Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/74547?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/74547?format=api", "purl": "pkg:ebuild/dev-db/phpmyadmin@4.0.5", "type": "ebuild", "namespace": "dev-db", "name": "phpmyadmin", "version": "4.0.5", "qualifiers": {}, "subpath": "", "is_vulnerable": false, "next_non_vulnerable_version": "4.2.13", "latest_non_vulnerable_version": "5.2.0", "affected_by_vulnerabilities": [], "fixing_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/16013?format=api", "vulnerability_id": "VCID-1dhd-3ayw-6kg3", "summary": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')\nMultiple cross-site scripting (XSS) vulnerabilities in phpMyAdmin 3.5.x before 3.5.8.2 allow remote attackers to inject arbitrary web script or HTML via vectors involving a JavaScript event in (1) an anchor identifier to setup/index.php or (2) a chartTitle (aka chart title) value.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-4997", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00263", "scoring_system": "epss", "scoring_elements": "0.49604", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00263", "scoring_system": "epss", "scoring_elements": "0.497", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00263", "scoring_system": "epss", "scoring_elements": "0.49661", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00263", "scoring_system": "epss", "scoring_elements": "0.49629", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00263", "scoring_system": "epss", "scoring_elements": "0.49545", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00263", "scoring_system": "epss", "scoring_elements": "0.49607", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00263", "scoring_system": "epss", "scoring_elements": "0.49637", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00263", "scoring_system": "epss", "scoring_elements": "0.49664", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00263", "scoring_system": "epss", "scoring_elements": "0.49616", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00263", "scoring_system": "epss", "scoring_elements": "0.49671", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00263", "scoring_system": "epss", "scoring_elements": "0.49665", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00263", "scoring_system": "epss", "scoring_elements": "0.49682", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00263", "scoring_system": "epss", "scoring_elements": "0.49653", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00263", "scoring_system": "epss", "scoring_elements": "0.49655", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00263", "scoring_system": "epss", "scoring_elements": "0.49702", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-4997" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4997", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4997" }, { "reference_url": "https://github.com/phpmyadmin/composer", "reference_id": "", "reference_type": "", "scores": [ { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/phpmyadmin/composer" }, { "reference_url": "http://www.phpmyadmin.net/home_page/security/PMASA-2013-9.php", "reference_id": "", "reference_type": "", "scores": [ { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "http://www.phpmyadmin.net/home_page/security/PMASA-2013-9.php" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2013-4997", "reference_id": "CVE-2013-4997", "reference_type": "", "scores": [ { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-4997" }, { "reference_url": "https://github.com/advisories/GHSA-5gh4-v2ch-pcx4", "reference_id": "GHSA-5gh4-v2ch-pcx4", "reference_type": "", "scores": [ { "value": "MODERATE", "scoring_system": "cvssv3.1_qr", "scoring_elements": "" } ], "url": "https://github.com/advisories/GHSA-5gh4-v2ch-pcx4" }, { "reference_url": "https://security.gentoo.org/glsa/201311-02", "reference_id": "GLSA-201311-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201311-02" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/74547?format=api", "purl": "pkg:ebuild/dev-db/phpmyadmin@4.0.5", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/phpmyadmin@4.0.5" } ], "aliases": [ "CVE-2013-4997", "GHSA-5gh4-v2ch-pcx4" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-1dhd-3ayw-6kg3" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/36784?format=api", "vulnerability_id": "VCID-2n2q-cm1n-cqdr", "summary": "Multiple vulnerabilities have been found in phpMyAdmin, allowing\n remote authenticated attackers to execute arbitrary code, inject SQL code\n or conduct other attacks.", "references": [ { "reference_url": "http://archives.neohapsis.com/archives/bugtraq/2013-04/0217.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://archives.neohapsis.com/archives/bugtraq/2013-04/0217.html" }, { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/104725.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/104725.html" }, { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/104770.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/104770.html" }, { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/104936.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/104936.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00181.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00181.html" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-3239", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.12333", "scoring_system": "epss", "scoring_elements": "0.93853", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.12333", "scoring_system": "epss", "scoring_elements": "0.9392", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.12333", "scoring_system": "epss", "scoring_elements": "0.93909", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.12333", "scoring_system": "epss", "scoring_elements": "0.939", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.12333", "scoring_system": "epss", "scoring_elements": "0.93903", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.12333", "scoring_system": "epss", "scoring_elements": "0.93901", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.12333", "scoring_system": "epss", "scoring_elements": "0.93895", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.12333", "scoring_system": "epss", "scoring_elements": "0.93844", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.12333", "scoring_system": "epss", "scoring_elements": "0.93856", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.12333", "scoring_system": "epss", "scoring_elements": "0.93873", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.12333", "scoring_system": "epss", "scoring_elements": "0.93868", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.12333", "scoring_system": "epss", "scoring_elements": "0.93835", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.12333", "scoring_system": "epss", "scoring_elements": "0.93864", "published_at": "2026-04-08T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-3239" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3239", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3239" }, { "reference_url": "https://github.com/phpmyadmin/phpmyadmin", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/phpmyadmin/phpmyadmin" }, { "reference_url": "https://github.com/phpmyadmin/phpmyadmin/commit/1f6bc0b707002e26cab216b9e57b4d5de764de48", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/phpmyadmin/phpmyadmin/commit/1f6bc0b707002e26cab216b9e57b4d5de764de48" }, { "reference_url": "https://github.com/phpmyadmin/phpmyadmin/commit/d3fafdfba0807068196655e9b6d16c5d1d3ccf8a", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/phpmyadmin/phpmyadmin/commit/d3fafdfba0807068196655e9b6d16c5d1d3ccf8a" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2013-3239", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.6", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:H/Au:S/C:P/I:P/A:P" }, { "value": "8.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-3239" }, { "reference_url": "https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0133", "reference_id": "", "reference_type": "", "scores": [], "url": "https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0133" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:160", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:160" }, { "reference_url": "http://www.phpmyadmin.net/home_page/security/PMASA-2013-3.php", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "http://www.phpmyadmin.net/home_page/security/PMASA-2013-3.php" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.0.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.0.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.0.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.1.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.1.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.1.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.2.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.2.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.2.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.2.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.2.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.2.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.2.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.2.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.2.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.3.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.3.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.3.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.7:rc1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.7:rc1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.7:rc1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.8:rc1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.8:rc1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.8:rc1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.0:rc2:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.0:rc2:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.0:rc2:*:*:*:*:*:*" }, { "reference_url": "https://github.com/advisories/GHSA-gg36-9346-9qx9", "reference_id": "GHSA-gg36-9346-9qx9", "reference_type": "", "scores": [ { "value": "HIGH", "scoring_system": "cvssv3.1_qr", "scoring_elements": "" } ], "url": "https://github.com/advisories/GHSA-gg36-9346-9qx9" }, { "reference_url": "https://security.gentoo.org/glsa/201311-02", "reference_id": "GLSA-201311-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201311-02" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/74547?format=api", "purl": "pkg:ebuild/dev-db/phpmyadmin@4.0.5", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/phpmyadmin@4.0.5" } ], "aliases": [ "CVE-2013-3239", "GHSA-gg36-9346-9qx9" ], "risk_score": 10.0, "exploitability": "2.0", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-2n2q-cm1n-cqdr" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/36787?format=api", "vulnerability_id": "VCID-6e6k-vaj9-budk", "summary": "Multiple vulnerabilities have been found in phpMyAdmin, allowing\n remote authenticated attackers to execute arbitrary code, inject SQL code\n or conduct other attacks.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-4996", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00277", "scoring_system": "epss", "scoring_elements": "0.51082", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00277", "scoring_system": "epss", "scoring_elements": "0.51135", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00277", "scoring_system": "epss", "scoring_elements": "0.51159", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00277", "scoring_system": "epss", "scoring_elements": "0.51116", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00277", "scoring_system": "epss", "scoring_elements": "0.51171", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00277", "scoring_system": "epss", "scoring_elements": "0.51167", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00277", "scoring_system": "epss", "scoring_elements": "0.51212", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00277", "scoring_system": "epss", "scoring_elements": "0.5119", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00277", "scoring_system": "epss", "scoring_elements": "0.51175", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00277", "scoring_system": "epss", "scoring_elements": "0.51215", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00277", "scoring_system": "epss", "scoring_elements": "0.51222", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00277", "scoring_system": "epss", "scoring_elements": "0.512", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00277", "scoring_system": "epss", "scoring_elements": "0.51145", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00277", "scoring_system": "epss", "scoring_elements": "0.51153", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00277", "scoring_system": "epss", "scoring_elements": "0.51117", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00277", "scoring_system": "epss", "scoring_elements": "0.51057", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00277", "scoring_system": "epss", "scoring_elements": "0.51109", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-4996" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4995", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4995" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4996", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4996" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5002", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5002" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5003", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5003" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1879", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1879" }, { "reference_url": "https://security.gentoo.org/glsa/201311-02", "reference_id": "GLSA-201311-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201311-02" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/74547?format=api", "purl": "pkg:ebuild/dev-db/phpmyadmin@4.0.5", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/phpmyadmin@4.0.5" } ], "aliases": [ "CVE-2013-4996" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6e6k-vaj9-budk" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/36793?format=api", "vulnerability_id": "VCID-6qw8-vmc8-yyfa", "summary": "Multiple vulnerabilities have been found in phpMyAdmin, allowing\n remote authenticated attackers to execute arbitrary code, inject SQL code\n or conduct other attacks.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-4999", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0025", "scoring_system": "epss", "scoring_elements": "0.48286", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0025", "scoring_system": "epss", "scoring_elements": "0.48322", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0025", "scoring_system": "epss", "scoring_elements": "0.48343", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0025", "scoring_system": "epss", "scoring_elements": "0.48295", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0025", "scoring_system": "epss", "scoring_elements": "0.4835", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.0025", "scoring_system": "epss", "scoring_elements": "0.48344", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0025", "scoring_system": "epss", "scoring_elements": "0.48369", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0025", "scoring_system": "epss", "scoring_elements": "0.48342", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0025", "scoring_system": "epss", "scoring_elements": "0.48354", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0025", "scoring_system": "epss", "scoring_elements": "0.48405", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0025", "scoring_system": "epss", "scoring_elements": "0.484", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0025", "scoring_system": "epss", "scoring_elements": "0.48339", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0025", "scoring_system": "epss", "scoring_elements": "0.48298", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.0025", "scoring_system": "epss", "scoring_elements": "0.48213", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.0025", "scoring_system": "epss", "scoring_elements": "0.48276", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-4999" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4999", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4999" }, { "reference_url": "https://security.gentoo.org/glsa/201311-02", "reference_id": "GLSA-201311-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201311-02" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/74547?format=api", "purl": "pkg:ebuild/dev-db/phpmyadmin@4.0.5", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/phpmyadmin@4.0.5" } ], "aliases": [ "CVE-2013-4999" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6qw8-vmc8-yyfa" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/36810?format=api", "vulnerability_id": "VCID-831x-uk8r-pqaa", "summary": "Multiple vulnerabilities have been found in phpMyAdmin, allowing\n remote authenticated attackers to execute arbitrary code, inject SQL code\n or conduct other attacks.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5029", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01725", "scoring_system": "epss", "scoring_elements": "0.8235", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01725", "scoring_system": "epss", "scoring_elements": "0.82365", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01725", "scoring_system": "epss", "scoring_elements": "0.82382", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01725", "scoring_system": "epss", "scoring_elements": "0.82378", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01725", "scoring_system": "epss", "scoring_elements": "0.82406", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01725", "scoring_system": "epss", "scoring_elements": "0.82414", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01725", "scoring_system": "epss", "scoring_elements": "0.82432", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01725", "scoring_system": "epss", "scoring_elements": "0.82429", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01725", "scoring_system": "epss", "scoring_elements": "0.82423", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01725", "scoring_system": "epss", "scoring_elements": "0.82458", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01725", "scoring_system": "epss", "scoring_elements": "0.8246", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01725", "scoring_system": "epss", "scoring_elements": "0.82465", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01725", "scoring_system": "epss", "scoring_elements": "0.82487", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01725", "scoring_system": "epss", "scoring_elements": "0.82497", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.01725", "scoring_system": "epss", "scoring_elements": "0.825", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.01725", "scoring_system": "epss", "scoring_elements": "0.8252", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.01725", "scoring_system": "epss", "scoring_elements": "0.8254", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5029" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5029", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5029" }, { "reference_url": "https://security.gentoo.org/glsa/201311-02", "reference_id": "GLSA-201311-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201311-02" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/74547?format=api", "purl": "pkg:ebuild/dev-db/phpmyadmin@4.0.5", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/phpmyadmin@4.0.5" } ], "aliases": [ "CVE-2013-5029" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-831x-uk8r-pqaa" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/36783?format=api", "vulnerability_id": "VCID-cb4p-81h2-h7cb", "summary": "Multiple vulnerabilities have been found in phpMyAdmin, allowing\n remote authenticated attackers to execute arbitrary code, inject SQL code\n or conduct other attacks.", "references": [ { "reference_url": "http://archives.neohapsis.com/archives/bugtraq/2013-04/0217.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://archives.neohapsis.com/archives/bugtraq/2013-04/0217.html" }, { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/104725.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/104725.html" }, { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/104770.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/104770.html" }, { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/104936.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/104936.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00181.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00181.html" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-3238", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.64584", "scoring_system": "epss", "scoring_elements": "0.98471", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.64584", "scoring_system": "epss", "scoring_elements": "0.98441", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.64584", "scoring_system": "epss", "scoring_elements": "0.98444", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.64584", "scoring_system": "epss", "scoring_elements": "0.98447", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.64584", "scoring_system": "epss", "scoring_elements": "0.98449", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.64584", "scoring_system": "epss", "scoring_elements": "0.98453", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.64584", "scoring_system": "epss", "scoring_elements": "0.98454", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.64584", "scoring_system": "epss", "scoring_elements": "0.98457", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.64584", "scoring_system": "epss", "scoring_elements": "0.98456", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.64584", "scoring_system": "epss", "scoring_elements": "0.98462", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.64584", "scoring_system": "epss", "scoring_elements": "0.98463", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.64584", "scoring_system": "epss", "scoring_elements": "0.98467", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.64584", "scoring_system": "epss", "scoring_elements": "0.98466", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.64584", "scoring_system": "epss", "scoring_elements": "0.98472", "published_at": "2026-05-05T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-3238" }, { "reference_url": "https://github.com/phpmyadmin/phpmyadmin/commit/dedd542cdaf1606ca9aa3f6f8f8adb078d8ad549", "reference_id": "", "reference_type": "", "scores": [], "url": "https://github.com/phpmyadmin/phpmyadmin/commit/dedd542cdaf1606ca9aa3f6f8f8adb078d8ad549" }, { "reference_url": "https://github.com/phpmyadmin/phpmyadmin/commit/ffa720d90a79c1f33cf4c5a33403d09a67b42a66", "reference_id": "", "reference_type": "", "scores": [], "url": "https://github.com/phpmyadmin/phpmyadmin/commit/ffa720d90a79c1f33cf4c5a33403d09a67b42a66" }, { "reference_url": "https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0133", "reference_id": "", "reference_type": "", "scores": [], "url": "https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0133" }, { "reference_url": "http://www.exploit-db.com/exploits/25136", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.exploit-db.com/exploits/25136" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:160", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:160" }, { "reference_url": "http://www.phpmyadmin.net/home_page/security/PMASA-2013-2.php", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.phpmyadmin.net/home_page/security/PMASA-2013-2.php" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.0.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.0.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.0.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.1.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.1.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.1.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.2.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.2.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.2.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.2.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.2.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.2.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.2.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.2.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.2.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.3.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.3.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.3.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.7:rc1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.7:rc1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.7:rc1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.8:rc1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.8:rc1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.8:rc1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.0:rc2:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.0:rc2:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.0:rc2:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2013-3238", "reference_id": "CVE-2013-3238", "reference_type": "", "scores": [ { "value": "6.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:S/C:P/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-3238" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/remote/25136.rb", "reference_id": "CVE-2013-3238;OSVDB-92793", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/remote/25136.rb" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/webapps/25003.txt", "reference_id": "CVE-2013-3241;CVE-2013-3240;CVE-2013-3239;CVE-2013-3238;OSVDB-92795;OSVDB-92794;OSVDB-92793;OSVDB-92792", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/webapps/25003.txt" }, { "reference_url": "http://www.waraxe.us/advisory-103.html", "reference_id": "CVE-2013-3241;CVE-2013-3240;CVE-2013-3239;CVE-2013-3238;OSVDB-92795;OSVDB-92794;OSVDB-92793;OSVDB-92792", "reference_type": "exploit", "scores": [], "url": "http://www.waraxe.us/advisory-103.html" }, { "reference_url": "https://security.gentoo.org/glsa/201311-02", "reference_id": "GLSA-201311-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201311-02" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/74547?format=api", "purl": "pkg:ebuild/dev-db/phpmyadmin@4.0.5", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/phpmyadmin@4.0.5" } ], "aliases": [ "CVE-2013-3238" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-cb4p-81h2-h7cb" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/36790?format=api", "vulnerability_id": "VCID-jr29-bd8n-ryap", "summary": "Multiple vulnerabilities have been found in phpMyAdmin, allowing\n remote authenticated attackers to execute arbitrary code, inject SQL code\n or conduct other attacks.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-4998", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0025", "scoring_system": "epss", "scoring_elements": "0.48286", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0025", "scoring_system": "epss", "scoring_elements": "0.48322", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0025", "scoring_system": "epss", "scoring_elements": "0.48343", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0025", "scoring_system": "epss", "scoring_elements": "0.48295", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0025", "scoring_system": "epss", "scoring_elements": "0.4835", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.0025", "scoring_system": "epss", "scoring_elements": "0.48344", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0025", "scoring_system": "epss", "scoring_elements": "0.48369", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0025", "scoring_system": "epss", "scoring_elements": "0.48342", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0025", "scoring_system": "epss", "scoring_elements": "0.48354", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0025", "scoring_system": "epss", "scoring_elements": "0.48405", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0025", "scoring_system": "epss", "scoring_elements": "0.484", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0025", "scoring_system": "epss", "scoring_elements": "0.48339", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0025", "scoring_system": "epss", "scoring_elements": "0.48298", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.0025", "scoring_system": "epss", "scoring_elements": "0.48213", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.0025", "scoring_system": "epss", "scoring_elements": "0.48276", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-4998" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4998", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4998" }, { "reference_url": "https://security.gentoo.org/glsa/201311-02", "reference_id": "GLSA-201311-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201311-02" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/74547?format=api", "purl": "pkg:ebuild/dev-db/phpmyadmin@4.0.5", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/phpmyadmin@4.0.5" } ], "aliases": [ "CVE-2013-4998" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-jr29-bd8n-ryap" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/36803?format=api", "vulnerability_id": "VCID-jvq4-djby-zkhe", "summary": "Multiple vulnerabilities have been found in phpMyAdmin, allowing\n remote authenticated attackers to execute arbitrary code, inject SQL code\n or conduct other attacks.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5001", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00185", "scoring_system": "epss", "scoring_elements": "0.40106", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00185", "scoring_system": "epss", "scoring_elements": "0.40256", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00185", "scoring_system": "epss", "scoring_elements": "0.4028", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00185", "scoring_system": "epss", "scoring_elements": "0.40203", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00185", "scoring_system": "epss", "scoring_elements": "0.40255", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00185", "scoring_system": "epss", "scoring_elements": "0.40266", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00185", "scoring_system": "epss", "scoring_elements": "0.40277", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00185", "scoring_system": "epss", "scoring_elements": "0.40239", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00185", "scoring_system": "epss", "scoring_elements": "0.4022", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00185", "scoring_system": "epss", "scoring_elements": "0.40267", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00185", "scoring_system": "epss", "scoring_elements": "0.40237", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00185", "scoring_system": "epss", "scoring_elements": "0.40161", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00185", "scoring_system": "epss", "scoring_elements": "0.39987", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00185", "scoring_system": "epss", "scoring_elements": "0.39972", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00185", "scoring_system": "epss", "scoring_elements": "0.39892", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00185", "scoring_system": "epss", "scoring_elements": "0.39764", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00185", "scoring_system": "epss", "scoring_elements": "0.39829", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5001" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5001", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5001" }, { "reference_url": "https://security.gentoo.org/glsa/201311-02", "reference_id": "GLSA-201311-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201311-02" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/74547?format=api", "purl": "pkg:ebuild/dev-db/phpmyadmin@4.0.5", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/phpmyadmin@4.0.5" } ], "aliases": [ "CVE-2013-5001" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-jvq4-djby-zkhe" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/36806?format=api", "vulnerability_id": "VCID-q2be-73wp-tbav", "summary": "Multiple vulnerabilities have been found in phpMyAdmin, allowing\n remote authenticated attackers to execute arbitrary code, inject SQL code\n or conduct other attacks.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5002", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00209", "scoring_system": "epss", "scoring_elements": "0.43083", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00209", "scoring_system": "epss", "scoring_elements": "0.43216", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00209", "scoring_system": "epss", "scoring_elements": "0.43137", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00209", "scoring_system": "epss", "scoring_elements": "0.43005", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00209", "scoring_system": "epss", "scoring_elements": "0.43232", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00209", "scoring_system": "epss", "scoring_elements": "0.43288", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00209", "scoring_system": "epss", "scoring_elements": "0.43317", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00209", "scoring_system": "epss", "scoring_elements": "0.43254", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00209", "scoring_system": "epss", "scoring_elements": "0.43305", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00209", "scoring_system": "epss", "scoring_elements": "0.4332", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00209", "scoring_system": "epss", "scoring_elements": "0.43341", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00209", "scoring_system": "epss", "scoring_elements": "0.43309", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00209", "scoring_system": "epss", "scoring_elements": "0.43293", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00209", "scoring_system": "epss", "scoring_elements": "0.43355", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00209", "scoring_system": "epss", "scoring_elements": "0.43344", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00209", "scoring_system": "epss", "scoring_elements": "0.4328", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00209", "scoring_system": "epss", "scoring_elements": "0.43214", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5002" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4995", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4995" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4996", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4996" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5002", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5002" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5003", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5003" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1879", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1879" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2013-5002", "reference_id": "", "reference_type": "", "scores": [ { "value": "LOW", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-5002" }, { "reference_url": "http://www.phpmyadmin.net/home_page/security/PMASA-2013-14.php", "reference_id": "", "reference_type": "", "scores": [ { "value": "LOW", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "http://www.phpmyadmin.net/home_page/security/PMASA-2013-14.php" }, { "reference_url": "https://github.com/advisories/GHSA-p632-5w74-x8xx", "reference_id": "GHSA-p632-5w74-x8xx", "reference_type": "", "scores": [ { "value": "LOW", "scoring_system": "cvssv3.1_qr", "scoring_elements": "" } ], "url": "https://github.com/advisories/GHSA-p632-5w74-x8xx" }, { "reference_url": "https://security.gentoo.org/glsa/201311-02", "reference_id": "GLSA-201311-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201311-02" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/74547?format=api", "purl": "pkg:ebuild/dev-db/phpmyadmin@4.0.5", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/phpmyadmin@4.0.5" } ], "aliases": [ "CVE-2013-5002", "GHSA-p632-5w74-x8xx" ], "risk_score": 1.4, "exploitability": "0.5", "weighted_severity": "2.7", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-q2be-73wp-tbav" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/36785?format=api", "vulnerability_id": "VCID-tgrx-g8fs-qkhv", "summary": "Multiple vulnerabilities have been found in phpMyAdmin, allowing\n remote authenticated attackers to execute arbitrary code, inject SQL code\n or conduct other attacks.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-4995", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00209", "scoring_system": "epss", "scoring_elements": "0.43232", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00209", "scoring_system": "epss", "scoring_elements": "0.43288", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00209", "scoring_system": "epss", "scoring_elements": "0.43317", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00209", "scoring_system": "epss", "scoring_elements": "0.43254", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00209", "scoring_system": "epss", "scoring_elements": "0.43305", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00209", "scoring_system": "epss", "scoring_elements": "0.4332", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00209", "scoring_system": "epss", "scoring_elements": "0.43341", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00209", "scoring_system": "epss", "scoring_elements": "0.43309", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00209", "scoring_system": "epss", "scoring_elements": "0.43293", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00209", "scoring_system": "epss", "scoring_elements": "0.43355", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00209", "scoring_system": "epss", "scoring_elements": "0.43344", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00209", "scoring_system": "epss", "scoring_elements": "0.4328", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00209", "scoring_system": "epss", "scoring_elements": "0.43214", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00209", "scoring_system": "epss", "scoring_elements": "0.43216", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00209", "scoring_system": "epss", "scoring_elements": "0.43137", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00209", "scoring_system": "epss", "scoring_elements": "0.43005", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00209", "scoring_system": "epss", "scoring_elements": "0.43083", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-4995" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4995", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4995" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4996", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4996" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5002", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5002" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5003", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5003" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1879", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1879" }, { "reference_url": "https://security.gentoo.org/glsa/201311-02", "reference_id": "GLSA-201311-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201311-02" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/74547?format=api", "purl": "pkg:ebuild/dev-db/phpmyadmin@4.0.5", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/phpmyadmin@4.0.5" } ], "aliases": [ "CVE-2013-4995" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-tgrx-g8fs-qkhv" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/36798?format=api", "vulnerability_id": "VCID-u794-p9hy-k3cg", "summary": "Multiple vulnerabilities have been found in phpMyAdmin, allowing\n remote authenticated attackers to execute arbitrary code, inject SQL code\n or conduct other attacks.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5000", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0025", "scoring_system": "epss", "scoring_elements": "0.48286", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0025", "scoring_system": "epss", "scoring_elements": "0.48322", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0025", "scoring_system": "epss", "scoring_elements": "0.48343", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0025", "scoring_system": "epss", "scoring_elements": "0.48295", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0025", "scoring_system": "epss", "scoring_elements": "0.4835", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.0025", "scoring_system": "epss", "scoring_elements": "0.48344", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0025", "scoring_system": "epss", "scoring_elements": "0.48369", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0025", "scoring_system": "epss", "scoring_elements": "0.48342", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0025", "scoring_system": "epss", "scoring_elements": "0.48354", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0025", "scoring_system": "epss", "scoring_elements": "0.48405", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0025", "scoring_system": "epss", "scoring_elements": "0.484", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0025", "scoring_system": "epss", "scoring_elements": "0.48339", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0025", "scoring_system": "epss", "scoring_elements": "0.48298", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.0025", "scoring_system": "epss", "scoring_elements": "0.48213", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.0025", "scoring_system": "epss", "scoring_elements": "0.48276", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5000" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5000", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5000" }, { "reference_url": "https://security.gentoo.org/glsa/201311-02", "reference_id": "GLSA-201311-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201311-02" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/74547?format=api", "purl": "pkg:ebuild/dev-db/phpmyadmin@4.0.5", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/phpmyadmin@4.0.5" } ], "aliases": [ "CVE-2013-5000" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-u794-p9hy-k3cg" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/36782?format=api", "vulnerability_id": "VCID-uxne-zpub-tffp", "summary": "Multiple vulnerabilities have been found in phpMyAdmin, allowing\n remote authenticated attackers to execute arbitrary code, inject SQL code\n or conduct other attacks.", "references": [ { "reference_url": "http://archives.neohapsis.com/archives/fulldisclosure/2013-04/0101.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://archives.neohapsis.com/archives/fulldisclosure/2013-04/0101.html" }, { "reference_url": "http://immunityservices.blogspot.com/2019/02/cvss.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://immunityservices.blogspot.com/2019/02/cvss.html" }, { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-April/103184.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-April/103184.html" }, { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-April/103188.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-April/103188.html" }, { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-April/103195.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-April/103195.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00181.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00181.html" }, { "reference_url": "http://openwall.com/lists/oss-security/2013/04/09/13", "reference_id": "", "reference_type": "", "scores": [], "url": "http://openwall.com/lists/oss-security/2013/04/09/13" }, { "reference_url": "http://packetstormsecurity.com/files/121205/phpMyAdmin-3.5.7-Cross-Site-Scripting.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://packetstormsecurity.com/files/121205/phpMyAdmin-3.5.7-Cross-Site-Scripting.html" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-1937", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.08106", "scoring_system": "epss", "scoring_elements": "0.92123", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.08106", "scoring_system": "epss", "scoring_elements": "0.9213", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.08106", "scoring_system": "epss", "scoring_elements": "0.92137", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.08106", "scoring_system": "epss", "scoring_elements": "0.92141", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.08106", "scoring_system": "epss", "scoring_elements": "0.92153", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.08106", "scoring_system": "epss", "scoring_elements": "0.92156", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.08106", "scoring_system": "epss", "scoring_elements": "0.9216", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.08106", "scoring_system": "epss", "scoring_elements": "0.92161", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.08766", "scoring_system": "epss", "scoring_elements": "0.92527", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.08766", "scoring_system": "epss", "scoring_elements": "0.92548", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.08766", "scoring_system": "epss", "scoring_elements": "0.92525", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.08766", "scoring_system": "epss", "scoring_elements": "0.9253", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.08766", "scoring_system": "epss", "scoring_elements": "0.92536", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.08766", "scoring_system": "epss", "scoring_elements": "0.92524", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.08766", "scoring_system": "epss", "scoring_elements": "0.92528", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.08766", "scoring_system": "epss", "scoring_elements": "0.92529", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-1937" }, { "reference_url": "https://github.com/phpmyadmin/phpmyadmin/commit/79089c9bc02c82c15419fd9d6496b8781ae08a5a", "reference_id": "", "reference_type": "", "scores": [], "url": "https://github.com/phpmyadmin/phpmyadmin/commit/79089c9bc02c82c15419fd9d6496b8781ae08a5a" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:144", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:144" }, { "reference_url": "http://www.phpmyadmin.net/home_page/security/PMASA-2013-1.php", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.phpmyadmin.net/home_page/security/PMASA-2013-1.php" }, { "reference_url": "http://www.waraxe.us/advisory-102.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.waraxe.us/advisory-102.html" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.0.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.0.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.0.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.1.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.1.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.1.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.2.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.2.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.2.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.2.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.2.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.2.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.2.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.2.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.2.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.3.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.3.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.3.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.7:rc1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.7:rc1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.7:rc1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:*:rc1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:phpmyadmin:phpmyadmin:*:rc1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:*:rc1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1937", "reference_id": "CVE-2013-1937", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:P/A:N" }, { "value": "6.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1937" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/webapps/38440.txt", "reference_id": "CVE-2013-1937;OSVDB-92201", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/webapps/38440.txt" }, { "reference_url": "https://www.securityfocus.com/bid/58962/info", "reference_id": "CVE-2013-1937;OSVDB-92201", "reference_type": "exploit", "scores": [], "url": "https://www.securityfocus.com/bid/58962/info" }, { "reference_url": "https://security.gentoo.org/glsa/201311-02", "reference_id": "GLSA-201311-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201311-02" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/74547?format=api", "purl": "pkg:ebuild/dev-db/phpmyadmin@4.0.5", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/phpmyadmin@4.0.5" } ], "aliases": [ "CVE-2013-1937" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-uxne-zpub-tffp" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/36808?format=api", "vulnerability_id": "VCID-x89g-7mcs-tuep", "summary": "Multiple vulnerabilities have been found in phpMyAdmin, allowing\n remote authenticated attackers to execute arbitrary code, inject SQL code\n or conduct other attacks.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5003", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00374", "scoring_system": "epss", "scoring_elements": "0.58948", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00374", "scoring_system": "epss", "scoring_elements": "0.59024", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00374", "scoring_system": "epss", "scoring_elements": "0.59046", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00374", "scoring_system": "epss", "scoring_elements": "0.59011", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00374", "scoring_system": "epss", "scoring_elements": "0.59063", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00374", "scoring_system": "epss", "scoring_elements": "0.59069", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00374", "scoring_system": "epss", "scoring_elements": "0.59087", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00374", "scoring_system": "epss", "scoring_elements": "0.5905", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00374", "scoring_system": "epss", "scoring_elements": "0.59085", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00374", "scoring_system": "epss", "scoring_elements": "0.5909", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00374", "scoring_system": "epss", "scoring_elements": "0.59049", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00374", "scoring_system": "epss", "scoring_elements": "0.59067", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00374", "scoring_system": "epss", "scoring_elements": "0.59054", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00374", "scoring_system": "epss", "scoring_elements": "0.59013", "published_at": "2026-05-05T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5003" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4995", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4995" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4996", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4996" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5002", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5002" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5003", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5003" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1879", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1879" }, { "reference_url": "https://security.gentoo.org/glsa/201311-02", "reference_id": "GLSA-201311-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201311-02" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/74547?format=api", "purl": "pkg:ebuild/dev-db/phpmyadmin@4.0.5", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/phpmyadmin@4.0.5" } ], "aliases": [ "CVE-2013-5003" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-x89g-7mcs-tuep" } ], "risk_score": null, "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/phpmyadmin@4.0.5" }