Lookup for vulnerable packages by Package URL.
| Purl | pkg:apk/alpine/phpmyadmin@4.8.4-r0?arch=armv7&distroversion=v3.19&reponame=community |
| Type | apk |
| Namespace | alpine |
| Name | phpmyadmin |
| Version | 4.8.4-r0 |
| Qualifiers |
| arch |
armv7 |
| distroversion |
v3.19 |
| reponame |
community |
|
| Subpath | |
| Is_vulnerable | false |
| Next_non_vulnerable_version | 4.8.5-r0 |
| Latest_non_vulnerable_version | 5.1.2-r0 |
| Affected_by_vulnerabilities |
|
| Fixing_vulnerabilities |
| 0 |
| url |
VCID-986a-3m4g-83ge |
| vulnerability_id |
VCID-986a-3m4g-83ge |
| summary |
Cross-Site Request Forgery (CSRF)
By deceiving a user into clicking on a crafted URL, it is possible to perform harmful SQL operations such as renaming databases, creating new `tables/routines`, deleting designer pages, `adding/deleting` users, updating user passwords, killing SQL processes. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2018-19969 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00458 |
| scoring_system |
epss |
| scoring_elements |
0.64024 |
| published_at |
2026-04-24T12:55:00Z |
|
| 1 |
| value |
0.00458 |
| scoring_system |
epss |
| scoring_elements |
0.63934 |
| published_at |
2026-04-07T12:55:00Z |
|
| 2 |
| value |
0.00458 |
| scoring_system |
epss |
| scoring_elements |
0.63984 |
| published_at |
2026-04-08T12:55:00Z |
|
| 3 |
| value |
0.00458 |
| scoring_system |
epss |
| scoring_elements |
0.64002 |
| published_at |
2026-04-09T12:55:00Z |
|
| 4 |
| value |
0.00458 |
| scoring_system |
epss |
| scoring_elements |
0.64014 |
| published_at |
2026-04-11T12:55:00Z |
|
| 5 |
| value |
0.00458 |
| scoring_system |
epss |
| scoring_elements |
0.64 |
| published_at |
2026-04-12T12:55:00Z |
|
| 6 |
| value |
0.00458 |
| scoring_system |
epss |
| scoring_elements |
0.6397 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.00458 |
| scoring_system |
epss |
| scoring_elements |
0.64005 |
| published_at |
2026-04-16T12:55:00Z |
|
| 8 |
| value |
0.00458 |
| scoring_system |
epss |
| scoring_elements |
0.64017 |
| published_at |
2026-04-18T12:55:00Z |
|
| 9 |
| value |
0.00458 |
| scoring_system |
epss |
| scoring_elements |
0.64006 |
| published_at |
2026-04-21T12:55:00Z |
|
| 10 |
| value |
0.00458 |
| scoring_system |
epss |
| scoring_elements |
0.63888 |
| published_at |
2026-04-01T12:55:00Z |
|
| 11 |
| value |
0.00458 |
| scoring_system |
epss |
| scoring_elements |
0.63947 |
| published_at |
2026-04-02T12:55:00Z |
|
| 12 |
| value |
0.00458 |
| scoring_system |
epss |
| scoring_elements |
0.63974 |
| published_at |
2026-04-04T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2018-19969 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
|
| fixed_packages |
|
| aliases |
CVE-2018-19969, GHSA-xwf2-53mc-r8hx
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-986a-3m4g-83ge |
|
| 1 |
| url |
VCID-ebk2-vjau-57h9 |
| vulnerability_id |
VCID-ebk2-vjau-57h9 |
| summary |
Information Exposure
An attacker can exploit phpMyAdm to leak the contents of a local file because of an error in the transformation feature. The attacker must have access to the phpMyAdmin Configuration Storage tables, although these can easily be created in any database to which the attacker has access. An attacker must have valid credentials to log in to phpMyAdmin; this vulnerability does not allow an attacker to circumvent the login system. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2018-19968 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.02543 |
| scoring_system |
epss |
| scoring_elements |
0.85517 |
| published_at |
2026-04-24T12:55:00Z |
|
| 1 |
| value |
0.02543 |
| scoring_system |
epss |
| scoring_elements |
0.85397 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.02543 |
| scoring_system |
epss |
| scoring_elements |
0.85409 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.02543 |
| scoring_system |
epss |
| scoring_elements |
0.85429 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.02543 |
| scoring_system |
epss |
| scoring_elements |
0.85432 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.02543 |
| scoring_system |
epss |
| scoring_elements |
0.85453 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.02543 |
| scoring_system |
epss |
| scoring_elements |
0.85461 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.02543 |
| scoring_system |
epss |
| scoring_elements |
0.85475 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.02543 |
| scoring_system |
epss |
| scoring_elements |
0.85474 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.02543 |
| scoring_system |
epss |
| scoring_elements |
0.8547 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.02543 |
| scoring_system |
epss |
| scoring_elements |
0.85494 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.02543 |
| scoring_system |
epss |
| scoring_elements |
0.85498 |
| published_at |
2026-04-18T12:55:00Z |
|
| 12 |
| value |
0.02543 |
| scoring_system |
epss |
| scoring_elements |
0.85495 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2018-19968 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
|
| fixed_packages |
|
| aliases |
CVE-2018-19968, GHSA-xc97-r49q-cxgc
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-ebk2-vjau-57h9 |
|
| 2 |
| url |
VCID-qcra-cu62-43he |
| vulnerability_id |
VCID-qcra-cu62-43he |
| summary |
Cross-site Scripting
In phpMyAdm, an XSS vulnerability was found in the navigation tree, where an attacker can deliver a payload to a user through a crafted `database/table` name. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2018-19970 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01501 |
| scoring_system |
epss |
| scoring_elements |
0.81198 |
| published_at |
2026-04-24T12:55:00Z |
|
| 1 |
| value |
0.01501 |
| scoring_system |
epss |
| scoring_elements |
0.81074 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.01501 |
| scoring_system |
epss |
| scoring_elements |
0.81083 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.01501 |
| scoring_system |
epss |
| scoring_elements |
0.81108 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.01501 |
| scoring_system |
epss |
| scoring_elements |
0.81107 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.01501 |
| scoring_system |
epss |
| scoring_elements |
0.81135 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.01501 |
| scoring_system |
epss |
| scoring_elements |
0.81141 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.01501 |
| scoring_system |
epss |
| scoring_elements |
0.81159 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.01501 |
| scoring_system |
epss |
| scoring_elements |
0.81146 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.01501 |
| scoring_system |
epss |
| scoring_elements |
0.81139 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.01501 |
| scoring_system |
epss |
| scoring_elements |
0.81176 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.01501 |
| scoring_system |
epss |
| scoring_elements |
0.81178 |
| published_at |
2026-04-18T12:55:00Z |
|
| 12 |
| value |
0.01501 |
| scoring_system |
epss |
| scoring_elements |
0.81175 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2018-19970 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
|
| fixed_packages |
|
| aliases |
CVE-2018-19970, GHSA-8987-93fh-rcwq
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-qcra-cu62-43he |
|
|
| Risk_score | null |
| Resource_url | http://public2.vulnerablecode.io/packages/pkg:apk/alpine/phpmyadmin@4.8.4-r0%3Farch=armv7&distroversion=v3.19&reponame=community |