Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/phpmyadmin@4:3.4.7.1-1?distro=trixie
Typedeb
Namespacedebian
Namephpmyadmin
Version4:3.4.7.1-1
Qualifiers
distro trixie
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version4:3.4.8-1
Latest_non_vulnerable_version4:5.2.3+dfsg-1
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-jypm-yg7x-p3cn
vulnerability_id VCID-jypm-yg7x-p3cn
summary
Improper Restriction of XML External Entity Reference
The simplexml_load_string function in the XML import plug-in (libraries/import/xml.php) in phpMyAdmin 3.4.x before 3.4.7.1 and 3.3.x before 3.3.10.5 allows remote authenticated users to read arbitrary files via XML data containing external entity references, aka an XML external entity (XXE) injection attack.
references
0
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2011-November/069625.html
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url http://lists.fedoraproject.org/pipermail/package-announce/2011-November/069625.html
1
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2011-November/069635.html
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url http://lists.fedoraproject.org/pipermail/package-announce/2011-November/069635.html
2
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2011-November/069649.html
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url http://lists.fedoraproject.org/pipermail/package-announce/2011-November/069649.html
3
reference_url http://packetstormsecurity.org/files/view/106511/phpmyadmin-fileread.txt
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url http://packetstormsecurity.org/files/view/106511/phpmyadmin-fileread.txt
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-4107
reference_id
reference_type
scores
0
value 0.12434
scoring_system epss
scoring_elements 0.93927
published_at 2026-04-21T12:55:00Z
1
value 0.12434
scoring_system epss
scoring_elements 0.93861
published_at 2026-04-01T12:55:00Z
2
value 0.12434
scoring_system epss
scoring_elements 0.9387
published_at 2026-04-02T12:55:00Z
3
value 0.12434
scoring_system epss
scoring_elements 0.9388
published_at 2026-04-04T12:55:00Z
4
value 0.12434
scoring_system epss
scoring_elements 0.93883
published_at 2026-04-07T12:55:00Z
5
value 0.12434
scoring_system epss
scoring_elements 0.93892
published_at 2026-04-08T12:55:00Z
6
value 0.12434
scoring_system epss
scoring_elements 0.93895
published_at 2026-04-09T12:55:00Z
7
value 0.12434
scoring_system epss
scoring_elements 0.93899
published_at 2026-04-13T12:55:00Z
8
value 0.12434
scoring_system epss
scoring_elements 0.9392
published_at 2026-04-16T12:55:00Z
9
value 0.12434
scoring_system epss
scoring_elements 0.93926
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-4107
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=751112
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://bugzilla.redhat.com/show_bug.cgi?id=751112
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4107
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4107
7
reference_url http://seclists.org/fulldisclosure/2011/Nov/21
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url http://seclists.org/fulldisclosure/2011/Nov/21
8
reference_url http://securityreason.com/securityalert/8533
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url http://securityreason.com/securityalert/8533
9
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/71108
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://exchange.xforce.ibmcloud.com/vulnerabilities/71108
10
reference_url https://github.com/phpmyadmin/phpmyadmin
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/phpmyadmin/phpmyadmin
11
reference_url https://github.com/phpmyadmin/phpmyadmin/commit/2fbf631384fd8cded55f4500cb87b129442f9ed2
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/phpmyadmin/phpmyadmin/commit/2fbf631384fd8cded55f4500cb87b129442f9ed2
12
reference_url https://github.com/phpmyadmin/phpmyadmin/commit/34d99de000de9d15cfdf5e9cc8b7682d51110bbd
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/phpmyadmin/phpmyadmin/commit/34d99de000de9d15cfdf5e9cc8b7682d51110bbd
13
reference_url https://github.com/phpmyadmin/phpmyadmin/commit/5fa86b8e81565c15ddbc359e8f59ecd829a2b717
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/phpmyadmin/phpmyadmin/commit/5fa86b8e81565c15ddbc359e8f59ecd829a2b717
14
reference_url https://github.com/phpmyadmin/phpmyadmin/commit/a5e206fbd2ca814042cfc1bb7dd3b40c28ce3fb5
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/phpmyadmin/phpmyadmin/commit/a5e206fbd2ca814042cfc1bb7dd3b40c28ce3fb5
15
reference_url http://www.debian.org/security/2012/dsa-2391
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.debian.org/security/2012/dsa-2391
16
reference_url http://www.openwall.com/lists/oss-security/2011/11/03/3
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.openwall.com/lists/oss-security/2011/11/03/3
17
reference_url http://www.openwall.com/lists/oss-security/2011/11/03/5
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.openwall.com/lists/oss-security/2011/11/03/5
18
reference_url http://www.phpmyadmin.net/home_page/security/PMASA-2011-17.php
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.phpmyadmin.net/home_page/security/PMASA-2011-17.php
19
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=656247
reference_id 656247
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=656247
20
reference_url https://nvd.nist.gov/vuln/detail/CVE-2011-4107
reference_id CVE-2011-4107
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2011-4107
21
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/webapps/18371.rb
reference_id CVE-2011-4107;OSVDB-76798
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/webapps/18371.rb
22
reference_url https://github.com/advisories/GHSA-q4mm-89q2-xffg
reference_id GHSA-q4mm-89q2-xffg
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-q4mm-89q2-xffg
23
reference_url https://security.gentoo.org/glsa/201201-01
reference_id GLSA-201201-01
reference_type
scores
url https://security.gentoo.org/glsa/201201-01
fixed_packages
0
url pkg:deb/debian/phpmyadmin@4:3.4.7.1-1?distro=trixie
purl pkg:deb/debian/phpmyadmin@4:3.4.7.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:3.4.7.1-1%3Fdistro=trixie
1
url pkg:deb/debian/phpmyadmin@4:5.0.4%2Bdfsg2-2%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/phpmyadmin@4:5.0.4%2Bdfsg2-2%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-na3j-h3qr-k7dc
1
vulnerability VCID-ndjn-p6gb-u7g4
2
vulnerability VCID-rqy8-n6fr-hqey
3
vulnerability VCID-zd8d-c1nk-g7a4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:5.0.4%252Bdfsg2-2%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/phpmyadmin@4:5.2.1%2Bdfsg-1%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/phpmyadmin@4:5.2.1%2Bdfsg-1%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-zd8d-c1nk-g7a4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:5.2.1%252Bdfsg-1%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/phpmyadmin@4:5.2.2-really%2Bdfsg-1%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/phpmyadmin@4:5.2.2-really%2Bdfsg-1%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:5.2.2-really%252Bdfsg-1%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/phpmyadmin@4:5.2.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/phpmyadmin@4:5.2.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:5.2.3%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2011-4107, GHSA-q4mm-89q2-xffg
risk_score 10.0
exploitability 2.0
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jypm-yg7x-p3cn
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:3.4.7.1-1%3Fdistro=trixie