.com/advisories/34430 Vendor Advisory
http://secunia.com/advisories/34430 Broken Link, Vendor Advisory
Changed Reference Type
http://secunia.com/advisories/34642 Vendor Advisory
http://secunia.com/advisories/34642 Broken Link, Vendor Advisory
Changed Reference Type
http://secunia.com/advisories/35585 Vendor Advisory
http://secunia.com/advisories/35585 Broken Link, Vendor Advisory
Changed Reference Type
http://secunia.com/advisories/35635 Vendor Advisory
http://secunia.com/advisories/35635 Broken Link, Vendor Advisory
Changed Reference Type
http://security.gentoo.org/glsa/glsa-200906-03.xml No Types Assigned
http://security.gentoo.org/glsa/glsa-200906-03.xml Third Party Advisory
Changed Reference Type
http://www.debian.org/security/2009/dsa-1824 No Types Assigned
http://www.debian.org/security/2009/dsa-1824 Mailing List
Changed Reference Type
http://www.gnucitizen.org/blog/cve-2009-1151-phpmyadmin-remote-code-execution-proof-of-concept/ No Types Assigned
http://www.gnucitizen.org/blog/cve-2009-1151-phpmyadmin-remote-code-execution-proof-of-concept/ Exploit, Issue Tracking
Changed Reference Type
http://www.mandriva.com/security/advisories?name=MDVSA-2009:115 No Types Assigned
http://www.mandriva.com/security/advisories?name=MDVSA-2009:115 Broken Link
Changed Reference Type
http://www.securityfocus.com/archive/1/504191/100/0/threaded No Types Assigned
http://www.securityfocus.com/archive/1/504191/100/0/threaded Broken Link, Third Party Advisory, VDB Entry
Changed Reference Type
http://www.securityfocus.com/bid/34236 No Types Assigned
http://www.securityfocus.com/bid/34236 Broken Link, Third Party Advisory, VDB Entry
Changed Reference Type
https://www.exploit-db.com/exploits/8921 No Types Assigned
https://www.exploit-db.com/exploits/8921 Exploit, Third Party Advisory, VDB Entry