Lookup for vulnerable packages by Package URL.

GET /api/packages/74547?format=api
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "url": "http://public2.vulnerablecode.io/api/packages/74547?format=api",
    "purl": "pkg:ebuild/dev-db/phpmyadmin@4.0.5",
    "type": "ebuild",
    "namespace": "dev-db",
    "name": "phpmyadmin",
    "version": "4.0.5",
    "qualifiers": {},
    "subpath": "",
    "is_vulnerable": false,
    "next_non_vulnerable_version": "4.2.13",
    "latest_non_vulnerable_version": "5.2.0",
    "affected_by_vulnerabilities": [],
    "fixing_vulnerabilities": [
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/16013?format=api",
            "vulnerability_id": "VCID-1dhd-3ayw-6kg3",
            "summary": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')\nMultiple cross-site scripting (XSS) vulnerabilities in phpMyAdmin 3.5.x before 3.5.8.2 allow remote attackers to inject arbitrary web script or HTML via vectors involving a JavaScript event in (1) an anchor identifier to setup/index.php or (2) a chartTitle (aka chart title) value.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-4997",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00263",
                            "scoring_system": "epss",
                            "scoring_elements": "0.49604",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00263",
                            "scoring_system": "epss",
                            "scoring_elements": "0.497",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00263",
                            "scoring_system": "epss",
                            "scoring_elements": "0.49661",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00263",
                            "scoring_system": "epss",
                            "scoring_elements": "0.49629",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00263",
                            "scoring_system": "epss",
                            "scoring_elements": "0.49545",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00263",
                            "scoring_system": "epss",
                            "scoring_elements": "0.49607",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00263",
                            "scoring_system": "epss",
                            "scoring_elements": "0.49637",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00263",
                            "scoring_system": "epss",
                            "scoring_elements": "0.49664",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00263",
                            "scoring_system": "epss",
                            "scoring_elements": "0.49616",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00263",
                            "scoring_system": "epss",
                            "scoring_elements": "0.49671",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00263",
                            "scoring_system": "epss",
                            "scoring_elements": "0.49665",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00263",
                            "scoring_system": "epss",
                            "scoring_elements": "0.49682",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00263",
                            "scoring_system": "epss",
                            "scoring_elements": "0.49653",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00263",
                            "scoring_system": "epss",
                            "scoring_elements": "0.49655",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00263",
                            "scoring_system": "epss",
                            "scoring_elements": "0.49702",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-4997"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4997",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4997"
                },
                {
                    "reference_url": "https://github.com/phpmyadmin/composer",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/phpmyadmin/composer"
                },
                {
                    "reference_url": "http://www.phpmyadmin.net/home_page/security/PMASA-2013-9.php",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://www.phpmyadmin.net/home_page/security/PMASA-2013-9.php"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2013-4997",
                    "reference_id": "CVE-2013-4997",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-4997"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-5gh4-v2ch-pcx4",
                    "reference_id": "GHSA-5gh4-v2ch-pcx4",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "MODERATE",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-5gh4-v2ch-pcx4"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201311-02",
                    "reference_id": "GLSA-201311-02",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201311-02"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/74547?format=api",
                    "purl": "pkg:ebuild/dev-db/phpmyadmin@4.0.5",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/phpmyadmin@4.0.5"
                }
            ],
            "aliases": [
                "CVE-2013-4997",
                "GHSA-5gh4-v2ch-pcx4"
            ],
            "risk_score": 3.1,
            "exploitability": "0.5",
            "weighted_severity": "6.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-1dhd-3ayw-6kg3"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/36784?format=api",
            "vulnerability_id": "VCID-2n2q-cm1n-cqdr",
            "summary": "Multiple vulnerabilities have been found in phpMyAdmin, allowing\n    remote authenticated attackers to execute arbitrary code, inject SQL code\n    or conduct other attacks.",
            "references": [
                {
                    "reference_url": "http://archives.neohapsis.com/archives/bugtraq/2013-04/0217.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://archives.neohapsis.com/archives/bugtraq/2013-04/0217.html"
                },
                {
                    "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/104725.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/104725.html"
                },
                {
                    "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/104770.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/104770.html"
                },
                {
                    "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/104936.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/104936.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00181.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00181.html"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-3239",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.12333",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93853",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.12333",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9392",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.12333",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93909",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.12333",
                            "scoring_system": "epss",
                            "scoring_elements": "0.939",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.12333",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93903",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.12333",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93901",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.12333",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93895",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.12333",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93844",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.12333",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93856",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.12333",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93873",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.12333",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93868",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.12333",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93835",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.12333",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93864",
                            "published_at": "2026-04-08T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-3239"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3239",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3239"
                },
                {
                    "reference_url": "https://github.com/phpmyadmin/phpmyadmin",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/phpmyadmin/phpmyadmin"
                },
                {
                    "reference_url": "https://github.com/phpmyadmin/phpmyadmin/commit/1f6bc0b707002e26cab216b9e57b4d5de764de48",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/phpmyadmin/phpmyadmin/commit/1f6bc0b707002e26cab216b9e57b4d5de764de48"
                },
                {
                    "reference_url": "https://github.com/phpmyadmin/phpmyadmin/commit/d3fafdfba0807068196655e9b6d16c5d1d3ccf8a",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/phpmyadmin/phpmyadmin/commit/d3fafdfba0807068196655e9b6d16c5d1d3ccf8a"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2013-3239",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.6",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:H/Au:S/C:P/I:P/A:P"
                        },
                        {
                            "value": "8.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-3239"
                },
                {
                    "reference_url": "https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0133",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0133"
                },
                {
                    "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:160",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:160"
                },
                {
                    "reference_url": "http://www.phpmyadmin.net/home_page/security/PMASA-2013-3.php",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://www.phpmyadmin.net/home_page/security/PMASA-2013-3.php"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.0.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.0.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.0.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.1.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.1.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.1.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.2.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.2.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.2.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.2.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.2.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.2.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.2.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.2.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.2.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.3.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.3.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.3.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.5:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.5:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.5:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.7:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.7:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.7:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.7:rc1:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.7:rc1:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.7:rc1:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.8:rc1:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.8:rc1:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.8:rc1:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.0:rc2:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.0:rc2:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.0:rc2:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-gg36-9346-9qx9",
                    "reference_id": "GHSA-gg36-9346-9qx9",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "HIGH",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-gg36-9346-9qx9"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201311-02",
                    "reference_id": "GLSA-201311-02",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201311-02"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/74547?format=api",
                    "purl": "pkg:ebuild/dev-db/phpmyadmin@4.0.5",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/phpmyadmin@4.0.5"
                }
            ],
            "aliases": [
                "CVE-2013-3239",
                "GHSA-gg36-9346-9qx9"
            ],
            "risk_score": 10.0,
            "exploitability": "2.0",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-2n2q-cm1n-cqdr"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/36787?format=api",
            "vulnerability_id": "VCID-6e6k-vaj9-budk",
            "summary": "Multiple vulnerabilities have been found in phpMyAdmin, allowing\n    remote authenticated attackers to execute arbitrary code, inject SQL code\n    or conduct other attacks.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-4996",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00277",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51082",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00277",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51135",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00277",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51159",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00277",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51116",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00277",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51171",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00277",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51167",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00277",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51212",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00277",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5119",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00277",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51175",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00277",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51215",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00277",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51222",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00277",
                            "scoring_system": "epss",
                            "scoring_elements": "0.512",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00277",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51145",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00277",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51153",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00277",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51117",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00277",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51057",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00277",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51109",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-4996"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4995",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4995"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4996",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4996"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5002",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5002"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5003",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5003"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1879",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1879"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201311-02",
                    "reference_id": "GLSA-201311-02",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201311-02"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/74547?format=api",
                    "purl": "pkg:ebuild/dev-db/phpmyadmin@4.0.5",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/phpmyadmin@4.0.5"
                }
            ],
            "aliases": [
                "CVE-2013-4996"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6e6k-vaj9-budk"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/36793?format=api",
            "vulnerability_id": "VCID-6qw8-vmc8-yyfa",
            "summary": "Multiple vulnerabilities have been found in phpMyAdmin, allowing\n    remote authenticated attackers to execute arbitrary code, inject SQL code\n    or conduct other attacks.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-4999",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48286",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.0025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48322",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48343",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48295",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4835",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.0025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48344",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48369",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48342",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48354",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.0025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48405",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.0025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.484",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.0025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48339",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.0025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48298",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.0025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48213",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.0025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48276",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-4999"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4999",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4999"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201311-02",
                    "reference_id": "GLSA-201311-02",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201311-02"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/74547?format=api",
                    "purl": "pkg:ebuild/dev-db/phpmyadmin@4.0.5",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/phpmyadmin@4.0.5"
                }
            ],
            "aliases": [
                "CVE-2013-4999"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6qw8-vmc8-yyfa"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/36810?format=api",
            "vulnerability_id": "VCID-831x-uk8r-pqaa",
            "summary": "Multiple vulnerabilities have been found in phpMyAdmin, allowing\n    remote authenticated attackers to execute arbitrary code, inject SQL code\n    or conduct other attacks.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5029",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01725",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8235",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01725",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82365",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01725",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82382",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01725",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82378",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01725",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82406",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01725",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82414",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01725",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82432",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01725",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82429",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01725",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82423",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01725",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82458",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.01725",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8246",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.01725",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82465",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.01725",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82487",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.01725",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82497",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.01725",
                            "scoring_system": "epss",
                            "scoring_elements": "0.825",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.01725",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8252",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.01725",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8254",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5029"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5029",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5029"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201311-02",
                    "reference_id": "GLSA-201311-02",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201311-02"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/74547?format=api",
                    "purl": "pkg:ebuild/dev-db/phpmyadmin@4.0.5",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/phpmyadmin@4.0.5"
                }
            ],
            "aliases": [
                "CVE-2013-5029"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-831x-uk8r-pqaa"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/36783?format=api",
            "vulnerability_id": "VCID-cb4p-81h2-h7cb",
            "summary": "Multiple vulnerabilities have been found in phpMyAdmin, allowing\n    remote authenticated attackers to execute arbitrary code, inject SQL code\n    or conduct other attacks.",
            "references": [
                {
                    "reference_url": "http://archives.neohapsis.com/archives/bugtraq/2013-04/0217.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://archives.neohapsis.com/archives/bugtraq/2013-04/0217.html"
                },
                {
                    "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/104725.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/104725.html"
                },
                {
                    "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/104770.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/104770.html"
                },
                {
                    "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/104936.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/104936.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00181.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00181.html"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-3238",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.64584",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98471",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.64584",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98441",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.64584",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98444",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.64584",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98447",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.64584",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98449",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.64584",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98453",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.64584",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98454",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.64584",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98457",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.64584",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98456",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.64584",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98462",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.64584",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98463",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.64584",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98467",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.64584",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98466",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.64584",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98472",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-3238"
                },
                {
                    "reference_url": "https://github.com/phpmyadmin/phpmyadmin/commit/dedd542cdaf1606ca9aa3f6f8f8adb078d8ad549",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://github.com/phpmyadmin/phpmyadmin/commit/dedd542cdaf1606ca9aa3f6f8f8adb078d8ad549"
                },
                {
                    "reference_url": "https://github.com/phpmyadmin/phpmyadmin/commit/ffa720d90a79c1f33cf4c5a33403d09a67b42a66",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://github.com/phpmyadmin/phpmyadmin/commit/ffa720d90a79c1f33cf4c5a33403d09a67b42a66"
                },
                {
                    "reference_url": "https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0133",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0133"
                },
                {
                    "reference_url": "http://www.exploit-db.com/exploits/25136",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.exploit-db.com/exploits/25136"
                },
                {
                    "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:160",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:160"
                },
                {
                    "reference_url": "http://www.phpmyadmin.net/home_page/security/PMASA-2013-2.php",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.phpmyadmin.net/home_page/security/PMASA-2013-2.php"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.0.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.0.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.0.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.1.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.1.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.1.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.2.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.2.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.2.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.2.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.2.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.2.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.2.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.2.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.2.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.3.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.3.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.3.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.5:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.5:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.5:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.7:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.7:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.7:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.7:rc1:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.7:rc1:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.7:rc1:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.8:rc1:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.8:rc1:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.8:rc1:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.0:rc2:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.0:rc2:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.0:rc2:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2013-3238",
                    "reference_id": "CVE-2013-3238",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.0",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:S/C:P/I:P/A:P"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-3238"
                },
                {
                    "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/remote/25136.rb",
                    "reference_id": "CVE-2013-3238;OSVDB-92793",
                    "reference_type": "exploit",
                    "scores": [],
                    "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/remote/25136.rb"
                },
                {
                    "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/webapps/25003.txt",
                    "reference_id": "CVE-2013-3241;CVE-2013-3240;CVE-2013-3239;CVE-2013-3238;OSVDB-92795;OSVDB-92794;OSVDB-92793;OSVDB-92792",
                    "reference_type": "exploit",
                    "scores": [],
                    "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/webapps/25003.txt"
                },
                {
                    "reference_url": "http://www.waraxe.us/advisory-103.html",
                    "reference_id": "CVE-2013-3241;CVE-2013-3240;CVE-2013-3239;CVE-2013-3238;OSVDB-92795;OSVDB-92794;OSVDB-92793;OSVDB-92792",
                    "reference_type": "exploit",
                    "scores": [],
                    "url": "http://www.waraxe.us/advisory-103.html"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201311-02",
                    "reference_id": "GLSA-201311-02",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201311-02"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/74547?format=api",
                    "purl": "pkg:ebuild/dev-db/phpmyadmin@4.0.5",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/phpmyadmin@4.0.5"
                }
            ],
            "aliases": [
                "CVE-2013-3238"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-cb4p-81h2-h7cb"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/36790?format=api",
            "vulnerability_id": "VCID-jr29-bd8n-ryap",
            "summary": "Multiple vulnerabilities have been found in phpMyAdmin, allowing\n    remote authenticated attackers to execute arbitrary code, inject SQL code\n    or conduct other attacks.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-4998",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48286",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.0025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48322",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48343",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48295",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4835",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.0025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48344",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48369",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48342",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48354",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.0025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48405",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.0025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.484",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.0025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48339",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.0025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48298",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.0025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48213",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.0025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48276",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-4998"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4998",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4998"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201311-02",
                    "reference_id": "GLSA-201311-02",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201311-02"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/74547?format=api",
                    "purl": "pkg:ebuild/dev-db/phpmyadmin@4.0.5",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/phpmyadmin@4.0.5"
                }
            ],
            "aliases": [
                "CVE-2013-4998"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-jr29-bd8n-ryap"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/36803?format=api",
            "vulnerability_id": "VCID-jvq4-djby-zkhe",
            "summary": "Multiple vulnerabilities have been found in phpMyAdmin, allowing\n    remote authenticated attackers to execute arbitrary code, inject SQL code\n    or conduct other attacks.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5001",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00185",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40106",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00185",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40256",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00185",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4028",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00185",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40203",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00185",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40255",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00185",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40266",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00185",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40277",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00185",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40239",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00185",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4022",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00185",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40267",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00185",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40237",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00185",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40161",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00185",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39987",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00185",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39972",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00185",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39892",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00185",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39764",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00185",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39829",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5001"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5001",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5001"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201311-02",
                    "reference_id": "GLSA-201311-02",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201311-02"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/74547?format=api",
                    "purl": "pkg:ebuild/dev-db/phpmyadmin@4.0.5",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/phpmyadmin@4.0.5"
                }
            ],
            "aliases": [
                "CVE-2013-5001"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-jvq4-djby-zkhe"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/36806?format=api",
            "vulnerability_id": "VCID-q2be-73wp-tbav",
            "summary": "Multiple vulnerabilities have been found in phpMyAdmin, allowing\n    remote authenticated attackers to execute arbitrary code, inject SQL code\n    or conduct other attacks.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5002",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00209",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43083",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00209",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43216",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00209",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43137",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00209",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43005",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00209",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43232",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00209",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43288",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00209",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43317",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00209",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43254",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00209",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43305",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00209",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4332",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00209",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43341",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00209",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43309",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00209",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43293",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00209",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43355",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00209",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43344",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00209",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4328",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00209",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43214",
                            "published_at": "2026-04-24T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5002"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4995",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4995"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4996",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4996"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5002",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5002"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5003",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5003"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1879",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1879"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2013-5002",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "LOW",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-5002"
                },
                {
                    "reference_url": "http://www.phpmyadmin.net/home_page/security/PMASA-2013-14.php",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "LOW",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://www.phpmyadmin.net/home_page/security/PMASA-2013-14.php"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-p632-5w74-x8xx",
                    "reference_id": "GHSA-p632-5w74-x8xx",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "LOW",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-p632-5w74-x8xx"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201311-02",
                    "reference_id": "GLSA-201311-02",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201311-02"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/74547?format=api",
                    "purl": "pkg:ebuild/dev-db/phpmyadmin@4.0.5",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/phpmyadmin@4.0.5"
                }
            ],
            "aliases": [
                "CVE-2013-5002",
                "GHSA-p632-5w74-x8xx"
            ],
            "risk_score": 1.4,
            "exploitability": "0.5",
            "weighted_severity": "2.7",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-q2be-73wp-tbav"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/36785?format=api",
            "vulnerability_id": "VCID-tgrx-g8fs-qkhv",
            "summary": "Multiple vulnerabilities have been found in phpMyAdmin, allowing\n    remote authenticated attackers to execute arbitrary code, inject SQL code\n    or conduct other attacks.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-4995",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00209",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43232",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00209",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43288",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00209",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43317",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00209",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43254",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00209",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43305",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00209",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4332",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00209",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43341",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00209",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43309",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00209",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43293",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00209",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43355",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00209",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43344",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00209",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4328",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00209",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43214",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00209",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43216",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00209",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43137",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00209",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43005",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00209",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43083",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-4995"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4995",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4995"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4996",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4996"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5002",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5002"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5003",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5003"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1879",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1879"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201311-02",
                    "reference_id": "GLSA-201311-02",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201311-02"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/74547?format=api",
                    "purl": "pkg:ebuild/dev-db/phpmyadmin@4.0.5",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/phpmyadmin@4.0.5"
                }
            ],
            "aliases": [
                "CVE-2013-4995"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-tgrx-g8fs-qkhv"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/36798?format=api",
            "vulnerability_id": "VCID-u794-p9hy-k3cg",
            "summary": "Multiple vulnerabilities have been found in phpMyAdmin, allowing\n    remote authenticated attackers to execute arbitrary code, inject SQL code\n    or conduct other attacks.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5000",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48286",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.0025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48322",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48343",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48295",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4835",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.0025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48344",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48369",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48342",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48354",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.0025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48405",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.0025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.484",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.0025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48339",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.0025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48298",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.0025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48213",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.0025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48276",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5000"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5000",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5000"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201311-02",
                    "reference_id": "GLSA-201311-02",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201311-02"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/74547?format=api",
                    "purl": "pkg:ebuild/dev-db/phpmyadmin@4.0.5",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/phpmyadmin@4.0.5"
                }
            ],
            "aliases": [
                "CVE-2013-5000"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-u794-p9hy-k3cg"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/36782?format=api",
            "vulnerability_id": "VCID-uxne-zpub-tffp",
            "summary": "Multiple vulnerabilities have been found in phpMyAdmin, allowing\n    remote authenticated attackers to execute arbitrary code, inject SQL code\n    or conduct other attacks.",
            "references": [
                {
                    "reference_url": "http://archives.neohapsis.com/archives/fulldisclosure/2013-04/0101.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://archives.neohapsis.com/archives/fulldisclosure/2013-04/0101.html"
                },
                {
                    "reference_url": "http://immunityservices.blogspot.com/2019/02/cvss.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://immunityservices.blogspot.com/2019/02/cvss.html"
                },
                {
                    "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-April/103184.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-April/103184.html"
                },
                {
                    "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-April/103188.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-April/103188.html"
                },
                {
                    "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-April/103195.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-April/103195.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00181.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00181.html"
                },
                {
                    "reference_url": "http://openwall.com/lists/oss-security/2013/04/09/13",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://openwall.com/lists/oss-security/2013/04/09/13"
                },
                {
                    "reference_url": "http://packetstormsecurity.com/files/121205/phpMyAdmin-3.5.7-Cross-Site-Scripting.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://packetstormsecurity.com/files/121205/phpMyAdmin-3.5.7-Cross-Site-Scripting.html"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-1937",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.08106",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92123",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.08106",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9213",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.08106",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92137",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.08106",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92141",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.08106",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92153",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.08106",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92156",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.08106",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9216",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.08106",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92161",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.08766",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92527",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.08766",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92548",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.08766",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92525",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.08766",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9253",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.08766",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92536",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.08766",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92524",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.08766",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92528",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.08766",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92529",
                            "published_at": "2026-04-24T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-1937"
                },
                {
                    "reference_url": "https://github.com/phpmyadmin/phpmyadmin/commit/79089c9bc02c82c15419fd9d6496b8781ae08a5a",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://github.com/phpmyadmin/phpmyadmin/commit/79089c9bc02c82c15419fd9d6496b8781ae08a5a"
                },
                {
                    "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:144",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:144"
                },
                {
                    "reference_url": "http://www.phpmyadmin.net/home_page/security/PMASA-2013-1.php",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.phpmyadmin.net/home_page/security/PMASA-2013-1.php"
                },
                {
                    "reference_url": "http://www.waraxe.us/advisory-102.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.waraxe.us/advisory-102.html"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.0.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.0.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.0.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.1.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.1.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.1.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.2.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.2.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.2.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.2.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.2.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.2.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.2.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.2.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.2.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.3.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.3.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.3.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.5:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.5:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.5:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.7:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.7:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.7:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.7:rc1:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.7:rc1:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.7:rc1:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:*:rc1:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:phpmyadmin:phpmyadmin:*:rc1:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:*:rc1:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1937",
                    "reference_id": "CVE-2013-1937",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:P/A:N"
                        },
                        {
                            "value": "6.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1937"
                },
                {
                    "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/webapps/38440.txt",
                    "reference_id": "CVE-2013-1937;OSVDB-92201",
                    "reference_type": "exploit",
                    "scores": [],
                    "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/webapps/38440.txt"
                },
                {
                    "reference_url": "https://www.securityfocus.com/bid/58962/info",
                    "reference_id": "CVE-2013-1937;OSVDB-92201",
                    "reference_type": "exploit",
                    "scores": [],
                    "url": "https://www.securityfocus.com/bid/58962/info"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201311-02",
                    "reference_id": "GLSA-201311-02",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201311-02"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/74547?format=api",
                    "purl": "pkg:ebuild/dev-db/phpmyadmin@4.0.5",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/phpmyadmin@4.0.5"
                }
            ],
            "aliases": [
                "CVE-2013-1937"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-uxne-zpub-tffp"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/36808?format=api",
            "vulnerability_id": "VCID-x89g-7mcs-tuep",
            "summary": "Multiple vulnerabilities have been found in phpMyAdmin, allowing\n    remote authenticated attackers to execute arbitrary code, inject SQL code\n    or conduct other attacks.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5003",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00374",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58948",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00374",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59024",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00374",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59046",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00374",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59011",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00374",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59063",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00374",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59069",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00374",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59087",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00374",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5905",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00374",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59085",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00374",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5909",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00374",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59049",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00374",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59067",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00374",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59054",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00374",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59013",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5003"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4995",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4995"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4996",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4996"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5002",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5002"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5003",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5003"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1879",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1879"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201311-02",
                    "reference_id": "GLSA-201311-02",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201311-02"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/74547?format=api",
                    "purl": "pkg:ebuild/dev-db/phpmyadmin@4.0.5",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/phpmyadmin@4.0.5"
                }
            ],
            "aliases": [
                "CVE-2013-5003"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-x89g-7mcs-tuep"
        }
    ],
    "risk_score": null,
    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/phpmyadmin@4.0.5"
}