Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| pgadmin.org | pgAdmin 4 | 6.9 ~ 9.15 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|
No public POC found.
Login to generate AI POC| CVE-2026-7813 | 9.9 CRITICAL | pgAdmin 4: Cross-user data access and shared-server privilege escalation in server mode |
| CVE-2026-7815 | 8.8 HIGH | pgAdmin 4: SQL injection in Maintenance tool option values leading to remote code executio |
| CVE-2026-7816 | 8.8 HIGH | pgAdmin 4: OS command injection in Import/Export query export via psql metacommand breakou |
| CVE-2026-7819 | 8.1 HIGH | pgAdmin 4: Symbolic-link path traversal in File Manager allows arbitrary file write |
| CVE-2026-7818 | 7.0 HIGH | pgAdmin 4: Unsafe deserialization (CWE-502) in file-backed session manager leads to remote |
| CVE-2026-7817 | 6.5 MEDIUM | pgAdmin 4: Local file inclusion and server-side request forgery in LLM API configuration e |
| CVE-2026-7820 | 6.5 MEDIUM | pgAdmin 4: Account-lockout bypass via Flask-Security default /login view |
No comments yet