| 0 |
| url |
VCID-2y3v-jnph-hfh4 |
| vulnerability_id |
VCID-2y3v-jnph-hfh4 |
| summary |
Multiple vulnerabilities have been found in phpMyAdmin, allowing
remote attackers to conduct XSS. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-26935 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.91523 |
| scoring_system |
epss |
| scoring_elements |
0.99677 |
| published_at |
2026-04-29T12:55:00Z |
|
| 1 |
| value |
0.91523 |
| scoring_system |
epss |
| scoring_elements |
0.9967 |
| published_at |
2026-04-07T12:55:00Z |
|
| 2 |
| value |
0.91523 |
| scoring_system |
epss |
| scoring_elements |
0.99669 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.91523 |
| scoring_system |
epss |
| scoring_elements |
0.99667 |
| published_at |
2026-04-02T12:55:00Z |
|
| 4 |
| value |
0.91523 |
| scoring_system |
epss |
| scoring_elements |
0.99676 |
| published_at |
2026-04-24T12:55:00Z |
|
| 5 |
| value |
0.91523 |
| scoring_system |
epss |
| scoring_elements |
0.99675 |
| published_at |
2026-04-21T12:55:00Z |
|
| 6 |
| value |
0.91523 |
| scoring_system |
epss |
| scoring_elements |
0.99673 |
| published_at |
2026-04-18T12:55:00Z |
|
| 7 |
| value |
0.91523 |
| scoring_system |
epss |
| scoring_elements |
0.99672 |
| published_at |
2026-04-16T12:55:00Z |
|
| 8 |
| value |
0.91523 |
| scoring_system |
epss |
| scoring_elements |
0.99671 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-26935 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
|
| fixed_packages |
|
| aliases |
CVE-2020-26935, GHSA-7ff4-cv53-4cjq
|
| risk_score |
10.0 |
| exploitability |
2.0 |
| weighted_severity |
9.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-2y3v-jnph-hfh4 |
|
| 1 |
| url |
VCID-41mv-6vqr-sua6 |
| vulnerability_id |
VCID-41mv-6vqr-sua6 |
| summary |
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
SQL Injection vulnerability in function getTableCreationQuery in CreateAddField.php in phpMyAdmin 5.x before 5.2.0 via the tbl_storage_engine or tbl_collation parameters to tbl_create.php. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-22452 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.03245 |
| scoring_system |
epss |
| scoring_elements |
0.87129 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.03245 |
| scoring_system |
epss |
| scoring_elements |
0.87155 |
| published_at |
2026-04-29T12:55:00Z |
|
| 2 |
| value |
0.03245 |
| scoring_system |
epss |
| scoring_elements |
0.87069 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.03245 |
| scoring_system |
epss |
| scoring_elements |
0.87154 |
| published_at |
2026-04-26T12:55:00Z |
|
| 4 |
| value |
0.03245 |
| scoring_system |
epss |
| scoring_elements |
0.87088 |
| published_at |
2026-04-04T12:55:00Z |
|
| 5 |
| value |
0.03245 |
| scoring_system |
epss |
| scoring_elements |
0.87081 |
| published_at |
2026-04-07T12:55:00Z |
|
| 6 |
| value |
0.03245 |
| scoring_system |
epss |
| scoring_elements |
0.87101 |
| published_at |
2026-04-08T12:55:00Z |
|
| 7 |
| value |
0.03245 |
| scoring_system |
epss |
| scoring_elements |
0.87109 |
| published_at |
2026-04-09T12:55:00Z |
|
| 8 |
| value |
0.03245 |
| scoring_system |
epss |
| scoring_elements |
0.87122 |
| published_at |
2026-04-11T12:55:00Z |
|
| 9 |
| value |
0.03245 |
| scoring_system |
epss |
| scoring_elements |
0.87117 |
| published_at |
2026-04-12T12:55:00Z |
|
| 10 |
| value |
0.03245 |
| scoring_system |
epss |
| scoring_elements |
0.87112 |
| published_at |
2026-04-13T12:55:00Z |
|
| 11 |
| value |
0.03245 |
| scoring_system |
epss |
| scoring_elements |
0.87128 |
| published_at |
2026-04-16T12:55:00Z |
|
| 12 |
| value |
0.03245 |
| scoring_system |
epss |
| scoring_elements |
0.87132 |
| published_at |
2026-04-18T12:55:00Z |
|
| 13 |
| value |
0.03245 |
| scoring_system |
epss |
| scoring_elements |
0.87148 |
| published_at |
2026-04-24T12:55:00Z |
|
| 14 |
| value |
0.03245 |
| scoring_system |
epss |
| scoring_elements |
0.87058 |
| published_at |
2026-04-01T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-22452 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
| reference_url |
http://phpmyadmin.com |
| reference_id |
phpmyadmin.com |
| reference_type |
|
| scores |
| 0 |
| value |
9.8 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
|
| 1 |
| value |
Track* |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-04-01T14:07:49Z/ |
|
|
| url |
http://phpmyadmin.com |
|
|
| fixed_packages |
|
| aliases |
CVE-2020-22452, GHSA-prcg-mc23-hgjh
|
| risk_score |
4.5 |
| exploitability |
0.5 |
| weighted_severity |
9.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-41mv-6vqr-sua6 |
|
| 2 |
| url |
VCID-5657-kcyh-7bc2 |
| vulnerability_id |
VCID-5657-kcyh-7bc2 |
| summary |
phpMyAdmin SQL injection in user accounts page
In phpMyAdmin 4 before 4.9.4 and 5 before 5.0.1, SQL injection exists in the user accounts page. A malicious user could inject custom SQL in place of their own username when creating queries to this page. An attacker must have a valid MySQL account to access the server. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-5504 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.22375 |
| scoring_system |
epss |
| scoring_elements |
0.95844 |
| published_at |
2026-04-29T12:55:00Z |
|
| 1 |
| value |
0.22375 |
| scoring_system |
epss |
| scoring_elements |
0.95834 |
| published_at |
2026-04-16T12:55:00Z |
|
| 2 |
| value |
0.22375 |
| scoring_system |
epss |
| scoring_elements |
0.9584 |
| published_at |
2026-04-18T12:55:00Z |
|
| 3 |
| value |
0.22375 |
| scoring_system |
epss |
| scoring_elements |
0.95843 |
| published_at |
2026-04-21T12:55:00Z |
|
| 4 |
| value |
0.23238 |
| scoring_system |
epss |
| scoring_elements |
0.95908 |
| published_at |
2026-04-01T12:55:00Z |
|
| 5 |
| value |
0.23238 |
| scoring_system |
epss |
| scoring_elements |
0.95928 |
| published_at |
2026-04-07T12:55:00Z |
|
| 6 |
| value |
0.23238 |
| scoring_system |
epss |
| scoring_elements |
0.95924 |
| published_at |
2026-04-04T12:55:00Z |
|
| 7 |
| value |
0.23238 |
| scoring_system |
epss |
| scoring_elements |
0.95916 |
| published_at |
2026-04-02T12:55:00Z |
|
| 8 |
| value |
0.23238 |
| scoring_system |
epss |
| scoring_elements |
0.95945 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.23238 |
| scoring_system |
epss |
| scoring_elements |
0.95942 |
| published_at |
2026-04-12T12:55:00Z |
|
| 10 |
| value |
0.23238 |
| scoring_system |
epss |
| scoring_elements |
0.95939 |
| published_at |
2026-04-09T12:55:00Z |
|
| 11 |
| value |
0.23238 |
| scoring_system |
epss |
| scoring_elements |
0.95937 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-5504 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
|
| fixed_packages |
|
| aliases |
CVE-2020-5504, GHSA-fgj8-93xx-f6g6
|
| risk_score |
10.0 |
| exploitability |
2.0 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-5657-kcyh-7bc2 |
|
| 3 |
| url |
VCID-986a-3m4g-83ge |
| vulnerability_id |
VCID-986a-3m4g-83ge |
| summary |
Cross-Site Request Forgery (CSRF)
By deceiving a user into clicking on a crafted URL, it is possible to perform harmful SQL operations such as renaming databases, creating new `tables/routines`, deleting designer pages, `adding/deleting` users, updating user passwords, killing SQL processes. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2018-19969 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00458 |
| scoring_system |
epss |
| scoring_elements |
0.64036 |
| published_at |
2026-04-29T12:55:00Z |
|
| 1 |
| value |
0.00458 |
| scoring_system |
epss |
| scoring_elements |
0.64002 |
| published_at |
2026-04-09T12:55:00Z |
|
| 2 |
| value |
0.00458 |
| scoring_system |
epss |
| scoring_elements |
0.64014 |
| published_at |
2026-04-11T12:55:00Z |
|
| 3 |
| value |
0.00458 |
| scoring_system |
epss |
| scoring_elements |
0.64 |
| published_at |
2026-04-12T12:55:00Z |
|
| 4 |
| value |
0.00458 |
| scoring_system |
epss |
| scoring_elements |
0.6397 |
| published_at |
2026-04-13T12:55:00Z |
|
| 5 |
| value |
0.00458 |
| scoring_system |
epss |
| scoring_elements |
0.64005 |
| published_at |
2026-04-16T12:55:00Z |
|
| 6 |
| value |
0.00458 |
| scoring_system |
epss |
| scoring_elements |
0.64017 |
| published_at |
2026-04-18T12:55:00Z |
|
| 7 |
| value |
0.00458 |
| scoring_system |
epss |
| scoring_elements |
0.64006 |
| published_at |
2026-04-21T12:55:00Z |
|
| 8 |
| value |
0.00458 |
| scoring_system |
epss |
| scoring_elements |
0.64024 |
| published_at |
2026-04-24T12:55:00Z |
|
| 9 |
| value |
0.00458 |
| scoring_system |
epss |
| scoring_elements |
0.64038 |
| published_at |
2026-04-26T12:55:00Z |
|
| 10 |
| value |
0.00458 |
| scoring_system |
epss |
| scoring_elements |
0.63888 |
| published_at |
2026-04-01T12:55:00Z |
|
| 11 |
| value |
0.00458 |
| scoring_system |
epss |
| scoring_elements |
0.63947 |
| published_at |
2026-04-02T12:55:00Z |
|
| 12 |
| value |
0.00458 |
| scoring_system |
epss |
| scoring_elements |
0.63974 |
| published_at |
2026-04-04T12:55:00Z |
|
| 13 |
| value |
0.00458 |
| scoring_system |
epss |
| scoring_elements |
0.63934 |
| published_at |
2026-04-07T12:55:00Z |
|
| 14 |
| value |
0.00458 |
| scoring_system |
epss |
| scoring_elements |
0.63984 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2018-19969 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
|
| fixed_packages |
|
| aliases |
CVE-2018-19969, GHSA-xwf2-53mc-r8hx
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-986a-3m4g-83ge |
|
| 4 |
| url |
VCID-a286-32jj-eubk |
| vulnerability_id |
VCID-a286-32jj-eubk |
| summary |
Regular Expression Denial of Service in jquery-validation
The GitHub Security Lab team has identified potential security vulnerabilities in jquery.validation.
The project contains one or more regular expressions that are vulnerable to ReDoS (Regular Expression Denial of Service)
This issue was discovered and reported by GitHub team member @erik-krogh (Erik Krogh Kristensen). |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-21252 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.007 |
| scoring_system |
epss |
| scoring_elements |
0.72076 |
| published_at |
2026-04-29T12:55:00Z |
|
| 1 |
| value |
0.007 |
| scoring_system |
epss |
| scoring_elements |
0.72082 |
| published_at |
2026-04-26T12:55:00Z |
|
| 2 |
| value |
0.007 |
| scoring_system |
epss |
| scoring_elements |
0.72075 |
| published_at |
2026-04-24T12:55:00Z |
|
| 3 |
| value |
0.007 |
| scoring_system |
epss |
| scoring_elements |
0.72047 |
| published_at |
2026-04-18T12:55:00Z |
|
| 4 |
| value |
0.007 |
| scoring_system |
epss |
| scoring_elements |
0.72014 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.007 |
| scoring_system |
epss |
| scoring_elements |
0.7203 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.007 |
| scoring_system |
epss |
| scoring_elements |
0.72006 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.007 |
| scoring_system |
epss |
| scoring_elements |
0.71993 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.007 |
| scoring_system |
epss |
| scoring_elements |
0.71955 |
| published_at |
2026-04-07T12:55:00Z |
|
| 9 |
| value |
0.007 |
| scoring_system |
epss |
| scoring_elements |
0.71979 |
| published_at |
2026-04-04T12:55:00Z |
|
| 10 |
| value |
0.007 |
| scoring_system |
epss |
| scoring_elements |
0.71959 |
| published_at |
2026-04-02T12:55:00Z |
|
| 11 |
| value |
0.007 |
| scoring_system |
epss |
| scoring_elements |
0.72032 |
| published_at |
2026-04-21T12:55:00Z |
|
| 12 |
| value |
0.007 |
| scoring_system |
epss |
| scoring_elements |
0.71951 |
| published_at |
2026-04-01T12:55:00Z |
|
| 13 |
| value |
0.007 |
| scoring_system |
epss |
| scoring_elements |
0.72039 |
| published_at |
2026-04-16T12:55:00Z |
|
| 14 |
| value |
0.007 |
| scoring_system |
epss |
| scoring_elements |
0.71998 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-21252 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-21252, GHSA-jxwx-85vp-gvwm
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-a286-32jj-eubk |
|
| 5 |
| url |
VCID-br1c-5bzf-ufeu |
| vulnerability_id |
VCID-br1c-5bzf-ufeu |
| summary |
SQL Injection
An issue was discovered in phpMyAdmin. A vulnerability was reported where a specially crafted username can be used to trigger a SQL injection attack through the designer feature. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2019-6798 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00538 |
| scoring_system |
epss |
| scoring_elements |
0.67562 |
| published_at |
2026-04-08T12:55:00Z |
|
| 1 |
| value |
0.00538 |
| scoring_system |
epss |
| scoring_elements |
0.6761 |
| published_at |
2026-04-29T12:55:00Z |
|
| 2 |
| value |
0.00538 |
| scoring_system |
epss |
| scoring_elements |
0.67608 |
| published_at |
2026-04-26T12:55:00Z |
|
| 3 |
| value |
0.00538 |
| scoring_system |
epss |
| scoring_elements |
0.67597 |
| published_at |
2026-04-24T12:55:00Z |
|
| 4 |
| value |
0.00538 |
| scoring_system |
epss |
| scoring_elements |
0.67578 |
| published_at |
2026-04-21T12:55:00Z |
|
| 5 |
| value |
0.00538 |
| scoring_system |
epss |
| scoring_elements |
0.67599 |
| published_at |
2026-04-18T12:55:00Z |
|
| 6 |
| value |
0.00538 |
| scoring_system |
epss |
| scoring_elements |
0.67587 |
| published_at |
2026-04-16T12:55:00Z |
|
| 7 |
| value |
0.00538 |
| scoring_system |
epss |
| scoring_elements |
0.67551 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00538 |
| scoring_system |
epss |
| scoring_elements |
0.67474 |
| published_at |
2026-04-01T12:55:00Z |
|
| 9 |
| value |
0.00538 |
| scoring_system |
epss |
| scoring_elements |
0.67584 |
| published_at |
2026-04-12T12:55:00Z |
|
| 10 |
| value |
0.00538 |
| scoring_system |
epss |
| scoring_elements |
0.67598 |
| published_at |
2026-04-11T12:55:00Z |
|
| 11 |
| value |
0.00538 |
| scoring_system |
epss |
| scoring_elements |
0.6751 |
| published_at |
2026-04-07T12:55:00Z |
|
| 12 |
| value |
0.00538 |
| scoring_system |
epss |
| scoring_elements |
0.67575 |
| published_at |
2026-04-09T12:55:00Z |
|
| 13 |
| value |
0.00538 |
| scoring_system |
epss |
| scoring_elements |
0.67532 |
| published_at |
2026-04-04T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2019-6798 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
| reference_url |
https://nvd.nist.gov/vuln/detail/CVE-2019-6798 |
| reference_id |
CVE-2019-6798 |
| reference_type |
|
| scores |
| 0 |
| value |
7.5 |
| scoring_system |
cvssv2 |
| scoring_elements |
AV:N/AC:L/Au:N/C:P/I:P/A:P |
|
| 1 |
| value |
9.8 |
| scoring_system |
cvssv3 |
| scoring_elements |
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
|
| 2 |
| value |
9.8 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
|
| 3 |
| value |
CRITICAL |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://nvd.nist.gov/vuln/detail/CVE-2019-6798 |
|
| 9 |
|
| 10 |
|
| 11 |
|
|
| fixed_packages |
|
| aliases |
CVE-2019-6798, GHSA-f732-fxh6-g4qj
|
| risk_score |
4.5 |
| exploitability |
0.5 |
| weighted_severity |
9.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-br1c-5bzf-ufeu |
|
| 6 |
| url |
VCID-c91y-txcw-2kdy |
| vulnerability_id |
VCID-c91y-txcw-2kdy |
| summary |
Cross-site Scripting
An issue was discovered in `js/designer/move.js` in phpMyAdm A Cross-Site Scripting vulnerability has been found where an attacker can use a crafted database name to trigger an XSS attack when that database is referenced from the Designer feature. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2018-12581 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0062 |
| scoring_system |
epss |
| scoring_elements |
0.70128 |
| published_at |
2026-04-29T12:55:00Z |
|
| 1 |
| value |
0.0062 |
| scoring_system |
epss |
| scoring_elements |
0.69974 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.0062 |
| scoring_system |
epss |
| scoring_elements |
0.69987 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.0062 |
| scoring_system |
epss |
| scoring_elements |
0.70001 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.0062 |
| scoring_system |
epss |
| scoring_elements |
0.69978 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.0062 |
| scoring_system |
epss |
| scoring_elements |
0.70026 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.0062 |
| scoring_system |
epss |
| scoring_elements |
0.70042 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.0062 |
| scoring_system |
epss |
| scoring_elements |
0.70065 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.0062 |
| scoring_system |
epss |
| scoring_elements |
0.7005 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.0062 |
| scoring_system |
epss |
| scoring_elements |
0.70037 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.0062 |
| scoring_system |
epss |
| scoring_elements |
0.7008 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.0062 |
| scoring_system |
epss |
| scoring_elements |
0.70089 |
| published_at |
2026-04-18T12:55:00Z |
|
| 12 |
| value |
0.0062 |
| scoring_system |
epss |
| scoring_elements |
0.70069 |
| published_at |
2026-04-21T12:55:00Z |
|
| 13 |
| value |
0.0062 |
| scoring_system |
epss |
| scoring_elements |
0.70121 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2018-12581 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
| reference_url |
https://nvd.nist.gov/vuln/detail/CVE-2018-12581 |
| reference_id |
CVE-2018-12581 |
| reference_type |
|
| scores |
| 0 |
| value |
4.3 |
| scoring_system |
cvssv2 |
| scoring_elements |
AV:N/AC:M/Au:N/C:N/I:P/A:N |
|
| 1 |
| value |
6.1 |
| scoring_system |
cvssv3 |
| scoring_elements |
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N |
|
| 2 |
| value |
6.1 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N |
|
| 3 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://nvd.nist.gov/vuln/detail/CVE-2018-12581 |
|
| 11 |
|
| 12 |
|
|
| fixed_packages |
|
| aliases |
CVE-2018-12581, GHSA-vxj6-pm6r-23hq
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-c91y-txcw-2kdy |
|
| 7 |
| url |
VCID-ebk2-vjau-57h9 |
| vulnerability_id |
VCID-ebk2-vjau-57h9 |
| summary |
Information Exposure
An attacker can exploit phpMyAdm to leak the contents of a local file because of an error in the transformation feature. The attacker must have access to the phpMyAdmin Configuration Storage tables, although these can easily be created in any database to which the attacker has access. An attacker must have valid credentials to log in to phpMyAdmin; this vulnerability does not allow an attacker to circumvent the login system. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2018-19968 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.02543 |
| scoring_system |
epss |
| scoring_elements |
0.85526 |
| published_at |
2026-04-29T12:55:00Z |
|
| 1 |
| value |
0.02543 |
| scoring_system |
epss |
| scoring_elements |
0.85397 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.02543 |
| scoring_system |
epss |
| scoring_elements |
0.85409 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.02543 |
| scoring_system |
epss |
| scoring_elements |
0.85429 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.02543 |
| scoring_system |
epss |
| scoring_elements |
0.85432 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.02543 |
| scoring_system |
epss |
| scoring_elements |
0.85453 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.02543 |
| scoring_system |
epss |
| scoring_elements |
0.85461 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.02543 |
| scoring_system |
epss |
| scoring_elements |
0.85475 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.02543 |
| scoring_system |
epss |
| scoring_elements |
0.85474 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.02543 |
| scoring_system |
epss |
| scoring_elements |
0.8547 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.02543 |
| scoring_system |
epss |
| scoring_elements |
0.85494 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.02543 |
| scoring_system |
epss |
| scoring_elements |
0.85498 |
| published_at |
2026-04-18T12:55:00Z |
|
| 12 |
| value |
0.02543 |
| scoring_system |
epss |
| scoring_elements |
0.85495 |
| published_at |
2026-04-21T12:55:00Z |
|
| 13 |
| value |
0.02543 |
| scoring_system |
epss |
| scoring_elements |
0.85517 |
| published_at |
2026-04-24T12:55:00Z |
|
| 14 |
| value |
0.02543 |
| scoring_system |
epss |
| scoring_elements |
0.85527 |
| published_at |
2026-04-26T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2018-19968 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
|
| fixed_packages |
|
| aliases |
CVE-2018-19968, GHSA-xc97-r49q-cxgc
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-ebk2-vjau-57h9 |
|
| 8 |
| url |
VCID-ftdj-p5as-97hd |
| vulnerability_id |
VCID-ftdj-p5as-97hd |
| summary |
Cross-Site Request Forgery (CSRF)
phpMyAdm has CSRF, allowing an attacker to execute arbitrary SQL statements, related to `js/db_operations.js`, `js/tbl_operations.js`, `libraries/classes/Operations.php`, and `sql.php.` |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2018-10188 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00935 |
| scoring_system |
epss |
| scoring_elements |
0.76107 |
| published_at |
2026-04-07T12:55:00Z |
|
| 1 |
| value |
0.00935 |
| scoring_system |
epss |
| scoring_elements |
0.76241 |
| published_at |
2026-04-29T12:55:00Z |
|
| 2 |
| value |
0.00935 |
| scoring_system |
epss |
| scoring_elements |
0.76179 |
| published_at |
2026-04-11T12:55:00Z |
|
| 3 |
| value |
0.00935 |
| scoring_system |
epss |
| scoring_elements |
0.76093 |
| published_at |
2026-04-01T12:55:00Z |
|
| 4 |
| value |
0.00935 |
| scoring_system |
epss |
| scoring_elements |
0.76153 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00935 |
| scoring_system |
epss |
| scoring_elements |
0.76096 |
| published_at |
2026-04-02T12:55:00Z |
|
| 6 |
| value |
0.00935 |
| scoring_system |
epss |
| scoring_elements |
0.76128 |
| published_at |
2026-04-04T12:55:00Z |
|
| 7 |
| value |
0.00935 |
| scoring_system |
epss |
| scoring_elements |
0.7614 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.00935 |
| scoring_system |
epss |
| scoring_elements |
0.76229 |
| published_at |
2026-04-26T12:55:00Z |
|
| 9 |
| value |
0.00935 |
| scoring_system |
epss |
| scoring_elements |
0.76219 |
| published_at |
2026-04-24T12:55:00Z |
|
| 10 |
| value |
0.00935 |
| scoring_system |
epss |
| scoring_elements |
0.7618 |
| published_at |
2026-04-21T12:55:00Z |
|
| 11 |
| value |
0.00935 |
| scoring_system |
epss |
| scoring_elements |
0.76197 |
| published_at |
2026-04-18T12:55:00Z |
|
| 12 |
| value |
0.00935 |
| scoring_system |
epss |
| scoring_elements |
0.76193 |
| published_at |
2026-04-16T12:55:00Z |
|
| 13 |
| value |
0.00935 |
| scoring_system |
epss |
| scoring_elements |
0.76152 |
| published_at |
2026-04-13T12:55:00Z |
|
| 14 |
| value |
0.00935 |
| scoring_system |
epss |
| scoring_elements |
0.76155 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2018-10188 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
| reference_url |
https://nvd.nist.gov/vuln/detail/CVE-2018-10188 |
| reference_id |
CVE-2018-10188 |
| reference_type |
|
| scores |
| 0 |
| value |
6.8 |
| scoring_system |
cvssv2 |
| scoring_elements |
AV:N/AC:M/Au:N/C:P/I:P/A:P |
|
| 1 |
| value |
8.8 |
| scoring_system |
cvssv3 |
| scoring_elements |
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H |
|
| 2 |
| value |
8.8 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H |
|
| 3 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://nvd.nist.gov/vuln/detail/CVE-2018-10188 |
|
| 14 |
|
|
| fixed_packages |
|
| aliases |
CVE-2018-10188, GHSA-v6fp-h79x-9rqc
|
| risk_score |
10.0 |
| exploitability |
2.0 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-ftdj-p5as-97hd |
|
| 9 |
| url |
VCID-g6ud-92qe-hqcx |
| vulnerability_id |
VCID-g6ud-92qe-hqcx |
| summary |
phpMyAdmin unsanitized Git information
phpMyAdmin before 4.9.2 does not escape certain Git information, related to `libraries/classes/Display/GitRevision.php and libraries/classes/Footer.php`. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2019-19617 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01155 |
| scoring_system |
epss |
| scoring_elements |
0.78613 |
| published_at |
2026-04-29T12:55:00Z |
|
| 1 |
| value |
0.01155 |
| scoring_system |
epss |
| scoring_elements |
0.78481 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.01155 |
| scoring_system |
epss |
| scoring_elements |
0.78487 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.01155 |
| scoring_system |
epss |
| scoring_elements |
0.78518 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.01155 |
| scoring_system |
epss |
| scoring_elements |
0.78501 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.01155 |
| scoring_system |
epss |
| scoring_elements |
0.78528 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.01155 |
| scoring_system |
epss |
| scoring_elements |
0.78533 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.01155 |
| scoring_system |
epss |
| scoring_elements |
0.78558 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.01155 |
| scoring_system |
epss |
| scoring_elements |
0.7854 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.01155 |
| scoring_system |
epss |
| scoring_elements |
0.78532 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.01155 |
| scoring_system |
epss |
| scoring_elements |
0.7856 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.01155 |
| scoring_system |
epss |
| scoring_elements |
0.78559 |
| published_at |
2026-04-18T12:55:00Z |
|
| 12 |
| value |
0.01155 |
| scoring_system |
epss |
| scoring_elements |
0.78556 |
| published_at |
2026-04-21T12:55:00Z |
|
| 13 |
| value |
0.01155 |
| scoring_system |
epss |
| scoring_elements |
0.78588 |
| published_at |
2026-04-24T12:55:00Z |
|
| 14 |
| value |
0.01155 |
| scoring_system |
epss |
| scoring_elements |
0.78596 |
| published_at |
2026-04-26T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2019-19617 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
|
| fixed_packages |
|
| aliases |
CVE-2019-19617, GHSA-pgph-mc4p-f8c3
|
| risk_score |
4.5 |
| exploitability |
0.5 |
| weighted_severity |
9.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-g6ud-92qe-hqcx |
|
| 10 |
| url |
VCID-gu4y-aeqx-mqak |
| vulnerability_id |
VCID-gu4y-aeqx-mqak |
| summary |
SQL injection in phpMyAdmin
An issue was discovered in phpMyAdmin before 4.9.2. A crafted database/table name can be used to trigger a SQL injection attack through the designer feature. |
| references |
| 0 |
|
| 1 |
|
| 2 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2019-18622 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00736 |
| scoring_system |
epss |
| scoring_elements |
0.72851 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00736 |
| scoring_system |
epss |
| scoring_elements |
0.72859 |
| published_at |
2026-04-18T12:55:00Z |
|
| 2 |
| value |
0.00736 |
| scoring_system |
epss |
| scoring_elements |
0.72849 |
| published_at |
2026-04-16T12:55:00Z |
|
| 3 |
| value |
0.00736 |
| scoring_system |
epss |
| scoring_elements |
0.72807 |
| published_at |
2026-04-13T12:55:00Z |
|
| 4 |
| value |
0.00736 |
| scoring_system |
epss |
| scoring_elements |
0.72815 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.00736 |
| scoring_system |
epss |
| scoring_elements |
0.72832 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00736 |
| scoring_system |
epss |
| scoring_elements |
0.72808 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00736 |
| scoring_system |
epss |
| scoring_elements |
0.72794 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.00736 |
| scoring_system |
epss |
| scoring_elements |
0.72756 |
| published_at |
2026-04-07T12:55:00Z |
|
| 9 |
| value |
0.00736 |
| scoring_system |
epss |
| scoring_elements |
0.72752 |
| published_at |
2026-04-01T12:55:00Z |
|
| 10 |
| value |
0.00736 |
| scoring_system |
epss |
| scoring_elements |
0.7276 |
| published_at |
2026-04-02T12:55:00Z |
|
| 11 |
| value |
0.00736 |
| scoring_system |
epss |
| scoring_elements |
0.7278 |
| published_at |
2026-04-04T12:55:00Z |
|
| 12 |
| value |
0.00736 |
| scoring_system |
epss |
| scoring_elements |
0.729 |
| published_at |
2026-04-29T12:55:00Z |
|
| 13 |
| value |
0.00736 |
| scoring_system |
epss |
| scoring_elements |
0.72902 |
| published_at |
2026-04-26T12:55:00Z |
|
| 14 |
| value |
0.00736 |
| scoring_system |
epss |
| scoring_elements |
0.72892 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2019-18622 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
|
| fixed_packages |
|
| aliases |
CVE-2019-18622, GHSA-jgjc-332c-8cmc
|
| risk_score |
4.5 |
| exploitability |
0.5 |
| weighted_severity |
9.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-gu4y-aeqx-mqak |
|
| 11 |
| url |
VCID-jma9-9uhu-xuc3 |
| vulnerability_id |
VCID-jma9-9uhu-xuc3 |
| summary |
SQL Injection
A vulnerability was reported where a specially crafted database name can be used to trigger an SQL injection attack through the designer feature. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2019-11768 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01803 |
| scoring_system |
epss |
| scoring_elements |
0.82885 |
| published_at |
2026-04-29T12:55:00Z |
|
| 1 |
| value |
0.01803 |
| scoring_system |
epss |
| scoring_elements |
0.82813 |
| published_at |
2026-04-12T12:55:00Z |
|
| 2 |
| value |
0.01803 |
| scoring_system |
epss |
| scoring_elements |
0.82808 |
| published_at |
2026-04-13T12:55:00Z |
|
| 3 |
| value |
0.01803 |
| scoring_system |
epss |
| scoring_elements |
0.82847 |
| published_at |
2026-04-16T12:55:00Z |
|
| 4 |
| value |
0.01803 |
| scoring_system |
epss |
| scoring_elements |
0.82846 |
| published_at |
2026-04-18T12:55:00Z |
|
| 5 |
| value |
0.01803 |
| scoring_system |
epss |
| scoring_elements |
0.82849 |
| published_at |
2026-04-21T12:55:00Z |
|
| 6 |
| value |
0.01803 |
| scoring_system |
epss |
| scoring_elements |
0.82871 |
| published_at |
2026-04-24T12:55:00Z |
|
| 7 |
| value |
0.01803 |
| scoring_system |
epss |
| scoring_elements |
0.8288 |
| published_at |
2026-04-26T12:55:00Z |
|
| 8 |
| value |
0.01803 |
| scoring_system |
epss |
| scoring_elements |
0.82743 |
| published_at |
2026-04-01T12:55:00Z |
|
| 9 |
| value |
0.01803 |
| scoring_system |
epss |
| scoring_elements |
0.82759 |
| published_at |
2026-04-02T12:55:00Z |
|
| 10 |
| value |
0.01803 |
| scoring_system |
epss |
| scoring_elements |
0.82772 |
| published_at |
2026-04-04T12:55:00Z |
|
| 11 |
| value |
0.01803 |
| scoring_system |
epss |
| scoring_elements |
0.82769 |
| published_at |
2026-04-07T12:55:00Z |
|
| 12 |
| value |
0.01803 |
| scoring_system |
epss |
| scoring_elements |
0.82795 |
| published_at |
2026-04-08T12:55:00Z |
|
| 13 |
| value |
0.01803 |
| scoring_system |
epss |
| scoring_elements |
0.82801 |
| published_at |
2026-04-09T12:55:00Z |
|
| 14 |
| value |
0.01803 |
| scoring_system |
epss |
| scoring_elements |
0.82817 |
| published_at |
2026-04-11T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2019-11768 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
|
| fixed_packages |
|
| aliases |
CVE-2019-11768, GHSA-x37v-98f9-mj32
|
| risk_score |
4.5 |
| exploitability |
0.5 |
| weighted_severity |
9.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-jma9-9uhu-xuc3 |
|
| 12 |
| url |
VCID-mk34-h4nz-b3ey |
| vulnerability_id |
VCID-mk34-h4nz-b3ey |
| summary |
Multiple vulnerabilities have been found in phpMyAdmin, allowing
remote attackers to conduct XSS. |
| references |
| 0 |
|
| 1 |
|
| 2 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-26934 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.02788 |
| scoring_system |
epss |
| scoring_elements |
0.86124 |
| published_at |
2026-04-29T12:55:00Z |
|
| 1 |
| value |
0.02788 |
| scoring_system |
epss |
| scoring_elements |
0.86042 |
| published_at |
2026-04-07T12:55:00Z |
|
| 2 |
| value |
0.02788 |
| scoring_system |
epss |
| scoring_elements |
0.86026 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.02788 |
| scoring_system |
epss |
| scoring_elements |
0.86014 |
| published_at |
2026-04-01T12:55:00Z |
|
| 4 |
| value |
0.02788 |
| scoring_system |
epss |
| scoring_elements |
0.86114 |
| published_at |
2026-04-24T12:55:00Z |
|
| 5 |
| value |
0.02788 |
| scoring_system |
epss |
| scoring_elements |
0.86094 |
| published_at |
2026-04-21T12:55:00Z |
|
| 6 |
| value |
0.02788 |
| scoring_system |
epss |
| scoring_elements |
0.86101 |
| published_at |
2026-04-18T12:55:00Z |
|
| 7 |
| value |
0.02788 |
| scoring_system |
epss |
| scoring_elements |
0.86096 |
| published_at |
2026-04-16T12:55:00Z |
|
| 8 |
| value |
0.02788 |
| scoring_system |
epss |
| scoring_elements |
0.86079 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.02788 |
| scoring_system |
epss |
| scoring_elements |
0.86083 |
| published_at |
2026-04-12T12:55:00Z |
|
| 10 |
| value |
0.02788 |
| scoring_system |
epss |
| scoring_elements |
0.86086 |
| published_at |
2026-04-11T12:55:00Z |
|
| 11 |
| value |
0.02788 |
| scoring_system |
epss |
| scoring_elements |
0.86072 |
| published_at |
2026-04-09T12:55:00Z |
|
| 12 |
| value |
0.02788 |
| scoring_system |
epss |
| scoring_elements |
0.86061 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-26934 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
|
| fixed_packages |
|
| aliases |
CVE-2020-26934, GHSA-6349-53vr-7hcr
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-mk34-h4nz-b3ey |
|
| 13 |
| url |
VCID-mwtw-n1tv-hfd9 |
| vulnerability_id |
VCID-mwtw-n1tv-hfd9 |
| summary |
Cross-site Scripting
Cross-site scripting (XSS) vulnerability in `db_central_columns.php` in phpMyAdm allows remote authenticated users to inject arbitrary web script or HTML via a crafted URL. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2018-7260 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00302 |
| scoring_system |
epss |
| scoring_elements |
0.53486 |
| published_at |
2026-04-26T12:55:00Z |
|
| 1 |
| value |
0.00302 |
| scoring_system |
epss |
| scoring_elements |
0.53399 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00302 |
| scoring_system |
epss |
| scoring_elements |
0.53422 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00302 |
| scoring_system |
epss |
| scoring_elements |
0.53448 |
| published_at |
2026-04-29T12:55:00Z |
|
| 4 |
| value |
0.00302 |
| scoring_system |
epss |
| scoring_elements |
0.53417 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00302 |
| scoring_system |
epss |
| scoring_elements |
0.53469 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00302 |
| scoring_system |
epss |
| scoring_elements |
0.53466 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00302 |
| scoring_system |
epss |
| scoring_elements |
0.53515 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00302 |
| scoring_system |
epss |
| scoring_elements |
0.53498 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00302 |
| scoring_system |
epss |
| scoring_elements |
0.53481 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00302 |
| scoring_system |
epss |
| scoring_elements |
0.53517 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.00302 |
| scoring_system |
epss |
| scoring_elements |
0.53522 |
| published_at |
2026-04-18T12:55:00Z |
|
| 12 |
| value |
0.00302 |
| scoring_system |
epss |
| scoring_elements |
0.53503 |
| published_at |
2026-04-21T12:55:00Z |
|
| 13 |
| value |
0.00302 |
| scoring_system |
epss |
| scoring_elements |
0.53472 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2018-7260 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
|
| fixed_packages |
|
| aliases |
CVE-2018-7260, GHSA-gqmj-f46x-wqhw
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-mwtw-n1tv-hfd9 |
|
| 14 |
| url |
VCID-ngtc-xtjn-xbhp |
| vulnerability_id |
VCID-ngtc-xtjn-xbhp |
| summary |
phpMyAdmin SQL injection vulnerability
In phpMyAdmin 4.x before 4.9.5 and 5.x before 5.0.2, a SQL injection vulnerability has been discovered where certain parameters are not properly escaped when generating certain queries for search actions in libraries/classes/Controllers/Table/TableSearchController.php. An attacker can generate a crafted database or table name. The attack can be performed if a user attempts certain search operations on the malicious database or table. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-10802 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01622 |
| scoring_system |
epss |
| scoring_elements |
0.8187 |
| published_at |
2026-04-16T12:55:00Z |
|
| 1 |
| value |
0.01622 |
| scoring_system |
epss |
| scoring_elements |
0.81779 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.01622 |
| scoring_system |
epss |
| scoring_elements |
0.81912 |
| published_at |
2026-04-29T12:55:00Z |
|
| 3 |
| value |
0.01622 |
| scoring_system |
epss |
| scoring_elements |
0.81907 |
| published_at |
2026-04-26T12:55:00Z |
|
| 4 |
| value |
0.01622 |
| scoring_system |
epss |
| scoring_elements |
0.81896 |
| published_at |
2026-04-24T12:55:00Z |
|
| 5 |
| value |
0.01622 |
| scoring_system |
epss |
| scoring_elements |
0.81873 |
| published_at |
2026-04-21T12:55:00Z |
|
| 6 |
| value |
0.01622 |
| scoring_system |
epss |
| scoring_elements |
0.81871 |
| published_at |
2026-04-18T12:55:00Z |
|
| 7 |
| value |
0.01622 |
| scoring_system |
epss |
| scoring_elements |
0.81826 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.01622 |
| scoring_system |
epss |
| scoring_elements |
0.818 |
| published_at |
2026-04-07T12:55:00Z |
|
| 9 |
| value |
0.01622 |
| scoring_system |
epss |
| scoring_elements |
0.81769 |
| published_at |
2026-04-01T12:55:00Z |
|
| 10 |
| value |
0.01622 |
| scoring_system |
epss |
| scoring_elements |
0.81802 |
| published_at |
2026-04-04T12:55:00Z |
|
| 11 |
| value |
0.01622 |
| scoring_system |
epss |
| scoring_elements |
0.81834 |
| published_at |
2026-04-13T12:55:00Z |
|
| 12 |
| value |
0.01622 |
| scoring_system |
epss |
| scoring_elements |
0.8184 |
| published_at |
2026-04-12T12:55:00Z |
|
| 13 |
| value |
0.01622 |
| scoring_system |
epss |
| scoring_elements |
0.81852 |
| published_at |
2026-04-11T12:55:00Z |
|
| 14 |
| value |
0.01622 |
| scoring_system |
epss |
| scoring_elements |
0.81833 |
| published_at |
2026-04-09T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-10802 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
|
| fixed_packages |
|
| aliases |
CVE-2020-10802, GHSA-f4cr-3xmc-2wpm
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-ngtc-xtjn-xbhp |
|
| 15 |
| url |
VCID-qcra-cu62-43he |
| vulnerability_id |
VCID-qcra-cu62-43he |
| summary |
Cross-site Scripting
In phpMyAdm, an XSS vulnerability was found in the navigation tree, where an attacker can deliver a payload to a user through a crafted `database/table` name. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2018-19970 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01501 |
| scoring_system |
epss |
| scoring_elements |
0.81108 |
| published_at |
2026-04-04T12:55:00Z |
|
| 1 |
| value |
0.01501 |
| scoring_system |
epss |
| scoring_elements |
0.8121 |
| published_at |
2026-04-29T12:55:00Z |
|
| 2 |
| value |
0.01501 |
| scoring_system |
epss |
| scoring_elements |
0.81205 |
| published_at |
2026-04-26T12:55:00Z |
|
| 3 |
| value |
0.01501 |
| scoring_system |
epss |
| scoring_elements |
0.81198 |
| published_at |
2026-04-24T12:55:00Z |
|
| 4 |
| value |
0.01501 |
| scoring_system |
epss |
| scoring_elements |
0.81175 |
| published_at |
2026-04-21T12:55:00Z |
|
| 5 |
| value |
0.01501 |
| scoring_system |
epss |
| scoring_elements |
0.81178 |
| published_at |
2026-04-18T12:55:00Z |
|
| 6 |
| value |
0.01501 |
| scoring_system |
epss |
| scoring_elements |
0.81176 |
| published_at |
2026-04-16T12:55:00Z |
|
| 7 |
| value |
0.01501 |
| scoring_system |
epss |
| scoring_elements |
0.81139 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.01501 |
| scoring_system |
epss |
| scoring_elements |
0.81146 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.01501 |
| scoring_system |
epss |
| scoring_elements |
0.81159 |
| published_at |
2026-04-11T12:55:00Z |
|
| 10 |
| value |
0.01501 |
| scoring_system |
epss |
| scoring_elements |
0.81141 |
| published_at |
2026-04-09T12:55:00Z |
|
| 11 |
| value |
0.01501 |
| scoring_system |
epss |
| scoring_elements |
0.81135 |
| published_at |
2026-04-08T12:55:00Z |
|
| 12 |
| value |
0.01501 |
| scoring_system |
epss |
| scoring_elements |
0.81074 |
| published_at |
2026-04-01T12:55:00Z |
|
| 13 |
| value |
0.01501 |
| scoring_system |
epss |
| scoring_elements |
0.81083 |
| published_at |
2026-04-02T12:55:00Z |
|
| 14 |
| value |
0.01501 |
| scoring_system |
epss |
| scoring_elements |
0.81107 |
| published_at |
2026-04-07T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2018-19970 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
|
| fixed_packages |
|
| aliases |
CVE-2018-19970, GHSA-8987-93fh-rcwq
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-qcra-cu62-43he |
|
| 16 |
| url |
VCID-scu3-cfyc-9qfz |
| vulnerability_id |
VCID-scu3-cfyc-9qfz |
| summary |
Cross-Site Request Forgery (CSRF)
A vulnerability was found that allows an attacker to trigger a CSRF attack against a phpMyAdmin user. The attacker can trick the user, for instance through a broken `<img>` tag pointing at the victim's phpMyAdmin database, and the attacker can potentially deliver a payload (such as a specific `INSERT` or `DELETE` statement) to the victim. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2019-12616 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.55051 |
| scoring_system |
epss |
| scoring_elements |
0.98047 |
| published_at |
2026-04-07T12:55:00Z |
|
| 1 |
| value |
0.55051 |
| scoring_system |
epss |
| scoring_elements |
0.98066 |
| published_at |
2026-04-29T12:55:00Z |
|
| 2 |
| value |
0.55051 |
| scoring_system |
epss |
| scoring_elements |
0.98061 |
| published_at |
2026-04-24T12:55:00Z |
|
| 3 |
| value |
0.55051 |
| scoring_system |
epss |
| scoring_elements |
0.98062 |
| published_at |
2026-04-26T12:55:00Z |
|
| 4 |
| value |
0.55051 |
| scoring_system |
epss |
| scoring_elements |
0.98065 |
| published_at |
2026-04-18T12:55:00Z |
|
| 5 |
| value |
0.55051 |
| scoring_system |
epss |
| scoring_elements |
0.98059 |
| published_at |
2026-04-13T12:55:00Z |
|
| 6 |
| value |
0.55051 |
| scoring_system |
epss |
| scoring_elements |
0.98058 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.55051 |
| scoring_system |
epss |
| scoring_elements |
0.98053 |
| published_at |
2026-04-09T12:55:00Z |
|
| 8 |
| value |
0.55051 |
| scoring_system |
epss |
| scoring_elements |
0.98038 |
| published_at |
2026-04-01T12:55:00Z |
|
| 9 |
| value |
0.55051 |
| scoring_system |
epss |
| scoring_elements |
0.98043 |
| published_at |
2026-04-02T12:55:00Z |
|
| 10 |
| value |
0.55051 |
| scoring_system |
epss |
| scoring_elements |
0.98052 |
| published_at |
2026-04-08T12:55:00Z |
|
| 11 |
| value |
0.55051 |
| scoring_system |
epss |
| scoring_elements |
0.98045 |
| published_at |
2026-04-04T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2019-12616 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
|
| fixed_packages |
|
| aliases |
CVE-2019-12616, GHSA-mfr9-pcm3-6mwc
|
| risk_score |
10.0 |
| exploitability |
2.0 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-scu3-cfyc-9qfz |
|
| 17 |
| url |
VCID-tks3-6uv4-kygf |
| vulnerability_id |
VCID-tks3-6uv4-kygf |
| summary |
phpMyAdmin SQL Injection
In phpMyAdmin 4.x before 4.9.5 and 5.x before 5.0.2, a SQL injection vulnerability was found in retrieval of the current username (in libraries/classes/Server/Privileges.php and libraries/classes/UserPassword.php). A malicious user with access to the server could create a crafted username, and then trick the victim into performing specific actions with that user account (such as editing its privileges). |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-10804 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.02444 |
| scoring_system |
epss |
| scoring_elements |
0.85237 |
| published_at |
2026-04-29T12:55:00Z |
|
| 1 |
| value |
0.02444 |
| scoring_system |
epss |
| scoring_elements |
0.85114 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.02444 |
| scoring_system |
epss |
| scoring_elements |
0.85127 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.02444 |
| scoring_system |
epss |
| scoring_elements |
0.85144 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.02444 |
| scoring_system |
epss |
| scoring_elements |
0.85147 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.02444 |
| scoring_system |
epss |
| scoring_elements |
0.85169 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.02444 |
| scoring_system |
epss |
| scoring_elements |
0.85177 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.02444 |
| scoring_system |
epss |
| scoring_elements |
0.85191 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.02444 |
| scoring_system |
epss |
| scoring_elements |
0.85189 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.02444 |
| scoring_system |
epss |
| scoring_elements |
0.85186 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.02444 |
| scoring_system |
epss |
| scoring_elements |
0.85207 |
| published_at |
2026-04-21T12:55:00Z |
|
| 11 |
| value |
0.02444 |
| scoring_system |
epss |
| scoring_elements |
0.85208 |
| published_at |
2026-04-18T12:55:00Z |
|
| 12 |
| value |
0.02444 |
| scoring_system |
epss |
| scoring_elements |
0.85231 |
| published_at |
2026-04-24T12:55:00Z |
|
| 13 |
| value |
0.02444 |
| scoring_system |
epss |
| scoring_elements |
0.85239 |
| published_at |
2026-04-26T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-10804 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
|
| fixed_packages |
|
| aliases |
CVE-2020-10804, GHSA-h65r-8fp8-w7cx
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-tks3-6uv4-kygf |
|
| 18 |
| url |
VCID-yfja-ssw3-skh1 |
| vulnerability_id |
VCID-yfja-ssw3-skh1 |
| summary |
Information Exposure
When the `AllowArbitraryServer` configuration setting is set to true, with the use of a rogue MySQL server, an attacker can read any file on the server that the web server's user can access. This is related to the `mysql.allow_local_infile` PHP configuration, and the inadvertent ignoring of `options(MYSQLI_OPT_LOCAL_INFILE` calls. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2019-6799 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.7658 |
| scoring_system |
epss |
| scoring_elements |
0.98935 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.7658 |
| scoring_system |
epss |
| scoring_elements |
0.98954 |
| published_at |
2026-04-29T12:55:00Z |
|
| 2 |
| value |
0.7658 |
| scoring_system |
epss |
| scoring_elements |
0.98952 |
| published_at |
2026-04-26T12:55:00Z |
|
| 3 |
| value |
0.7658 |
| scoring_system |
epss |
| scoring_elements |
0.98939 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.7658 |
| scoring_system |
epss |
| scoring_elements |
0.98937 |
| published_at |
2026-04-04T12:55:00Z |
|
| 5 |
| value |
0.7658 |
| scoring_system |
epss |
| scoring_elements |
0.9895 |
| published_at |
2026-04-24T12:55:00Z |
|
| 6 |
| value |
0.7658 |
| scoring_system |
epss |
| scoring_elements |
0.98948 |
| published_at |
2026-04-21T12:55:00Z |
|
| 7 |
| value |
0.7658 |
| scoring_system |
epss |
| scoring_elements |
0.98947 |
| published_at |
2026-04-18T12:55:00Z |
|
| 8 |
| value |
0.7658 |
| scoring_system |
epss |
| scoring_elements |
0.98946 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.7658 |
| scoring_system |
epss |
| scoring_elements |
0.98944 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.7658 |
| scoring_system |
epss |
| scoring_elements |
0.98943 |
| published_at |
2026-04-11T12:55:00Z |
|
| 11 |
| value |
0.7658 |
| scoring_system |
epss |
| scoring_elements |
0.98933 |
| published_at |
2026-04-01T12:55:00Z |
|
| 12 |
| value |
0.7658 |
| scoring_system |
epss |
| scoring_elements |
0.98941 |
| published_at |
2026-04-09T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2019-6799 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
| reference_url |
https://nvd.nist.gov/vuln/detail/CVE-2019-6799 |
| reference_id |
CVE-2019-6799 |
| reference_type |
|
| scores |
| 0 |
| value |
4.3 |
| scoring_system |
cvssv2 |
| scoring_elements |
AV:N/AC:M/Au:N/C:P/I:N/A:N |
|
| 1 |
| value |
5.9 |
| scoring_system |
cvssv3 |
| scoring_elements |
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N |
|
| 2 |
| value |
5.9 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N |
|
| 3 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://nvd.nist.gov/vuln/detail/CVE-2019-6799 |
|
| 11 |
|
| 12 |
|
|
| fixed_packages |
|
| aliases |
CVE-2019-6799, GHSA-c8wj-q36q-3wg4
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-yfja-ssw3-skh1 |
|
| 19 |
| url |
VCID-znfm-ak2t-mqdd |
| vulnerability_id |
VCID-znfm-ak2t-mqdd |
| summary |
phpMyAdmin SQL injection vulnerability
In phpMyAdmin 4.x before 4.9.5 and 5.x before 5.0.2, a SQL injection vulnerability was discovered where malicious code could be used to trigger an XSS attack through retrieving and displaying results (in tbl_get_field.php and libraries/classes/Display/Results.php). The attacker must be able to insert crafted data into certain database tables, which when retrieved (for instance, through the Browse tab) can trigger the XSS attack. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-10803 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.03554 |
| scoring_system |
epss |
| scoring_elements |
0.8773 |
| published_at |
2026-04-29T12:55:00Z |
|
| 1 |
| value |
0.03554 |
| scoring_system |
epss |
| scoring_elements |
0.87643 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.03554 |
| scoring_system |
epss |
| scoring_elements |
0.87653 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.03554 |
| scoring_system |
epss |
| scoring_elements |
0.87666 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.03554 |
| scoring_system |
epss |
| scoring_elements |
0.87667 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.03554 |
| scoring_system |
epss |
| scoring_elements |
0.87688 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.03554 |
| scoring_system |
epss |
| scoring_elements |
0.87694 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.03554 |
| scoring_system |
epss |
| scoring_elements |
0.87706 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.03554 |
| scoring_system |
epss |
| scoring_elements |
0.87699 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.03554 |
| scoring_system |
epss |
| scoring_elements |
0.87697 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.03554 |
| scoring_system |
epss |
| scoring_elements |
0.87712 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.03554 |
| scoring_system |
epss |
| scoring_elements |
0.87708 |
| published_at |
2026-04-21T12:55:00Z |
|
| 12 |
| value |
0.03554 |
| scoring_system |
epss |
| scoring_elements |
0.87726 |
| published_at |
2026-04-24T12:55:00Z |
|
| 13 |
| value |
0.03554 |
| scoring_system |
epss |
| scoring_elements |
0.87732 |
| published_at |
2026-04-26T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-10803 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
|
| fixed_packages |
|
| aliases |
CVE-2020-10803, GHSA-fcww-8wvc-38q9
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-znfm-ak2t-mqdd |
|
| 20 |
| url |
VCID-zyzp-aqd8-e3a9 |
| vulnerability_id |
VCID-zyzp-aqd8-e3a9 |
| summary |
phpMyAdmin Cross-Site Request Forgery (CSRF)
A CSRF issue in phpMyAdmin 4.9.0.1 allows deletion of any server in the Setup page. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2019-12922 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.4225 |
| scoring_system |
epss |
| scoring_elements |
0.97462 |
| published_at |
2026-04-29T12:55:00Z |
|
| 1 |
| value |
0.4225 |
| scoring_system |
epss |
| scoring_elements |
0.97422 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.4225 |
| scoring_system |
epss |
| scoring_elements |
0.97429 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.4225 |
| scoring_system |
epss |
| scoring_elements |
0.97433 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.4225 |
| scoring_system |
epss |
| scoring_elements |
0.97434 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.4225 |
| scoring_system |
epss |
| scoring_elements |
0.97441 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.4225 |
| scoring_system |
epss |
| scoring_elements |
0.97442 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.4225 |
| scoring_system |
epss |
| scoring_elements |
0.97445 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.4225 |
| scoring_system |
epss |
| scoring_elements |
0.97447 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.4225 |
| scoring_system |
epss |
| scoring_elements |
0.97456 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.4225 |
| scoring_system |
epss |
| scoring_elements |
0.9746 |
| published_at |
2026-04-26T12:55:00Z |
|
| 11 |
| value |
0.4225 |
| scoring_system |
epss |
| scoring_elements |
0.97459 |
| published_at |
2026-04-21T12:55:00Z |
|
| 12 |
| value |
0.4225 |
| scoring_system |
epss |
| scoring_elements |
0.97458 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2019-12922 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
|
| fixed_packages |
|
| aliases |
CVE-2019-12922, GHSA-4c9q-64gq-xhx4
|
| risk_score |
10.0 |
| exploitability |
2.0 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-zyzp-aqd8-e3a9 |
|