Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/phpmyadmin@4:4.6.6-1?distro=trixie
Typedeb
Namespacedebian
Namephpmyadmin
Version4:4.6.6-1
Qualifiers
distro trixie
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version4:4.6.6-2
Latest_non_vulnerable_version4:5.2.3+dfsg-1
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-24e9-fnt7-jqdu
vulnerability_id VCID-24e9-fnt7-jqdu
summary
Improper Input Validation
phpMyAdmin is vulnerable to a DoS attack in the replication status by using a specially crafted table name.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-1000018
reference_id
reference_type
scores
0
value 0.01295
scoring_system epss
scoring_elements 0.7972
published_at 2026-04-21T12:55:00Z
1
value 0.01295
scoring_system epss
scoring_elements 0.79654
published_at 2026-04-07T12:55:00Z
2
value 0.01295
scoring_system epss
scoring_elements 0.79683
published_at 2026-04-08T12:55:00Z
3
value 0.01295
scoring_system epss
scoring_elements 0.7969
published_at 2026-04-09T12:55:00Z
4
value 0.01295
scoring_system epss
scoring_elements 0.79711
published_at 2026-04-11T12:55:00Z
5
value 0.01295
scoring_system epss
scoring_elements 0.79695
published_at 2026-04-12T12:55:00Z
6
value 0.01295
scoring_system epss
scoring_elements 0.79688
published_at 2026-04-13T12:55:00Z
7
value 0.01295
scoring_system epss
scoring_elements 0.79717
published_at 2026-04-18T12:55:00Z
8
value 0.01295
scoring_system epss
scoring_elements 0.79639
published_at 2026-04-01T12:55:00Z
9
value 0.01295
scoring_system epss
scoring_elements 0.79646
published_at 2026-04-02T12:55:00Z
10
value 0.01295
scoring_system epss
scoring_elements 0.79667
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-1000018
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000018
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000018
2
reference_url https://web.archive.org/web/20210123220317/http://www.securityfocus.com/bid/95738
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://web.archive.org/web/20210123220317/http://www.securityfocus.com/bid/95738
3
reference_url https://www.phpmyadmin.net/security/PMASA-2017-7
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://www.phpmyadmin.net/security/PMASA-2017-7
4
reference_url http://www.securityfocus.com/bid/95738
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/95738
5
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-1000018
reference_id CVE-2017-1000018
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2017-1000018
6
reference_url https://github.com/advisories/GHSA-47qr-f86f-3wm4
reference_id GHSA-47qr-f86f-3wm4
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-47qr-f86f-3wm4
fixed_packages
0
url pkg:deb/debian/phpmyadmin@4:4.6.6-1?distro=trixie
purl pkg:deb/debian/phpmyadmin@4:4.6.6-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:4.6.6-1%3Fdistro=trixie
1
url pkg:deb/debian/phpmyadmin@4:5.0.4%2Bdfsg2-2%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/phpmyadmin@4:5.0.4%2Bdfsg2-2%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-na3j-h3qr-k7dc
1
vulnerability VCID-ndjn-p6gb-u7g4
2
vulnerability VCID-rqy8-n6fr-hqey
3
vulnerability VCID-zd8d-c1nk-g7a4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:5.0.4%252Bdfsg2-2%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/phpmyadmin@4:5.2.1%2Bdfsg-1%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/phpmyadmin@4:5.2.1%2Bdfsg-1%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-zd8d-c1nk-g7a4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:5.2.1%252Bdfsg-1%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/phpmyadmin@4:5.2.2-really%2Bdfsg-1%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/phpmyadmin@4:5.2.2-really%2Bdfsg-1%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:5.2.2-really%252Bdfsg-1%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/phpmyadmin@4:5.2.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/phpmyadmin@4:5.2.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:5.2.3%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2017-1000018, GHSA-47qr-f86f-3wm4
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-24e9-fnt7-jqdu
1
url VCID-4awg-qnjf-4ua5
vulnerability_id VCID-4awg-qnjf-4ua5
summary
Improper Input Validation
A weakness was discovered where an attacker can inject arbitrary values in to the browser cookies.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-1000016
reference_id
reference_type
scores
0
value 0.00488
scoring_system epss
scoring_elements 0.65507
published_at 2026-04-21T12:55:00Z
1
value 0.00488
scoring_system epss
scoring_elements 0.65486
published_at 2026-04-08T12:55:00Z
2
value 0.00488
scoring_system epss
scoring_elements 0.65497
published_at 2026-04-09T12:55:00Z
3
value 0.00488
scoring_system epss
scoring_elements 0.65516
published_at 2026-04-11T12:55:00Z
4
value 0.00488
scoring_system epss
scoring_elements 0.65503
published_at 2026-04-12T12:55:00Z
5
value 0.00488
scoring_system epss
scoring_elements 0.65475
published_at 2026-04-13T12:55:00Z
6
value 0.00488
scoring_system epss
scoring_elements 0.65511
published_at 2026-04-16T12:55:00Z
7
value 0.00488
scoring_system epss
scoring_elements 0.65523
published_at 2026-04-18T12:55:00Z
8
value 0.00488
scoring_system epss
scoring_elements 0.65392
published_at 2026-04-01T12:55:00Z
9
value 0.00488
scoring_system epss
scoring_elements 0.65441
published_at 2026-04-02T12:55:00Z
10
value 0.00488
scoring_system epss
scoring_elements 0.65468
published_at 2026-04-04T12:55:00Z
11
value 0.00488
scoring_system epss
scoring_elements 0.65433
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-1000016
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000016
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000016
2
reference_url https://github.com/phpmyadmin/phpmyadmin/commit/3b6ed1f
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/phpmyadmin/phpmyadmin/commit/3b6ed1f
3
reference_url https://www.phpmyadmin.net/security/PMASA-2017-5
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://www.phpmyadmin.net/security/PMASA-2017-5
4
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-1000016
reference_id CVE-2017-1000016
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2017-1000016
5
reference_url https://github.com/advisories/GHSA-j2cq-h6v2-f875
reference_id GHSA-j2cq-h6v2-f875
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-j2cq-h6v2-f875
fixed_packages
0
url pkg:deb/debian/phpmyadmin@4:4.6.6-1?distro=trixie
purl pkg:deb/debian/phpmyadmin@4:4.6.6-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:4.6.6-1%3Fdistro=trixie
1
url pkg:deb/debian/phpmyadmin@4:5.0.4%2Bdfsg2-2%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/phpmyadmin@4:5.0.4%2Bdfsg2-2%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-na3j-h3qr-k7dc
1
vulnerability VCID-ndjn-p6gb-u7g4
2
vulnerability VCID-rqy8-n6fr-hqey
3
vulnerability VCID-zd8d-c1nk-g7a4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:5.0.4%252Bdfsg2-2%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/phpmyadmin@4:5.2.1%2Bdfsg-1%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/phpmyadmin@4:5.2.1%2Bdfsg-1%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-zd8d-c1nk-g7a4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:5.2.1%252Bdfsg-1%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/phpmyadmin@4:5.2.2-really%2Bdfsg-1%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/phpmyadmin@4:5.2.2-really%2Bdfsg-1%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:5.2.2-really%252Bdfsg-1%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/phpmyadmin@4:5.2.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/phpmyadmin@4:5.2.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:5.2.3%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2017-1000016, GHSA-j2cq-h6v2-f875
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4awg-qnjf-4ua5
2
url VCID-7h9b-a8dp-57hp
vulnerability_id VCID-7h9b-a8dp-57hp
summary
Cross-site Scripting
phpMyAdmin is vulnerable to a CSS injection attack through crafted cookie parameters.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-1000015
reference_id
reference_type
scores
0
value 0.00557
scoring_system epss
scoring_elements 0.68119
published_at 2026-04-07T12:55:00Z
1
value 0.00557
scoring_system epss
scoring_elements 0.68196
published_at 2026-04-21T12:55:00Z
2
value 0.00557
scoring_system epss
scoring_elements 0.68214
published_at 2026-04-18T12:55:00Z
3
value 0.00557
scoring_system epss
scoring_elements 0.68202
published_at 2026-04-16T12:55:00Z
4
value 0.00557
scoring_system epss
scoring_elements 0.68164
published_at 2026-04-13T12:55:00Z
5
value 0.00557
scoring_system epss
scoring_elements 0.68197
published_at 2026-04-12T12:55:00Z
6
value 0.00557
scoring_system epss
scoring_elements 0.68211
published_at 2026-04-11T12:55:00Z
7
value 0.00557
scoring_system epss
scoring_elements 0.68186
published_at 2026-04-09T12:55:00Z
8
value 0.00557
scoring_system epss
scoring_elements 0.68101
published_at 2026-04-01T12:55:00Z
9
value 0.00557
scoring_system epss
scoring_elements 0.68124
published_at 2026-04-02T12:55:00Z
10
value 0.00557
scoring_system epss
scoring_elements 0.6817
published_at 2026-04-08T12:55:00Z
11
value 0.00557
scoring_system epss
scoring_elements 0.68142
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-1000015
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000015
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000015
2
reference_url https://github.com/phpmyadmin/composer
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/phpmyadmin/composer
3
reference_url https://web.archive.org/web/20210123220229/http://www.securityfocus.com/bid/95726
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://web.archive.org/web/20210123220229/http://www.securityfocus.com/bid/95726
4
reference_url https://www.phpmyadmin.net/security/PMASA-2017-4
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://www.phpmyadmin.net/security/PMASA-2017-4
5
reference_url http://www.securityfocus.com/bid/95726
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/95726
6
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-1000015
reference_id CVE-2017-1000015
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2017-1000015
7
reference_url https://github.com/advisories/GHSA-3fgq-cmr4-97rr
reference_id GHSA-3fgq-cmr4-97rr
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-3fgq-cmr4-97rr
8
reference_url https://usn.ubuntu.com/USN-4843-1/
reference_id USN-USN-4843-1
reference_type
scores
url https://usn.ubuntu.com/USN-4843-1/
fixed_packages
0
url pkg:deb/debian/phpmyadmin@4:4.6.6-1?distro=trixie
purl pkg:deb/debian/phpmyadmin@4:4.6.6-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:4.6.6-1%3Fdistro=trixie
1
url pkg:deb/debian/phpmyadmin@4:5.0.4%2Bdfsg2-2%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/phpmyadmin@4:5.0.4%2Bdfsg2-2%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-na3j-h3qr-k7dc
1
vulnerability VCID-ndjn-p6gb-u7g4
2
vulnerability VCID-rqy8-n6fr-hqey
3
vulnerability VCID-zd8d-c1nk-g7a4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:5.0.4%252Bdfsg2-2%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/phpmyadmin@4:5.2.1%2Bdfsg-1%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/phpmyadmin@4:5.2.1%2Bdfsg-1%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-zd8d-c1nk-g7a4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:5.2.1%252Bdfsg-1%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/phpmyadmin@4:5.2.2-really%2Bdfsg-1%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/phpmyadmin@4:5.2.2-really%2Bdfsg-1%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:5.2.2-really%252Bdfsg-1%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/phpmyadmin@4:5.2.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/phpmyadmin@4:5.2.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:5.2.3%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2017-1000015, GHSA-3fgq-cmr4-97rr
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7h9b-a8dp-57hp
3
url VCID-7n1n-uj91-8ugg
vulnerability_id VCID-7n1n-uj91-8ugg
summary
phpMyAdmin server-side request forgery (SSRF)
The setup script for phpMyAdmin before 4.0.10.19, 4.4.x before 4.4.15.10, and 4.6.x before 4.6.6 allows remote attackers to conduct server-side request forgery (SSRF) attacks via unspecified vectors.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-6621
reference_id
reference_type
scores
0
value 0.00389
scoring_system epss
scoring_elements 0.59883
published_at 2026-04-07T12:55:00Z
1
value 0.00389
scoring_system epss
scoring_elements 0.59966
published_at 2026-04-21T12:55:00Z
2
value 0.00389
scoring_system epss
scoring_elements 0.5998
published_at 2026-04-18T12:55:00Z
3
value 0.00389
scoring_system epss
scoring_elements 0.59974
published_at 2026-04-16T12:55:00Z
4
value 0.00389
scoring_system epss
scoring_elements 0.59934
published_at 2026-04-13T12:55:00Z
5
value 0.00389
scoring_system epss
scoring_elements 0.59953
published_at 2026-04-12T12:55:00Z
6
value 0.00389
scoring_system epss
scoring_elements 0.59968
published_at 2026-04-11T12:55:00Z
7
value 0.00389
scoring_system epss
scoring_elements 0.59947
published_at 2026-04-09T12:55:00Z
8
value 0.00389
scoring_system epss
scoring_elements 0.59811
published_at 2026-04-01T12:55:00Z
9
value 0.00389
scoring_system epss
scoring_elements 0.59888
published_at 2026-04-02T12:55:00Z
10
value 0.00389
scoring_system epss
scoring_elements 0.59933
published_at 2026-04-08T12:55:00Z
11
value 0.00389
scoring_system epss
scoring_elements 0.59913
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-6621
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6621
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6621
2
reference_url https://github.com/phpmyadmin/composer
reference_id
reference_type
scores
0
value 8.6
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/phpmyadmin/composer
3
reference_url https://lists.debian.org/debian-lts-announce/2018/07/msg00006.html
reference_id
reference_type
scores
0
value 8.6
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.debian.org/debian-lts-announce/2018/07/msg00006.html
4
reference_url https://www.phpmyadmin.net/security/PMASA-2016-44
reference_id
reference_type
scores
0
value 8.6
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://www.phpmyadmin.net/security/PMASA-2016-44
5
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-6621
reference_id CVE-2016-6621
reference_type
scores
0
value 8.6
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2016-6621
6
reference_url https://github.com/advisories/GHSA-44vv-mm86-7cg6
reference_id GHSA-44vv-mm86-7cg6
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-44vv-mm86-7cg6
fixed_packages
0
url pkg:deb/debian/phpmyadmin@4:4.6.6-1?distro=trixie
purl pkg:deb/debian/phpmyadmin@4:4.6.6-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:4.6.6-1%3Fdistro=trixie
1
url pkg:deb/debian/phpmyadmin@4:5.0.4%2Bdfsg2-2%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/phpmyadmin@4:5.0.4%2Bdfsg2-2%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-na3j-h3qr-k7dc
1
vulnerability VCID-ndjn-p6gb-u7g4
2
vulnerability VCID-rqy8-n6fr-hqey
3
vulnerability VCID-zd8d-c1nk-g7a4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:5.0.4%252Bdfsg2-2%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/phpmyadmin@4:5.2.1%2Bdfsg-1%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/phpmyadmin@4:5.2.1%2Bdfsg-1%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-zd8d-c1nk-g7a4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:5.2.1%252Bdfsg-1%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/phpmyadmin@4:5.2.2-really%2Bdfsg-1%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/phpmyadmin@4:5.2.2-really%2Bdfsg-1%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:5.2.2-really%252Bdfsg-1%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/phpmyadmin@4:5.2.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/phpmyadmin@4:5.2.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:5.2.3%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2016-6621, GHSA-44vv-mm86-7cg6
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7n1n-uj91-8ugg
4
url VCID-b5d2-5bfb-bbgz
vulnerability_id VCID-b5d2-5bfb-bbgz
summary
Server-Side Request Forgery (SSRF)
phpMyAdmin is vulnerable to a weakness where a user with appropriate permissions is able to connect to an arbitrary MySQL server.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-1000017
reference_id
reference_type
scores
0
value 0.0092
scoring_system epss
scoring_elements 0.75913
published_at 2026-04-07T12:55:00Z
1
value 0.0092
scoring_system epss
scoring_elements 0.75979
published_at 2026-04-21T12:55:00Z
2
value 0.0092
scoring_system epss
scoring_elements 0.75994
published_at 2026-04-18T12:55:00Z
3
value 0.0092
scoring_system epss
scoring_elements 0.75992
published_at 2026-04-16T12:55:00Z
4
value 0.0092
scoring_system epss
scoring_elements 0.75954
published_at 2026-04-13T12:55:00Z
5
value 0.0092
scoring_system epss
scoring_elements 0.75961
published_at 2026-04-12T12:55:00Z
6
value 0.0092
scoring_system epss
scoring_elements 0.75984
published_at 2026-04-11T12:55:00Z
7
value 0.0092
scoring_system epss
scoring_elements 0.7596
published_at 2026-04-09T12:55:00Z
8
value 0.0092
scoring_system epss
scoring_elements 0.75898
published_at 2026-04-01T12:55:00Z
9
value 0.0092
scoring_system epss
scoring_elements 0.75902
published_at 2026-04-02T12:55:00Z
10
value 0.0092
scoring_system epss
scoring_elements 0.75946
published_at 2026-04-08T12:55:00Z
11
value 0.0092
scoring_system epss
scoring_elements 0.75934
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-1000017
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000017
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000017
2
reference_url https://github.com/phpmyadmin/composer
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/phpmyadmin/composer
3
reference_url https://www.phpmyadmin.net/security/PMASA-2017-6
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://www.phpmyadmin.net/security/PMASA-2017-6
4
reference_url http://www.securityfocus.com/bid/95732
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url http://www.securityfocus.com/bid/95732
5
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-1000017
reference_id CVE-2017-1000017
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2017-1000017
6
reference_url https://github.com/advisories/GHSA-99xj-xqc9-98hr
reference_id GHSA-99xj-xqc9-98hr
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-99xj-xqc9-98hr
fixed_packages
0
url pkg:deb/debian/phpmyadmin@4:4.6.6-1?distro=trixie
purl pkg:deb/debian/phpmyadmin@4:4.6.6-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:4.6.6-1%3Fdistro=trixie
1
url pkg:deb/debian/phpmyadmin@4:5.0.4%2Bdfsg2-2%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/phpmyadmin@4:5.0.4%2Bdfsg2-2%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-na3j-h3qr-k7dc
1
vulnerability VCID-ndjn-p6gb-u7g4
2
vulnerability VCID-rqy8-n6fr-hqey
3
vulnerability VCID-zd8d-c1nk-g7a4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:5.0.4%252Bdfsg2-2%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/phpmyadmin@4:5.2.1%2Bdfsg-1%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/phpmyadmin@4:5.2.1%2Bdfsg-1%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-zd8d-c1nk-g7a4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:5.2.1%252Bdfsg-1%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/phpmyadmin@4:5.2.2-really%2Bdfsg-1%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/phpmyadmin@4:5.2.2-really%2Bdfsg-1%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:5.2.2-really%252Bdfsg-1%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/phpmyadmin@4:5.2.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/phpmyadmin@4:5.2.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:5.2.3%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2017-1000017, GHSA-99xj-xqc9-98hr
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-b5d2-5bfb-bbgz
5
url VCID-f4d7-69e8-sqej
vulnerability_id VCID-f4d7-69e8-sqej
summary The plural form formula in ngettext family of calls in php-gettext before 1.0.12 allows remote attackers to execute arbitrary code.
references
0
reference_url http://lists.opensuse.org/opensuse-updates/2017-02/msg00015.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2017-02/msg00015.html
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-8980
reference_id
reference_type
scores
0
value 0.04573
scoring_system epss
scoring_elements 0.8922
published_at 2026-04-21T12:55:00Z
1
value 0.04573
scoring_system epss
scoring_elements 0.89224
published_at 2026-04-18T12:55:00Z
2
value 0.04573
scoring_system epss
scoring_elements 0.89162
published_at 2026-04-01T12:55:00Z
3
value 0.04573
scoring_system epss
scoring_elements 0.89168
published_at 2026-04-02T12:55:00Z
4
value 0.04573
scoring_system epss
scoring_elements 0.89183
published_at 2026-04-04T12:55:00Z
5
value 0.04573
scoring_system epss
scoring_elements 0.89186
published_at 2026-04-07T12:55:00Z
6
value 0.04573
scoring_system epss
scoring_elements 0.89204
published_at 2026-04-08T12:55:00Z
7
value 0.04573
scoring_system epss
scoring_elements 0.89208
published_at 2026-04-09T12:55:00Z
8
value 0.04573
scoring_system epss
scoring_elements 0.89218
published_at 2026-04-11T12:55:00Z
9
value 0.04573
scoring_system epss
scoring_elements 0.89214
published_at 2026-04-12T12:55:00Z
10
value 0.04573
scoring_system epss
scoring_elements 0.89212
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-8980
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1367462
reference_id
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1367462
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8980
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8980
4
reference_url http://seclists.org/fulldisclosure/2016/Aug/76
reference_id
reference_type
scores
url http://seclists.org/fulldisclosure/2016/Aug/76
5
reference_url https://launchpad.net/php-gettext/trunk/1.0.12
reference_id
reference_type
scores
url https://launchpad.net/php-gettext/trunk/1.0.12
6
reference_url https://lwn.net/Alerts/708838/
reference_id
reference_type
scores
url https://lwn.net/Alerts/708838/
7
reference_url http://www.openwall.com/lists/oss-security/2017/01/18/4
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2017/01/18/4
8
reference_url http://www.securityfocus.com/bid/95754
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/95754
9
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=851770
reference_id 851770
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=851770
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php-gettext_project:php-gettext:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:php-gettext_project:php-gettext:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php-gettext_project:php-gettext:*:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:24:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:24:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:24:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:42.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.2:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-8980
reference_id CVE-2015-8980
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
1
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2015-8980
16
reference_url https://usn.ubuntu.com/USN-4779-1/
reference_id USN-USN-4779-1
reference_type
scores
url https://usn.ubuntu.com/USN-4779-1/
fixed_packages
0
url pkg:deb/debian/phpmyadmin@4:4.6.6-1?distro=trixie
purl pkg:deb/debian/phpmyadmin@4:4.6.6-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:4.6.6-1%3Fdistro=trixie
1
url pkg:deb/debian/phpmyadmin@4:5.0.4%2Bdfsg2-2%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/phpmyadmin@4:5.0.4%2Bdfsg2-2%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-na3j-h3qr-k7dc
1
vulnerability VCID-ndjn-p6gb-u7g4
2
vulnerability VCID-rqy8-n6fr-hqey
3
vulnerability VCID-zd8d-c1nk-g7a4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:5.0.4%252Bdfsg2-2%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/phpmyadmin@4:5.2.1%2Bdfsg-1%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/phpmyadmin@4:5.2.1%2Bdfsg-1%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-zd8d-c1nk-g7a4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:5.2.1%252Bdfsg-1%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/phpmyadmin@4:5.2.2-really%2Bdfsg-1%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/phpmyadmin@4:5.2.2-really%2Bdfsg-1%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:5.2.2-really%252Bdfsg-1%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/phpmyadmin@4:5.2.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/phpmyadmin@4:5.2.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:5.2.3%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2015-8980
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-f4d7-69e8-sqej
6
url VCID-uw6h-fpzy-x3ap
vulnerability_id VCID-uw6h-fpzy-x3ap
summary
URL Redirection to Untrusted Site (Open Redirect)
phpMyAdmin is vulnerable to an open redirect weakness.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-1000013
reference_id
reference_type
scores
0
value 0.00239
scoring_system epss
scoring_elements 0.47088
published_at 2026-04-18T12:55:00Z
1
value 0.00239
scoring_system epss
scoring_elements 0.4698
published_at 2026-04-07T12:55:00Z
2
value 0.00239
scoring_system epss
scoring_elements 0.47035
published_at 2026-04-08T12:55:00Z
3
value 0.00239
scoring_system epss
scoring_elements 0.47031
published_at 2026-04-09T12:55:00Z
4
value 0.00239
scoring_system epss
scoring_elements 0.47055
published_at 2026-04-11T12:55:00Z
5
value 0.00239
scoring_system epss
scoring_elements 0.47029
published_at 2026-04-12T12:55:00Z
6
value 0.00239
scoring_system epss
scoring_elements 0.47036
published_at 2026-04-21T12:55:00Z
7
value 0.00239
scoring_system epss
scoring_elements 0.47092
published_at 2026-04-16T12:55:00Z
8
value 0.00239
scoring_system epss
scoring_elements 0.46978
published_at 2026-04-01T12:55:00Z
9
value 0.00239
scoring_system epss
scoring_elements 0.47014
published_at 2026-04-02T12:55:00Z
10
value 0.00239
scoring_system epss
scoring_elements 0.47033
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-1000013
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000013
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000013
2
reference_url https://web.archive.org/web/20210123220100/http://www.securityfocus.com/bid/95720
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://web.archive.org/web/20210123220100/http://www.securityfocus.com/bid/95720
3
reference_url https://www.phpmyadmin.net/security/PMASA-2017-1
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://www.phpmyadmin.net/security/PMASA-2017-1
4
reference_url http://www.securityfocus.com/bid/95720
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/95720
5
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-1000013
reference_id CVE-2017-1000013
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2017-1000013
6
reference_url https://github.com/advisories/GHSA-5h5m-fj48-qpjw
reference_id GHSA-5h5m-fj48-qpjw
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-5h5m-fj48-qpjw
fixed_packages
0
url pkg:deb/debian/phpmyadmin@4:4.6.6-1?distro=trixie
purl pkg:deb/debian/phpmyadmin@4:4.6.6-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:4.6.6-1%3Fdistro=trixie
1
url pkg:deb/debian/phpmyadmin@4:5.0.4%2Bdfsg2-2%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/phpmyadmin@4:5.0.4%2Bdfsg2-2%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-na3j-h3qr-k7dc
1
vulnerability VCID-ndjn-p6gb-u7g4
2
vulnerability VCID-rqy8-n6fr-hqey
3
vulnerability VCID-zd8d-c1nk-g7a4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:5.0.4%252Bdfsg2-2%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/phpmyadmin@4:5.2.1%2Bdfsg-1%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/phpmyadmin@4:5.2.1%2Bdfsg-1%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-zd8d-c1nk-g7a4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:5.2.1%252Bdfsg-1%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/phpmyadmin@4:5.2.2-really%2Bdfsg-1%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/phpmyadmin@4:5.2.2-really%2Bdfsg-1%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:5.2.2-really%252Bdfsg-1%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/phpmyadmin@4:5.2.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/phpmyadmin@4:5.2.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:5.2.3%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2017-1000013, GHSA-5h5m-fj48-qpjw
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-uw6h-fpzy-x3ap
7
url VCID-zreq-41ja-pbf1
vulnerability_id VCID-zreq-41ja-pbf1
summary
Improper Input Validation
phpMyAdmin is vulnerable to a DoS weakness in the table editing functionality.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-1000014
reference_id
reference_type
scores
0
value 0.01144
scoring_system epss
scoring_elements 0.78417
published_at 2026-04-07T12:55:00Z
1
value 0.01144
scoring_system epss
scoring_elements 0.7847
published_at 2026-04-21T12:55:00Z
2
value 0.01144
scoring_system epss
scoring_elements 0.78475
published_at 2026-04-18T12:55:00Z
3
value 0.01144
scoring_system epss
scoring_elements 0.78455
published_at 2026-04-12T12:55:00Z
4
value 0.01144
scoring_system epss
scoring_elements 0.78474
published_at 2026-04-11T12:55:00Z
5
value 0.01144
scoring_system epss
scoring_elements 0.78448
published_at 2026-04-13T12:55:00Z
6
value 0.01144
scoring_system epss
scoring_elements 0.78396
published_at 2026-04-01T12:55:00Z
7
value 0.01144
scoring_system epss
scoring_elements 0.78403
published_at 2026-04-02T12:55:00Z
8
value 0.01144
scoring_system epss
scoring_elements 0.78443
published_at 2026-04-08T12:55:00Z
9
value 0.01144
scoring_system epss
scoring_elements 0.78434
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-1000014
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000014
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000014
2
reference_url https://web.archive.org/web/20210123220105/http://www.securityfocus.com/bid/95721
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://web.archive.org/web/20210123220105/http://www.securityfocus.com/bid/95721
3
reference_url https://www.phpmyadmin.net/security/PMASA-2017-3
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://www.phpmyadmin.net/security/PMASA-2017-3
4
reference_url http://www.securityfocus.com/bid/95721
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/95721
5
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-1000014
reference_id CVE-2017-1000014
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2017-1000014
6
reference_url https://github.com/advisories/GHSA-9hrc-rwrq-v6mh
reference_id GHSA-9hrc-rwrq-v6mh
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-9hrc-rwrq-v6mh
7
reference_url https://usn.ubuntu.com/USN-4843-1/
reference_id USN-USN-4843-1
reference_type
scores
url https://usn.ubuntu.com/USN-4843-1/
fixed_packages
0
url pkg:deb/debian/phpmyadmin@4:4.6.6-1?distro=trixie
purl pkg:deb/debian/phpmyadmin@4:4.6.6-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:4.6.6-1%3Fdistro=trixie
1
url pkg:deb/debian/phpmyadmin@4:5.0.4%2Bdfsg2-2%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/phpmyadmin@4:5.0.4%2Bdfsg2-2%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-na3j-h3qr-k7dc
1
vulnerability VCID-ndjn-p6gb-u7g4
2
vulnerability VCID-rqy8-n6fr-hqey
3
vulnerability VCID-zd8d-c1nk-g7a4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:5.0.4%252Bdfsg2-2%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/phpmyadmin@4:5.2.1%2Bdfsg-1%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/phpmyadmin@4:5.2.1%2Bdfsg-1%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-zd8d-c1nk-g7a4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:5.2.1%252Bdfsg-1%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/phpmyadmin@4:5.2.2-really%2Bdfsg-1%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/phpmyadmin@4:5.2.2-really%2Bdfsg-1%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:5.2.2-really%252Bdfsg-1%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/phpmyadmin@4:5.2.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/phpmyadmin@4:5.2.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:5.2.3%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2017-1000014, GHSA-9hrc-rwrq-v6mh
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zreq-41ja-pbf1
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:4.6.6-1%3Fdistro=trixie