Lookup for vulnerable packages by Package URL.

Purlpkg:ebuild/dev-db/phpmyadmin@2.6.4_p3
Typeebuild
Namespacedev-db
Namephpmyadmin
Version2.6.4_p3
Qualifiers
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version2.7.0_p1
Latest_non_vulnerable_version5.2.0
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-5qxf-smga-w7b6
vulnerability_id VCID-5qxf-smga-w7b6
summary
phpMyAdmin contains a local file inclusion vulnerability that may lead to
    the execution of arbitrary code, along with several cross-site scripting
    issues.
references
0
reference_url http://archives.neohapsis.com/archives/fulldisclosure/2005-10/0478.
reference_id
reference_type
scores
url http://archives.neohapsis.com/archives/fulldisclosure/2005-10/0478.
1
reference_url http://marc.info/?l=bugtraq&m=113017591414699&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=113017591414699&w=2
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2005-3300
reference_id
reference_type
scores
0
value 0.0189
scoring_system epss
scoring_elements 0.83225
published_at 2026-04-21T12:55:00Z
1
value 0.0189
scoring_system epss
scoring_elements 0.83118
published_at 2026-04-01T12:55:00Z
2
value 0.0189
scoring_system epss
scoring_elements 0.83135
published_at 2026-04-02T12:55:00Z
3
value 0.0189
scoring_system epss
scoring_elements 0.83148
published_at 2026-04-04T12:55:00Z
4
value 0.0189
scoring_system epss
scoring_elements 0.83146
published_at 2026-04-07T12:55:00Z
5
value 0.0189
scoring_system epss
scoring_elements 0.83171
published_at 2026-04-08T12:55:00Z
6
value 0.0189
scoring_system epss
scoring_elements 0.83178
published_at 2026-04-09T12:55:00Z
7
value 0.0189
scoring_system epss
scoring_elements 0.83194
published_at 2026-04-11T12:55:00Z
8
value 0.0189
scoring_system epss
scoring_elements 0.83189
published_at 2026-04-12T12:55:00Z
9
value 0.0189
scoring_system epss
scoring_elements 0.83184
published_at 2026-04-13T12:55:00Z
10
value 0.0189
scoring_system epss
scoring_elements 0.83221
published_at 2026-04-16T12:55:00Z
11
value 0.0189
scoring_system epss
scoring_elements 0.83222
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2005-3300
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3300
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3300
4
reference_url http://secunia.com/advisories/17289/
reference_id
reference_type
scores
url http://secunia.com/advisories/17289/
5
reference_url http://secunia.com/advisories/17337
reference_id
reference_type
scores
url http://secunia.com/advisories/17337
6
reference_url http://secunia.com/advisories/17559
reference_id
reference_type
scores
url http://secunia.com/advisories/17559
7
reference_url http://secunia.com/advisories/17607
reference_id
reference_type
scores
url http://secunia.com/advisories/17607
8
reference_url http://securitytracker.com/id?1015091
reference_id
reference_type
scores
url http://securitytracker.com/id?1015091
9
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/22835
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/22835
10
reference_url http://www.debian.org/security/2005/dsa-880
reference_id
reference_type
scores
url http://www.debian.org/security/2005/dsa-880
11
reference_url http://www.gentoo.org/security/en/glsa/glsa-200510-21.xml
reference_id
reference_type
scores
url http://www.gentoo.org/security/en/glsa/glsa-200510-21.xml
12
reference_url http://www.hardened-php.net/advisory_162005.73.html
reference_id
reference_type
scores
url http://www.hardened-php.net/advisory_162005.73.html
13
reference_url http://www.novell.com/linux/security/advisories/2005_28_sr.html
reference_id
reference_type
scores
url http://www.novell.com/linux/security/advisories/2005_28_sr.html
14
reference_url http://www.novell.com/linux/security/advisories/2005_66_phpmyadmin.html
reference_id
reference_type
scores
url http://www.novell.com/linux/security/advisories/2005_66_phpmyadmin.html
15
reference_url http://www.phpmyadmin.net/home_page/security.php?issue=PMASA-2005-5
reference_id
reference_type
scores
url http://www.phpmyadmin.net/home_page/security.php?issue=PMASA-2005-5
16
reference_url http://www.securityfocus.com/bid/15169
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/15169
17
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=335306
reference_id 335306
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=335306
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:2.6.4_pl3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:phpmyadmin:phpmyadmin:2.6.4_pl3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:2.6.4_pl3:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/detail/CVE-2005-3300
reference_id CVE-2005-3300
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:P/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2005-3300
20
reference_url https://security.gentoo.org/glsa/200510-21
reference_id GLSA-200510-21
reference_type
scores
url https://security.gentoo.org/glsa/200510-21
fixed_packages
0
url pkg:ebuild/dev-db/phpmyadmin@2.6.4_p3
purl pkg:ebuild/dev-db/phpmyadmin@2.6.4_p3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/phpmyadmin@2.6.4_p3
aliases CVE-2005-3300
risk_score 2.2
exploitability 0.5
weighted_severity 4.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5qxf-smga-w7b6
1
url VCID-au6f-6v6x-ykf4
vulnerability_id VCID-au6f-6v6x-ykf4
summary
phpMyAdmin contains a local file inclusion vulnerability that may lead to
    the execution of arbitrary code, along with several cross-site scripting
    issues.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2005-3301
reference_id
reference_type
scores
0
value 0.11794
scoring_system epss
scoring_elements 0.93737
published_at 2026-04-21T12:55:00Z
1
value 0.11794
scoring_system epss
scoring_elements 0.93672
published_at 2026-04-01T12:55:00Z
2
value 0.11794
scoring_system epss
scoring_elements 0.93682
published_at 2026-04-02T12:55:00Z
3
value 0.11794
scoring_system epss
scoring_elements 0.93692
published_at 2026-04-04T12:55:00Z
4
value 0.11794
scoring_system epss
scoring_elements 0.93695
published_at 2026-04-07T12:55:00Z
5
value 0.11794
scoring_system epss
scoring_elements 0.93704
published_at 2026-04-08T12:55:00Z
6
value 0.11794
scoring_system epss
scoring_elements 0.93706
published_at 2026-04-09T12:55:00Z
7
value 0.11794
scoring_system epss
scoring_elements 0.9371
published_at 2026-04-12T12:55:00Z
8
value 0.11794
scoring_system epss
scoring_elements 0.93711
published_at 2026-04-13T12:55:00Z
9
value 0.11794
scoring_system epss
scoring_elements 0.93728
published_at 2026-04-16T12:55:00Z
10
value 0.11794
scoring_system epss
scoring_elements 0.93735
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2005-3301
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3301
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3301
2
reference_url http://secunia.com/advisories/17337
reference_id
reference_type
scores
url http://secunia.com/advisories/17337
3
reference_url http://secunia.com/advisories/17559
reference_id
reference_type
scores
url http://secunia.com/advisories/17559
4
reference_url http://secunia.com/advisories/17607
reference_id
reference_type
scores
url http://secunia.com/advisories/17607
5
reference_url http://www.debian.org/security/2005/dsa-880
reference_id
reference_type
scores
url http://www.debian.org/security/2005/dsa-880
6
reference_url http://www.gentoo.org/security/en/glsa/glsa-200510-21.xml
reference_id
reference_type
scores
url http://www.gentoo.org/security/en/glsa/glsa-200510-21.xml
7
reference_url http://www.novell.com/linux/security/advisories/2005_28_sr.html
reference_id
reference_type
scores
url http://www.novell.com/linux/security/advisories/2005_28_sr.html
8
reference_url http://www.novell.com/linux/security/advisories/2005_66_phpmyadmin.html
reference_id
reference_type
scores
url http://www.novell.com/linux/security/advisories/2005_66_phpmyadmin.html
9
reference_url http://www.phpmyadmin.net/home_page/security.php?issue=PMASA-2005-5
reference_id
reference_type
scores
url http://www.phpmyadmin.net/home_page/security.php?issue=PMASA-2005-5
10
reference_url http://www.securityfocus.com/bid/15196
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/15196
11
reference_url http://www.vupen.com/english/advisories/2005/2179
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2005/2179
12
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=335513
reference_id 335513
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=335513
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:2.6.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:phpmyadmin:phpmyadmin:2.6.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:2.6.4:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:2.6.4_pl1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:phpmyadmin:phpmyadmin:2.6.4_pl1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:2.6.4_pl1:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:2.6.4_pl2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:phpmyadmin:phpmyadmin:2.6.4_pl2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:2.6.4_pl2:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:2.6.4_rc1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:phpmyadmin:phpmyadmin:2.6.4_rc1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:2.6.4_rc1:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/detail/CVE-2005-3301
reference_id CVE-2005-3301
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:P/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2005-3301
18
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/webapps/26392.txt
reference_id CVE-2005-3301;OSVDB-20261
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/webapps/26392.txt
19
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/webapps/26393.txt
reference_id CVE-2005-3301;OSVDB-20262
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/webapps/26393.txt
20
reference_url https://www.securityfocus.com/bid/15196/info
reference_id CVE-2005-3301;OSVDB-20262
reference_type exploit
scores
url https://www.securityfocus.com/bid/15196/info
21
reference_url https://security.gentoo.org/glsa/200510-21
reference_id GLSA-200510-21
reference_type
scores
url https://security.gentoo.org/glsa/200510-21
fixed_packages
0
url pkg:ebuild/dev-db/phpmyadmin@2.6.4_p3
purl pkg:ebuild/dev-db/phpmyadmin@2.6.4_p3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/phpmyadmin@2.6.4_p3
aliases CVE-2005-3301
risk_score 7.8
exploitability 2.0
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-au6f-6v6x-ykf4
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/phpmyadmin@2.6.4_p3