Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/phpmyadmin@4:4.4.14.1-1?distro=trixie
Typedeb
Namespacedebian
Namephpmyadmin
Version4:4.4.14.1-1
Qualifiers
distro trixie
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version4:4.5.1-1
Latest_non_vulnerable_version4:5.2.3+dfsg-1
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-w56h-g9t8-1fgu
vulnerability_id VCID-w56h-g9t8-1fgu
summary
phpMyAdmin ReCaptcha bypass
libraries/plugins/auth/AuthenticationCookie.class.php in phpMyAdmin 4.3.x before 4.3.13.2 and 4.4.x before 4.4.14.1 allows remote attackers to bypass a multiple-reCaptcha protection mechanism against brute-force credential guessing by providing a correct response to a single reCaptcha.
references
0
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2015-September/166294.html
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://lists.fedoraproject.org/pipermail/package-announce/2015-September/166294.html
1
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2015-September/166307.html
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://lists.fedoraproject.org/pipermail/package-announce/2015-September/166307.html
2
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2015-September/166531.html
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://lists.fedoraproject.org/pipermail/package-announce/2015-September/166531.html
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-6830
reference_id
reference_type
scores
0
value 0.21219
scoring_system epss
scoring_elements 0.95684
published_at 2026-04-21T12:55:00Z
1
value 0.21219
scoring_system epss
scoring_elements 0.95651
published_at 2026-04-07T12:55:00Z
2
value 0.21219
scoring_system epss
scoring_elements 0.95659
published_at 2026-04-08T12:55:00Z
3
value 0.21219
scoring_system epss
scoring_elements 0.95663
published_at 2026-04-09T12:55:00Z
4
value 0.21219
scoring_system epss
scoring_elements 0.95668
published_at 2026-04-11T12:55:00Z
5
value 0.21219
scoring_system epss
scoring_elements 0.95667
published_at 2026-04-12T12:55:00Z
6
value 0.21219
scoring_system epss
scoring_elements 0.9567
published_at 2026-04-13T12:55:00Z
7
value 0.21219
scoring_system epss
scoring_elements 0.95678
published_at 2026-04-16T12:55:00Z
8
value 0.21219
scoring_system epss
scoring_elements 0.95681
published_at 2026-04-18T12:55:00Z
9
value 0.21219
scoring_system epss
scoring_elements 0.95633
published_at 2026-04-01T12:55:00Z
10
value 0.21219
scoring_system epss
scoring_elements 0.95643
published_at 2026-04-02T12:55:00Z
11
value 0.21219
scoring_system epss
scoring_elements 0.95648
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-6830
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8958
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8958
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9218
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9218
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2206
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2206
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3902
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3902
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3903
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3903
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6830
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6830
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7873
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7873
11
reference_url https://github.com/phpmyadmin/phpmyadmin/commit/0314e67900f01410bc8c81c58a40dc0515e3c91d
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/phpmyadmin/phpmyadmin/commit/0314e67900f01410bc8c81c58a40dc0515e3c91d
12
reference_url https://github.com/phpmyadmin/phpmyadmin/commit/785f4e2711848eb8945894199d5870253a88584e
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/phpmyadmin/phpmyadmin/commit/785f4e2711848eb8945894199d5870253a88584e
13
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-6830
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2015-6830
14
reference_url https://web.archive.org/web/20200228052837/http://www.securityfocus.com/bid/76674
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://web.archive.org/web/20200228052837/http://www.securityfocus.com/bid/76674
15
reference_url https://web.archive.org/web/20211215060142/http://www.securitytracker.com/id/1033546
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://web.archive.org/web/20211215060142/http://www.securitytracker.com/id/1033546
16
reference_url https://www.phpmyadmin.net/security/PMASA-2015-4
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://www.phpmyadmin.net/security/PMASA-2015-4
17
reference_url https://www.phpmyadmin.net/security/PMASA-2015-4/
reference_id
reference_type
scores
url https://www.phpmyadmin.net/security/PMASA-2015-4/
18
reference_url http://www.debian.org/security/2015/dsa-3382
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.debian.org/security/2015/dsa-3382
19
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/remote/52414.py
reference_id CVE-2015-6830
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/remote/52414.py
20
reference_url https://github.com/advisories/GHSA-v6fh-vg22-r6cm
reference_id GHSA-v6fh-vg22-r6cm
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-v6fh-vg22-r6cm
fixed_packages
0
url pkg:deb/debian/phpmyadmin@4:4.4.14.1-1?distro=trixie
purl pkg:deb/debian/phpmyadmin@4:4.4.14.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:4.4.14.1-1%3Fdistro=trixie
1
url pkg:deb/debian/phpmyadmin@4:5.0.4%2Bdfsg2-2%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/phpmyadmin@4:5.0.4%2Bdfsg2-2%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-na3j-h3qr-k7dc
1
vulnerability VCID-ndjn-p6gb-u7g4
2
vulnerability VCID-rqy8-n6fr-hqey
3
vulnerability VCID-zd8d-c1nk-g7a4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:5.0.4%252Bdfsg2-2%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/phpmyadmin@4:5.2.1%2Bdfsg-1%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/phpmyadmin@4:5.2.1%2Bdfsg-1%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-zd8d-c1nk-g7a4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:5.2.1%252Bdfsg-1%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/phpmyadmin@4:5.2.2-really%2Bdfsg-1%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/phpmyadmin@4:5.2.2-really%2Bdfsg-1%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:5.2.2-really%252Bdfsg-1%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/phpmyadmin@4:5.2.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/phpmyadmin@4:5.2.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:5.2.3%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2015-6830, GHSA-v6fh-vg22-r6cm
risk_score 10.0
exploitability 2.0
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-w56h-g9t8-1fgu
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:4.4.14.1-1%3Fdistro=trixie