Lookup for vulnerable packages by Package URL.
| Purl | pkg:apk/alpine/phpmyadmin@4.8.4-r0?arch=armhf&distroversion=edge&reponame=community |
| Type | apk |
| Namespace | alpine |
| Name | phpmyadmin |
| Version | 4.8.4-r0 |
| Qualifiers |
| arch |
armhf |
| distroversion |
edge |
| reponame |
community |
|
| Subpath | |
| Is_vulnerable | false |
| Next_non_vulnerable_version | 4.8.5-r0 |
| Latest_non_vulnerable_version | 5.1.2-r0 |
| Affected_by_vulnerabilities |
|
| Fixing_vulnerabilities |
| 0 |
| url |
VCID-986a-3m4g-83ge |
| vulnerability_id |
VCID-986a-3m4g-83ge |
| summary |
Cross-Site Request Forgery (CSRF)
By deceiving a user into clicking on a crafted URL, it is possible to perform harmful SQL operations such as renaming databases, creating new `tables/routines`, deleting designer pages, `adding/deleting` users, updating user passwords, killing SQL processes. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2018-19969 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00458 |
| scoring_system |
epss |
| scoring_elements |
0.63934 |
| published_at |
2026-04-07T12:55:00Z |
|
| 1 |
| value |
0.00458 |
| scoring_system |
epss |
| scoring_elements |
0.64006 |
| published_at |
2026-04-21T12:55:00Z |
|
| 2 |
| value |
0.00458 |
| scoring_system |
epss |
| scoring_elements |
0.64017 |
| published_at |
2026-04-18T12:55:00Z |
|
| 3 |
| value |
0.00458 |
| scoring_system |
epss |
| scoring_elements |
0.64005 |
| published_at |
2026-04-16T12:55:00Z |
|
| 4 |
| value |
0.00458 |
| scoring_system |
epss |
| scoring_elements |
0.6397 |
| published_at |
2026-04-13T12:55:00Z |
|
| 5 |
| value |
0.00458 |
| scoring_system |
epss |
| scoring_elements |
0.64 |
| published_at |
2026-04-12T12:55:00Z |
|
| 6 |
| value |
0.00458 |
| scoring_system |
epss |
| scoring_elements |
0.64014 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00458 |
| scoring_system |
epss |
| scoring_elements |
0.64002 |
| published_at |
2026-04-09T12:55:00Z |
|
| 8 |
| value |
0.00458 |
| scoring_system |
epss |
| scoring_elements |
0.63888 |
| published_at |
2026-04-01T12:55:00Z |
|
| 9 |
| value |
0.00458 |
| scoring_system |
epss |
| scoring_elements |
0.63947 |
| published_at |
2026-04-02T12:55:00Z |
|
| 10 |
| value |
0.00458 |
| scoring_system |
epss |
| scoring_elements |
0.63984 |
| published_at |
2026-04-08T12:55:00Z |
|
| 11 |
| value |
0.00458 |
| scoring_system |
epss |
| scoring_elements |
0.63974 |
| published_at |
2026-04-04T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2018-19969 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
|
| fixed_packages |
|
| aliases |
CVE-2018-19969, GHSA-xwf2-53mc-r8hx
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-986a-3m4g-83ge |
|
| 1 |
| url |
VCID-ebk2-vjau-57h9 |
| vulnerability_id |
VCID-ebk2-vjau-57h9 |
| summary |
Information Exposure
An attacker can exploit phpMyAdm to leak the contents of a local file because of an error in the transformation feature. The attacker must have access to the phpMyAdmin Configuration Storage tables, although these can easily be created in any database to which the attacker has access. An attacker must have valid credentials to log in to phpMyAdmin; this vulnerability does not allow an attacker to circumvent the login system. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2018-19968 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.02543 |
| scoring_system |
epss |
| scoring_elements |
0.85409 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.02543 |
| scoring_system |
epss |
| scoring_elements |
0.85495 |
| published_at |
2026-04-21T12:55:00Z |
|
| 2 |
| value |
0.02543 |
| scoring_system |
epss |
| scoring_elements |
0.85498 |
| published_at |
2026-04-18T12:55:00Z |
|
| 3 |
| value |
0.02543 |
| scoring_system |
epss |
| scoring_elements |
0.85494 |
| published_at |
2026-04-16T12:55:00Z |
|
| 4 |
| value |
0.02543 |
| scoring_system |
epss |
| scoring_elements |
0.8547 |
| published_at |
2026-04-13T12:55:00Z |
|
| 5 |
| value |
0.02543 |
| scoring_system |
epss |
| scoring_elements |
0.85429 |
| published_at |
2026-04-04T12:55:00Z |
|
| 6 |
| value |
0.02543 |
| scoring_system |
epss |
| scoring_elements |
0.85397 |
| published_at |
2026-04-01T12:55:00Z |
|
| 7 |
| value |
0.02543 |
| scoring_system |
epss |
| scoring_elements |
0.85474 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.02543 |
| scoring_system |
epss |
| scoring_elements |
0.85475 |
| published_at |
2026-04-11T12:55:00Z |
|
| 9 |
| value |
0.02543 |
| scoring_system |
epss |
| scoring_elements |
0.85461 |
| published_at |
2026-04-09T12:55:00Z |
|
| 10 |
| value |
0.02543 |
| scoring_system |
epss |
| scoring_elements |
0.85453 |
| published_at |
2026-04-08T12:55:00Z |
|
| 11 |
| value |
0.02543 |
| scoring_system |
epss |
| scoring_elements |
0.85432 |
| published_at |
2026-04-07T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2018-19968 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
|
| fixed_packages |
|
| aliases |
CVE-2018-19968, GHSA-xc97-r49q-cxgc
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-ebk2-vjau-57h9 |
|
| 2 |
| url |
VCID-qcra-cu62-43he |
| vulnerability_id |
VCID-qcra-cu62-43he |
| summary |
Cross-site Scripting
In phpMyAdm, an XSS vulnerability was found in the navigation tree, where an attacker can deliver a payload to a user through a crafted `database/table` name. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2018-19970 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01501 |
| scoring_system |
epss |
| scoring_elements |
0.81175 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.01501 |
| scoring_system |
epss |
| scoring_elements |
0.81074 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.01501 |
| scoring_system |
epss |
| scoring_elements |
0.81083 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.01501 |
| scoring_system |
epss |
| scoring_elements |
0.81108 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.01501 |
| scoring_system |
epss |
| scoring_elements |
0.81107 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.01501 |
| scoring_system |
epss |
| scoring_elements |
0.81135 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.01501 |
| scoring_system |
epss |
| scoring_elements |
0.81141 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.01501 |
| scoring_system |
epss |
| scoring_elements |
0.81159 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.01501 |
| scoring_system |
epss |
| scoring_elements |
0.81146 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.01501 |
| scoring_system |
epss |
| scoring_elements |
0.81139 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.01501 |
| scoring_system |
epss |
| scoring_elements |
0.81176 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.01501 |
| scoring_system |
epss |
| scoring_elements |
0.81178 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2018-19970 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
|
| fixed_packages |
|
| aliases |
CVE-2018-19970, GHSA-8987-93fh-rcwq
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-qcra-cu62-43he |
|
|
| Risk_score | null |
| Resource_url | http://public2.vulnerablecode.io/packages/pkg:apk/alpine/phpmyadmin@4.8.4-r0%3Farch=armhf&distroversion=edge&reponame=community |