firebirdwebadmin icon indicating copy to clipboard operation
firebirdwebadmin copied to clipboard

FirebirdWebAdmin is a web frontend for the Firebird SQL database server written in PHP.

Results 12 firebirdwebadmin issues
Sort by recently updated
recently updated
newest added

Hello, i tried to install firebirdwebadmin 3.4.1 over my existing 3.4.0 installation. i just remove old 3.4.0 files and add new 3.4.1 from today and edit the configuration.inc.php file. but...

bug

Hi, I have queries return with BLOB columns, but the BLOB is portable to String/text. If possible try to convert BLOB to String in Select return. The column "MON$SQL_TEXT" from...

Hi, I have problem with: ``` SET TERM ^ ; CREATE OR ALTER trigger XXX_YYY0 for AAAAAAAA active before delete position 0 AS begin --something end;^ SET TERM ; ^...

Hi, I have problems with blocks like: ``` SET TERM !! ; EXECUTE BLOCK AS BEGIN --something END!! SET TERM ; !! ``` Thanks...

Hi, Sometimes I got this warning: ``` Warning: -- php: fbird_commit(): invalid transaction handle (expecting explicit transaction start) in file: /var/www/html/firebirdwebadmin/sql.php, line 190 ``` Thanks!

Would be nice if we could check for ignore BLOB fields on export section.

Doens't matter character set, the data always come with strange caracters. eg.:"GOI�S VELHO" should be "GOIÁS VELHO" the data is WIN1252

fb_lock_print for FB3(?) have mandatory parameter (-d or -f) and statistics can not be retrived now.

bug

Recently, our team found a reflected cross-site scripting (XSS) vulnerability The vulnerability logic is present in the file: https://github.com/mariuz/firebirdwebadmin/blob/master/panels/tb_droptables.php#L26 ![image](https://github.com/mariuz/firebirdwebadmin/assets/131662463/754c8484-be45-43d3-834d-edb0bbfd92a2) The `echo` directly outputs the parameter `$_POST['drop_tables']` without any sanitization....

Recently, our team found a reflected cross-site scripting (XSS) vulnerability The vulnerability logic is present in the file: https://github.com/mariuz/firebirdwebadmin/blob/master/panels/tb_dropfields.php#L27 ![image](https://github.com/mariuz/firebirdwebadmin/assets/131662463/cff1b84e-2420-4ea1-b13b-30f19b27e748) The `echo` directly outputs the parameter `$_POST['drop_cols']` without any sanitization....