Lookup for vulnerable packages by Package URL.

Purlpkg:composer/phpmyadmin/phpmyadmin@3.5.0
Typecomposer
Namespacephpmyadmin
Namephpmyadmin
Version3.5.0
Qualifiers
Subpath
Is_vulnerabletrue
Next_non_vulnerable_version4.9.11
Latest_non_vulnerable_version5.2.2
Affected_by_vulnerabilities
0
url VCID-1dhd-3ayw-6kg3
vulnerability_id VCID-1dhd-3ayw-6kg3
summary
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Multiple cross-site scripting (XSS) vulnerabilities in phpMyAdmin 3.5.x before 3.5.8.2 allow remote attackers to inject arbitrary web script or HTML via vectors involving a JavaScript event in (1) an anchor identifier to setup/index.php or (2) a chartTitle (aka chart title) value.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-4997
reference_id
reference_type
scores
0
value 0.00263
scoring_system epss
scoring_elements 0.497
published_at 2026-04-18T12:55:00Z
1
value 0.00263
scoring_system epss
scoring_elements 0.49682
published_at 2026-04-11T12:55:00Z
2
value 0.00263
scoring_system epss
scoring_elements 0.49653
published_at 2026-04-12T12:55:00Z
3
value 0.00263
scoring_system epss
scoring_elements 0.49655
published_at 2026-04-13T12:55:00Z
4
value 0.00263
scoring_system epss
scoring_elements 0.49702
published_at 2026-04-16T12:55:00Z
5
value 0.00263
scoring_system epss
scoring_elements 0.49607
published_at 2026-04-01T12:55:00Z
6
value 0.00263
scoring_system epss
scoring_elements 0.49637
published_at 2026-04-02T12:55:00Z
7
value 0.00263
scoring_system epss
scoring_elements 0.49664
published_at 2026-04-04T12:55:00Z
8
value 0.00263
scoring_system epss
scoring_elements 0.49616
published_at 2026-04-07T12:55:00Z
9
value 0.00263
scoring_system epss
scoring_elements 0.49671
published_at 2026-04-21T12:55:00Z
10
value 0.00263
scoring_system epss
scoring_elements 0.49665
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-4997
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4997
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4997
2
reference_url https://github.com/phpmyadmin/composer
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/phpmyadmin/composer
3
reference_url http://www.phpmyadmin.net/home_page/security/PMASA-2013-9.php
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.phpmyadmin.net/home_page/security/PMASA-2013-9.php
4
reference_url https://nvd.nist.gov/vuln/detail/CVE-2013-4997
reference_id CVE-2013-4997
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2013-4997
5
reference_url https://github.com/advisories/GHSA-5gh4-v2ch-pcx4
reference_id GHSA-5gh4-v2ch-pcx4
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-5gh4-v2ch-pcx4
6
reference_url https://security.gentoo.org/glsa/201311-02
reference_id GLSA-201311-02
reference_type
scores
url https://security.gentoo.org/glsa/201311-02
fixed_packages
0
url pkg:composer/phpmyadmin/phpmyadmin@3.5.8%2B2
purl pkg:composer/phpmyadmin/phpmyadmin@3.5.8%2B2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/phpmyadmin/phpmyadmin@3.5.8%252B2
aliases CVE-2013-4997, GHSA-5gh4-v2ch-pcx4
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1dhd-3ayw-6kg3
1
url VCID-2n2q-cm1n-cqdr
vulnerability_id VCID-2n2q-cm1n-cqdr
summary
Multiple vulnerabilities have been found in phpMyAdmin, allowing
    remote authenticated attackers to execute arbitrary code, inject SQL code
    or conduct other attacks.
references
0
reference_url http://archives.neohapsis.com/archives/bugtraq/2013-04/0217.html
reference_id
reference_type
scores
url http://archives.neohapsis.com/archives/bugtraq/2013-04/0217.html
1
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2013-May/104725.html
reference_id
reference_type
scores
0
value 8.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url http://lists.fedoraproject.org/pipermail/package-announce/2013-May/104725.html
2
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2013-May/104770.html
reference_id
reference_type
scores
0
value 8.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url http://lists.fedoraproject.org/pipermail/package-announce/2013-May/104770.html
3
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2013-May/104936.html
reference_id
reference_type
scores
0
value 8.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url http://lists.fedoraproject.org/pipermail/package-announce/2013-May/104936.html
4
reference_url http://lists.opensuse.org/opensuse-updates/2013-06/msg00181.html
reference_id
reference_type
scores
0
value 8.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url http://lists.opensuse.org/opensuse-updates/2013-06/msg00181.html
5
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-3239
reference_id
reference_type
scores
0
value 0.12333
scoring_system epss
scoring_elements 0.93901
published_at 2026-04-21T12:55:00Z
1
value 0.12333
scoring_system epss
scoring_elements 0.93835
published_at 2026-04-01T12:55:00Z
2
value 0.12333
scoring_system epss
scoring_elements 0.93844
published_at 2026-04-02T12:55:00Z
3
value 0.12333
scoring_system epss
scoring_elements 0.93853
published_at 2026-04-04T12:55:00Z
4
value 0.12333
scoring_system epss
scoring_elements 0.93856
published_at 2026-04-07T12:55:00Z
5
value 0.12333
scoring_system epss
scoring_elements 0.93864
published_at 2026-04-08T12:55:00Z
6
value 0.12333
scoring_system epss
scoring_elements 0.93868
published_at 2026-04-09T12:55:00Z
7
value 0.12333
scoring_system epss
scoring_elements 0.93873
published_at 2026-04-13T12:55:00Z
8
value 0.12333
scoring_system epss
scoring_elements 0.93895
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-3239
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3239
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3239
7
reference_url https://github.com/phpmyadmin/phpmyadmin
reference_id
reference_type
scores
0
value 8.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/phpmyadmin/phpmyadmin
8
reference_url https://github.com/phpmyadmin/phpmyadmin/commit/1f6bc0b707002e26cab216b9e57b4d5de764de48
reference_id
reference_type
scores
0
value 8.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/phpmyadmin/phpmyadmin/commit/1f6bc0b707002e26cab216b9e57b4d5de764de48
9
reference_url https://github.com/phpmyadmin/phpmyadmin/commit/d3fafdfba0807068196655e9b6d16c5d1d3ccf8a
reference_id
reference_type
scores
0
value 8.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/phpmyadmin/phpmyadmin/commit/d3fafdfba0807068196655e9b6d16c5d1d3ccf8a
10
reference_url https://nvd.nist.gov/vuln/detail/CVE-2013-3239
reference_id
reference_type
scores
0
value 4.6
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:S/C:P/I:P/A:P
1
value 8.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2013-3239
11
reference_url https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0133
reference_id
reference_type
scores
url https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0133
12
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2013:160
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2013:160
13
reference_url http://www.phpmyadmin.net/home_page/security/PMASA-2013-3.php
reference_id
reference_type
scores
0
value 8.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url http://www.phpmyadmin.net/home_page/security/PMASA-2013-3.php
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.0.0:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.1.0:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.2.0:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.2.1:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.2.2:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.3.0:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.4:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.5:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.6:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.7:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.7:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.7:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.7:rc1:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.8:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.8:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.8:rc1:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.0:rc2:*:*:*:*:*:*
reference_id cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.0:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.0:rc2:*:*:*:*:*:*
27
reference_url https://github.com/advisories/GHSA-gg36-9346-9qx9
reference_id GHSA-gg36-9346-9qx9
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-gg36-9346-9qx9
28
reference_url https://security.gentoo.org/glsa/201311-02
reference_id GLSA-201311-02
reference_type
scores
url https://security.gentoo.org/glsa/201311-02
fixed_packages
0
url pkg:composer/phpmyadmin/phpmyadmin@3.5.8%2B1
purl pkg:composer/phpmyadmin/phpmyadmin@3.5.8%2B1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/phpmyadmin/phpmyadmin@3.5.8%252B1
aliases CVE-2013-3239, GHSA-gg36-9346-9qx9
risk_score 10.0
exploitability 2.0
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2n2q-cm1n-cqdr
2
url VCID-46c2-r8g1-13ez
vulnerability_id VCID-46c2-r8g1-13ez
summary
phpMyAdmin Multiple Cross-site Scripting Vulnerabilities in the Database Structure page
Multiple cross-site scripting (XSS) vulnerabilities in the Database Structure page in phpMyAdmin 3.4.x before 3.4.11.1 and 3.5.x before 3.5.2.2 allow remote authenticated users to inject arbitrary web script or HTML via (1) a crafted table name during table creation, or a (2) Empty link or (3) Drop link for a crafted table name.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-4345
reference_id
reference_type
scores
0
value 0.00209
scoring_system epss
scoring_elements 0.4328
published_at 2026-04-21T12:55:00Z
1
value 0.00209
scoring_system epss
scoring_elements 0.43341
published_at 2026-04-11T12:55:00Z
2
value 0.00209
scoring_system epss
scoring_elements 0.43309
published_at 2026-04-12T12:55:00Z
3
value 0.00209
scoring_system epss
scoring_elements 0.43293
published_at 2026-04-13T12:55:00Z
4
value 0.00209
scoring_system epss
scoring_elements 0.43355
published_at 2026-04-16T12:55:00Z
5
value 0.00209
scoring_system epss
scoring_elements 0.43344
published_at 2026-04-18T12:55:00Z
6
value 0.00209
scoring_system epss
scoring_elements 0.43232
published_at 2026-04-01T12:55:00Z
7
value 0.00209
scoring_system epss
scoring_elements 0.43288
published_at 2026-04-02T12:55:00Z
8
value 0.00209
scoring_system epss
scoring_elements 0.43317
published_at 2026-04-04T12:55:00Z
9
value 0.00209
scoring_system epss
scoring_elements 0.43254
published_at 2026-04-07T12:55:00Z
10
value 0.00209
scoring_system epss
scoring_elements 0.43305
published_at 2026-04-08T12:55:00Z
11
value 0.00209
scoring_system epss
scoring_elements 0.4332
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-4345
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4345
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4345
2
reference_url https://hermes.opensuse.org/messages/15513071
reference_id
reference_type
scores
url https://hermes.opensuse.org/messages/15513071
3
reference_url https://nvd.nist.gov/vuln/detail/CVE-2012-4345
reference_id
reference_type
scores
0
value 3.5
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:S/C:N/I:P/A:N
1
value LOW
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2012-4345
4
reference_url https://web.archive.org/web/20150523055725/http://www.mandriva.com/en/support/security/advisories/advisory/MDVSA-2012:136/?name=MDVSA-2012:136
reference_id
reference_type
scores
0
value LOW
scoring_system generic_textual
scoring_elements
url https://web.archive.org/web/20150523055725/http://www.mandriva.com/en/support/security/advisories/advisory/MDVSA-2012:136/?name=MDVSA-2012:136
5
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2012:136
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2012:136
6
reference_url http://www.phpmyadmin.net/home_page/security/PMASA-2012-4.php
reference_id
reference_type
scores
0
value LOW
scoring_system generic_textual
scoring_elements
url http://www.phpmyadmin.net/home_page/security/PMASA-2012-4.php
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.4.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:phpmyadmin:phpmyadmin:3.4.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.4.0.0:*:*:*:*:*:*:*
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.4.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:phpmyadmin:phpmyadmin:3.4.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.4.1.0:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.4.10.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:phpmyadmin:phpmyadmin:3.4.10.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.4.10.0:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.4.10.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:phpmyadmin:phpmyadmin:3.4.10.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.4.10.1:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.4.10.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:phpmyadmin:phpmyadmin:3.4.10.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.4.10.2:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.4.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:phpmyadmin:phpmyadmin:3.4.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.4.11:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.4.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:phpmyadmin:phpmyadmin:3.4.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.4.2.0:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.4.3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:phpmyadmin:phpmyadmin:3.4.3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.4.3.0:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.4.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:phpmyadmin:phpmyadmin:3.4.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.4.3.1:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.4.3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:phpmyadmin:phpmyadmin:3.4.3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.4.3.2:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.4.4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:phpmyadmin:phpmyadmin:3.4.4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.4.4.0:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.4.5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:phpmyadmin:phpmyadmin:3.4.5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.4.5.0:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.4.6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:phpmyadmin:phpmyadmin:3.4.6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.4.6.0:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.4.7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:phpmyadmin:phpmyadmin:3.4.7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.4.7.0:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.4.7.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:phpmyadmin:phpmyadmin:3.4.7.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.4.7.1:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.4.8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:phpmyadmin:phpmyadmin:3.4.8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.4.8.0:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.4.9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:phpmyadmin:phpmyadmin:3.4.9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.4.9.0:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.0.0:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.1.0:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.2.0:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.2.1:*:*:*:*:*:*:*
28
reference_url https://github.com/advisories/GHSA-r3pq-mp8v-cp33
reference_id GHSA-r3pq-mp8v-cp33
reference_type
scores
0
value LOW
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-r3pq-mp8v-cp33
fixed_packages
0
url pkg:composer/phpmyadmin/phpmyadmin@3.5.2%2B2
purl pkg:composer/phpmyadmin/phpmyadmin@3.5.2%2B2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/phpmyadmin/phpmyadmin@3.5.2%252B2
aliases CVE-2012-4345, GHSA-r3pq-mp8v-cp33
risk_score 1.6
exploitability 0.5
weighted_severity 3.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-46c2-r8g1-13ez
3
url VCID-5288-gx4v-7bh4
vulnerability_id VCID-5288-gx4v-7bh4
summary
phpMyAdmin Unsafe Fetching of Javascript Code
phpMyAdmin 3.5.x before 3.5.3 uses JavaScript code that is obtained through an HTTP session to phpmyadmin.net without SSL, which allows man-in-the-middle attackers to conduct cross-site scripting (XSS) attacks by modifying this code.
references
0
reference_url http://lists.opensuse.org/opensuse-updates/2012-11/msg00033.html
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://lists.opensuse.org/opensuse-updates/2012-11/msg00033.html
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-5368
reference_id
reference_type
scores
0
value 0.00425
scoring_system epss
scoring_elements 0.62251
published_at 2026-04-21T12:55:00Z
1
value 0.00425
scoring_system epss
scoring_elements 0.62211
published_at 2026-04-08T12:55:00Z
2
value 0.00425
scoring_system epss
scoring_elements 0.62228
published_at 2026-04-09T12:55:00Z
3
value 0.00425
scoring_system epss
scoring_elements 0.62246
published_at 2026-04-11T12:55:00Z
4
value 0.00425
scoring_system epss
scoring_elements 0.62236
published_at 2026-04-12T12:55:00Z
5
value 0.00425
scoring_system epss
scoring_elements 0.62215
published_at 2026-04-13T12:55:00Z
6
value 0.00425
scoring_system epss
scoring_elements 0.6226
published_at 2026-04-16T12:55:00Z
7
value 0.00425
scoring_system epss
scoring_elements 0.62267
published_at 2026-04-18T12:55:00Z
8
value 0.00425
scoring_system epss
scoring_elements 0.62102
published_at 2026-04-01T12:55:00Z
9
value 0.00425
scoring_system epss
scoring_elements 0.62162
published_at 2026-04-02T12:55:00Z
10
value 0.00425
scoring_system epss
scoring_elements 0.62193
published_at 2026-04-04T12:55:00Z
11
value 0.00425
scoring_system epss
scoring_elements 0.62161
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-5368
2
reference_url https://github.com/phpmyadmin/phpmyadmin/commit/50edafc0884aa15d0a1aa178089ac6a1ad2eb18a
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/phpmyadmin/phpmyadmin/commit/50edafc0884aa15d0a1aa178089ac6a1ad2eb18a
3
reference_url https://github.com/phpmyadmin/phpmyadmin/commit/a547f3d3e2cf36c6a904fa3e053fd8bddd3fbbb0
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/phpmyadmin/phpmyadmin/commit/a547f3d3e2cf36c6a904fa3e053fd8bddd3fbbb0
4
reference_url https://nvd.nist.gov/vuln/detail/CVE-2012-5368
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:P/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2012-5368
5
reference_url https://web.archive.org/web/20200228143700/http://www.securityfocus.com/bid/55939
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://web.archive.org/web/20200228143700/http://www.securityfocus.com/bid/55939
6
reference_url http://www.phpmyadmin.net/home_page/security/PMASA-2012-7.php
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.phpmyadmin.net/home_page/security/PMASA-2012-7.php
7
reference_url http://www.securityfocus.com/bid/55939
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/55939
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.0.0:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.1.0:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.2.0:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.2.1:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.2.2:*:*:*:*:*:*:*
13
reference_url https://github.com/advisories/GHSA-xpxp-v33m-5jp9
reference_id GHSA-xpxp-v33m-5jp9
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-xpxp-v33m-5jp9
fixed_packages
0
url pkg:composer/phpmyadmin/phpmyadmin@3.5.3
purl pkg:composer/phpmyadmin/phpmyadmin@3.5.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/phpmyadmin/phpmyadmin@3.5.3
aliases CVE-2012-5368, GHSA-xpxp-v33m-5jp9
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5288-gx4v-7bh4
4
url VCID-dby9-xw23-huf5
vulnerability_id VCID-dby9-xw23-huf5
summary
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Multiple cross-site scripting (XSS) vulnerabilities in phpMyAdmin 3.5.x before 3.5.2.2 allow remote authenticated users to inject arbitrary web script or HTML via a Table Operations (1) TRUNCATE or (2) DROP link for a crafted table name, (3) the Add Trigger popup within a Triggers page that references crafted table names, (4) an invalid trigger-creation attempt for a crafted table name, (5) crafted data in a table, or (6) a crafted tooltip label name during GIS data visualization, a different issue than CVE-2012-4345.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-4579
reference_id
reference_type
scores
0
value 0.00185
scoring_system epss
scoring_elements 0.40161
published_at 2026-04-21T12:55:00Z
1
value 0.00185
scoring_system epss
scoring_elements 0.40239
published_at 2026-04-12T12:55:00Z
2
value 0.00185
scoring_system epss
scoring_elements 0.4022
published_at 2026-04-13T12:55:00Z
3
value 0.00185
scoring_system epss
scoring_elements 0.40267
published_at 2026-04-16T12:55:00Z
4
value 0.00185
scoring_system epss
scoring_elements 0.40237
published_at 2026-04-18T12:55:00Z
5
value 0.00185
scoring_system epss
scoring_elements 0.40106
published_at 2026-04-01T12:55:00Z
6
value 0.00185
scoring_system epss
scoring_elements 0.40256
published_at 2026-04-02T12:55:00Z
7
value 0.00185
scoring_system epss
scoring_elements 0.4028
published_at 2026-04-04T12:55:00Z
8
value 0.00185
scoring_system epss
scoring_elements 0.40203
published_at 2026-04-07T12:55:00Z
9
value 0.00185
scoring_system epss
scoring_elements 0.40255
published_at 2026-04-08T12:55:00Z
10
value 0.00185
scoring_system epss
scoring_elements 0.40266
published_at 2026-04-09T12:55:00Z
11
value 0.00185
scoring_system epss
scoring_elements 0.40277
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-4579
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4579
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4579
2
reference_url http://www.phpmyadmin.net/home_page/security/PMASA-2012-4.php
reference_id
reference_type
scores
0
value LOW
scoring_system generic_textual
scoring_elements
url http://www.phpmyadmin.net/home_page/security/PMASA-2012-4.php
3
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.0.0:*:*:*:*:*:*:*
4
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.1.0:*:*:*:*:*:*:*
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.2.0:*:*:*:*:*:*:*
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.2.1:*:*:*:*:*:*:*
7
reference_url https://nvd.nist.gov/vuln/detail/CVE-2012-4579
reference_id CVE-2012-4579
reference_type
scores
0
value 3.5
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:S/C:N/I:P/A:N
1
value LOW
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2012-4579
8
reference_url https://github.com/advisories/GHSA-q7v2-w38r-pv7v
reference_id GHSA-q7v2-w38r-pv7v
reference_type
scores
0
value LOW
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-q7v2-w38r-pv7v
fixed_packages
0
url pkg:composer/phpmyadmin/phpmyadmin@3.5.2%2B2
purl pkg:composer/phpmyadmin/phpmyadmin@3.5.2%2B2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/phpmyadmin/phpmyadmin@3.5.2%252B2
aliases CVE-2012-4579, GHSA-q7v2-w38r-pv7v
risk_score 1.6
exploitability 0.5
weighted_severity 3.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dby9-xw23-huf5
5
url VCID-kke6-fqmn-pug2
vulnerability_id VCID-kke6-fqmn-pug2
summary
phpMyAdmin multiple cross-site scripting vulnerabilities
Multiple cross-site scripting (XSS) vulnerabilities in phpMyAdmin 3.5.x before 3.5.3 allow remote authenticated users to inject arbitrary web script or HTML via a crafted name of (1) an event, (2) a procedure, or (3) a trigger.
references
0
reference_url http://lists.opensuse.org/opensuse-updates/2012-11/msg00033.html
reference_id
reference_type
scores
0
value LOW
scoring_system generic_textual
scoring_elements
url http://lists.opensuse.org/opensuse-updates/2012-11/msg00033.html
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-5339
reference_id
reference_type
scores
0
value 0.00208
scoring_system epss
scoring_elements 0.43128
published_at 2026-04-21T12:55:00Z
1
value 0.00208
scoring_system epss
scoring_elements 0.4316
published_at 2026-04-08T12:55:00Z
2
value 0.00208
scoring_system epss
scoring_elements 0.43173
published_at 2026-04-09T12:55:00Z
3
value 0.00208
scoring_system epss
scoring_elements 0.43194
published_at 2026-04-11T12:55:00Z
4
value 0.00208
scoring_system epss
scoring_elements 0.43161
published_at 2026-04-12T12:55:00Z
5
value 0.00208
scoring_system epss
scoring_elements 0.43146
published_at 2026-04-13T12:55:00Z
6
value 0.00208
scoring_system epss
scoring_elements 0.43205
published_at 2026-04-16T12:55:00Z
7
value 0.00208
scoring_system epss
scoring_elements 0.43195
published_at 2026-04-18T12:55:00Z
8
value 0.00208
scoring_system epss
scoring_elements 0.43083
published_at 2026-04-01T12:55:00Z
9
value 0.00208
scoring_system epss
scoring_elements 0.43142
published_at 2026-04-02T12:55:00Z
10
value 0.00208
scoring_system epss
scoring_elements 0.43169
published_at 2026-04-04T12:55:00Z
11
value 0.00208
scoring_system epss
scoring_elements 0.43107
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-5339
2
reference_url https://github.com/phpmyadmin/phpmyadmin/commit/6ea8fad3f999bfdf79eb6fe31309592bca54d611
reference_id
reference_type
scores
0
value LOW
scoring_system generic_textual
scoring_elements
url https://github.com/phpmyadmin/phpmyadmin/commit/6ea8fad3f999bfdf79eb6fe31309592bca54d611
3
reference_url https://github.com/phpmyadmin/phpmyadmin/commit/cfd688d2512df9827a8ecc0412fc264fc5bcb186
reference_id
reference_type
scores
0
value LOW
scoring_system generic_textual
scoring_elements
url https://github.com/phpmyadmin/phpmyadmin/commit/cfd688d2512df9827a8ecc0412fc264fc5bcb186
4
reference_url https://nvd.nist.gov/vuln/detail/CVE-2012-5339
reference_id
reference_type
scores
0
value 3.5
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:S/C:N/I:P/A:N
1
value LOW
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2012-5339
5
reference_url https://web.archive.org/web/20121020000514/http://www.securityfocus.com/bid/55925
reference_id
reference_type
scores
0
value LOW
scoring_system generic_textual
scoring_elements
url https://web.archive.org/web/20121020000514/http://www.securityfocus.com/bid/55925
6
reference_url http://www.phpmyadmin.net/home_page/security/PMASA-2012-6.php
reference_id
reference_type
scores
0
value LOW
scoring_system generic_textual
scoring_elements
url http://www.phpmyadmin.net/home_page/security/PMASA-2012-6.php
7
reference_url http://www.securityfocus.com/bid/55925
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/55925
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.0.0:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.1.0:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.2.0:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.2.1:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.2.2:*:*:*:*:*:*:*
13
reference_url https://github.com/advisories/GHSA-rfpg-2fp8-2fph
reference_id GHSA-rfpg-2fp8-2fph
reference_type
scores
0
value LOW
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-rfpg-2fp8-2fph
fixed_packages
0
url pkg:composer/phpmyadmin/phpmyadmin@3.5.3
purl pkg:composer/phpmyadmin/phpmyadmin@3.5.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/phpmyadmin/phpmyadmin@3.5.3
aliases CVE-2012-5339, GHSA-rfpg-2fp8-2fph
risk_score 1.6
exploitability 0.5
weighted_severity 3.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-kke6-fqmn-pug2
6
url VCID-q2be-73wp-tbav
vulnerability_id VCID-q2be-73wp-tbav
summary
Multiple vulnerabilities have been found in phpMyAdmin, allowing
    remote authenticated attackers to execute arbitrary code, inject SQL code
    or conduct other attacks.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-5002
reference_id
reference_type
scores
0
value 0.00209
scoring_system epss
scoring_elements 0.4328
published_at 2026-04-21T12:55:00Z
1
value 0.00209
scoring_system epss
scoring_elements 0.43293
published_at 2026-04-13T12:55:00Z
2
value 0.00209
scoring_system epss
scoring_elements 0.43355
published_at 2026-04-16T12:55:00Z
3
value 0.00209
scoring_system epss
scoring_elements 0.43344
published_at 2026-04-18T12:55:00Z
4
value 0.00209
scoring_system epss
scoring_elements 0.43232
published_at 2026-04-01T12:55:00Z
5
value 0.00209
scoring_system epss
scoring_elements 0.43288
published_at 2026-04-02T12:55:00Z
6
value 0.00209
scoring_system epss
scoring_elements 0.43317
published_at 2026-04-04T12:55:00Z
7
value 0.00209
scoring_system epss
scoring_elements 0.43254
published_at 2026-04-07T12:55:00Z
8
value 0.00209
scoring_system epss
scoring_elements 0.43305
published_at 2026-04-08T12:55:00Z
9
value 0.00209
scoring_system epss
scoring_elements 0.4332
published_at 2026-04-09T12:55:00Z
10
value 0.00209
scoring_system epss
scoring_elements 0.43341
published_at 2026-04-11T12:55:00Z
11
value 0.00209
scoring_system epss
scoring_elements 0.43309
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-5002
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4995
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4995
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4996
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4996
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5002
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5002
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5003
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5003
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1879
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1879
6
reference_url https://nvd.nist.gov/vuln/detail/CVE-2013-5002
reference_id
reference_type
scores
0
value LOW
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2013-5002
7
reference_url http://www.phpmyadmin.net/home_page/security/PMASA-2013-14.php
reference_id
reference_type
scores
0
value LOW
scoring_system generic_textual
scoring_elements
url http://www.phpmyadmin.net/home_page/security/PMASA-2013-14.php
8
reference_url https://github.com/advisories/GHSA-p632-5w74-x8xx
reference_id GHSA-p632-5w74-x8xx
reference_type
scores
0
value LOW
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-p632-5w74-x8xx
9
reference_url https://security.gentoo.org/glsa/201311-02
reference_id GLSA-201311-02
reference_type
scores
url https://security.gentoo.org/glsa/201311-02
fixed_packages
0
url pkg:composer/phpmyadmin/phpmyadmin@3.5.8%2B2
purl pkg:composer/phpmyadmin/phpmyadmin@3.5.8%2B2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/phpmyadmin/phpmyadmin@3.5.8%252B2
1
url pkg:composer/phpmyadmin/phpmyadmin@4.0.4.2
purl pkg:composer/phpmyadmin/phpmyadmin@4.0.4.2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2jjv-4en4-e3gx
1
vulnerability VCID-5657-kcyh-7bc2
2
vulnerability VCID-7mys-s9mz-h3g1
3
vulnerability VCID-7n1n-uj91-8ugg
4
vulnerability VCID-b5bf-6u8e-byh8
5
vulnerability VCID-b9b1-624h-uubt
6
vulnerability VCID-cy6p-nz8a-zydk
7
vulnerability VCID-eq3j-14fc-2uev
8
vulnerability VCID-f7gd-w9r7-xyb2
9
vulnerability VCID-g6ud-92qe-hqcx
10
vulnerability VCID-gu4y-aeqx-mqak
11
vulnerability VCID-ngtc-xtjn-xbhp
12
vulnerability VCID-rqy8-n6fr-hqey
13
vulnerability VCID-tks3-6uv4-kygf
14
vulnerability VCID-wamt-3g12-t7ch
15
vulnerability VCID-xu1c-xtb4-9ygg
16
vulnerability VCID-znfm-ak2t-mqdd
17
vulnerability VCID-zyzp-aqd8-e3a9
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/phpmyadmin/phpmyadmin@4.0.4.2
2
url pkg:composer/phpmyadmin/phpmyadmin@4.0.4%2B2
purl pkg:composer/phpmyadmin/phpmyadmin@4.0.4%2B2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7h9b-a8dp-57hp
1
vulnerability VCID-uw6h-fpzy-x3ap
2
vulnerability VCID-zreq-41ja-pbf1
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/phpmyadmin/phpmyadmin@4.0.4%252B2
aliases CVE-2013-5002, GHSA-p632-5w74-x8xx
risk_score 1.4
exploitability 0.5
weighted_severity 2.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-q2be-73wp-tbav
Fixing_vulnerabilities
Risk_score10.0
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:composer/phpmyadmin/phpmyadmin@3.5.0