| 0 |
| url |
VCID-2jjv-4en4-e3gx |
| vulnerability_id |
VCID-2jjv-4en4-e3gx |
| summary |
phpMyAdmin through 5.0.2 allows CSV injection via Export Section. NOTE: the vendor disputes this because "the CSV file is accurately generated based on the database contents. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-22278 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00409 |
| scoring_system |
epss |
| scoring_elements |
0.61125 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00409 |
| scoring_system |
epss |
| scoring_elements |
0.61205 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00409 |
| scoring_system |
epss |
| scoring_elements |
0.61233 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00409 |
| scoring_system |
epss |
| scoring_elements |
0.61199 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00409 |
| scoring_system |
epss |
| scoring_elements |
0.61247 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00409 |
| scoring_system |
epss |
| scoring_elements |
0.61261 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00409 |
| scoring_system |
epss |
| scoring_elements |
0.61281 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00409 |
| scoring_system |
epss |
| scoring_elements |
0.61267 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00409 |
| scoring_system |
epss |
| scoring_elements |
0.61249 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00409 |
| scoring_system |
epss |
| scoring_elements |
0.61289 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00409 |
| scoring_system |
epss |
| scoring_elements |
0.61294 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00409 |
| scoring_system |
epss |
| scoring_elements |
0.61273 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-22278 |
|
| 1 |
|
|
| fixed_packages |
|
| aliases |
CVE-2020-22278
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-2jjv-4en4-e3gx |
|
| 1 |
| url |
VCID-5657-kcyh-7bc2 |
| vulnerability_id |
VCID-5657-kcyh-7bc2 |
| summary |
phpMyAdmin SQL injection in user accounts page
In phpMyAdmin 4 before 4.9.4 and 5 before 5.0.1, SQL injection exists in the user accounts page. A malicious user could inject custom SQL in place of their own username when creating queries to this page. An attacker must have a valid MySQL account to access the server. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-5504 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.22375 |
| scoring_system |
epss |
| scoring_elements |
0.95843 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.22375 |
| scoring_system |
epss |
| scoring_elements |
0.95834 |
| published_at |
2026-04-16T12:55:00Z |
|
| 2 |
| value |
0.22375 |
| scoring_system |
epss |
| scoring_elements |
0.9584 |
| published_at |
2026-04-18T12:55:00Z |
|
| 3 |
| value |
0.23238 |
| scoring_system |
epss |
| scoring_elements |
0.95916 |
| published_at |
2026-04-02T12:55:00Z |
|
| 4 |
| value |
0.23238 |
| scoring_system |
epss |
| scoring_elements |
0.95908 |
| published_at |
2026-04-01T12:55:00Z |
|
| 5 |
| value |
0.23238 |
| scoring_system |
epss |
| scoring_elements |
0.95945 |
| published_at |
2026-04-13T12:55:00Z |
|
| 6 |
| value |
0.23238 |
| scoring_system |
epss |
| scoring_elements |
0.95942 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.23238 |
| scoring_system |
epss |
| scoring_elements |
0.95939 |
| published_at |
2026-04-09T12:55:00Z |
|
| 8 |
| value |
0.23238 |
| scoring_system |
epss |
| scoring_elements |
0.95937 |
| published_at |
2026-04-08T12:55:00Z |
|
| 9 |
| value |
0.23238 |
| scoring_system |
epss |
| scoring_elements |
0.95928 |
| published_at |
2026-04-07T12:55:00Z |
|
| 10 |
| value |
0.23238 |
| scoring_system |
epss |
| scoring_elements |
0.95924 |
| published_at |
2026-04-04T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-5504 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
|
| fixed_packages |
|
| aliases |
CVE-2020-5504, GHSA-fgj8-93xx-f6g6
|
| risk_score |
10.0 |
| exploitability |
2.0 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-5657-kcyh-7bc2 |
|
| 2 |
| url |
VCID-986a-3m4g-83ge |
| vulnerability_id |
VCID-986a-3m4g-83ge |
| summary |
Cross-Site Request Forgery (CSRF)
By deceiving a user into clicking on a crafted URL, it is possible to perform harmful SQL operations such as renaming databases, creating new `tables/routines`, deleting designer pages, `adding/deleting` users, updating user passwords, killing SQL processes. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2018-19969 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00458 |
| scoring_system |
epss |
| scoring_elements |
0.63934 |
| published_at |
2026-04-07T12:55:00Z |
|
| 1 |
| value |
0.00458 |
| scoring_system |
epss |
| scoring_elements |
0.64006 |
| published_at |
2026-04-21T12:55:00Z |
|
| 2 |
| value |
0.00458 |
| scoring_system |
epss |
| scoring_elements |
0.64017 |
| published_at |
2026-04-18T12:55:00Z |
|
| 3 |
| value |
0.00458 |
| scoring_system |
epss |
| scoring_elements |
0.64005 |
| published_at |
2026-04-16T12:55:00Z |
|
| 4 |
| value |
0.00458 |
| scoring_system |
epss |
| scoring_elements |
0.6397 |
| published_at |
2026-04-13T12:55:00Z |
|
| 5 |
| value |
0.00458 |
| scoring_system |
epss |
| scoring_elements |
0.64 |
| published_at |
2026-04-12T12:55:00Z |
|
| 6 |
| value |
0.00458 |
| scoring_system |
epss |
| scoring_elements |
0.64014 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00458 |
| scoring_system |
epss |
| scoring_elements |
0.64002 |
| published_at |
2026-04-09T12:55:00Z |
|
| 8 |
| value |
0.00458 |
| scoring_system |
epss |
| scoring_elements |
0.63888 |
| published_at |
2026-04-01T12:55:00Z |
|
| 9 |
| value |
0.00458 |
| scoring_system |
epss |
| scoring_elements |
0.63947 |
| published_at |
2026-04-02T12:55:00Z |
|
| 10 |
| value |
0.00458 |
| scoring_system |
epss |
| scoring_elements |
0.63984 |
| published_at |
2026-04-08T12:55:00Z |
|
| 11 |
| value |
0.00458 |
| scoring_system |
epss |
| scoring_elements |
0.63974 |
| published_at |
2026-04-04T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2018-19969 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
|
| fixed_packages |
|
| aliases |
CVE-2018-19969, GHSA-xwf2-53mc-r8hx
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-986a-3m4g-83ge |
|
| 3 |
| url |
VCID-9auw-hwad-ybaf |
| vulnerability_id |
VCID-9auw-hwad-ybaf |
| summary |
Improper Authentication
An issue was discovered in phpMyAdm in which an attacker can include (view and potentially execute) files on the server. The vulnerability comes from a portion of code where pages are redirected and loaded within phpMyAdmin, and an improper test for allowed pages. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:composer/phpmyadmin/phpmyadmin@4.8.2 |
| purl |
pkg:composer/phpmyadmin/phpmyadmin@4.8.2 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-2jjv-4en4-e3gx |
|
| 1 |
| vulnerability |
VCID-5657-kcyh-7bc2 |
|
| 2 |
| vulnerability |
VCID-986a-3m4g-83ge |
|
| 3 |
| vulnerability |
VCID-br1c-5bzf-ufeu |
|
| 4 |
| vulnerability |
VCID-ebk2-vjau-57h9 |
|
| 5 |
| vulnerability |
VCID-fchc-55te-akhe |
|
| 6 |
| vulnerability |
VCID-g6ud-92qe-hqcx |
|
| 7 |
| vulnerability |
VCID-gu4y-aeqx-mqak |
|
| 8 |
| vulnerability |
VCID-jma9-9uhu-xuc3 |
|
| 9 |
| vulnerability |
VCID-ngtc-xtjn-xbhp |
|
| 10 |
| vulnerability |
VCID-qcra-cu62-43he |
|
| 11 |
| vulnerability |
VCID-rqy8-n6fr-hqey |
|
| 12 |
| vulnerability |
VCID-scu3-cfyc-9qfz |
|
| 13 |
| vulnerability |
VCID-tks3-6uv4-kygf |
|
| 14 |
| vulnerability |
VCID-yfja-ssw3-skh1 |
|
| 15 |
| vulnerability |
VCID-ym9b-4su6-6fbr |
|
| 16 |
| vulnerability |
VCID-znfm-ak2t-mqdd |
|
| 17 |
| vulnerability |
VCID-zyzp-aqd8-e3a9 |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:composer/phpmyadmin/phpmyadmin@4.8.2 |
|
| 1 |
|
|
| aliases |
CVE-2018-12613, GHSA-x394-g9j8-x7mf
|
| risk_score |
10.0 |
| exploitability |
2.0 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-9auw-hwad-ybaf |
|
| 4 |
| url |
VCID-br1c-5bzf-ufeu |
| vulnerability_id |
VCID-br1c-5bzf-ufeu |
| summary |
SQL Injection
An issue was discovered in phpMyAdmin. A vulnerability was reported where a specially crafted username can be used to trigger a SQL injection attack through the designer feature. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2019-6798 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00538 |
| scoring_system |
epss |
| scoring_elements |
0.67578 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00538 |
| scoring_system |
epss |
| scoring_elements |
0.67474 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00538 |
| scoring_system |
epss |
| scoring_elements |
0.6751 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00538 |
| scoring_system |
epss |
| scoring_elements |
0.67532 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00538 |
| scoring_system |
epss |
| scoring_elements |
0.67562 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00538 |
| scoring_system |
epss |
| scoring_elements |
0.67575 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00538 |
| scoring_system |
epss |
| scoring_elements |
0.67598 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00538 |
| scoring_system |
epss |
| scoring_elements |
0.67584 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00538 |
| scoring_system |
epss |
| scoring_elements |
0.67551 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00538 |
| scoring_system |
epss |
| scoring_elements |
0.67587 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00538 |
| scoring_system |
epss |
| scoring_elements |
0.67599 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2019-6798 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
| reference_url |
https://nvd.nist.gov/vuln/detail/CVE-2019-6798 |
| reference_id |
CVE-2019-6798 |
| reference_type |
|
| scores |
| 0 |
| value |
7.5 |
| scoring_system |
cvssv2 |
| scoring_elements |
AV:N/AC:L/Au:N/C:P/I:P/A:P |
|
| 1 |
| value |
9.8 |
| scoring_system |
cvssv3 |
| scoring_elements |
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
|
| 2 |
| value |
9.8 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
|
| 3 |
| value |
CRITICAL |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://nvd.nist.gov/vuln/detail/CVE-2019-6798 |
|
| 9 |
|
| 10 |
|
| 11 |
|
|
| fixed_packages |
|
| aliases |
CVE-2019-6798, GHSA-f732-fxh6-g4qj
|
| risk_score |
4.5 |
| exploitability |
0.5 |
| weighted_severity |
9.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-br1c-5bzf-ufeu |
|
| 5 |
| url |
VCID-c91y-txcw-2kdy |
| vulnerability_id |
VCID-c91y-txcw-2kdy |
| summary |
Cross-site Scripting
An issue was discovered in `js/designer/move.js` in phpMyAdm A Cross-Site Scripting vulnerability has been found where an attacker can use a crafted database name to trigger an XSS attack when that database is referenced from the Designer feature. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2018-12581 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0062 |
| scoring_system |
epss |
| scoring_elements |
0.70001 |
| published_at |
2026-04-04T12:55:00Z |
|
| 1 |
| value |
0.0062 |
| scoring_system |
epss |
| scoring_elements |
0.70069 |
| published_at |
2026-04-21T12:55:00Z |
|
| 2 |
| value |
0.0062 |
| scoring_system |
epss |
| scoring_elements |
0.69974 |
| published_at |
2026-04-01T12:55:00Z |
|
| 3 |
| value |
0.0062 |
| scoring_system |
epss |
| scoring_elements |
0.70026 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.0062 |
| scoring_system |
epss |
| scoring_elements |
0.69987 |
| published_at |
2026-04-02T12:55:00Z |
|
| 5 |
| value |
0.0062 |
| scoring_system |
epss |
| scoring_elements |
0.69978 |
| published_at |
2026-04-07T12:55:00Z |
|
| 6 |
| value |
0.0062 |
| scoring_system |
epss |
| scoring_elements |
0.70089 |
| published_at |
2026-04-18T12:55:00Z |
|
| 7 |
| value |
0.0062 |
| scoring_system |
epss |
| scoring_elements |
0.7008 |
| published_at |
2026-04-16T12:55:00Z |
|
| 8 |
| value |
0.0062 |
| scoring_system |
epss |
| scoring_elements |
0.70037 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.0062 |
| scoring_system |
epss |
| scoring_elements |
0.7005 |
| published_at |
2026-04-12T12:55:00Z |
|
| 10 |
| value |
0.0062 |
| scoring_system |
epss |
| scoring_elements |
0.70065 |
| published_at |
2026-04-11T12:55:00Z |
|
| 11 |
| value |
0.0062 |
| scoring_system |
epss |
| scoring_elements |
0.70042 |
| published_at |
2026-04-09T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2018-12581 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
| reference_url |
https://nvd.nist.gov/vuln/detail/CVE-2018-12581 |
| reference_id |
CVE-2018-12581 |
| reference_type |
|
| scores |
| 0 |
| value |
4.3 |
| scoring_system |
cvssv2 |
| scoring_elements |
AV:N/AC:M/Au:N/C:N/I:P/A:N |
|
| 1 |
| value |
6.1 |
| scoring_system |
cvssv3 |
| scoring_elements |
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N |
|
| 2 |
| value |
6.1 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N |
|
| 3 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://nvd.nist.gov/vuln/detail/CVE-2018-12581 |
|
| 11 |
|
| 12 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:composer/phpmyadmin/phpmyadmin@4.8.2 |
| purl |
pkg:composer/phpmyadmin/phpmyadmin@4.8.2 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-2jjv-4en4-e3gx |
|
| 1 |
| vulnerability |
VCID-5657-kcyh-7bc2 |
|
| 2 |
| vulnerability |
VCID-986a-3m4g-83ge |
|
| 3 |
| vulnerability |
VCID-br1c-5bzf-ufeu |
|
| 4 |
| vulnerability |
VCID-ebk2-vjau-57h9 |
|
| 5 |
| vulnerability |
VCID-fchc-55te-akhe |
|
| 6 |
| vulnerability |
VCID-g6ud-92qe-hqcx |
|
| 7 |
| vulnerability |
VCID-gu4y-aeqx-mqak |
|
| 8 |
| vulnerability |
VCID-jma9-9uhu-xuc3 |
|
| 9 |
| vulnerability |
VCID-ngtc-xtjn-xbhp |
|
| 10 |
| vulnerability |
VCID-qcra-cu62-43he |
|
| 11 |
| vulnerability |
VCID-rqy8-n6fr-hqey |
|
| 12 |
| vulnerability |
VCID-scu3-cfyc-9qfz |
|
| 13 |
| vulnerability |
VCID-tks3-6uv4-kygf |
|
| 14 |
| vulnerability |
VCID-yfja-ssw3-skh1 |
|
| 15 |
| vulnerability |
VCID-ym9b-4su6-6fbr |
|
| 16 |
| vulnerability |
VCID-znfm-ak2t-mqdd |
|
| 17 |
| vulnerability |
VCID-zyzp-aqd8-e3a9 |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:composer/phpmyadmin/phpmyadmin@4.8.2 |
|
| 1 |
|
|
| aliases |
CVE-2018-12581, GHSA-vxj6-pm6r-23hq
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-c91y-txcw-2kdy |
|
| 6 |
| url |
VCID-ebk2-vjau-57h9 |
| vulnerability_id |
VCID-ebk2-vjau-57h9 |
| summary |
Information Exposure
An attacker can exploit phpMyAdm to leak the contents of a local file because of an error in the transformation feature. The attacker must have access to the phpMyAdmin Configuration Storage tables, although these can easily be created in any database to which the attacker has access. An attacker must have valid credentials to log in to phpMyAdmin; this vulnerability does not allow an attacker to circumvent the login system. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2018-19968 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.02543 |
| scoring_system |
epss |
| scoring_elements |
0.85409 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.02543 |
| scoring_system |
epss |
| scoring_elements |
0.85495 |
| published_at |
2026-04-21T12:55:00Z |
|
| 2 |
| value |
0.02543 |
| scoring_system |
epss |
| scoring_elements |
0.85498 |
| published_at |
2026-04-18T12:55:00Z |
|
| 3 |
| value |
0.02543 |
| scoring_system |
epss |
| scoring_elements |
0.85494 |
| published_at |
2026-04-16T12:55:00Z |
|
| 4 |
| value |
0.02543 |
| scoring_system |
epss |
| scoring_elements |
0.8547 |
| published_at |
2026-04-13T12:55:00Z |
|
| 5 |
| value |
0.02543 |
| scoring_system |
epss |
| scoring_elements |
0.85429 |
| published_at |
2026-04-04T12:55:00Z |
|
| 6 |
| value |
0.02543 |
| scoring_system |
epss |
| scoring_elements |
0.85397 |
| published_at |
2026-04-01T12:55:00Z |
|
| 7 |
| value |
0.02543 |
| scoring_system |
epss |
| scoring_elements |
0.85474 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.02543 |
| scoring_system |
epss |
| scoring_elements |
0.85475 |
| published_at |
2026-04-11T12:55:00Z |
|
| 9 |
| value |
0.02543 |
| scoring_system |
epss |
| scoring_elements |
0.85461 |
| published_at |
2026-04-09T12:55:00Z |
|
| 10 |
| value |
0.02543 |
| scoring_system |
epss |
| scoring_elements |
0.85453 |
| published_at |
2026-04-08T12:55:00Z |
|
| 11 |
| value |
0.02543 |
| scoring_system |
epss |
| scoring_elements |
0.85432 |
| published_at |
2026-04-07T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2018-19968 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
|
| fixed_packages |
|
| aliases |
CVE-2018-19968, GHSA-xc97-r49q-cxgc
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-ebk2-vjau-57h9 |
|
| 7 |
| url |
VCID-fchc-55te-akhe |
| vulnerability_id |
VCID-fchc-55te-akhe |
| summary |
Cross-site Scripting
An issue was discovered in phpMyAdm. A Cross-Site Scripting vulnerability has been found where an attacker can use a crafted file to manipulate an authenticated user who loads that file through the import feature. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2018-15605 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00675 |
| scoring_system |
epss |
| scoring_elements |
0.71465 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00675 |
| scoring_system |
epss |
| scoring_elements |
0.71392 |
| published_at |
2026-04-07T12:55:00Z |
|
| 2 |
| value |
0.00675 |
| scoring_system |
epss |
| scoring_elements |
0.714 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00675 |
| scoring_system |
epss |
| scoring_elements |
0.71418 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00675 |
| scoring_system |
epss |
| scoring_elements |
0.71433 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00675 |
| scoring_system |
epss |
| scoring_elements |
0.71446 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00675 |
| scoring_system |
epss |
| scoring_elements |
0.71468 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00675 |
| scoring_system |
epss |
| scoring_elements |
0.71452 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00675 |
| scoring_system |
epss |
| scoring_elements |
0.71434 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00675 |
| scoring_system |
epss |
| scoring_elements |
0.7148 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00675 |
| scoring_system |
epss |
| scoring_elements |
0.71485 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2018-15605 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:composer/phpmyadmin/phpmyadmin@4.8.3 |
| purl |
pkg:composer/phpmyadmin/phpmyadmin@4.8.3 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-2jjv-4en4-e3gx |
|
| 1 |
| vulnerability |
VCID-5657-kcyh-7bc2 |
|
| 2 |
| vulnerability |
VCID-986a-3m4g-83ge |
|
| 3 |
| vulnerability |
VCID-br1c-5bzf-ufeu |
|
| 4 |
| vulnerability |
VCID-ebk2-vjau-57h9 |
|
| 5 |
| vulnerability |
VCID-g6ud-92qe-hqcx |
|
| 6 |
| vulnerability |
VCID-gu4y-aeqx-mqak |
|
| 7 |
| vulnerability |
VCID-jma9-9uhu-xuc3 |
|
| 8 |
| vulnerability |
VCID-ngtc-xtjn-xbhp |
|
| 9 |
| vulnerability |
VCID-qcra-cu62-43he |
|
| 10 |
| vulnerability |
VCID-rqy8-n6fr-hqey |
|
| 11 |
| vulnerability |
VCID-scu3-cfyc-9qfz |
|
| 12 |
| vulnerability |
VCID-tks3-6uv4-kygf |
|
| 13 |
| vulnerability |
VCID-yfja-ssw3-skh1 |
|
| 14 |
| vulnerability |
VCID-ym9b-4su6-6fbr |
|
| 15 |
| vulnerability |
VCID-znfm-ak2t-mqdd |
|
| 16 |
| vulnerability |
VCID-zyzp-aqd8-e3a9 |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:composer/phpmyadmin/phpmyadmin@4.8.3 |
|
|
| aliases |
CVE-2018-15605, GHSA-c958-4j9x-q7w4
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-fchc-55te-akhe |
|
| 8 |
| url |
VCID-ftdj-p5as-97hd |
| vulnerability_id |
VCID-ftdj-p5as-97hd |
| summary |
Cross-Site Request Forgery (CSRF)
phpMyAdm has CSRF, allowing an attacker to execute arbitrary SQL statements, related to `js/db_operations.js`, `js/tbl_operations.js`, `libraries/classes/Operations.php`, and `sql.php.` |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2018-10188 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00935 |
| scoring_system |
epss |
| scoring_elements |
0.7618 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00935 |
| scoring_system |
epss |
| scoring_elements |
0.76093 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00935 |
| scoring_system |
epss |
| scoring_elements |
0.76096 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00935 |
| scoring_system |
epss |
| scoring_elements |
0.76128 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00935 |
| scoring_system |
epss |
| scoring_elements |
0.76107 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00935 |
| scoring_system |
epss |
| scoring_elements |
0.7614 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00935 |
| scoring_system |
epss |
| scoring_elements |
0.76153 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00935 |
| scoring_system |
epss |
| scoring_elements |
0.76179 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00935 |
| scoring_system |
epss |
| scoring_elements |
0.76155 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00935 |
| scoring_system |
epss |
| scoring_elements |
0.76152 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00935 |
| scoring_system |
epss |
| scoring_elements |
0.76193 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.00935 |
| scoring_system |
epss |
| scoring_elements |
0.76197 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2018-10188 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
| reference_url |
https://nvd.nist.gov/vuln/detail/CVE-2018-10188 |
| reference_id |
CVE-2018-10188 |
| reference_type |
|
| scores |
| 0 |
| value |
6.8 |
| scoring_system |
cvssv2 |
| scoring_elements |
AV:N/AC:M/Au:N/C:P/I:P/A:P |
|
| 1 |
| value |
8.8 |
| scoring_system |
cvssv3 |
| scoring_elements |
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H |
|
| 2 |
| value |
8.8 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H |
|
| 3 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://nvd.nist.gov/vuln/detail/CVE-2018-10188 |
|
| 14 |
|
|
| fixed_packages |
|
| aliases |
CVE-2018-10188, GHSA-v6fp-h79x-9rqc
|
| risk_score |
10.0 |
| exploitability |
2.0 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-ftdj-p5as-97hd |
|
| 9 |
| url |
VCID-g6ud-92qe-hqcx |
| vulnerability_id |
VCID-g6ud-92qe-hqcx |
| summary |
phpMyAdmin unsanitized Git information
phpMyAdmin before 4.9.2 does not escape certain Git information, related to `libraries/classes/Display/GitRevision.php and libraries/classes/Footer.php`. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2019-19617 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01155 |
| scoring_system |
epss |
| scoring_elements |
0.78487 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.01155 |
| scoring_system |
epss |
| scoring_elements |
0.78518 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.01155 |
| scoring_system |
epss |
| scoring_elements |
0.78481 |
| published_at |
2026-04-01T12:55:00Z |
|
| 3 |
| value |
0.01155 |
| scoring_system |
epss |
| scoring_elements |
0.78556 |
| published_at |
2026-04-21T12:55:00Z |
|
| 4 |
| value |
0.01155 |
| scoring_system |
epss |
| scoring_elements |
0.78559 |
| published_at |
2026-04-18T12:55:00Z |
|
| 5 |
| value |
0.01155 |
| scoring_system |
epss |
| scoring_elements |
0.7856 |
| published_at |
2026-04-16T12:55:00Z |
|
| 6 |
| value |
0.01155 |
| scoring_system |
epss |
| scoring_elements |
0.78532 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.01155 |
| scoring_system |
epss |
| scoring_elements |
0.7854 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.01155 |
| scoring_system |
epss |
| scoring_elements |
0.78558 |
| published_at |
2026-04-11T12:55:00Z |
|
| 9 |
| value |
0.01155 |
| scoring_system |
epss |
| scoring_elements |
0.78533 |
| published_at |
2026-04-09T12:55:00Z |
|
| 10 |
| value |
0.01155 |
| scoring_system |
epss |
| scoring_elements |
0.78528 |
| published_at |
2026-04-08T12:55:00Z |
|
| 11 |
| value |
0.01155 |
| scoring_system |
epss |
| scoring_elements |
0.78501 |
| published_at |
2026-04-07T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2019-19617 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
|
| fixed_packages |
|
| aliases |
CVE-2019-19617, GHSA-pgph-mc4p-f8c3
|
| risk_score |
4.5 |
| exploitability |
0.5 |
| weighted_severity |
9.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-g6ud-92qe-hqcx |
|
| 10 |
| url |
VCID-gu4y-aeqx-mqak |
| vulnerability_id |
VCID-gu4y-aeqx-mqak |
| summary |
SQL injection in phpMyAdmin
An issue was discovered in phpMyAdmin before 4.9.2. A crafted database/table name can be used to trigger a SQL injection attack through the designer feature. |
| references |
| 0 |
|
| 1 |
|
| 2 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2019-18622 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00736 |
| scoring_system |
epss |
| scoring_elements |
0.72851 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00736 |
| scoring_system |
epss |
| scoring_elements |
0.72752 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00736 |
| scoring_system |
epss |
| scoring_elements |
0.7276 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00736 |
| scoring_system |
epss |
| scoring_elements |
0.7278 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00736 |
| scoring_system |
epss |
| scoring_elements |
0.72756 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00736 |
| scoring_system |
epss |
| scoring_elements |
0.72794 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00736 |
| scoring_system |
epss |
| scoring_elements |
0.72808 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00736 |
| scoring_system |
epss |
| scoring_elements |
0.72832 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00736 |
| scoring_system |
epss |
| scoring_elements |
0.72815 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00736 |
| scoring_system |
epss |
| scoring_elements |
0.72807 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00736 |
| scoring_system |
epss |
| scoring_elements |
0.72849 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.00736 |
| scoring_system |
epss |
| scoring_elements |
0.72859 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2019-18622 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
|
| fixed_packages |
|
| aliases |
CVE-2019-18622, GHSA-jgjc-332c-8cmc
|
| risk_score |
4.5 |
| exploitability |
0.5 |
| weighted_severity |
9.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-gu4y-aeqx-mqak |
|
| 11 |
| url |
VCID-jma9-9uhu-xuc3 |
| vulnerability_id |
VCID-jma9-9uhu-xuc3 |
| summary |
SQL Injection
A vulnerability was reported where a specially crafted database name can be used to trigger an SQL injection attack through the designer feature. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2019-11768 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01803 |
| scoring_system |
epss |
| scoring_elements |
0.82849 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.01803 |
| scoring_system |
epss |
| scoring_elements |
0.82795 |
| published_at |
2026-04-08T12:55:00Z |
|
| 2 |
| value |
0.01803 |
| scoring_system |
epss |
| scoring_elements |
0.82801 |
| published_at |
2026-04-09T12:55:00Z |
|
| 3 |
| value |
0.01803 |
| scoring_system |
epss |
| scoring_elements |
0.82817 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.01803 |
| scoring_system |
epss |
| scoring_elements |
0.82813 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.01803 |
| scoring_system |
epss |
| scoring_elements |
0.82808 |
| published_at |
2026-04-13T12:55:00Z |
|
| 6 |
| value |
0.01803 |
| scoring_system |
epss |
| scoring_elements |
0.82847 |
| published_at |
2026-04-16T12:55:00Z |
|
| 7 |
| value |
0.01803 |
| scoring_system |
epss |
| scoring_elements |
0.82846 |
| published_at |
2026-04-18T12:55:00Z |
|
| 8 |
| value |
0.01803 |
| scoring_system |
epss |
| scoring_elements |
0.82743 |
| published_at |
2026-04-01T12:55:00Z |
|
| 9 |
| value |
0.01803 |
| scoring_system |
epss |
| scoring_elements |
0.82759 |
| published_at |
2026-04-02T12:55:00Z |
|
| 10 |
| value |
0.01803 |
| scoring_system |
epss |
| scoring_elements |
0.82772 |
| published_at |
2026-04-04T12:55:00Z |
|
| 11 |
| value |
0.01803 |
| scoring_system |
epss |
| scoring_elements |
0.82769 |
| published_at |
2026-04-07T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2019-11768 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
|
| fixed_packages |
|
| aliases |
CVE-2019-11768, GHSA-x37v-98f9-mj32
|
| risk_score |
4.5 |
| exploitability |
0.5 |
| weighted_severity |
9.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-jma9-9uhu-xuc3 |
|
| 12 |
| url |
VCID-ngtc-xtjn-xbhp |
| vulnerability_id |
VCID-ngtc-xtjn-xbhp |
| summary |
phpMyAdmin SQL injection vulnerability
In phpMyAdmin 4.x before 4.9.5 and 5.x before 5.0.2, a SQL injection vulnerability has been discovered where certain parameters are not properly escaped when generating certain queries for search actions in libraries/classes/Controllers/Table/TableSearchController.php. An attacker can generate a crafted database or table name. The attack can be performed if a user attempts certain search operations on the malicious database or table. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-10802 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01622 |
| scoring_system |
epss |
| scoring_elements |
0.81852 |
| published_at |
2026-04-11T12:55:00Z |
|
| 1 |
| value |
0.01622 |
| scoring_system |
epss |
| scoring_elements |
0.81779 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.01622 |
| scoring_system |
epss |
| scoring_elements |
0.81873 |
| published_at |
2026-04-21T12:55:00Z |
|
| 3 |
| value |
0.01622 |
| scoring_system |
epss |
| scoring_elements |
0.81871 |
| published_at |
2026-04-18T12:55:00Z |
|
| 4 |
| value |
0.01622 |
| scoring_system |
epss |
| scoring_elements |
0.8187 |
| published_at |
2026-04-16T12:55:00Z |
|
| 5 |
| value |
0.01622 |
| scoring_system |
epss |
| scoring_elements |
0.81834 |
| published_at |
2026-04-13T12:55:00Z |
|
| 6 |
| value |
0.01622 |
| scoring_system |
epss |
| scoring_elements |
0.8184 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.01622 |
| scoring_system |
epss |
| scoring_elements |
0.81826 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.01622 |
| scoring_system |
epss |
| scoring_elements |
0.818 |
| published_at |
2026-04-07T12:55:00Z |
|
| 9 |
| value |
0.01622 |
| scoring_system |
epss |
| scoring_elements |
0.81802 |
| published_at |
2026-04-04T12:55:00Z |
|
| 10 |
| value |
0.01622 |
| scoring_system |
epss |
| scoring_elements |
0.81769 |
| published_at |
2026-04-01T12:55:00Z |
|
| 11 |
| value |
0.01622 |
| scoring_system |
epss |
| scoring_elements |
0.81833 |
| published_at |
2026-04-09T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-10802 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
|
| fixed_packages |
|
| aliases |
CVE-2020-10802, GHSA-f4cr-3xmc-2wpm
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-ngtc-xtjn-xbhp |
|
| 13 |
| url |
VCID-qcra-cu62-43he |
| vulnerability_id |
VCID-qcra-cu62-43he |
| summary |
Cross-site Scripting
In phpMyAdm, an XSS vulnerability was found in the navigation tree, where an attacker can deliver a payload to a user through a crafted `database/table` name. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2018-19970 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01501 |
| scoring_system |
epss |
| scoring_elements |
0.81175 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.01501 |
| scoring_system |
epss |
| scoring_elements |
0.81074 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.01501 |
| scoring_system |
epss |
| scoring_elements |
0.81083 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.01501 |
| scoring_system |
epss |
| scoring_elements |
0.81108 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.01501 |
| scoring_system |
epss |
| scoring_elements |
0.81107 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.01501 |
| scoring_system |
epss |
| scoring_elements |
0.81135 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.01501 |
| scoring_system |
epss |
| scoring_elements |
0.81141 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.01501 |
| scoring_system |
epss |
| scoring_elements |
0.81159 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.01501 |
| scoring_system |
epss |
| scoring_elements |
0.81146 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.01501 |
| scoring_system |
epss |
| scoring_elements |
0.81139 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.01501 |
| scoring_system |
epss |
| scoring_elements |
0.81176 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.01501 |
| scoring_system |
epss |
| scoring_elements |
0.81178 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2018-19970 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
|
| fixed_packages |
|
| aliases |
CVE-2018-19970, GHSA-8987-93fh-rcwq
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-qcra-cu62-43he |
|
| 14 |
| url |
VCID-rqy8-n6fr-hqey |
| vulnerability_id |
VCID-rqy8-n6fr-hqey |
| summary |
Exposure of Sensitive Information to an Unauthorized Actor
PhpMyAdmin 5.1.1 and before allows an attacker to retrieve potentially sensitive information by creating invalid requests. This affects the lang parameter, the pma_parameter, and the cookie section. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-0813 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00318 |
| scoring_system |
epss |
| scoring_elements |
0.54905 |
| published_at |
2026-04-16T12:55:00Z |
|
| 1 |
| value |
0.00318 |
| scoring_system |
epss |
| scoring_elements |
0.54888 |
| published_at |
2026-04-21T12:55:00Z |
|
| 2 |
| value |
0.00318 |
| scoring_system |
epss |
| scoring_elements |
0.54908 |
| published_at |
2026-04-18T12:55:00Z |
|
| 3 |
| value |
0.00437 |
| scoring_system |
epss |
| scoring_elements |
0.63043 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00437 |
| scoring_system |
epss |
| scoring_elements |
0.62955 |
| published_at |
2026-04-01T12:55:00Z |
|
| 5 |
| value |
0.00437 |
| scoring_system |
epss |
| scoring_elements |
0.63014 |
| published_at |
2026-04-02T12:55:00Z |
|
| 6 |
| value |
0.00437 |
| scoring_system |
epss |
| scoring_elements |
0.63007 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.00437 |
| scoring_system |
epss |
| scoring_elements |
0.63058 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.00437 |
| scoring_system |
epss |
| scoring_elements |
0.63074 |
| published_at |
2026-04-09T12:55:00Z |
|
| 9 |
| value |
0.00437 |
| scoring_system |
epss |
| scoring_elements |
0.63091 |
| published_at |
2026-04-11T12:55:00Z |
|
| 10 |
| value |
0.00437 |
| scoring_system |
epss |
| scoring_elements |
0.63077 |
| published_at |
2026-04-12T12:55:00Z |
|
| 11 |
| value |
0.00437 |
| scoring_system |
epss |
| scoring_elements |
0.63055 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-0813 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-0813, GHSA-vx8q-j7h9-vf6q
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-rqy8-n6fr-hqey |
|
| 15 |
| url |
VCID-scu3-cfyc-9qfz |
| vulnerability_id |
VCID-scu3-cfyc-9qfz |
| summary |
Cross-Site Request Forgery (CSRF)
A vulnerability was found that allows an attacker to trigger a CSRF attack against a phpMyAdmin user. The attacker can trick the user, for instance through a broken `<img>` tag pointing at the victim's phpMyAdmin database, and the attacker can potentially deliver a payload (such as a specific `INSERT` or `DELETE` statement) to the victim. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2019-12616 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.55051 |
| scoring_system |
epss |
| scoring_elements |
0.98062 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.55051 |
| scoring_system |
epss |
| scoring_elements |
0.98038 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.55051 |
| scoring_system |
epss |
| scoring_elements |
0.98043 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.55051 |
| scoring_system |
epss |
| scoring_elements |
0.98045 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.55051 |
| scoring_system |
epss |
| scoring_elements |
0.98047 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.55051 |
| scoring_system |
epss |
| scoring_elements |
0.98052 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.55051 |
| scoring_system |
epss |
| scoring_elements |
0.98053 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.55051 |
| scoring_system |
epss |
| scoring_elements |
0.98058 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.55051 |
| scoring_system |
epss |
| scoring_elements |
0.98059 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.55051 |
| scoring_system |
epss |
| scoring_elements |
0.98065 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2019-12616 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
|
| fixed_packages |
|
| aliases |
CVE-2019-12616, GHSA-mfr9-pcm3-6mwc
|
| risk_score |
10.0 |
| exploitability |
2.0 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-scu3-cfyc-9qfz |
|
| 16 |
| url |
VCID-tks3-6uv4-kygf |
| vulnerability_id |
VCID-tks3-6uv4-kygf |
| summary |
phpMyAdmin SQL Injection
In phpMyAdmin 4.x before 4.9.5 and 5.x before 5.0.2, a SQL injection vulnerability was found in retrieval of the current username (in libraries/classes/Server/Privileges.php and libraries/classes/UserPassword.php). A malicious user with access to the server could create a crafted username, and then trick the victim into performing specific actions with that user account (such as editing its privileges). |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-10804 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.02444 |
| scoring_system |
epss |
| scoring_elements |
0.85208 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.02444 |
| scoring_system |
epss |
| scoring_elements |
0.85114 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.02444 |
| scoring_system |
epss |
| scoring_elements |
0.85127 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.02444 |
| scoring_system |
epss |
| scoring_elements |
0.85144 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.02444 |
| scoring_system |
epss |
| scoring_elements |
0.85147 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.02444 |
| scoring_system |
epss |
| scoring_elements |
0.85169 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.02444 |
| scoring_system |
epss |
| scoring_elements |
0.85177 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.02444 |
| scoring_system |
epss |
| scoring_elements |
0.85191 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.02444 |
| scoring_system |
epss |
| scoring_elements |
0.85189 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.02444 |
| scoring_system |
epss |
| scoring_elements |
0.85186 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.02444 |
| scoring_system |
epss |
| scoring_elements |
0.85207 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-10804 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
|
| fixed_packages |
|
| aliases |
CVE-2020-10804, GHSA-h65r-8fp8-w7cx
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-tks3-6uv4-kygf |
|
| 17 |
| url |
VCID-yfja-ssw3-skh1 |
| vulnerability_id |
VCID-yfja-ssw3-skh1 |
| summary |
Information Exposure
When the `AllowArbitraryServer` configuration setting is set to true, with the use of a rogue MySQL server, an attacker can read any file on the server that the web server's user can access. This is related to the `mysql.allow_local_infile` PHP configuration, and the inadvertent ignoring of `options(MYSQLI_OPT_LOCAL_INFILE` calls. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2019-6799 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.7658 |
| scoring_system |
epss |
| scoring_elements |
0.98948 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.7658 |
| scoring_system |
epss |
| scoring_elements |
0.98933 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.7658 |
| scoring_system |
epss |
| scoring_elements |
0.98935 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.7658 |
| scoring_system |
epss |
| scoring_elements |
0.98937 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.7658 |
| scoring_system |
epss |
| scoring_elements |
0.98939 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.7658 |
| scoring_system |
epss |
| scoring_elements |
0.98941 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.7658 |
| scoring_system |
epss |
| scoring_elements |
0.98943 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.7658 |
| scoring_system |
epss |
| scoring_elements |
0.98944 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.7658 |
| scoring_system |
epss |
| scoring_elements |
0.98946 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.7658 |
| scoring_system |
epss |
| scoring_elements |
0.98947 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2019-6799 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
| reference_url |
https://nvd.nist.gov/vuln/detail/CVE-2019-6799 |
| reference_id |
CVE-2019-6799 |
| reference_type |
|
| scores |
| 0 |
| value |
4.3 |
| scoring_system |
cvssv2 |
| scoring_elements |
AV:N/AC:M/Au:N/C:P/I:N/A:N |
|
| 1 |
| value |
5.9 |
| scoring_system |
cvssv3 |
| scoring_elements |
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N |
|
| 2 |
| value |
5.9 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N |
|
| 3 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://nvd.nist.gov/vuln/detail/CVE-2019-6799 |
|
| 11 |
|
| 12 |
|
|
| fixed_packages |
|
| aliases |
CVE-2019-6799, GHSA-c8wj-q36q-3wg4
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-yfja-ssw3-skh1 |
|
| 18 |
| url |
VCID-ym9b-4su6-6fbr |
| vulnerability_id |
VCID-ym9b-4su6-6fbr |
| summary |
Cross-site Scripting vulnerability in drag-and-drop upload of phpMyAdmin
In phpMyAdmin before 4.9.11 and 5.x before 5.2.1, an authenticated user can trigger Cross-site Scripting (XSS) by uploading a crafted .sql file through the drag-and-drop interface. By disabling the configuration directive `$cfg['enable_drag_drop_import']`, users will be unable to use the drag and drop upload which would protect against the vulnerability. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-25727 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.1094 |
| scoring_system |
epss |
| scoring_elements |
0.93405 |
| published_at |
2026-04-13T12:55:00Z |
|
| 1 |
| value |
0.1094 |
| scoring_system |
epss |
| scoring_elements |
0.93434 |
| published_at |
2026-04-21T12:55:00Z |
|
| 2 |
| value |
0.1094 |
| scoring_system |
epss |
| scoring_elements |
0.93428 |
| published_at |
2026-04-18T12:55:00Z |
|
| 3 |
| value |
0.1094 |
| scoring_system |
epss |
| scoring_elements |
0.93423 |
| published_at |
2026-04-16T12:55:00Z |
|
| 4 |
| value |
0.11079 |
| scoring_system |
epss |
| scoring_elements |
0.93425 |
| published_at |
2026-04-02T12:55:00Z |
|
| 5 |
| value |
0.11079 |
| scoring_system |
epss |
| scoring_elements |
0.93433 |
| published_at |
2026-04-07T12:55:00Z |
|
| 6 |
| value |
0.11079 |
| scoring_system |
epss |
| scoring_elements |
0.93441 |
| published_at |
2026-04-08T12:55:00Z |
|
| 7 |
| value |
0.11079 |
| scoring_system |
epss |
| scoring_elements |
0.93445 |
| published_at |
2026-04-09T12:55:00Z |
|
| 8 |
| value |
0.11079 |
| scoring_system |
epss |
| scoring_elements |
0.9345 |
| published_at |
2026-04-11T12:55:00Z |
|
| 9 |
| value |
0.11079 |
| scoring_system |
epss |
| scoring_elements |
0.93451 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-25727 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-25727, GHSA-6hr3-44gx-g6wh
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-ym9b-4su6-6fbr |
|
| 19 |
| url |
VCID-znfm-ak2t-mqdd |
| vulnerability_id |
VCID-znfm-ak2t-mqdd |
| summary |
phpMyAdmin SQL injection vulnerability
In phpMyAdmin 4.x before 4.9.5 and 5.x before 5.0.2, a SQL injection vulnerability was discovered where malicious code could be used to trigger an XSS attack through retrieving and displaying results (in tbl_get_field.php and libraries/classes/Display/Results.php). The attacker must be able to insert crafted data into certain database tables, which when retrieved (for instance, through the Browse tab) can trigger the XSS attack. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-10803 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.03554 |
| scoring_system |
epss |
| scoring_elements |
0.87708 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.03554 |
| scoring_system |
epss |
| scoring_elements |
0.87643 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.03554 |
| scoring_system |
epss |
| scoring_elements |
0.87653 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.03554 |
| scoring_system |
epss |
| scoring_elements |
0.87666 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.03554 |
| scoring_system |
epss |
| scoring_elements |
0.87667 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.03554 |
| scoring_system |
epss |
| scoring_elements |
0.87688 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.03554 |
| scoring_system |
epss |
| scoring_elements |
0.87694 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.03554 |
| scoring_system |
epss |
| scoring_elements |
0.87706 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.03554 |
| scoring_system |
epss |
| scoring_elements |
0.87699 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.03554 |
| scoring_system |
epss |
| scoring_elements |
0.87697 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.03554 |
| scoring_system |
epss |
| scoring_elements |
0.87712 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-10803 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
|
| fixed_packages |
|
| aliases |
CVE-2020-10803, GHSA-fcww-8wvc-38q9
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-znfm-ak2t-mqdd |
|
| 20 |
| url |
VCID-zyzp-aqd8-e3a9 |
| vulnerability_id |
VCID-zyzp-aqd8-e3a9 |
| summary |
phpMyAdmin Cross-Site Request Forgery (CSRF)
A CSRF issue in phpMyAdmin 4.9.0.1 allows deletion of any server in the Setup page. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2019-12922 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.4225 |
| scoring_system |
epss |
| scoring_elements |
0.97459 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.4225 |
| scoring_system |
epss |
| scoring_elements |
0.97422 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.4225 |
| scoring_system |
epss |
| scoring_elements |
0.97429 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.4225 |
| scoring_system |
epss |
| scoring_elements |
0.97433 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.4225 |
| scoring_system |
epss |
| scoring_elements |
0.97434 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.4225 |
| scoring_system |
epss |
| scoring_elements |
0.97441 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.4225 |
| scoring_system |
epss |
| scoring_elements |
0.97442 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.4225 |
| scoring_system |
epss |
| scoring_elements |
0.97445 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.4225 |
| scoring_system |
epss |
| scoring_elements |
0.97447 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.4225 |
| scoring_system |
epss |
| scoring_elements |
0.97456 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.4225 |
| scoring_system |
epss |
| scoring_elements |
0.9746 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2019-12922 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
|
| fixed_packages |
|
| aliases |
CVE-2019-12922, GHSA-4c9q-64gq-xhx4
|
| risk_score |
10.0 |
| exploitability |
2.0 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-zyzp-aqd8-e3a9 |
|