Lookup for vulnerable packages by Package URL.

Purlpkg:apk/alpine/phpmyadmin@4.9.2-r0?arch=aarch64&distroversion=v3.14&reponame=community
Typeapk
Namespacealpine
Namephpmyadmin
Version4.9.2-r0
Qualifiers
arch aarch64
distroversion v3.14
reponame community
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version5.0.1-r0
Latest_non_vulnerable_version5.0.2-r0
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-g6ud-92qe-hqcx
vulnerability_id VCID-g6ud-92qe-hqcx
summary
phpMyAdmin unsanitized Git information
phpMyAdmin before 4.9.2 does not escape certain Git information, related to `libraries/classes/Display/GitRevision.php and libraries/classes/Footer.php`.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-19617
reference_id
reference_type
scores
0
value 0.01155
scoring_system epss
scoring_elements 0.78487
published_at 2026-04-02T12:55:00Z
1
value 0.01155
scoring_system epss
scoring_elements 0.78518
published_at 2026-04-04T12:55:00Z
2
value 0.01155
scoring_system epss
scoring_elements 0.78481
published_at 2026-04-01T12:55:00Z
3
value 0.01155
scoring_system epss
scoring_elements 0.78556
published_at 2026-04-21T12:55:00Z
4
value 0.01155
scoring_system epss
scoring_elements 0.78559
published_at 2026-04-18T12:55:00Z
5
value 0.01155
scoring_system epss
scoring_elements 0.7856
published_at 2026-04-16T12:55:00Z
6
value 0.01155
scoring_system epss
scoring_elements 0.78532
published_at 2026-04-13T12:55:00Z
7
value 0.01155
scoring_system epss
scoring_elements 0.7854
published_at 2026-04-12T12:55:00Z
8
value 0.01155
scoring_system epss
scoring_elements 0.78558
published_at 2026-04-11T12:55:00Z
9
value 0.01155
scoring_system epss
scoring_elements 0.78533
published_at 2026-04-09T12:55:00Z
10
value 0.01155
scoring_system epss
scoring_elements 0.78528
published_at 2026-04-08T12:55:00Z
11
value 0.01155
scoring_system epss
scoring_elements 0.78501
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-19617
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19617
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19617
2
reference_url https://github.com/phpmyadmin/composer
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://github.com/phpmyadmin/composer
3
reference_url https://github.com/phpmyadmin/phpmyadmin/commit/1119de642b136d20e810bb20f545069a01dd7cc9
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://github.com/phpmyadmin/phpmyadmin/commit/1119de642b136d20e810bb20f545069a01dd7cc9
4
reference_url https://github.com/phpmyadmin/phpmyadmin/compare/RELEASE_4_9_1...RELEASE_4_9_2
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://github.com/phpmyadmin/phpmyadmin/compare/RELEASE_4_9_1...RELEASE_4_9_2
5
reference_url https://lists.debian.org/debian-lts-announce/2019/12/msg00006.html
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://lists.debian.org/debian-lts-announce/2019/12/msg00006.html
6
reference_url https://lists.debian.org/debian-lts-announce/2020/10/msg00024.html
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://lists.debian.org/debian-lts-announce/2020/10/msg00024.html
7
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-19617
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2019-19617
8
reference_url https://www.phpmyadmin.net/news/2019/11/22/phpmyadmin-492-released
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://www.phpmyadmin.net/news/2019/11/22/phpmyadmin-492-released
9
reference_url https://www.phpmyadmin.net/news/2019/11/22/phpmyadmin-492-released/
reference_id
reference_type
scores
url https://www.phpmyadmin.net/news/2019/11/22/phpmyadmin-492-released/
10
reference_url https://github.com/advisories/GHSA-pgph-mc4p-f8c3
reference_id GHSA-pgph-mc4p-f8c3
reference_type
scores
0
value CRITICAL
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-pgph-mc4p-f8c3
11
reference_url https://usn.ubuntu.com/4639-1/
reference_id USN-4639-1
reference_type
scores
url https://usn.ubuntu.com/4639-1/
12
reference_url https://usn.ubuntu.com/USN-4843-1/
reference_id USN-USN-4843-1
reference_type
scores
url https://usn.ubuntu.com/USN-4843-1/
fixed_packages
0
url pkg:apk/alpine/phpmyadmin@4.9.2-r0?arch=aarch64&distroversion=v3.14&reponame=community
purl pkg:apk/alpine/phpmyadmin@4.9.2-r0?arch=aarch64&distroversion=v3.14&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/phpmyadmin@4.9.2-r0%3Farch=aarch64&distroversion=v3.14&reponame=community
aliases CVE-2019-19617, GHSA-pgph-mc4p-f8c3
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-g6ud-92qe-hqcx
1
url VCID-gu4y-aeqx-mqak
vulnerability_id VCID-gu4y-aeqx-mqak
summary
SQL injection in phpMyAdmin
An issue was discovered in phpMyAdmin before 4.9.2. A crafted database/table name can be used to trigger a SQL injection attack through the designer feature.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00002.html
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00002.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00024.html
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00024.html
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-18622
reference_id
reference_type
scores
0
value 0.00736
scoring_system epss
scoring_elements 0.72851
published_at 2026-04-21T12:55:00Z
1
value 0.00736
scoring_system epss
scoring_elements 0.72752
published_at 2026-04-01T12:55:00Z
2
value 0.00736
scoring_system epss
scoring_elements 0.7276
published_at 2026-04-02T12:55:00Z
3
value 0.00736
scoring_system epss
scoring_elements 0.7278
published_at 2026-04-04T12:55:00Z
4
value 0.00736
scoring_system epss
scoring_elements 0.72756
published_at 2026-04-07T12:55:00Z
5
value 0.00736
scoring_system epss
scoring_elements 0.72794
published_at 2026-04-08T12:55:00Z
6
value 0.00736
scoring_system epss
scoring_elements 0.72808
published_at 2026-04-09T12:55:00Z
7
value 0.00736
scoring_system epss
scoring_elements 0.72832
published_at 2026-04-11T12:55:00Z
8
value 0.00736
scoring_system epss
scoring_elements 0.72815
published_at 2026-04-12T12:55:00Z
9
value 0.00736
scoring_system epss
scoring_elements 0.72807
published_at 2026-04-13T12:55:00Z
10
value 0.00736
scoring_system epss
scoring_elements 0.72849
published_at 2026-04-16T12:55:00Z
11
value 0.00736
scoring_system epss
scoring_elements 0.72859
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-18622
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18622
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18622
4
reference_url https://github.com/phpmyadmin/composer/commit/51acbf53564d9b52e78509a5688ec2b68976b5f7
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://github.com/phpmyadmin/composer/commit/51acbf53564d9b52e78509a5688ec2b68976b5f7
5
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BA4DGF7KTQS6WA2DRNJSW66L43WB7LRV/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BA4DGF7KTQS6WA2DRNJSW66L43WB7LRV/
6
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W5GW4KEMNCBQYZCIXEJYC42OEBBN2NSH/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W5GW4KEMNCBQYZCIXEJYC42OEBBN2NSH/
7
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BA4DGF7KTQS6WA2DRNJSW66L43WB7LRV
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BA4DGF7KTQS6WA2DRNJSW66L43WB7LRV
8
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BA4DGF7KTQS6WA2DRNJSW66L43WB7LRV/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BA4DGF7KTQS6WA2DRNJSW66L43WB7LRV/
9
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W5GW4KEMNCBQYZCIXEJYC42OEBBN2NSH
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W5GW4KEMNCBQYZCIXEJYC42OEBBN2NSH
10
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W5GW4KEMNCBQYZCIXEJYC42OEBBN2NSH/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W5GW4KEMNCBQYZCIXEJYC42OEBBN2NSH/
11
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-18622
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
1
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
2
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2019-18622
12
reference_url https://security.gentoo.org/glsa/202003-39
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://security.gentoo.org/glsa/202003-39
13
reference_url https://www.phpmyadmin.net/security/PMASA-2019-5
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://www.phpmyadmin.net/security/PMASA-2019-5
14
reference_url https://www.phpmyadmin.net/security/PMASA-2019-5/
reference_id
reference_type
scores
url https://www.phpmyadmin.net/security/PMASA-2019-5/
15
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=945349
reference_id 945349
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=945349
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:opensuse:backports_sle:15.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:opensuse:backports_sle:15.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:opensuse:backports_sle:15.0:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:opensuse:backports_sle:15.0:sp1:*:*:*:*:*:*
reference_id cpe:2.3:a:opensuse:backports_sle:15.0:sp1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:opensuse:backports_sle:15.0:sp1:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:phpmyadmin:phpmyadmin:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:*:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
23
reference_url https://github.com/advisories/GHSA-jgjc-332c-8cmc
reference_id GHSA-jgjc-332c-8cmc
reference_type
scores
0
value CRITICAL
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-jgjc-332c-8cmc
fixed_packages
0
url pkg:apk/alpine/phpmyadmin@4.9.2-r0?arch=aarch64&distroversion=v3.14&reponame=community
purl pkg:apk/alpine/phpmyadmin@4.9.2-r0?arch=aarch64&distroversion=v3.14&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/phpmyadmin@4.9.2-r0%3Farch=aarch64&distroversion=v3.14&reponame=community
aliases CVE-2019-18622, GHSA-jgjc-332c-8cmc
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gu4y-aeqx-mqak
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:apk/alpine/phpmyadmin@4.9.2-r0%3Farch=aarch64&distroversion=v3.14&reponame=community