Lookup for vulnerable packages by Package URL.

Purlpkg:ebuild/dev-db/phpmyadmin@4.0.5
Typeebuild
Namespacedev-db
Namephpmyadmin
Version4.0.5
Qualifiers
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version4.2.13
Latest_non_vulnerable_version5.2.0
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-1dhd-3ayw-6kg3
vulnerability_id VCID-1dhd-3ayw-6kg3
summary
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Multiple cross-site scripting (XSS) vulnerabilities in phpMyAdmin 3.5.x before 3.5.8.2 allow remote attackers to inject arbitrary web script or HTML via vectors involving a JavaScript event in (1) an anchor identifier to setup/index.php or (2) a chartTitle (aka chart title) value.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-4997
reference_id
reference_type
scores
0
value 0.00263
scoring_system epss
scoring_elements 0.49661
published_at 2026-04-24T12:55:00Z
1
value 0.00263
scoring_system epss
scoring_elements 0.49653
published_at 2026-04-12T12:55:00Z
2
value 0.00263
scoring_system epss
scoring_elements 0.49655
published_at 2026-04-13T12:55:00Z
3
value 0.00263
scoring_system epss
scoring_elements 0.49702
published_at 2026-04-16T12:55:00Z
4
value 0.00263
scoring_system epss
scoring_elements 0.497
published_at 2026-04-18T12:55:00Z
5
value 0.00263
scoring_system epss
scoring_elements 0.49607
published_at 2026-04-01T12:55:00Z
6
value 0.00263
scoring_system epss
scoring_elements 0.49637
published_at 2026-04-02T12:55:00Z
7
value 0.00263
scoring_system epss
scoring_elements 0.49664
published_at 2026-04-04T12:55:00Z
8
value 0.00263
scoring_system epss
scoring_elements 0.49616
published_at 2026-04-07T12:55:00Z
9
value 0.00263
scoring_system epss
scoring_elements 0.49671
published_at 2026-04-21T12:55:00Z
10
value 0.00263
scoring_system epss
scoring_elements 0.49665
published_at 2026-04-09T12:55:00Z
11
value 0.00263
scoring_system epss
scoring_elements 0.49682
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-4997
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4997
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4997
2
reference_url https://github.com/phpmyadmin/composer
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/phpmyadmin/composer
3
reference_url http://www.phpmyadmin.net/home_page/security/PMASA-2013-9.php
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.phpmyadmin.net/home_page/security/PMASA-2013-9.php
4
reference_url https://nvd.nist.gov/vuln/detail/CVE-2013-4997
reference_id CVE-2013-4997
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2013-4997
5
reference_url https://github.com/advisories/GHSA-5gh4-v2ch-pcx4
reference_id GHSA-5gh4-v2ch-pcx4
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-5gh4-v2ch-pcx4
6
reference_url https://security.gentoo.org/glsa/201311-02
reference_id GLSA-201311-02
reference_type
scores
url https://security.gentoo.org/glsa/201311-02
fixed_packages
0
url pkg:ebuild/dev-db/phpmyadmin@4.0.5
purl pkg:ebuild/dev-db/phpmyadmin@4.0.5
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/phpmyadmin@4.0.5
aliases CVE-2013-4997, GHSA-5gh4-v2ch-pcx4
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1dhd-3ayw-6kg3
1
url VCID-2n2q-cm1n-cqdr
vulnerability_id VCID-2n2q-cm1n-cqdr
summary
Multiple vulnerabilities have been found in phpMyAdmin, allowing
    remote authenticated attackers to execute arbitrary code, inject SQL code
    or conduct other attacks.
references
0
reference_url http://archives.neohapsis.com/archives/bugtraq/2013-04/0217.html
reference_id
reference_type
scores
url http://archives.neohapsis.com/archives/bugtraq/2013-04/0217.html
1
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2013-May/104725.html
reference_id
reference_type
scores
0
value 8.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url http://lists.fedoraproject.org/pipermail/package-announce/2013-May/104725.html
2
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2013-May/104770.html
reference_id
reference_type
scores
0
value 8.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url http://lists.fedoraproject.org/pipermail/package-announce/2013-May/104770.html
3
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2013-May/104936.html
reference_id
reference_type
scores
0
value 8.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url http://lists.fedoraproject.org/pipermail/package-announce/2013-May/104936.html
4
reference_url http://lists.opensuse.org/opensuse-updates/2013-06/msg00181.html
reference_id
reference_type
scores
0
value 8.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url http://lists.opensuse.org/opensuse-updates/2013-06/msg00181.html
5
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-3239
reference_id
reference_type
scores
0
value 0.12333
scoring_system epss
scoring_elements 0.93903
published_at 2026-04-24T12:55:00Z
1
value 0.12333
scoring_system epss
scoring_elements 0.93835
published_at 2026-04-01T12:55:00Z
2
value 0.12333
scoring_system epss
scoring_elements 0.93844
published_at 2026-04-02T12:55:00Z
3
value 0.12333
scoring_system epss
scoring_elements 0.93853
published_at 2026-04-04T12:55:00Z
4
value 0.12333
scoring_system epss
scoring_elements 0.93856
published_at 2026-04-07T12:55:00Z
5
value 0.12333
scoring_system epss
scoring_elements 0.93864
published_at 2026-04-08T12:55:00Z
6
value 0.12333
scoring_system epss
scoring_elements 0.93868
published_at 2026-04-09T12:55:00Z
7
value 0.12333
scoring_system epss
scoring_elements 0.93873
published_at 2026-04-13T12:55:00Z
8
value 0.12333
scoring_system epss
scoring_elements 0.93895
published_at 2026-04-16T12:55:00Z
9
value 0.12333
scoring_system epss
scoring_elements 0.93901
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-3239
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3239
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3239
7
reference_url https://github.com/phpmyadmin/phpmyadmin
reference_id
reference_type
scores
0
value 8.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/phpmyadmin/phpmyadmin
8
reference_url https://github.com/phpmyadmin/phpmyadmin/commit/1f6bc0b707002e26cab216b9e57b4d5de764de48
reference_id
reference_type
scores
0
value 8.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/phpmyadmin/phpmyadmin/commit/1f6bc0b707002e26cab216b9e57b4d5de764de48
9
reference_url https://github.com/phpmyadmin/phpmyadmin/commit/d3fafdfba0807068196655e9b6d16c5d1d3ccf8a
reference_id
reference_type
scores
0
value 8.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/phpmyadmin/phpmyadmin/commit/d3fafdfba0807068196655e9b6d16c5d1d3ccf8a
10
reference_url https://nvd.nist.gov/vuln/detail/CVE-2013-3239
reference_id
reference_type
scores
0
value 4.6
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:S/C:P/I:P/A:P
1
value 8.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2013-3239
11
reference_url https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0133
reference_id
reference_type
scores
url https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0133
12
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2013:160
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2013:160
13
reference_url http://www.phpmyadmin.net/home_page/security/PMASA-2013-3.php
reference_id
reference_type
scores
0
value 8.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url http://www.phpmyadmin.net/home_page/security/PMASA-2013-3.php
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.0.0:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.1.0:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.2.0:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.2.1:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.2.2:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.3.0:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.4:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.5:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.6:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.7:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.7:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.7:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.7:rc1:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.8:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.8:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.8:rc1:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.0:rc2:*:*:*:*:*:*
reference_id cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.0:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.0:rc2:*:*:*:*:*:*
27
reference_url https://github.com/advisories/GHSA-gg36-9346-9qx9
reference_id GHSA-gg36-9346-9qx9
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-gg36-9346-9qx9
28
reference_url https://security.gentoo.org/glsa/201311-02
reference_id GLSA-201311-02
reference_type
scores
url https://security.gentoo.org/glsa/201311-02
fixed_packages
0
url pkg:ebuild/dev-db/phpmyadmin@4.0.5
purl pkg:ebuild/dev-db/phpmyadmin@4.0.5
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/phpmyadmin@4.0.5
aliases CVE-2013-3239, GHSA-gg36-9346-9qx9
risk_score 10.0
exploitability 2.0
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2n2q-cm1n-cqdr
2
url VCID-6e6k-vaj9-budk
vulnerability_id VCID-6e6k-vaj9-budk
summary
Multiple vulnerabilities have been found in phpMyAdmin, allowing
    remote authenticated attackers to execute arbitrary code, inject SQL code
    or conduct other attacks.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-4996
reference_id
reference_type
scores
0
value 0.00277
scoring_system epss
scoring_elements 0.51082
published_at 2026-04-01T12:55:00Z
1
value 0.00277
scoring_system epss
scoring_elements 0.51135
published_at 2026-04-02T12:55:00Z
2
value 0.00277
scoring_system epss
scoring_elements 0.51159
published_at 2026-04-04T12:55:00Z
3
value 0.00277
scoring_system epss
scoring_elements 0.51116
published_at 2026-04-07T12:55:00Z
4
value 0.00277
scoring_system epss
scoring_elements 0.51171
published_at 2026-04-08T12:55:00Z
5
value 0.00277
scoring_system epss
scoring_elements 0.51167
published_at 2026-04-09T12:55:00Z
6
value 0.00277
scoring_system epss
scoring_elements 0.51212
published_at 2026-04-11T12:55:00Z
7
value 0.00277
scoring_system epss
scoring_elements 0.5119
published_at 2026-04-12T12:55:00Z
8
value 0.00277
scoring_system epss
scoring_elements 0.51175
published_at 2026-04-13T12:55:00Z
9
value 0.00277
scoring_system epss
scoring_elements 0.51215
published_at 2026-04-16T12:55:00Z
10
value 0.00277
scoring_system epss
scoring_elements 0.51222
published_at 2026-04-18T12:55:00Z
11
value 0.00277
scoring_system epss
scoring_elements 0.512
published_at 2026-04-21T12:55:00Z
12
value 0.00277
scoring_system epss
scoring_elements 0.51145
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-4996
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4995
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4995
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4996
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4996
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5002
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5002
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5003
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5003
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1879
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1879
6
reference_url https://security.gentoo.org/glsa/201311-02
reference_id GLSA-201311-02
reference_type
scores
url https://security.gentoo.org/glsa/201311-02
fixed_packages
0
url pkg:ebuild/dev-db/phpmyadmin@4.0.5
purl pkg:ebuild/dev-db/phpmyadmin@4.0.5
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/phpmyadmin@4.0.5
aliases CVE-2013-4996
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6e6k-vaj9-budk
3
url VCID-6qw8-vmc8-yyfa
vulnerability_id VCID-6qw8-vmc8-yyfa
summary
Multiple vulnerabilities have been found in phpMyAdmin, allowing
    remote authenticated attackers to execute arbitrary code, inject SQL code
    or conduct other attacks.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-4999
reference_id
reference_type
scores
0
value 0.0025
scoring_system epss
scoring_elements 0.48286
published_at 2026-04-01T12:55:00Z
1
value 0.0025
scoring_system epss
scoring_elements 0.48322
published_at 2026-04-02T12:55:00Z
2
value 0.0025
scoring_system epss
scoring_elements 0.48343
published_at 2026-04-04T12:55:00Z
3
value 0.0025
scoring_system epss
scoring_elements 0.48295
published_at 2026-04-07T12:55:00Z
4
value 0.0025
scoring_system epss
scoring_elements 0.4835
published_at 2026-04-08T12:55:00Z
5
value 0.0025
scoring_system epss
scoring_elements 0.48344
published_at 2026-04-09T12:55:00Z
6
value 0.0025
scoring_system epss
scoring_elements 0.48369
published_at 2026-04-11T12:55:00Z
7
value 0.0025
scoring_system epss
scoring_elements 0.48342
published_at 2026-04-12T12:55:00Z
8
value 0.0025
scoring_system epss
scoring_elements 0.48354
published_at 2026-04-21T12:55:00Z
9
value 0.0025
scoring_system epss
scoring_elements 0.48405
published_at 2026-04-16T12:55:00Z
10
value 0.0025
scoring_system epss
scoring_elements 0.484
published_at 2026-04-18T12:55:00Z
11
value 0.0025
scoring_system epss
scoring_elements 0.48339
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-4999
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4999
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4999
2
reference_url https://security.gentoo.org/glsa/201311-02
reference_id GLSA-201311-02
reference_type
scores
url https://security.gentoo.org/glsa/201311-02
fixed_packages
0
url pkg:ebuild/dev-db/phpmyadmin@4.0.5
purl pkg:ebuild/dev-db/phpmyadmin@4.0.5
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/phpmyadmin@4.0.5
aliases CVE-2013-4999
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6qw8-vmc8-yyfa
4
url VCID-831x-uk8r-pqaa
vulnerability_id VCID-831x-uk8r-pqaa
summary
Multiple vulnerabilities have been found in phpMyAdmin, allowing
    remote authenticated attackers to execute arbitrary code, inject SQL code
    or conduct other attacks.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-5029
reference_id
reference_type
scores
0
value 0.01725
scoring_system epss
scoring_elements 0.8235
published_at 2026-04-01T12:55:00Z
1
value 0.01725
scoring_system epss
scoring_elements 0.82365
published_at 2026-04-02T12:55:00Z
2
value 0.01725
scoring_system epss
scoring_elements 0.82382
published_at 2026-04-04T12:55:00Z
3
value 0.01725
scoring_system epss
scoring_elements 0.82378
published_at 2026-04-07T12:55:00Z
4
value 0.01725
scoring_system epss
scoring_elements 0.82406
published_at 2026-04-08T12:55:00Z
5
value 0.01725
scoring_system epss
scoring_elements 0.82414
published_at 2026-04-09T12:55:00Z
6
value 0.01725
scoring_system epss
scoring_elements 0.82432
published_at 2026-04-11T12:55:00Z
7
value 0.01725
scoring_system epss
scoring_elements 0.82429
published_at 2026-04-12T12:55:00Z
8
value 0.01725
scoring_system epss
scoring_elements 0.82423
published_at 2026-04-13T12:55:00Z
9
value 0.01725
scoring_system epss
scoring_elements 0.82458
published_at 2026-04-16T12:55:00Z
10
value 0.01725
scoring_system epss
scoring_elements 0.8246
published_at 2026-04-18T12:55:00Z
11
value 0.01725
scoring_system epss
scoring_elements 0.82465
published_at 2026-04-21T12:55:00Z
12
value 0.01725
scoring_system epss
scoring_elements 0.82487
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-5029
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5029
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5029
2
reference_url https://security.gentoo.org/glsa/201311-02
reference_id GLSA-201311-02
reference_type
scores
url https://security.gentoo.org/glsa/201311-02
fixed_packages
0
url pkg:ebuild/dev-db/phpmyadmin@4.0.5
purl pkg:ebuild/dev-db/phpmyadmin@4.0.5
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/phpmyadmin@4.0.5
aliases CVE-2013-5029
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-831x-uk8r-pqaa
5
url VCID-cb4p-81h2-h7cb
vulnerability_id VCID-cb4p-81h2-h7cb
summary
Multiple vulnerabilities have been found in phpMyAdmin, allowing
    remote authenticated attackers to execute arbitrary code, inject SQL code
    or conduct other attacks.
references
0
reference_url http://archives.neohapsis.com/archives/bugtraq/2013-04/0217.html
reference_id
reference_type
scores
url http://archives.neohapsis.com/archives/bugtraq/2013-04/0217.html
1
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2013-May/104725.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2013-May/104725.html
2
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2013-May/104770.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2013-May/104770.html
3
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2013-May/104936.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2013-May/104936.html
4
reference_url http://lists.opensuse.org/opensuse-updates/2013-06/msg00181.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2013-06/msg00181.html
5
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-3238
reference_id
reference_type
scores
0
value 0.64584
scoring_system epss
scoring_elements 0.98467
published_at 2026-04-24T12:55:00Z
1
value 0.64584
scoring_system epss
scoring_elements 0.98441
published_at 2026-04-01T12:55:00Z
2
value 0.64584
scoring_system epss
scoring_elements 0.98444
published_at 2026-04-02T12:55:00Z
3
value 0.64584
scoring_system epss
scoring_elements 0.98447
published_at 2026-04-04T12:55:00Z
4
value 0.64584
scoring_system epss
scoring_elements 0.98449
published_at 2026-04-07T12:55:00Z
5
value 0.64584
scoring_system epss
scoring_elements 0.98453
published_at 2026-04-08T12:55:00Z
6
value 0.64584
scoring_system epss
scoring_elements 0.98454
published_at 2026-04-09T12:55:00Z
7
value 0.64584
scoring_system epss
scoring_elements 0.98457
published_at 2026-04-13T12:55:00Z
8
value 0.64584
scoring_system epss
scoring_elements 0.98456
published_at 2026-04-12T12:55:00Z
9
value 0.64584
scoring_system epss
scoring_elements 0.98462
published_at 2026-04-18T12:55:00Z
10
value 0.64584
scoring_system epss
scoring_elements 0.98463
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-3238
6
reference_url https://github.com/phpmyadmin/phpmyadmin/commit/dedd542cdaf1606ca9aa3f6f8f8adb078d8ad549
reference_id
reference_type
scores
url https://github.com/phpmyadmin/phpmyadmin/commit/dedd542cdaf1606ca9aa3f6f8f8adb078d8ad549
7
reference_url https://github.com/phpmyadmin/phpmyadmin/commit/ffa720d90a79c1f33cf4c5a33403d09a67b42a66
reference_id
reference_type
scores
url https://github.com/phpmyadmin/phpmyadmin/commit/ffa720d90a79c1f33cf4c5a33403d09a67b42a66
8
reference_url https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0133
reference_id
reference_type
scores
url https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0133
9
reference_url http://www.exploit-db.com/exploits/25136
reference_id
reference_type
scores
url http://www.exploit-db.com/exploits/25136
10
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2013:160
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2013:160
11
reference_url http://www.phpmyadmin.net/home_page/security/PMASA-2013-2.php
reference_id
reference_type
scores
url http://www.phpmyadmin.net/home_page/security/PMASA-2013-2.php
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.0.0:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.1.0:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.2.0:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.2.1:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.2.2:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.3.0:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.4:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.5:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.6:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.7:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.7:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.7:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.7:rc1:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.8:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.8:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.8:rc1:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.0:rc2:*:*:*:*:*:*
reference_id cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.0:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.0:rc2:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/detail/CVE-2013-3238
reference_id CVE-2013-3238
reference_type
scores
0
value 6.0
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:S/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2013-3238
26
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/remote/25136.rb
reference_id CVE-2013-3238;OSVDB-92793
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/remote/25136.rb
27
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/webapps/25003.txt
reference_id CVE-2013-3241;CVE-2013-3240;CVE-2013-3239;CVE-2013-3238;OSVDB-92795;OSVDB-92794;OSVDB-92793;OSVDB-92792
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/webapps/25003.txt
28
reference_url http://www.waraxe.us/advisory-103.html
reference_id CVE-2013-3241;CVE-2013-3240;CVE-2013-3239;CVE-2013-3238;OSVDB-92795;OSVDB-92794;OSVDB-92793;OSVDB-92792
reference_type exploit
scores
url http://www.waraxe.us/advisory-103.html
29
reference_url https://security.gentoo.org/glsa/201311-02
reference_id GLSA-201311-02
reference_type
scores
url https://security.gentoo.org/glsa/201311-02
fixed_packages
0
url pkg:ebuild/dev-db/phpmyadmin@4.0.5
purl pkg:ebuild/dev-db/phpmyadmin@4.0.5
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/phpmyadmin@4.0.5
aliases CVE-2013-3238
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-cb4p-81h2-h7cb
6
url VCID-jr29-bd8n-ryap
vulnerability_id VCID-jr29-bd8n-ryap
summary
Multiple vulnerabilities have been found in phpMyAdmin, allowing
    remote authenticated attackers to execute arbitrary code, inject SQL code
    or conduct other attacks.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-4998
reference_id
reference_type
scores
0
value 0.0025
scoring_system epss
scoring_elements 0.48286
published_at 2026-04-01T12:55:00Z
1
value 0.0025
scoring_system epss
scoring_elements 0.48322
published_at 2026-04-02T12:55:00Z
2
value 0.0025
scoring_system epss
scoring_elements 0.48343
published_at 2026-04-04T12:55:00Z
3
value 0.0025
scoring_system epss
scoring_elements 0.48295
published_at 2026-04-07T12:55:00Z
4
value 0.0025
scoring_system epss
scoring_elements 0.4835
published_at 2026-04-08T12:55:00Z
5
value 0.0025
scoring_system epss
scoring_elements 0.48344
published_at 2026-04-09T12:55:00Z
6
value 0.0025
scoring_system epss
scoring_elements 0.48369
published_at 2026-04-11T12:55:00Z
7
value 0.0025
scoring_system epss
scoring_elements 0.48342
published_at 2026-04-12T12:55:00Z
8
value 0.0025
scoring_system epss
scoring_elements 0.48354
published_at 2026-04-21T12:55:00Z
9
value 0.0025
scoring_system epss
scoring_elements 0.48405
published_at 2026-04-16T12:55:00Z
10
value 0.0025
scoring_system epss
scoring_elements 0.484
published_at 2026-04-18T12:55:00Z
11
value 0.0025
scoring_system epss
scoring_elements 0.48339
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-4998
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4998
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4998
2
reference_url https://security.gentoo.org/glsa/201311-02
reference_id GLSA-201311-02
reference_type
scores
url https://security.gentoo.org/glsa/201311-02
fixed_packages
0
url pkg:ebuild/dev-db/phpmyadmin@4.0.5
purl pkg:ebuild/dev-db/phpmyadmin@4.0.5
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/phpmyadmin@4.0.5
aliases CVE-2013-4998
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jr29-bd8n-ryap
7
url VCID-jvq4-djby-zkhe
vulnerability_id VCID-jvq4-djby-zkhe
summary
Multiple vulnerabilities have been found in phpMyAdmin, allowing
    remote authenticated attackers to execute arbitrary code, inject SQL code
    or conduct other attacks.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-5001
reference_id
reference_type
scores
0
value 0.00185
scoring_system epss
scoring_elements 0.40106
published_at 2026-04-01T12:55:00Z
1
value 0.00185
scoring_system epss
scoring_elements 0.40256
published_at 2026-04-02T12:55:00Z
2
value 0.00185
scoring_system epss
scoring_elements 0.4028
published_at 2026-04-04T12:55:00Z
3
value 0.00185
scoring_system epss
scoring_elements 0.40203
published_at 2026-04-07T12:55:00Z
4
value 0.00185
scoring_system epss
scoring_elements 0.40255
published_at 2026-04-08T12:55:00Z
5
value 0.00185
scoring_system epss
scoring_elements 0.40266
published_at 2026-04-09T12:55:00Z
6
value 0.00185
scoring_system epss
scoring_elements 0.40277
published_at 2026-04-11T12:55:00Z
7
value 0.00185
scoring_system epss
scoring_elements 0.40239
published_at 2026-04-12T12:55:00Z
8
value 0.00185
scoring_system epss
scoring_elements 0.4022
published_at 2026-04-13T12:55:00Z
9
value 0.00185
scoring_system epss
scoring_elements 0.40267
published_at 2026-04-16T12:55:00Z
10
value 0.00185
scoring_system epss
scoring_elements 0.40237
published_at 2026-04-18T12:55:00Z
11
value 0.00185
scoring_system epss
scoring_elements 0.40161
published_at 2026-04-21T12:55:00Z
12
value 0.00185
scoring_system epss
scoring_elements 0.39987
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-5001
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5001
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5001
2
reference_url https://security.gentoo.org/glsa/201311-02
reference_id GLSA-201311-02
reference_type
scores
url https://security.gentoo.org/glsa/201311-02
fixed_packages
0
url pkg:ebuild/dev-db/phpmyadmin@4.0.5
purl pkg:ebuild/dev-db/phpmyadmin@4.0.5
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/phpmyadmin@4.0.5
aliases CVE-2013-5001
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jvq4-djby-zkhe
8
url VCID-q2be-73wp-tbav
vulnerability_id VCID-q2be-73wp-tbav
summary
Multiple vulnerabilities have been found in phpMyAdmin, allowing
    remote authenticated attackers to execute arbitrary code, inject SQL code
    or conduct other attacks.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-5002
reference_id
reference_type
scores
0
value 0.00209
scoring_system epss
scoring_elements 0.43214
published_at 2026-04-24T12:55:00Z
1
value 0.00209
scoring_system epss
scoring_elements 0.43355
published_at 2026-04-16T12:55:00Z
2
value 0.00209
scoring_system epss
scoring_elements 0.43344
published_at 2026-04-18T12:55:00Z
3
value 0.00209
scoring_system epss
scoring_elements 0.4328
published_at 2026-04-21T12:55:00Z
4
value 0.00209
scoring_system epss
scoring_elements 0.43232
published_at 2026-04-01T12:55:00Z
5
value 0.00209
scoring_system epss
scoring_elements 0.43288
published_at 2026-04-02T12:55:00Z
6
value 0.00209
scoring_system epss
scoring_elements 0.43317
published_at 2026-04-04T12:55:00Z
7
value 0.00209
scoring_system epss
scoring_elements 0.43254
published_at 2026-04-07T12:55:00Z
8
value 0.00209
scoring_system epss
scoring_elements 0.43305
published_at 2026-04-08T12:55:00Z
9
value 0.00209
scoring_system epss
scoring_elements 0.4332
published_at 2026-04-09T12:55:00Z
10
value 0.00209
scoring_system epss
scoring_elements 0.43341
published_at 2026-04-11T12:55:00Z
11
value 0.00209
scoring_system epss
scoring_elements 0.43309
published_at 2026-04-12T12:55:00Z
12
value 0.00209
scoring_system epss
scoring_elements 0.43293
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-5002
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4995
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4995
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4996
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4996
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5002
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5002
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5003
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5003
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1879
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1879
6
reference_url https://nvd.nist.gov/vuln/detail/CVE-2013-5002
reference_id
reference_type
scores
0
value LOW
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2013-5002
7
reference_url http://www.phpmyadmin.net/home_page/security/PMASA-2013-14.php
reference_id
reference_type
scores
0
value LOW
scoring_system generic_textual
scoring_elements
url http://www.phpmyadmin.net/home_page/security/PMASA-2013-14.php
8
reference_url https://github.com/advisories/GHSA-p632-5w74-x8xx
reference_id GHSA-p632-5w74-x8xx
reference_type
scores
0
value LOW
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-p632-5w74-x8xx
9
reference_url https://security.gentoo.org/glsa/201311-02
reference_id GLSA-201311-02
reference_type
scores
url https://security.gentoo.org/glsa/201311-02
fixed_packages
0
url pkg:ebuild/dev-db/phpmyadmin@4.0.5
purl pkg:ebuild/dev-db/phpmyadmin@4.0.5
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/phpmyadmin@4.0.5
aliases CVE-2013-5002, GHSA-p632-5w74-x8xx
risk_score 1.4
exploitability 0.5
weighted_severity 2.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-q2be-73wp-tbav
9
url VCID-tgrx-g8fs-qkhv
vulnerability_id VCID-tgrx-g8fs-qkhv
summary
Multiple vulnerabilities have been found in phpMyAdmin, allowing
    remote authenticated attackers to execute arbitrary code, inject SQL code
    or conduct other attacks.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-4995
reference_id
reference_type
scores
0
value 0.00209
scoring_system epss
scoring_elements 0.43232
published_at 2026-04-01T12:55:00Z
1
value 0.00209
scoring_system epss
scoring_elements 0.43288
published_at 2026-04-02T12:55:00Z
2
value 0.00209
scoring_system epss
scoring_elements 0.43317
published_at 2026-04-04T12:55:00Z
3
value 0.00209
scoring_system epss
scoring_elements 0.43254
published_at 2026-04-07T12:55:00Z
4
value 0.00209
scoring_system epss
scoring_elements 0.43305
published_at 2026-04-08T12:55:00Z
5
value 0.00209
scoring_system epss
scoring_elements 0.4332
published_at 2026-04-09T12:55:00Z
6
value 0.00209
scoring_system epss
scoring_elements 0.43341
published_at 2026-04-11T12:55:00Z
7
value 0.00209
scoring_system epss
scoring_elements 0.43309
published_at 2026-04-12T12:55:00Z
8
value 0.00209
scoring_system epss
scoring_elements 0.43293
published_at 2026-04-13T12:55:00Z
9
value 0.00209
scoring_system epss
scoring_elements 0.43355
published_at 2026-04-16T12:55:00Z
10
value 0.00209
scoring_system epss
scoring_elements 0.43344
published_at 2026-04-18T12:55:00Z
11
value 0.00209
scoring_system epss
scoring_elements 0.4328
published_at 2026-04-21T12:55:00Z
12
value 0.00209
scoring_system epss
scoring_elements 0.43214
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-4995
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4995
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4995
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4996
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4996
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5002
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5002
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5003
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5003
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1879
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1879
6
reference_url https://security.gentoo.org/glsa/201311-02
reference_id GLSA-201311-02
reference_type
scores
url https://security.gentoo.org/glsa/201311-02
fixed_packages
0
url pkg:ebuild/dev-db/phpmyadmin@4.0.5
purl pkg:ebuild/dev-db/phpmyadmin@4.0.5
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/phpmyadmin@4.0.5
aliases CVE-2013-4995
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tgrx-g8fs-qkhv
10
url VCID-u794-p9hy-k3cg
vulnerability_id VCID-u794-p9hy-k3cg
summary
Multiple vulnerabilities have been found in phpMyAdmin, allowing
    remote authenticated attackers to execute arbitrary code, inject SQL code
    or conduct other attacks.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-5000
reference_id
reference_type
scores
0
value 0.0025
scoring_system epss
scoring_elements 0.48286
published_at 2026-04-01T12:55:00Z
1
value 0.0025
scoring_system epss
scoring_elements 0.48322
published_at 2026-04-02T12:55:00Z
2
value 0.0025
scoring_system epss
scoring_elements 0.48343
published_at 2026-04-04T12:55:00Z
3
value 0.0025
scoring_system epss
scoring_elements 0.48295
published_at 2026-04-07T12:55:00Z
4
value 0.0025
scoring_system epss
scoring_elements 0.4835
published_at 2026-04-08T12:55:00Z
5
value 0.0025
scoring_system epss
scoring_elements 0.48344
published_at 2026-04-09T12:55:00Z
6
value 0.0025
scoring_system epss
scoring_elements 0.48369
published_at 2026-04-11T12:55:00Z
7
value 0.0025
scoring_system epss
scoring_elements 0.48342
published_at 2026-04-12T12:55:00Z
8
value 0.0025
scoring_system epss
scoring_elements 0.48354
published_at 2026-04-21T12:55:00Z
9
value 0.0025
scoring_system epss
scoring_elements 0.48405
published_at 2026-04-16T12:55:00Z
10
value 0.0025
scoring_system epss
scoring_elements 0.484
published_at 2026-04-18T12:55:00Z
11
value 0.0025
scoring_system epss
scoring_elements 0.48339
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-5000
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5000
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5000
2
reference_url https://security.gentoo.org/glsa/201311-02
reference_id GLSA-201311-02
reference_type
scores
url https://security.gentoo.org/glsa/201311-02
fixed_packages
0
url pkg:ebuild/dev-db/phpmyadmin@4.0.5
purl pkg:ebuild/dev-db/phpmyadmin@4.0.5
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/phpmyadmin@4.0.5
aliases CVE-2013-5000
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-u794-p9hy-k3cg
11
url VCID-uxne-zpub-tffp
vulnerability_id VCID-uxne-zpub-tffp
summary
Multiple vulnerabilities have been found in phpMyAdmin, allowing
    remote authenticated attackers to execute arbitrary code, inject SQL code
    or conduct other attacks.
references
0
reference_url http://archives.neohapsis.com/archives/fulldisclosure/2013-04/0101.html
reference_id
reference_type
scores
url http://archives.neohapsis.com/archives/fulldisclosure/2013-04/0101.html
1
reference_url http://immunityservices.blogspot.com/2019/02/cvss.html
reference_id
reference_type
scores
url http://immunityservices.blogspot.com/2019/02/cvss.html
2
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2013-April/103184.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2013-April/103184.html
3
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2013-April/103188.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2013-April/103188.html
4
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2013-April/103195.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2013-April/103195.html
5
reference_url http://lists.opensuse.org/opensuse-updates/2013-06/msg00181.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2013-06/msg00181.html
6
reference_url http://openwall.com/lists/oss-security/2013/04/09/13
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2013/04/09/13
7
reference_url http://packetstormsecurity.com/files/121205/phpMyAdmin-3.5.7-Cross-Site-Scripting.html
reference_id
reference_type
scores
url http://packetstormsecurity.com/files/121205/phpMyAdmin-3.5.7-Cross-Site-Scripting.html
8
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-1937
reference_id
reference_type
scores
0
value 0.08106
scoring_system epss
scoring_elements 0.92123
published_at 2026-04-01T12:55:00Z
1
value 0.08106
scoring_system epss
scoring_elements 0.92137
published_at 2026-04-04T12:55:00Z
2
value 0.08106
scoring_system epss
scoring_elements 0.92141
published_at 2026-04-07T12:55:00Z
3
value 0.08106
scoring_system epss
scoring_elements 0.92153
published_at 2026-04-08T12:55:00Z
4
value 0.08106
scoring_system epss
scoring_elements 0.92156
published_at 2026-04-13T12:55:00Z
5
value 0.08106
scoring_system epss
scoring_elements 0.9216
published_at 2026-04-11T12:55:00Z
6
value 0.08106
scoring_system epss
scoring_elements 0.92161
published_at 2026-04-12T12:55:00Z
7
value 0.08106
scoring_system epss
scoring_elements 0.9213
published_at 2026-04-02T12:55:00Z
8
value 0.08766
scoring_system epss
scoring_elements 0.92524
published_at 2026-04-18T12:55:00Z
9
value 0.08766
scoring_system epss
scoring_elements 0.92528
published_at 2026-04-21T12:55:00Z
10
value 0.08766
scoring_system epss
scoring_elements 0.92529
published_at 2026-04-24T12:55:00Z
11
value 0.08766
scoring_system epss
scoring_elements 0.92525
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-1937
9
reference_url https://github.com/phpmyadmin/phpmyadmin/commit/79089c9bc02c82c15419fd9d6496b8781ae08a5a
reference_id
reference_type
scores
url https://github.com/phpmyadmin/phpmyadmin/commit/79089c9bc02c82c15419fd9d6496b8781ae08a5a
10
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2013:144
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2013:144
11
reference_url http://www.phpmyadmin.net/home_page/security/PMASA-2013-1.php
reference_id
reference_type
scores
url http://www.phpmyadmin.net/home_page/security/PMASA-2013-1.php
12
reference_url http://www.waraxe.us/advisory-102.html
reference_id
reference_type
scores
url http://www.waraxe.us/advisory-102.html
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.0.0:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.1.0:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.2.0:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.2.1:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.2.2:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.3.0:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.4:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.5:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.6:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.7:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.7:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.7:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.7:rc1:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:*:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:phpmyadmin:phpmyadmin:*:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:*:rc1:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/detail/CVE-2013-1937
reference_id CVE-2013-1937
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:P/A:N
1
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2013-1937
26
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/webapps/38440.txt
reference_id CVE-2013-1937;OSVDB-92201
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/webapps/38440.txt
27
reference_url https://www.securityfocus.com/bid/58962/info
reference_id CVE-2013-1937;OSVDB-92201
reference_type exploit
scores
url https://www.securityfocus.com/bid/58962/info
28
reference_url https://security.gentoo.org/glsa/201311-02
reference_id GLSA-201311-02
reference_type
scores
url https://security.gentoo.org/glsa/201311-02
fixed_packages
0
url pkg:ebuild/dev-db/phpmyadmin@4.0.5
purl pkg:ebuild/dev-db/phpmyadmin@4.0.5
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/phpmyadmin@4.0.5
aliases CVE-2013-1937
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-uxne-zpub-tffp
12
url VCID-x89g-7mcs-tuep
vulnerability_id VCID-x89g-7mcs-tuep
summary
Multiple vulnerabilities have been found in phpMyAdmin, allowing
    remote authenticated attackers to execute arbitrary code, inject SQL code
    or conduct other attacks.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-5003
reference_id
reference_type
scores
0
value 0.00374
scoring_system epss
scoring_elements 0.58948
published_at 2026-04-01T12:55:00Z
1
value 0.00374
scoring_system epss
scoring_elements 0.59024
published_at 2026-04-02T12:55:00Z
2
value 0.00374
scoring_system epss
scoring_elements 0.59046
published_at 2026-04-04T12:55:00Z
3
value 0.00374
scoring_system epss
scoring_elements 0.59011
published_at 2026-04-07T12:55:00Z
4
value 0.00374
scoring_system epss
scoring_elements 0.59063
published_at 2026-04-08T12:55:00Z
5
value 0.00374
scoring_system epss
scoring_elements 0.59069
published_at 2026-04-21T12:55:00Z
6
value 0.00374
scoring_system epss
scoring_elements 0.59087
published_at 2026-04-11T12:55:00Z
7
value 0.00374
scoring_system epss
scoring_elements 0.5905
published_at 2026-04-13T12:55:00Z
8
value 0.00374
scoring_system epss
scoring_elements 0.59085
published_at 2026-04-16T12:55:00Z
9
value 0.00374
scoring_system epss
scoring_elements 0.5909
published_at 2026-04-18T12:55:00Z
10
value 0.00374
scoring_system epss
scoring_elements 0.59049
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-5003
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4995
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4995
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4996
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4996
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5002
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5002
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5003
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5003
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1879
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1879
6
reference_url https://security.gentoo.org/glsa/201311-02
reference_id GLSA-201311-02
reference_type
scores
url https://security.gentoo.org/glsa/201311-02
fixed_packages
0
url pkg:ebuild/dev-db/phpmyadmin@4.0.5
purl pkg:ebuild/dev-db/phpmyadmin@4.0.5
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/phpmyadmin@4.0.5
aliases CVE-2013-5003
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-x89g-7mcs-tuep
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/phpmyadmin@4.0.5