Lookup for vulnerable packages by Package URL.

Purlpkg:composer/phpmyadmin/phpmyadmin@4.0.10.8
Typecomposer
Namespacephpmyadmin
Namephpmyadmin
Version4.0.10.8
Qualifiers
Subpath
Is_vulnerabletrue
Next_non_vulnerable_version4.9.11
Latest_non_vulnerable_version5.2.2
Affected_by_vulnerabilities
0
url VCID-2jjv-4en4-e3gx
vulnerability_id VCID-2jjv-4en4-e3gx
summary phpMyAdmin through 5.0.2 allows CSV injection via Export Section. NOTE: the vendor disputes this because "the CSV file is accurately generated based on the database contents.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-22278
reference_id
reference_type
scores
0
value 0.00409
scoring_system epss
scoring_elements 0.61125
published_at 2026-04-01T12:55:00Z
1
value 0.00409
scoring_system epss
scoring_elements 0.61205
published_at 2026-04-02T12:55:00Z
2
value 0.00409
scoring_system epss
scoring_elements 0.61233
published_at 2026-04-04T12:55:00Z
3
value 0.00409
scoring_system epss
scoring_elements 0.61199
published_at 2026-04-07T12:55:00Z
4
value 0.00409
scoring_system epss
scoring_elements 0.61247
published_at 2026-04-08T12:55:00Z
5
value 0.00409
scoring_system epss
scoring_elements 0.61261
published_at 2026-04-09T12:55:00Z
6
value 0.00409
scoring_system epss
scoring_elements 0.61281
published_at 2026-04-11T12:55:00Z
7
value 0.00409
scoring_system epss
scoring_elements 0.61267
published_at 2026-04-12T12:55:00Z
8
value 0.00409
scoring_system epss
scoring_elements 0.61249
published_at 2026-04-13T12:55:00Z
9
value 0.00409
scoring_system epss
scoring_elements 0.61289
published_at 2026-04-16T12:55:00Z
10
value 0.00409
scoring_system epss
scoring_elements 0.61294
published_at 2026-04-18T12:55:00Z
11
value 0.00409
scoring_system epss
scoring_elements 0.61273
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-22278
1
reference_url https://nvd.nist.gov/vuln/detail/CVE-2020-22278
reference_id CVE-2020-22278
reference_type
scores
url https://nvd.nist.gov/vuln/detail/CVE-2020-22278
fixed_packages
0
url pkg:composer/phpmyadmin/phpmyadmin@5.0.3
purl pkg:composer/phpmyadmin/phpmyadmin@5.0.3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-araw-4wdy-hqcz
1
vulnerability VCID-rqy8-n6fr-hqey
2
vulnerability VCID-ym9b-4su6-6fbr
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/phpmyadmin/phpmyadmin@5.0.3
aliases CVE-2020-22278
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2jjv-4en4-e3gx
1
url VCID-5657-kcyh-7bc2
vulnerability_id VCID-5657-kcyh-7bc2
summary
phpMyAdmin SQL injection in user accounts page
In phpMyAdmin 4 before 4.9.4 and 5 before 5.0.1, SQL injection exists in the user accounts page. A malicious user could inject custom SQL in place of their own username when creating queries to this page. An attacker must have a valid MySQL account to access the server.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00024.html
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00024.html
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-5504
reference_id
reference_type
scores
0
value 0.22375
scoring_system epss
scoring_elements 0.95843
published_at 2026-04-21T12:55:00Z
1
value 0.22375
scoring_system epss
scoring_elements 0.95834
published_at 2026-04-16T12:55:00Z
2
value 0.22375
scoring_system epss
scoring_elements 0.9584
published_at 2026-04-18T12:55:00Z
3
value 0.23238
scoring_system epss
scoring_elements 0.95916
published_at 2026-04-02T12:55:00Z
4
value 0.23238
scoring_system epss
scoring_elements 0.95908
published_at 2026-04-01T12:55:00Z
5
value 0.23238
scoring_system epss
scoring_elements 0.95945
published_at 2026-04-13T12:55:00Z
6
value 0.23238
scoring_system epss
scoring_elements 0.95942
published_at 2026-04-12T12:55:00Z
7
value 0.23238
scoring_system epss
scoring_elements 0.95939
published_at 2026-04-09T12:55:00Z
8
value 0.23238
scoring_system epss
scoring_elements 0.95937
published_at 2026-04-08T12:55:00Z
9
value 0.23238
scoring_system epss
scoring_elements 0.95928
published_at 2026-04-07T12:55:00Z
10
value 0.23238
scoring_system epss
scoring_elements 0.95924
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-5504
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-5504
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-5504
3
reference_url https://cybersecurityworks.com/zerodays/cve-2020-5504-phpmyadmin.html
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://cybersecurityworks.com/zerodays/cve-2020-5504-phpmyadmin.html
4
reference_url https://github.com/FriendsOfPHP/security-advisories/blob/master/phpmyadmin/phpmyadmin/CVE-2020-5504.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/FriendsOfPHP/security-advisories/blob/master/phpmyadmin/phpmyadmin/CVE-2020-5504.yaml
5
reference_url https://github.com/MarkLee131/awesome-web-pocs/blob/main/CVE-2020-5504.md
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/MarkLee131/awesome-web-pocs/blob/main/CVE-2020-5504.md
6
reference_url https://github.com/phpmyadmin/composer
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/phpmyadmin/composer
7
reference_url https://lists.debian.org/debian-lts-announce/2020/01/msg00011.html
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.debian.org/debian-lts-announce/2020/01/msg00011.html
8
reference_url https://nvd.nist.gov/vuln/detail/CVE-2020-5504
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2020-5504
9
reference_url https://www.phpmyadmin.net/security/PMASA-2020-1
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://www.phpmyadmin.net/security/PMASA-2020-1
10
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=948718
reference_id 948718
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=948718
11
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/webapps/52451.txt
reference_id CVE-2020-5504
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/webapps/52451.txt
12
reference_url https://github.com/advisories/GHSA-fgj8-93xx-f6g6
reference_id GHSA-fgj8-93xx-f6g6
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-fgj8-93xx-f6g6
13
reference_url https://usn.ubuntu.com/4639-1/
reference_id USN-4639-1
reference_type
scores
url https://usn.ubuntu.com/4639-1/
14
reference_url https://usn.ubuntu.com/USN-4843-1/
reference_id USN-USN-4843-1
reference_type
scores
url https://usn.ubuntu.com/USN-4843-1/
fixed_packages
0
url pkg:composer/phpmyadmin/phpmyadmin@4.9.4
purl pkg:composer/phpmyadmin/phpmyadmin@4.9.4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2jjv-4en4-e3gx
1
vulnerability VCID-2y3v-jnph-hfh4
2
vulnerability VCID-mk34-h4nz-b3ey
3
vulnerability VCID-na3j-h3qr-k7dc
4
vulnerability VCID-ngtc-xtjn-xbhp
5
vulnerability VCID-rqy8-n6fr-hqey
6
vulnerability VCID-tks3-6uv4-kygf
7
vulnerability VCID-ym9b-4su6-6fbr
8
vulnerability VCID-znfm-ak2t-mqdd
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/phpmyadmin/phpmyadmin@4.9.4
1
url pkg:composer/phpmyadmin/phpmyadmin@5.0.1
purl pkg:composer/phpmyadmin/phpmyadmin@5.0.1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2jjv-4en4-e3gx
1
vulnerability VCID-2y3v-jnph-hfh4
2
vulnerability VCID-41mv-6vqr-sua6
3
vulnerability VCID-araw-4wdy-hqcz
4
vulnerability VCID-mk34-h4nz-b3ey
5
vulnerability VCID-ngtc-xtjn-xbhp
6
vulnerability VCID-rqy8-n6fr-hqey
7
vulnerability VCID-tks3-6uv4-kygf
8
vulnerability VCID-ym9b-4su6-6fbr
9
vulnerability VCID-znfm-ak2t-mqdd
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/phpmyadmin/phpmyadmin@5.0.1
aliases CVE-2020-5504, GHSA-fgj8-93xx-f6g6
risk_score 10.0
exploitability 2.0
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5657-kcyh-7bc2
2
url VCID-g6ud-92qe-hqcx
vulnerability_id VCID-g6ud-92qe-hqcx
summary
phpMyAdmin unsanitized Git information
phpMyAdmin before 4.9.2 does not escape certain Git information, related to `libraries/classes/Display/GitRevision.php and libraries/classes/Footer.php`.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-19617
reference_id
reference_type
scores
0
value 0.01155
scoring_system epss
scoring_elements 0.78487
published_at 2026-04-02T12:55:00Z
1
value 0.01155
scoring_system epss
scoring_elements 0.78518
published_at 2026-04-04T12:55:00Z
2
value 0.01155
scoring_system epss
scoring_elements 0.78481
published_at 2026-04-01T12:55:00Z
3
value 0.01155
scoring_system epss
scoring_elements 0.78556
published_at 2026-04-21T12:55:00Z
4
value 0.01155
scoring_system epss
scoring_elements 0.78559
published_at 2026-04-18T12:55:00Z
5
value 0.01155
scoring_system epss
scoring_elements 0.7856
published_at 2026-04-16T12:55:00Z
6
value 0.01155
scoring_system epss
scoring_elements 0.78532
published_at 2026-04-13T12:55:00Z
7
value 0.01155
scoring_system epss
scoring_elements 0.7854
published_at 2026-04-12T12:55:00Z
8
value 0.01155
scoring_system epss
scoring_elements 0.78558
published_at 2026-04-11T12:55:00Z
9
value 0.01155
scoring_system epss
scoring_elements 0.78533
published_at 2026-04-09T12:55:00Z
10
value 0.01155
scoring_system epss
scoring_elements 0.78528
published_at 2026-04-08T12:55:00Z
11
value 0.01155
scoring_system epss
scoring_elements 0.78501
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-19617
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19617
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19617
2
reference_url https://github.com/phpmyadmin/composer
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://github.com/phpmyadmin/composer
3
reference_url https://github.com/phpmyadmin/phpmyadmin/commit/1119de642b136d20e810bb20f545069a01dd7cc9
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://github.com/phpmyadmin/phpmyadmin/commit/1119de642b136d20e810bb20f545069a01dd7cc9
4
reference_url https://github.com/phpmyadmin/phpmyadmin/compare/RELEASE_4_9_1...RELEASE_4_9_2
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://github.com/phpmyadmin/phpmyadmin/compare/RELEASE_4_9_1...RELEASE_4_9_2
5
reference_url https://lists.debian.org/debian-lts-announce/2019/12/msg00006.html
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://lists.debian.org/debian-lts-announce/2019/12/msg00006.html
6
reference_url https://lists.debian.org/debian-lts-announce/2020/10/msg00024.html
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://lists.debian.org/debian-lts-announce/2020/10/msg00024.html
7
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-19617
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2019-19617
8
reference_url https://www.phpmyadmin.net/news/2019/11/22/phpmyadmin-492-released
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://www.phpmyadmin.net/news/2019/11/22/phpmyadmin-492-released
9
reference_url https://www.phpmyadmin.net/news/2019/11/22/phpmyadmin-492-released/
reference_id
reference_type
scores
url https://www.phpmyadmin.net/news/2019/11/22/phpmyadmin-492-released/
10
reference_url https://github.com/advisories/GHSA-pgph-mc4p-f8c3
reference_id GHSA-pgph-mc4p-f8c3
reference_type
scores
0
value CRITICAL
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-pgph-mc4p-f8c3
11
reference_url https://usn.ubuntu.com/4639-1/
reference_id USN-4639-1
reference_type
scores
url https://usn.ubuntu.com/4639-1/
12
reference_url https://usn.ubuntu.com/USN-4843-1/
reference_id USN-USN-4843-1
reference_type
scores
url https://usn.ubuntu.com/USN-4843-1/
fixed_packages
0
url pkg:composer/phpmyadmin/phpmyadmin@4.9.2
purl pkg:composer/phpmyadmin/phpmyadmin@4.9.2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2jjv-4en4-e3gx
1
vulnerability VCID-2y3v-jnph-hfh4
2
vulnerability VCID-5657-kcyh-7bc2
3
vulnerability VCID-mk34-h4nz-b3ey
4
vulnerability VCID-na3j-h3qr-k7dc
5
vulnerability VCID-ngtc-xtjn-xbhp
6
vulnerability VCID-rqy8-n6fr-hqey
7
vulnerability VCID-tks3-6uv4-kygf
8
vulnerability VCID-ym9b-4su6-6fbr
9
vulnerability VCID-znfm-ak2t-mqdd
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/phpmyadmin/phpmyadmin@4.9.2
aliases CVE-2019-19617, GHSA-pgph-mc4p-f8c3
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-g6ud-92qe-hqcx
3
url VCID-gu4y-aeqx-mqak
vulnerability_id VCID-gu4y-aeqx-mqak
summary
SQL injection in phpMyAdmin
An issue was discovered in phpMyAdmin before 4.9.2. A crafted database/table name can be used to trigger a SQL injection attack through the designer feature.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00002.html
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00002.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00024.html
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00024.html
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-18622
reference_id
reference_type
scores
0
value 0.00736
scoring_system epss
scoring_elements 0.72851
published_at 2026-04-21T12:55:00Z
1
value 0.00736
scoring_system epss
scoring_elements 0.72752
published_at 2026-04-01T12:55:00Z
2
value 0.00736
scoring_system epss
scoring_elements 0.7276
published_at 2026-04-02T12:55:00Z
3
value 0.00736
scoring_system epss
scoring_elements 0.7278
published_at 2026-04-04T12:55:00Z
4
value 0.00736
scoring_system epss
scoring_elements 0.72756
published_at 2026-04-07T12:55:00Z
5
value 0.00736
scoring_system epss
scoring_elements 0.72794
published_at 2026-04-08T12:55:00Z
6
value 0.00736
scoring_system epss
scoring_elements 0.72808
published_at 2026-04-09T12:55:00Z
7
value 0.00736
scoring_system epss
scoring_elements 0.72832
published_at 2026-04-11T12:55:00Z
8
value 0.00736
scoring_system epss
scoring_elements 0.72815
published_at 2026-04-12T12:55:00Z
9
value 0.00736
scoring_system epss
scoring_elements 0.72807
published_at 2026-04-13T12:55:00Z
10
value 0.00736
scoring_system epss
scoring_elements 0.72849
published_at 2026-04-16T12:55:00Z
11
value 0.00736
scoring_system epss
scoring_elements 0.72859
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-18622
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18622
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18622
4
reference_url https://github.com/phpmyadmin/composer/commit/51acbf53564d9b52e78509a5688ec2b68976b5f7
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://github.com/phpmyadmin/composer/commit/51acbf53564d9b52e78509a5688ec2b68976b5f7
5
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BA4DGF7KTQS6WA2DRNJSW66L43WB7LRV/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BA4DGF7KTQS6WA2DRNJSW66L43WB7LRV/
6
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W5GW4KEMNCBQYZCIXEJYC42OEBBN2NSH/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W5GW4KEMNCBQYZCIXEJYC42OEBBN2NSH/
7
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BA4DGF7KTQS6WA2DRNJSW66L43WB7LRV
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BA4DGF7KTQS6WA2DRNJSW66L43WB7LRV
8
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BA4DGF7KTQS6WA2DRNJSW66L43WB7LRV/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BA4DGF7KTQS6WA2DRNJSW66L43WB7LRV/
9
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W5GW4KEMNCBQYZCIXEJYC42OEBBN2NSH
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W5GW4KEMNCBQYZCIXEJYC42OEBBN2NSH
10
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W5GW4KEMNCBQYZCIXEJYC42OEBBN2NSH/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W5GW4KEMNCBQYZCIXEJYC42OEBBN2NSH/
11
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-18622
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
1
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
2
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2019-18622
12
reference_url https://security.gentoo.org/glsa/202003-39
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://security.gentoo.org/glsa/202003-39
13
reference_url https://www.phpmyadmin.net/security/PMASA-2019-5
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://www.phpmyadmin.net/security/PMASA-2019-5
14
reference_url https://www.phpmyadmin.net/security/PMASA-2019-5/
reference_id
reference_type
scores
url https://www.phpmyadmin.net/security/PMASA-2019-5/
15
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=945349
reference_id 945349
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=945349
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:opensuse:backports_sle:15.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:opensuse:backports_sle:15.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:opensuse:backports_sle:15.0:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:opensuse:backports_sle:15.0:sp1:*:*:*:*:*:*
reference_id cpe:2.3:a:opensuse:backports_sle:15.0:sp1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:opensuse:backports_sle:15.0:sp1:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:phpmyadmin:phpmyadmin:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:*:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
23
reference_url https://github.com/advisories/GHSA-jgjc-332c-8cmc
reference_id GHSA-jgjc-332c-8cmc
reference_type
scores
0
value CRITICAL
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-jgjc-332c-8cmc
fixed_packages
0
url pkg:composer/phpmyadmin/phpmyadmin@4.9.2
purl pkg:composer/phpmyadmin/phpmyadmin@4.9.2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2jjv-4en4-e3gx
1
vulnerability VCID-2y3v-jnph-hfh4
2
vulnerability VCID-5657-kcyh-7bc2
3
vulnerability VCID-mk34-h4nz-b3ey
4
vulnerability VCID-na3j-h3qr-k7dc
5
vulnerability VCID-ngtc-xtjn-xbhp
6
vulnerability VCID-rqy8-n6fr-hqey
7
vulnerability VCID-tks3-6uv4-kygf
8
vulnerability VCID-ym9b-4su6-6fbr
9
vulnerability VCID-znfm-ak2t-mqdd
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/phpmyadmin/phpmyadmin@4.9.2
1
url pkg:composer/phpmyadmin/phpmyadmin@5.0.0
purl pkg:composer/phpmyadmin/phpmyadmin@5.0.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2jjv-4en4-e3gx
1
vulnerability VCID-2y3v-jnph-hfh4
2
vulnerability VCID-41mv-6vqr-sua6
3
vulnerability VCID-5657-kcyh-7bc2
4
vulnerability VCID-araw-4wdy-hqcz
5
vulnerability VCID-mk34-h4nz-b3ey
6
vulnerability VCID-ngtc-xtjn-xbhp
7
vulnerability VCID-rqy8-n6fr-hqey
8
vulnerability VCID-tks3-6uv4-kygf
9
vulnerability VCID-ym9b-4su6-6fbr
10
vulnerability VCID-znfm-ak2t-mqdd
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/phpmyadmin/phpmyadmin@5.0.0
aliases CVE-2019-18622, GHSA-jgjc-332c-8cmc
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gu4y-aeqx-mqak
4
url VCID-ngtc-xtjn-xbhp
vulnerability_id VCID-ngtc-xtjn-xbhp
summary
phpMyAdmin SQL injection vulnerability
In phpMyAdmin 4.x before 4.9.5 and 5.x before 5.0.2, a SQL injection vulnerability has been discovered where certain parameters are not properly escaped when generating certain queries for search actions in libraries/classes/Controllers/Table/TableSearchController.php. An attacker can generate a crafted database or table name. The attack can be performed if a user attempts certain search operations on the malicious database or table.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00046.html
reference_id
reference_type
scores
0
value 8.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00046.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00050.html
reference_id
reference_type
scores
0
value 8.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00050.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00005.html
reference_id
reference_type
scores
0
value 8.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00005.html
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-10802
reference_id
reference_type
scores
0
value 0.01622
scoring_system epss
scoring_elements 0.81852
published_at 2026-04-11T12:55:00Z
1
value 0.01622
scoring_system epss
scoring_elements 0.81779
published_at 2026-04-02T12:55:00Z
2
value 0.01622
scoring_system epss
scoring_elements 0.81873
published_at 2026-04-21T12:55:00Z
3
value 0.01622
scoring_system epss
scoring_elements 0.81871
published_at 2026-04-18T12:55:00Z
4
value 0.01622
scoring_system epss
scoring_elements 0.8187
published_at 2026-04-16T12:55:00Z
5
value 0.01622
scoring_system epss
scoring_elements 0.81834
published_at 2026-04-13T12:55:00Z
6
value 0.01622
scoring_system epss
scoring_elements 0.8184
published_at 2026-04-12T12:55:00Z
7
value 0.01622
scoring_system epss
scoring_elements 0.81826
published_at 2026-04-08T12:55:00Z
8
value 0.01622
scoring_system epss
scoring_elements 0.818
published_at 2026-04-07T12:55:00Z
9
value 0.01622
scoring_system epss
scoring_elements 0.81802
published_at 2026-04-04T12:55:00Z
10
value 0.01622
scoring_system epss
scoring_elements 0.81769
published_at 2026-04-01T12:55:00Z
11
value 0.01622
scoring_system epss
scoring_elements 0.81833
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-10802
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10802
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10802
5
reference_url https://github.com/FriendsOfPHP/security-advisories/blob/master/phpmyadmin/phpmyadmin/CVE-2020-10802.yaml
reference_id
reference_type
scores
0
value 8.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/FriendsOfPHP/security-advisories/blob/master/phpmyadmin/phpmyadmin/CVE-2020-10802.yaml
6
reference_url https://github.com/phpmyadmin/composer
reference_id
reference_type
scores
0
value 8.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/phpmyadmin/composer
7
reference_url https://lists.debian.org/debian-lts-announce/2020/03/msg00028.html
reference_id
reference_type
scores
0
value 8.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.debian.org/debian-lts-announce/2020/03/msg00028.html
8
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AAVW3SUKWR5RF5LZ6SARCYOWBIFUIWOJ/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AAVW3SUKWR5RF5LZ6SARCYOWBIFUIWOJ/
9
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BUG3IRITW2LUBGR5LSQMP7MVRTELHZJK/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BUG3IRITW2LUBGR5LSQMP7MVRTELHZJK/
10
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UZI6EQVRRIG252DY3MBT33BJVCSYDMQO/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UZI6EQVRRIG252DY3MBT33BJVCSYDMQO/
11
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AAVW3SUKWR5RF5LZ6SARCYOWBIFUIWOJ
reference_id
reference_type
scores
0
value 8.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AAVW3SUKWR5RF5LZ6SARCYOWBIFUIWOJ
12
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BUG3IRITW2LUBGR5LSQMP7MVRTELHZJK
reference_id
reference_type
scores
0
value 8.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BUG3IRITW2LUBGR5LSQMP7MVRTELHZJK
13
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UZI6EQVRRIG252DY3MBT33BJVCSYDMQO
reference_id
reference_type
scores
0
value 8.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UZI6EQVRRIG252DY3MBT33BJVCSYDMQO
14
reference_url https://nvd.nist.gov/vuln/detail/CVE-2020-10802
reference_id
reference_type
scores
0
value 6.0
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:S/C:P/I:P/A:P
1
value 8.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2020-10802
15
reference_url https://www.phpmyadmin.net/security/PMASA-2020-3
reference_id
reference_type
scores
0
value 8.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://www.phpmyadmin.net/security/PMASA-2020-3
16
reference_url https://www.phpmyadmin.net/security/PMASA-2020-3/
reference_id
reference_type
scores
url https://www.phpmyadmin.net/security/PMASA-2020-3/
17
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=954665
reference_id 954665
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=954665
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:opensuse:backports_sle:15.0:-:*:*:*:*:*:*
reference_id cpe:2.3:a:opensuse:backports_sle:15.0:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:opensuse:backports_sle:15.0:-:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:opensuse:backports_sle:15.0:sp1:*:*:*:*:*:*
reference_id cpe:2.3:a:opensuse:backports_sle:15.0:sp1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:opensuse:backports_sle:15.0:sp1:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:phpmyadmin:phpmyadmin:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:*:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:package_hub:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:suse:package_hub:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:package_hub:-:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise:12.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise:12.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise:12.0:*:*:*:*:*:*:*
28
reference_url https://github.com/advisories/GHSA-f4cr-3xmc-2wpm
reference_id GHSA-f4cr-3xmc-2wpm
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-f4cr-3xmc-2wpm
29
reference_url https://usn.ubuntu.com/4639-1/
reference_id USN-4639-1
reference_type
scores
url https://usn.ubuntu.com/4639-1/
fixed_packages
0
url pkg:composer/phpmyadmin/phpmyadmin@4.9.5
purl pkg:composer/phpmyadmin/phpmyadmin@4.9.5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2jjv-4en4-e3gx
1
vulnerability VCID-2y3v-jnph-hfh4
2
vulnerability VCID-mk34-h4nz-b3ey
3
vulnerability VCID-na3j-h3qr-k7dc
4
vulnerability VCID-rqy8-n6fr-hqey
5
vulnerability VCID-ym9b-4su6-6fbr
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/phpmyadmin/phpmyadmin@4.9.5
1
url pkg:composer/phpmyadmin/phpmyadmin@5.0.2
purl pkg:composer/phpmyadmin/phpmyadmin@5.0.2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2jjv-4en4-e3gx
1
vulnerability VCID-2y3v-jnph-hfh4
2
vulnerability VCID-araw-4wdy-hqcz
3
vulnerability VCID-dsxw-w87t-eycw
4
vulnerability VCID-mk34-h4nz-b3ey
5
vulnerability VCID-rqy8-n6fr-hqey
6
vulnerability VCID-ym9b-4su6-6fbr
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/phpmyadmin/phpmyadmin@5.0.2
aliases CVE-2020-10802, GHSA-f4cr-3xmc-2wpm
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ngtc-xtjn-xbhp
5
url VCID-rqy8-n6fr-hqey
vulnerability_id VCID-rqy8-n6fr-hqey
summary
Exposure of Sensitive Information to an Unauthorized Actor
PhpMyAdmin 5.1.1 and before allows an attacker to retrieve potentially sensitive information by creating invalid requests. This affects the lang parameter, the pma_parameter, and the cookie section.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-0813
reference_id
reference_type
scores
0
value 0.00318
scoring_system epss
scoring_elements 0.54905
published_at 2026-04-16T12:55:00Z
1
value 0.00318
scoring_system epss
scoring_elements 0.54888
published_at 2026-04-21T12:55:00Z
2
value 0.00318
scoring_system epss
scoring_elements 0.54908
published_at 2026-04-18T12:55:00Z
3
value 0.00437
scoring_system epss
scoring_elements 0.63043
published_at 2026-04-04T12:55:00Z
4
value 0.00437
scoring_system epss
scoring_elements 0.62955
published_at 2026-04-01T12:55:00Z
5
value 0.00437
scoring_system epss
scoring_elements 0.63014
published_at 2026-04-02T12:55:00Z
6
value 0.00437
scoring_system epss
scoring_elements 0.63007
published_at 2026-04-07T12:55:00Z
7
value 0.00437
scoring_system epss
scoring_elements 0.63058
published_at 2026-04-08T12:55:00Z
8
value 0.00437
scoring_system epss
scoring_elements 0.63074
published_at 2026-04-09T12:55:00Z
9
value 0.00437
scoring_system epss
scoring_elements 0.63091
published_at 2026-04-11T12:55:00Z
10
value 0.00437
scoring_system epss
scoring_elements 0.63077
published_at 2026-04-12T12:55:00Z
11
value 0.00437
scoring_system epss
scoring_elements 0.63055
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-0813
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0813
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0813
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://security.gentoo.org/glsa/202311-17
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://security.gentoo.org/glsa/202311-17
4
reference_url https://www.incibe-cert.es/en/early-warning/security-advisories/phpmyadmin-exposure-sensitive-information
reference_id
reference_type
scores
url https://www.incibe-cert.es/en/early-warning/security-advisories/phpmyadmin-exposure-sensitive-information
5
reference_url https://www.phpmyadmin.net/news/2022/2/11/phpmyadmin-4910-and-513-are-released
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://www.phpmyadmin.net/news/2022/2/11/phpmyadmin-4910-and-513-are-released
6
reference_url https://www.phpmyadmin.net/news/2022/2/11/phpmyadmin-4910-and-513-are-released/
reference_id
reference_type
scores
url https://www.phpmyadmin.net/news/2022/2/11/phpmyadmin-4910-and-513-are-released/
7
reference_url https://nvd.nist.gov/vuln/detail/CVE-2022-0813
reference_id CVE-2022-0813
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2022-0813
8
reference_url https://github.com/advisories/GHSA-vx8q-j7h9-vf6q
reference_id GHSA-vx8q-j7h9-vf6q
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-vx8q-j7h9-vf6q
fixed_packages
0
url pkg:composer/phpmyadmin/phpmyadmin@5.1.2
purl pkg:composer/phpmyadmin/phpmyadmin@5.1.2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-araw-4wdy-hqcz
1
vulnerability VCID-ym9b-4su6-6fbr
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/phpmyadmin/phpmyadmin@5.1.2
1
url pkg:composer/phpmyadmin/phpmyadmin@5.1.3
purl pkg:composer/phpmyadmin/phpmyadmin@5.1.3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-araw-4wdy-hqcz
1
vulnerability VCID-ym9b-4su6-6fbr
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/phpmyadmin/phpmyadmin@5.1.3
aliases CVE-2022-0813, GHSA-vx8q-j7h9-vf6q
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rqy8-n6fr-hqey
6
url VCID-tks3-6uv4-kygf
vulnerability_id VCID-tks3-6uv4-kygf
summary
phpMyAdmin SQL Injection
In phpMyAdmin 4.x before 4.9.5 and 5.x before 5.0.2, a SQL injection vulnerability was found in retrieval of the current username (in libraries/classes/Server/Privileges.php and libraries/classes/UserPassword.php). A malicious user with access to the server could create a crafted username, and then trick the victim into performing specific actions with that user account (such as editing its privileges).
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00046.html
reference_id
reference_type
scores
0
value 8.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00046.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00050.html
reference_id
reference_type
scores
0
value 8.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00050.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00005.html
reference_id
reference_type
scores
0
value 8.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00005.html
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-10804
reference_id
reference_type
scores
0
value 0.02444
scoring_system epss
scoring_elements 0.85208
published_at 2026-04-18T12:55:00Z
1
value 0.02444
scoring_system epss
scoring_elements 0.85114
published_at 2026-04-01T12:55:00Z
2
value 0.02444
scoring_system epss
scoring_elements 0.85127
published_at 2026-04-02T12:55:00Z
3
value 0.02444
scoring_system epss
scoring_elements 0.85144
published_at 2026-04-04T12:55:00Z
4
value 0.02444
scoring_system epss
scoring_elements 0.85147
published_at 2026-04-07T12:55:00Z
5
value 0.02444
scoring_system epss
scoring_elements 0.85169
published_at 2026-04-08T12:55:00Z
6
value 0.02444
scoring_system epss
scoring_elements 0.85177
published_at 2026-04-09T12:55:00Z
7
value 0.02444
scoring_system epss
scoring_elements 0.85191
published_at 2026-04-11T12:55:00Z
8
value 0.02444
scoring_system epss
scoring_elements 0.85189
published_at 2026-04-12T12:55:00Z
9
value 0.02444
scoring_system epss
scoring_elements 0.85186
published_at 2026-04-13T12:55:00Z
10
value 0.02444
scoring_system epss
scoring_elements 0.85207
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-10804
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10804
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10804
5
reference_url https://github.com/FriendsOfPHP/security-advisories/blob/master/phpmyadmin/phpmyadmin/CVE-2020-10804.yaml
reference_id
reference_type
scores
0
value 8.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/FriendsOfPHP/security-advisories/blob/master/phpmyadmin/phpmyadmin/CVE-2020-10804.yaml
6
reference_url https://github.com/phpmyadmin/composer
reference_id
reference_type
scores
0
value 8.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/phpmyadmin/composer
7
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AAVW3SUKWR5RF5LZ6SARCYOWBIFUIWOJ/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AAVW3SUKWR5RF5LZ6SARCYOWBIFUIWOJ/
8
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BUG3IRITW2LUBGR5LSQMP7MVRTELHZJK/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BUG3IRITW2LUBGR5LSQMP7MVRTELHZJK/
9
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UZI6EQVRRIG252DY3MBT33BJVCSYDMQO/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UZI6EQVRRIG252DY3MBT33BJVCSYDMQO/
10
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AAVW3SUKWR5RF5LZ6SARCYOWBIFUIWOJ
reference_id
reference_type
scores
0
value 8.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AAVW3SUKWR5RF5LZ6SARCYOWBIFUIWOJ
11
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BUG3IRITW2LUBGR5LSQMP7MVRTELHZJK
reference_id
reference_type
scores
0
value 8.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BUG3IRITW2LUBGR5LSQMP7MVRTELHZJK
12
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UZI6EQVRRIG252DY3MBT33BJVCSYDMQO
reference_id
reference_type
scores
0
value 8.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UZI6EQVRRIG252DY3MBT33BJVCSYDMQO
13
reference_url https://nvd.nist.gov/vuln/detail/CVE-2020-10804
reference_id
reference_type
scores
0
value 6.0
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:S/C:P/I:P/A:P
1
value 8.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2020-10804
14
reference_url https://www.phpmyadmin.net/security/PMASA-2020-2
reference_id
reference_type
scores
0
value 8.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://www.phpmyadmin.net/security/PMASA-2020-2
15
reference_url https://www.phpmyadmin.net/security/PMASA-2020-2/
reference_id
reference_type
scores
url https://www.phpmyadmin.net/security/PMASA-2020-2/
16
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=954667
reference_id 954667
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=954667
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:opensuse:backports_sle:15.0:-:*:*:*:*:*:*
reference_id cpe:2.3:a:opensuse:backports_sle:15.0:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:opensuse:backports_sle:15.0:-:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:opensuse:backports_sle:15.0:sp1:*:*:*:*:*:*
reference_id cpe:2.3:a:opensuse:backports_sle:15.0:sp1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:opensuse:backports_sle:15.0:sp1:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:phpmyadmin:phpmyadmin:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:*:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:package_hub:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:suse:package_hub:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:package_hub:-:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise:12.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise:12.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise:12.0:*:*:*:*:*:*:*
26
reference_url https://github.com/advisories/GHSA-h65r-8fp8-w7cx
reference_id GHSA-h65r-8fp8-w7cx
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-h65r-8fp8-w7cx
27
reference_url https://usn.ubuntu.com/4639-1/
reference_id USN-4639-1
reference_type
scores
url https://usn.ubuntu.com/4639-1/
fixed_packages
0
url pkg:composer/phpmyadmin/phpmyadmin@4.9.5
purl pkg:composer/phpmyadmin/phpmyadmin@4.9.5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2jjv-4en4-e3gx
1
vulnerability VCID-2y3v-jnph-hfh4
2
vulnerability VCID-mk34-h4nz-b3ey
3
vulnerability VCID-na3j-h3qr-k7dc
4
vulnerability VCID-rqy8-n6fr-hqey
5
vulnerability VCID-ym9b-4su6-6fbr
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/phpmyadmin/phpmyadmin@4.9.5
1
url pkg:composer/phpmyadmin/phpmyadmin@5.0.2
purl pkg:composer/phpmyadmin/phpmyadmin@5.0.2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2jjv-4en4-e3gx
1
vulnerability VCID-2y3v-jnph-hfh4
2
vulnerability VCID-araw-4wdy-hqcz
3
vulnerability VCID-dsxw-w87t-eycw
4
vulnerability VCID-mk34-h4nz-b3ey
5
vulnerability VCID-rqy8-n6fr-hqey
6
vulnerability VCID-ym9b-4su6-6fbr
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/phpmyadmin/phpmyadmin@5.0.2
aliases CVE-2020-10804, GHSA-h65r-8fp8-w7cx
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tks3-6uv4-kygf
7
url VCID-znfm-ak2t-mqdd
vulnerability_id VCID-znfm-ak2t-mqdd
summary
phpMyAdmin SQL injection vulnerability
In phpMyAdmin 4.x before 4.9.5 and 5.x before 5.0.2, a SQL injection vulnerability was discovered where malicious code could be used to trigger an XSS attack through retrieving and displaying results (in tbl_get_field.php and libraries/classes/Display/Results.php). The attacker must be able to insert crafted data into certain database tables, which when retrieved (for instance, through the Browse tab) can trigger the XSS attack.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00046.html
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00046.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00050.html
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00050.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00005.html
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00005.html
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-10803
reference_id
reference_type
scores
0
value 0.03554
scoring_system epss
scoring_elements 0.87708
published_at 2026-04-21T12:55:00Z
1
value 0.03554
scoring_system epss
scoring_elements 0.87643
published_at 2026-04-01T12:55:00Z
2
value 0.03554
scoring_system epss
scoring_elements 0.87653
published_at 2026-04-02T12:55:00Z
3
value 0.03554
scoring_system epss
scoring_elements 0.87666
published_at 2026-04-04T12:55:00Z
4
value 0.03554
scoring_system epss
scoring_elements 0.87667
published_at 2026-04-07T12:55:00Z
5
value 0.03554
scoring_system epss
scoring_elements 0.87688
published_at 2026-04-08T12:55:00Z
6
value 0.03554
scoring_system epss
scoring_elements 0.87694
published_at 2026-04-09T12:55:00Z
7
value 0.03554
scoring_system epss
scoring_elements 0.87706
published_at 2026-04-11T12:55:00Z
8
value 0.03554
scoring_system epss
scoring_elements 0.87699
published_at 2026-04-12T12:55:00Z
9
value 0.03554
scoring_system epss
scoring_elements 0.87697
published_at 2026-04-13T12:55:00Z
10
value 0.03554
scoring_system epss
scoring_elements 0.87712
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-10803
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10803
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10803
5
reference_url https://github.com/FriendsOfPHP/security-advisories/blob/master/phpmyadmin/phpmyadmin/CVE-2020-10803.yaml
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/FriendsOfPHP/security-advisories/blob/master/phpmyadmin/phpmyadmin/CVE-2020-10803.yaml
6
reference_url https://github.com/phpmyadmin/composer
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/phpmyadmin/composer
7
reference_url https://lists.debian.org/debian-lts-announce/2020/03/msg00028.html
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.debian.org/debian-lts-announce/2020/03/msg00028.html
8
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AAVW3SUKWR5RF5LZ6SARCYOWBIFUIWOJ/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AAVW3SUKWR5RF5LZ6SARCYOWBIFUIWOJ/
9
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BUG3IRITW2LUBGR5LSQMP7MVRTELHZJK/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BUG3IRITW2LUBGR5LSQMP7MVRTELHZJK/
10
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UZI6EQVRRIG252DY3MBT33BJVCSYDMQO/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UZI6EQVRRIG252DY3MBT33BJVCSYDMQO/
11
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AAVW3SUKWR5RF5LZ6SARCYOWBIFUIWOJ
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AAVW3SUKWR5RF5LZ6SARCYOWBIFUIWOJ
12
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BUG3IRITW2LUBGR5LSQMP7MVRTELHZJK
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BUG3IRITW2LUBGR5LSQMP7MVRTELHZJK
13
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UZI6EQVRRIG252DY3MBT33BJVCSYDMQO
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UZI6EQVRRIG252DY3MBT33BJVCSYDMQO
14
reference_url https://nvd.nist.gov/vuln/detail/CVE-2020-10803
reference_id
reference_type
scores
0
value 3.5
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:S/C:N/I:P/A:N
1
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2020-10803
15
reference_url https://www.phpmyadmin.net/security/PMASA-2020-4
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://www.phpmyadmin.net/security/PMASA-2020-4
16
reference_url https://www.phpmyadmin.net/security/PMASA-2020-4/
reference_id
reference_type
scores
url https://www.phpmyadmin.net/security/PMASA-2020-4/
17
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=954666
reference_id 954666
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=954666
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:opensuse:backports_sle:15.0:-:*:*:*:*:*:*
reference_id cpe:2.3:a:opensuse:backports_sle:15.0:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:opensuse:backports_sle:15.0:-:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:opensuse:backports_sle:15.0:sp1:*:*:*:*:*:*
reference_id cpe:2.3:a:opensuse:backports_sle:15.0:sp1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:opensuse:backports_sle:15.0:sp1:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:phpmyadmin:phpmyadmin:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:*:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:package_hub:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:suse:package_hub:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:package_hub:-:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise:12.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise:12.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise:12.0:*:*:*:*:*:*:*
28
reference_url https://github.com/advisories/GHSA-fcww-8wvc-38q9
reference_id GHSA-fcww-8wvc-38q9
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-fcww-8wvc-38q9
29
reference_url https://usn.ubuntu.com/4639-1/
reference_id USN-4639-1
reference_type
scores
url https://usn.ubuntu.com/4639-1/
fixed_packages
0
url pkg:composer/phpmyadmin/phpmyadmin@4.9.5
purl pkg:composer/phpmyadmin/phpmyadmin@4.9.5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2jjv-4en4-e3gx
1
vulnerability VCID-2y3v-jnph-hfh4
2
vulnerability VCID-mk34-h4nz-b3ey
3
vulnerability VCID-na3j-h3qr-k7dc
4
vulnerability VCID-rqy8-n6fr-hqey
5
vulnerability VCID-ym9b-4su6-6fbr
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/phpmyadmin/phpmyadmin@4.9.5
1
url pkg:composer/phpmyadmin/phpmyadmin@5.0.2
purl pkg:composer/phpmyadmin/phpmyadmin@5.0.2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2jjv-4en4-e3gx
1
vulnerability VCID-2y3v-jnph-hfh4
2
vulnerability VCID-araw-4wdy-hqcz
3
vulnerability VCID-dsxw-w87t-eycw
4
vulnerability VCID-mk34-h4nz-b3ey
5
vulnerability VCID-rqy8-n6fr-hqey
6
vulnerability VCID-ym9b-4su6-6fbr
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/phpmyadmin/phpmyadmin@5.0.2
aliases CVE-2020-10803, GHSA-fcww-8wvc-38q9
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-znfm-ak2t-mqdd
8
url VCID-zyzp-aqd8-e3a9
vulnerability_id VCID-zyzp-aqd8-e3a9
summary
phpMyAdmin Cross-Site Request Forgery (CSRF)
A CSRF issue in phpMyAdmin 4.9.0.1 allows deletion of any server in the Setup page.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00078.html
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00078.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00024.html
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00024.html
2
reference_url http://packetstormsecurity.com/files/154483/phpMyAdmin-4.9.0.1-Cross-Site-Request-Forgery.html
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url http://packetstormsecurity.com/files/154483/phpMyAdmin-4.9.0.1-Cross-Site-Request-Forgery.html
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-12922
reference_id
reference_type
scores
0
value 0.4225
scoring_system epss
scoring_elements 0.97459
published_at 2026-04-21T12:55:00Z
1
value 0.4225
scoring_system epss
scoring_elements 0.97422
published_at 2026-04-01T12:55:00Z
2
value 0.4225
scoring_system epss
scoring_elements 0.97429
published_at 2026-04-02T12:55:00Z
3
value 0.4225
scoring_system epss
scoring_elements 0.97433
published_at 2026-04-04T12:55:00Z
4
value 0.4225
scoring_system epss
scoring_elements 0.97434
published_at 2026-04-07T12:55:00Z
5
value 0.4225
scoring_system epss
scoring_elements 0.97441
published_at 2026-04-08T12:55:00Z
6
value 0.4225
scoring_system epss
scoring_elements 0.97442
published_at 2026-04-09T12:55:00Z
7
value 0.4225
scoring_system epss
scoring_elements 0.97445
published_at 2026-04-11T12:55:00Z
8
value 0.4225
scoring_system epss
scoring_elements 0.97447
published_at 2026-04-13T12:55:00Z
9
value 0.4225
scoring_system epss
scoring_elements 0.97456
published_at 2026-04-16T12:55:00Z
10
value 0.4225
scoring_system epss
scoring_elements 0.9746
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-12922
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12922
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12922
5
reference_url http://seclists.org/fulldisclosure/2019/Sep/23
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url http://seclists.org/fulldisclosure/2019/Sep/23
6
reference_url https://github.com/phpmyadmin/phpmyadmin/commit/427fbed55d3154d96ecfc1c7784d49eaa3c04161
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/phpmyadmin/phpmyadmin/commit/427fbed55d3154d96ecfc1c7784d49eaa3c04161
7
reference_url https://github.com/phpmyadmin/phpmyadmin/commit/7d21d4223bdbe0306593309132b4263d7087d13b
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/phpmyadmin/phpmyadmin/commit/7d21d4223bdbe0306593309132b4263d7087d13b
8
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PBLBE6CSC2ZLINIRBUU5XBLXYVBTF3KA/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PBLBE6CSC2ZLINIRBUU5XBLXYVBTF3KA/
9
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QJ5BW2VEMD2P23ZYRWHDBEQHOKGKGWD6/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QJ5BW2VEMD2P23ZYRWHDBEQHOKGKGWD6/
10
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YCB3PTGHZ7AJCM6BKCQRRP6HG3OKYCMN/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YCB3PTGHZ7AJCM6BKCQRRP6HG3OKYCMN/
11
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PBLBE6CSC2ZLINIRBUU5XBLXYVBTF3KA
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PBLBE6CSC2ZLINIRBUU5XBLXYVBTF3KA
12
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QJ5BW2VEMD2P23ZYRWHDBEQHOKGKGWD6
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QJ5BW2VEMD2P23ZYRWHDBEQHOKGKGWD6
13
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YCB3PTGHZ7AJCM6BKCQRRP6HG3OKYCMN
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YCB3PTGHZ7AJCM6BKCQRRP6HG3OKYCMN
14
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-12922
reference_id
reference_type
scores
0
value 5.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:P/A:P
1
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2019-12922
15
reference_url https://www.exploit-db.com/exploits/47385
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://www.exploit-db.com/exploits/47385
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:phpmyadmin:phpmyadmin:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:*:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
20
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/webapps/47385.txt
reference_id CVE-2019-12922
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/webapps/47385.txt
21
reference_url https://github.com/advisories/GHSA-4c9q-64gq-xhx4
reference_id GHSA-4c9q-64gq-xhx4
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-4c9q-64gq-xhx4
22
reference_url https://usn.ubuntu.com/USN-4843-1/
reference_id USN-USN-4843-1
reference_type
scores
url https://usn.ubuntu.com/USN-4843-1/
fixed_packages
0
url pkg:composer/phpmyadmin/phpmyadmin@4.9.1
purl pkg:composer/phpmyadmin/phpmyadmin@4.9.1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2jjv-4en4-e3gx
1
vulnerability VCID-2y3v-jnph-hfh4
2
vulnerability VCID-5657-kcyh-7bc2
3
vulnerability VCID-g6ud-92qe-hqcx
4
vulnerability VCID-gu4y-aeqx-mqak
5
vulnerability VCID-mk34-h4nz-b3ey
6
vulnerability VCID-na3j-h3qr-k7dc
7
vulnerability VCID-ngtc-xtjn-xbhp
8
vulnerability VCID-rqy8-n6fr-hqey
9
vulnerability VCID-tks3-6uv4-kygf
10
vulnerability VCID-ym9b-4su6-6fbr
11
vulnerability VCID-znfm-ak2t-mqdd
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/phpmyadmin/phpmyadmin@4.9.1
1
url pkg:composer/phpmyadmin/phpmyadmin@5.0.0
purl pkg:composer/phpmyadmin/phpmyadmin@5.0.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2jjv-4en4-e3gx
1
vulnerability VCID-2y3v-jnph-hfh4
2
vulnerability VCID-41mv-6vqr-sua6
3
vulnerability VCID-5657-kcyh-7bc2
4
vulnerability VCID-araw-4wdy-hqcz
5
vulnerability VCID-mk34-h4nz-b3ey
6
vulnerability VCID-ngtc-xtjn-xbhp
7
vulnerability VCID-rqy8-n6fr-hqey
8
vulnerability VCID-tks3-6uv4-kygf
9
vulnerability VCID-ym9b-4su6-6fbr
10
vulnerability VCID-znfm-ak2t-mqdd
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/phpmyadmin/phpmyadmin@5.0.0
aliases CVE-2019-12922, GHSA-4c9q-64gq-xhx4
risk_score 10.0
exploitability 2.0
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zyzp-aqd8-e3a9
Fixing_vulnerabilities
Risk_score10.0
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:composer/phpmyadmin/phpmyadmin@4.0.10.8