Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/935168?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/935168?format=api", "purl": "pkg:deb/debian/phpmyadmin@4:2.9.1.1-2?distro=trixie", "type": "deb", "namespace": "debian", "name": "phpmyadmin", "version": "4:2.9.1.1-2", "qualifiers": { "distro": "trixie" }, "subpath": "", "is_vulnerable": false, "next_non_vulnerable_version": "4:2.10.0.2-1", "latest_non_vulnerable_version": "4:5.2.3+dfsg-1", "affected_by_vulnerabilities": [], "fixing_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/91641?format=api", "vulnerability_id": "VCID-53wj-87ss-bkda", "summary": "Multiple unspecified vulnerabilities in phpMyAdmin before 2.9.2-rc1 have unknown impact and attack vectors.", "references": [ { "reference_url": "http://osvdb.org/32666", "reference_id": "", "reference_type": "", "scores": [], "url": "http://osvdb.org/32666" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2007-0203", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00745", "scoring_system": "epss", "scoring_elements": "0.73215", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00745", "scoring_system": "epss", "scoring_elements": "0.72985", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00745", "scoring_system": "epss", "scoring_elements": "0.72994", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00745", "scoring_system": "epss", "scoring_elements": "0.73014", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00745", "scoring_system": "epss", "scoring_elements": "0.7299", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00745", "scoring_system": "epss", "scoring_elements": "0.73027", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00745", "scoring_system": "epss", "scoring_elements": "0.73041", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00745", "scoring_system": "epss", "scoring_elements": "0.73065", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00745", "scoring_system": "epss", "scoring_elements": "0.73044", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00745", "scoring_system": "epss", "scoring_elements": "0.73038", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00745", "scoring_system": "epss", "scoring_elements": "0.73081", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00745", "scoring_system": "epss", "scoring_elements": "0.73091", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00745", "scoring_system": "epss", "scoring_elements": "0.73084", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00745", "scoring_system": "epss", "scoring_elements": "0.73123", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00745", "scoring_system": "epss", "scoring_elements": "0.73136", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00745", "scoring_system": "epss", "scoring_elements": "0.73135", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00745", "scoring_system": "epss", "scoring_elements": "0.73129", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00745", "scoring_system": "epss", "scoring_elements": "0.73155", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00745", "scoring_system": "epss", "scoring_elements": "0.73176", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00745", "scoring_system": "epss", "scoring_elements": "0.73159", "published_at": "2026-05-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2007-0203" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0203", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0203" }, { "reference_url": "http://secunia.com/advisories/23702", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/23702" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:199", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:199" }, { "reference_url": "http://www.phpmyadmin.net/home_page/downloads.php?relnotes=0", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.phpmyadmin.net/home_page/downloads.php?relnotes=0" }, { "reference_url": "http://www.securityfocus.com/bid/21987", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/21987" }, { "reference_url": "http://www.vupen.com/english/advisories/2007/0125", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2007/0125" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=406486", "reference_id": "406486", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=406486" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:phpmyadmin:phpmyadmin:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2007-0203", "reference_id": "CVE-2007-0203", "reference_type": "", "scores": [ { "value": "10.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:C/I:C/A:C" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2007-0203" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/935168?format=api", "purl": "pkg:deb/debian/phpmyadmin@4:2.9.1.1-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:2.9.1.1-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935143?format=api", "purl": "pkg:deb/debian/phpmyadmin@4:5.0.4%2Bdfsg2-2%2Bdeb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-na3j-h3qr-k7dc" }, { "vulnerability": "VCID-ndjn-p6gb-u7g4" }, { "vulnerability": "VCID-rqy8-n6fr-hqey" }, { "vulnerability": "VCID-zd8d-c1nk-g7a4" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:5.0.4%252Bdfsg2-2%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935141?format=api", "purl": "pkg:deb/debian/phpmyadmin@4:5.2.1%2Bdfsg-1%2Bdeb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-zd8d-c1nk-g7a4" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:5.2.1%252Bdfsg-1%252Bdeb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935145?format=api", "purl": "pkg:deb/debian/phpmyadmin@4:5.2.2-really%2Bdfsg-1%2Bdeb13u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:5.2.2-really%252Bdfsg-1%252Bdeb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935144?format=api", "purl": "pkg:deb/debian/phpmyadmin@4:5.2.3%2Bdfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:5.2.3%252Bdfsg-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2007-0203" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-53wj-87ss-bkda" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/91648?format=api", "vulnerability_id": "VCID-7v4j-ybp2-pfhs", "summary": "Cross-site scripting (XSS) vulnerability in phpMyAdmin 2.8.1 and earlier, when Microsoft Internet Explorer 6 is used, allows remote attackers to inject arbitrary web script or HTML via a javascript: URI in a CSS style in the convcharset parameter to the top-level URI, a different vulnerability than CVE-2005-0992.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2007-0341", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01171", "scoring_system": "epss", "scoring_elements": "0.78861", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.01171", "scoring_system": "epss", "scoring_elements": "0.78624", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01171", "scoring_system": "epss", "scoring_elements": "0.78631", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01171", "scoring_system": "epss", "scoring_elements": "0.78661", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01171", "scoring_system": "epss", "scoring_elements": "0.78642", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01171", "scoring_system": "epss", "scoring_elements": "0.78668", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01171", "scoring_system": "epss", "scoring_elements": "0.78675", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01171", "scoring_system": "epss", "scoring_elements": "0.787", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01171", "scoring_system": "epss", "scoring_elements": "0.78681", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01171", "scoring_system": "epss", "scoring_elements": "0.78674", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01171", "scoring_system": "epss", "scoring_elements": "0.78702", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01171", "scoring_system": "epss", "scoring_elements": "0.78696", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01171", "scoring_system": "epss", "scoring_elements": "0.78725", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01171", "scoring_system": "epss", "scoring_elements": "0.78733", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.01171", "scoring_system": "epss", "scoring_elements": "0.78749", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.01171", "scoring_system": "epss", "scoring_elements": "0.78769", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.01171", "scoring_system": "epss", "scoring_elements": "0.78792", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.01171", "scoring_system": "epss", "scoring_elements": "0.78808", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.01171", "scoring_system": "epss", "scoring_elements": "0.78805", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.01171", "scoring_system": "epss", "scoring_elements": "0.78822", "published_at": "2026-05-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2007-0341" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0341", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0341" }, { "reference_url": "http://www.securityfocus.com/archive/1/456698/100/0/threaded", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/archive/1/456698/100/0/threaded" }, { "reference_url": "http://www.securityfocus.com/archive/1/456726/100/0/threaded", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/archive/1/456726/100/0/threaded" }, { "reference_url": "http://www.virtuax.be/advisories/Advisory1-12012007.txt", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.virtuax.be/advisories/Advisory1-12012007.txt" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:2.8.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:phpmyadmin:phpmyadmin:2.8.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:2.8.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2007-0341", "reference_id": "CVE-2007-0341", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2007-0341" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/935168?format=api", "purl": "pkg:deb/debian/phpmyadmin@4:2.9.1.1-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:2.9.1.1-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935143?format=api", "purl": "pkg:deb/debian/phpmyadmin@4:5.0.4%2Bdfsg2-2%2Bdeb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-na3j-h3qr-k7dc" }, { "vulnerability": "VCID-ndjn-p6gb-u7g4" }, { "vulnerability": "VCID-rqy8-n6fr-hqey" }, { "vulnerability": "VCID-zd8d-c1nk-g7a4" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:5.0.4%252Bdfsg2-2%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935141?format=api", "purl": "pkg:deb/debian/phpmyadmin@4:5.2.1%2Bdfsg-1%2Bdeb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-zd8d-c1nk-g7a4" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:5.2.1%252Bdfsg-1%252Bdeb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935145?format=api", "purl": "pkg:deb/debian/phpmyadmin@4:5.2.2-really%2Bdfsg-1%2Bdeb13u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:5.2.2-really%252Bdfsg-1%252Bdeb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935144?format=api", "purl": "pkg:deb/debian/phpmyadmin@4:5.2.3%2Bdfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:5.2.3%252Bdfsg-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2007-0341" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "6.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7v4j-ybp2-pfhs" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/91632?format=api", "vulnerability_id": "VCID-bp8e-uxb2-n7hw", "summary": "phpMyAdmin before 2.9.1.1 allows remote attackers to bypass Allow/Deny access rules that use IP addresses via false headers.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2006-6944", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00363", "scoring_system": "epss", "scoring_elements": "0.58444", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00363", "scoring_system": "epss", "scoring_elements": "0.58243", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00363", "scoring_system": "epss", "scoring_elements": "0.58329", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00363", "scoring_system": "epss", "scoring_elements": "0.58349", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00363", "scoring_system": "epss", "scoring_elements": "0.58323", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00363", "scoring_system": "epss", "scoring_elements": "0.58376", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00363", "scoring_system": "epss", "scoring_elements": "0.58382", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00363", "scoring_system": "epss", "scoring_elements": "0.58399", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00363", "scoring_system": "epss", "scoring_elements": "0.58377", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00363", "scoring_system": "epss", "scoring_elements": "0.58357", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00363", "scoring_system": "epss", "scoring_elements": "0.58389", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00363", "scoring_system": "epss", "scoring_elements": "0.58393", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00363", "scoring_system": "epss", "scoring_elements": "0.5837", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00363", "scoring_system": "epss", "scoring_elements": "0.58331", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00363", "scoring_system": "epss", "scoring_elements": "0.58343", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00363", "scoring_system": "epss", "scoring_elements": "0.58328", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00363", "scoring_system": "epss", "scoring_elements": "0.58295", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00363", "scoring_system": "epss", "scoring_elements": "0.58337", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00363", "scoring_system": "epss", "scoring_elements": "0.58395", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00363", "scoring_system": "epss", "scoring_elements": "0.58348", "published_at": "2026-05-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2006-6944" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6944", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6944" }, { "reference_url": "http://secunia.com/advisories/26733", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/26733" }, { "reference_url": "http://www.phpmyadmin.net/home_page/security.php?issue=PMASA-2006-9", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.phpmyadmin.net/home_page/security.php?issue=PMASA-2006-9" }, { "reference_url": "http://www.us.debian.org/security/2007/dsa-1370", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.us.debian.org/security/2007/dsa-1370" }, { "reference_url": "http://www.vupen.com/english/advisories/2006/4572", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2006/4572" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:phpmyadmin:phpmyadmin:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:2.9.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:phpmyadmin:phpmyadmin:2.9.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:2.9.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:2.9.0.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:phpmyadmin:phpmyadmin:2.9.0.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:2.9.0.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:2.9.0.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:phpmyadmin:phpmyadmin:2.9.0.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:2.9.0.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:2.9.0.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:phpmyadmin:phpmyadmin:2.9.0.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:2.9.0.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:2.9.0_beta1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:phpmyadmin:phpmyadmin:2.9.0_beta1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:2.9.0_beta1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:2.9.0_rc1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:phpmyadmin:phpmyadmin:2.9.0_rc1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:2.9.0_rc1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:2.9.1_rc1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:phpmyadmin:phpmyadmin:2.9.1_rc1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:2.9.1_rc1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:2.9.1_rc2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:phpmyadmin:phpmyadmin:2.9.1_rc2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:2.9.1_rc2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2006-6944", "reference_id": "CVE-2006-6944", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-6944" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/935168?format=api", "purl": "pkg:deb/debian/phpmyadmin@4:2.9.1.1-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:2.9.1.1-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935143?format=api", "purl": "pkg:deb/debian/phpmyadmin@4:5.0.4%2Bdfsg2-2%2Bdeb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-na3j-h3qr-k7dc" }, { "vulnerability": "VCID-ndjn-p6gb-u7g4" }, { "vulnerability": "VCID-rqy8-n6fr-hqey" }, { "vulnerability": "VCID-zd8d-c1nk-g7a4" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:5.0.4%252Bdfsg2-2%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935141?format=api", "purl": "pkg:deb/debian/phpmyadmin@4:5.2.1%2Bdfsg-1%2Bdeb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-zd8d-c1nk-g7a4" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:5.2.1%252Bdfsg-1%252Bdeb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935145?format=api", "purl": "pkg:deb/debian/phpmyadmin@4:5.2.2-really%2Bdfsg-1%2Bdeb13u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:5.2.2-really%252Bdfsg-1%252Bdeb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935144?format=api", "purl": "pkg:deb/debian/phpmyadmin@4:5.2.3%2Bdfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:5.2.3%252Bdfsg-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2006-6944" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-bp8e-uxb2-n7hw" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60844?format=api", "vulnerability_id": "VCID-mf42-xrqt-9qf7", "summary": "Multiple vulnerabilities have been discovered in phpMyAdmin, the worst of\n which may allow for remote code execution.", "references": [ { "reference_url": "http://marc.info/?l=bugtraq&m=116370414309444&w=2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://marc.info/?l=bugtraq&m=116370414309444&w=2" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2006-6942", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02243", "scoring_system": "epss", "scoring_elements": "0.84726", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.02243", "scoring_system": "epss", "scoring_elements": "0.84489", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02243", "scoring_system": "epss", "scoring_elements": "0.84505", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02243", "scoring_system": "epss", "scoring_elements": "0.84526", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02243", "scoring_system": "epss", "scoring_elements": "0.84529", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02243", "scoring_system": "epss", "scoring_elements": "0.8455", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02243", "scoring_system": "epss", "scoring_elements": "0.84556", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02243", "scoring_system": "epss", "scoring_elements": "0.84575", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02243", "scoring_system": "epss", "scoring_elements": "0.8457", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02243", "scoring_system": "epss", "scoring_elements": "0.84566", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02243", "scoring_system": "epss", "scoring_elements": "0.84585", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.02243", "scoring_system": "epss", "scoring_elements": "0.84586", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.02243", "scoring_system": "epss", "scoring_elements": "0.84587", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.02243", "scoring_system": "epss", "scoring_elements": "0.84613", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.02243", "scoring_system": "epss", "scoring_elements": "0.84622", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.02243", "scoring_system": "epss", "scoring_elements": "0.84624", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.02243", "scoring_system": "epss", "scoring_elements": "0.84639", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.02243", "scoring_system": "epss", "scoring_elements": "0.84665", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.02243", "scoring_system": "epss", "scoring_elements": "0.84682", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.02243", "scoring_system": "epss", "scoring_elements": "0.84679", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.02243", "scoring_system": "epss", "scoring_elements": "0.84695", "published_at": "2026-05-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2006-6942" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6942", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6942" }, { "reference_url": "http://secunia.com/advisories/26733", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/26733" }, { "reference_url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30310", "reference_id": "", "reference_type": "", "scores": [], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30310" }, { "reference_url": "http://www.phpmyadmin.net/home_page/security.php?issue=PMASA-2006-7", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.phpmyadmin.net/home_page/security.php?issue=PMASA-2006-7" }, { "reference_url": "http://www.securityfocus.com/bid/21137", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/21137" }, { "reference_url": "http://www.us.debian.org/security/2007/dsa-1370", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.us.debian.org/security/2007/dsa-1370" }, { "reference_url": "http://www.vupen.com/english/advisories/2006/4572", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2006/4572" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:phpmyadmin:phpmyadmin:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:2.9.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:phpmyadmin:phpmyadmin:2.9.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:2.9.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:2.9.0.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:phpmyadmin:phpmyadmin:2.9.0.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:2.9.0.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:2.9.0.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:phpmyadmin:phpmyadmin:2.9.0.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:2.9.0.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:2.9.0.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:phpmyadmin:phpmyadmin:2.9.0.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:2.9.0.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:2.9.0_beta1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:phpmyadmin:phpmyadmin:2.9.0_beta1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:2.9.0_beta1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:2.9.0_rc1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:phpmyadmin:phpmyadmin:2.9.0_rc1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:2.9.0_rc1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:2.9.1_rc1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:phpmyadmin:phpmyadmin:2.9.1_rc1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:2.9.1_rc1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:2.9.1_rc2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:phpmyadmin:phpmyadmin:2.9.1_rc2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:2.9.1_rc2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2006-6942", "reference_id": "CVE-2006-6942", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-6942" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/webapps/29058.txt", "reference_id": "CVE-2006-6942;OSVDB-58821", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/webapps/29058.txt" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/webapps/29059.txt", "reference_id": "CVE-2006-6942;OSVDB-58822", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/webapps/29059.txt" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/webapps/29060.txt", "reference_id": "CVE-2006-6942;OSVDB-58823", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/webapps/29060.txt" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/webapps/29061.txt", "reference_id": "CVE-2006-6942;OSVDB-58824", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/webapps/29061.txt" }, { "reference_url": "https://www.securityfocus.com/bid/21137/info", "reference_id": "CVE-2006-6943;OSVDB-59227", "reference_type": "exploit", "scores": [], "url": "https://www.securityfocus.com/bid/21137/info" }, { "reference_url": "https://security.gentoo.org/glsa/200903-32", "reference_id": "GLSA-200903-32", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200903-32" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/935168?format=api", "purl": "pkg:deb/debian/phpmyadmin@4:2.9.1.1-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:2.9.1.1-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935143?format=api", "purl": "pkg:deb/debian/phpmyadmin@4:5.0.4%2Bdfsg2-2%2Bdeb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-na3j-h3qr-k7dc" }, { "vulnerability": "VCID-ndjn-p6gb-u7g4" }, { "vulnerability": "VCID-rqy8-n6fr-hqey" }, { "vulnerability": "VCID-zd8d-c1nk-g7a4" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:5.0.4%252Bdfsg2-2%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935141?format=api", "purl": "pkg:deb/debian/phpmyadmin@4:5.2.1%2Bdfsg-1%2Bdeb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-zd8d-c1nk-g7a4" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:5.2.1%252Bdfsg-1%252Bdeb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935145?format=api", "purl": "pkg:deb/debian/phpmyadmin@4:5.2.2-really%2Bdfsg-1%2Bdeb13u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:5.2.2-really%252Bdfsg-1%252Bdeb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935144?format=api", "purl": "pkg:deb/debian/phpmyadmin@4:5.2.3%2Bdfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:5.2.3%252Bdfsg-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2006-6942" ], "risk_score": 10.0, "exploitability": "2.0", "weighted_severity": "6.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-mf42-xrqt-9qf7" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/91631?format=api", "vulnerability_id": "VCID-n9cd-f892-r7by", "summary": "PhpMyAdmin before 2.9.1.1 allows remote attackers to obtain the full server path via direct requests to (a) scripts/check_lang.php and (b) themes/darkblue_orange/layout.inc.php; and via the (1) lang[], (2) target[], (3) db[], (4) goto[], (5) table[], and (6) tbl_group[] array arguments to (c) index.php, and the (7) back[] argument to (d) sql.php; and an invalid (8) sort_by parameter to (e) server_databases.php and (9) db parameter to (f) db_printview.php.", "references": [ { "reference_url": "http://marc.info/?l=bugtraq&m=116370414309444&w=2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://marc.info/?l=bugtraq&m=116370414309444&w=2" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2006-6943", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.1154", "scoring_system": "epss", "scoring_elements": "0.93706", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.1154", "scoring_system": "epss", "scoring_elements": "0.93591", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.1154", "scoring_system": "epss", "scoring_elements": "0.936", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.1154", "scoring_system": "epss", "scoring_elements": "0.93608", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.1154", "scoring_system": "epss", "scoring_elements": "0.9361", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.1154", "scoring_system": "epss", "scoring_elements": "0.93619", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.1154", "scoring_system": "epss", "scoring_elements": "0.93622", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.1154", "scoring_system": "epss", "scoring_elements": "0.93627", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.1154", "scoring_system": "epss", "scoring_elements": "0.93645", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.1154", "scoring_system": "epss", "scoring_elements": "0.93652", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.1154", "scoring_system": "epss", "scoring_elements": "0.93657", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.1154", "scoring_system": "epss", "scoring_elements": "0.93661", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.1154", "scoring_system": "epss", "scoring_elements": "0.9366", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.1154", "scoring_system": "epss", "scoring_elements": "0.93666", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.1154", "scoring_system": "epss", "scoring_elements": "0.93677", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.1154", "scoring_system": "epss", "scoring_elements": "0.93686", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.1154", "scoring_system": "epss", "scoring_elements": "0.93688", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.1154", "scoring_system": "epss", "scoring_elements": "0.93694", "published_at": "2026-05-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2006-6943" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6943", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6943" }, { "reference_url": "http://www.phpmyadmin.net/home_page/security.php?issue=PMASA-2006-8", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.phpmyadmin.net/home_page/security.php?issue=PMASA-2006-8" }, { "reference_url": "http://www.securityfocus.com/bid/21137", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/21137" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:phpmyadmin:phpmyadmin:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:2.9.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:phpmyadmin:phpmyadmin:2.9.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:2.9.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:2.9.0.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:phpmyadmin:phpmyadmin:2.9.0.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:2.9.0.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:2.9.0.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:phpmyadmin:phpmyadmin:2.9.0.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:2.9.0.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:2.9.0.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:phpmyadmin:phpmyadmin:2.9.0.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:2.9.0.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:2.9.0_beta1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:phpmyadmin:phpmyadmin:2.9.0_beta1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:2.9.0_beta1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:2.9.0_rc1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:phpmyadmin:phpmyadmin:2.9.0_rc1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:2.9.0_rc1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:2.9.1_rc1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:phpmyadmin:phpmyadmin:2.9.1_rc1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:2.9.1_rc1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:2.9.1_rc2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:phpmyadmin:phpmyadmin:2.9.1_rc2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:2.9.1_rc2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2006-6943", "reference_id": "CVE-2006-6943", "reference_type": "", "scores": [ { "value": "5.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:N/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-6943" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/webapps/29062.txt", "reference_id": "CVE-2006-6943;OSVDB-59227", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/webapps/29062.txt" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/935168?format=api", "purl": "pkg:deb/debian/phpmyadmin@4:2.9.1.1-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:2.9.1.1-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935143?format=api", "purl": "pkg:deb/debian/phpmyadmin@4:5.0.4%2Bdfsg2-2%2Bdeb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-na3j-h3qr-k7dc" }, { "vulnerability": "VCID-ndjn-p6gb-u7g4" }, { "vulnerability": "VCID-rqy8-n6fr-hqey" }, { "vulnerability": "VCID-zd8d-c1nk-g7a4" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:5.0.4%252Bdfsg2-2%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935141?format=api", "purl": "pkg:deb/debian/phpmyadmin@4:5.2.1%2Bdfsg-1%2Bdeb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-zd8d-c1nk-g7a4" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:5.2.1%252Bdfsg-1%252Bdeb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935145?format=api", "purl": "pkg:deb/debian/phpmyadmin@4:5.2.2-really%2Bdfsg-1%2Bdeb13u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:5.2.2-really%252Bdfsg-1%252Bdeb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935144?format=api", "purl": "pkg:deb/debian/phpmyadmin@4:5.2.3%2Bdfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:5.2.3%252Bdfsg-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2006-6943" ], "risk_score": 9.0, "exploitability": "2.0", "weighted_severity": "4.5", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-n9cd-f892-r7by" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/91642?format=api", "vulnerability_id": "VCID-rk3e-t7v8-vuac", "summary": "Multiple cross-site scripting (XSS) vulnerabilities in phpMyAdmin before 2.9.2-rc1 allow remote attackers to inject arbitrary web script or HTML via unspecified vectors. NOTE: some of these details are obtained from third party information.", "references": [ { "reference_url": "http://osvdb.org/32667", "reference_id": "", "reference_type": "", "scores": [], "url": "http://osvdb.org/32667" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2007-0204", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01631", "scoring_system": "epss", "scoring_elements": "0.82092", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.01631", "scoring_system": "epss", "scoring_elements": "0.81831", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01631", "scoring_system": "epss", "scoring_elements": "0.81842", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01631", "scoring_system": "epss", "scoring_elements": "0.81865", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01631", "scoring_system": "epss", "scoring_elements": "0.81861", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01631", "scoring_system": "epss", "scoring_elements": "0.81887", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01631", "scoring_system": "epss", "scoring_elements": "0.81894", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01631", "scoring_system": "epss", "scoring_elements": "0.81913", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01631", "scoring_system": "epss", "scoring_elements": "0.81901", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01631", "scoring_system": "epss", "scoring_elements": "0.81896", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01631", "scoring_system": "epss", "scoring_elements": "0.81932", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01631", "scoring_system": "epss", "scoring_elements": "0.81934", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01631", "scoring_system": "epss", "scoring_elements": "0.81957", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01631", "scoring_system": "epss", "scoring_elements": "0.81967", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.01631", "scoring_system": "epss", "scoring_elements": "0.81973", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.01631", "scoring_system": "epss", "scoring_elements": "0.81993", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.01631", "scoring_system": "epss", "scoring_elements": "0.82012", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.01631", "scoring_system": "epss", "scoring_elements": "0.82038", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.01631", "scoring_system": "epss", "scoring_elements": "0.82035", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.01631", "scoring_system": "epss", "scoring_elements": "0.82051", "published_at": "2026-05-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2007-0204" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0204", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0204" }, { "reference_url": "http://secunia.com/advisories/23702", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/23702" }, { "reference_url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/31387", "reference_id": "", "reference_type": "", "scores": [], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/31387" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:199", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:199" }, { "reference_url": "http://www.phpmyadmin.net/home_page/downloads.php?relnotes=0", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.phpmyadmin.net/home_page/downloads.php?relnotes=0" }, { "reference_url": "http://www.securityfocus.com/bid/21987", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/21987" }, { "reference_url": "http://www.vupen.com/english/advisories/2007/0125", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2007/0125" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=406486", "reference_id": "406486", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=406486" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:phpmyadmin:phpmyadmin:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmyadmin:phpmyadmin:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2007-0204", "reference_id": "CVE-2007-0204", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2007-0204" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/935168?format=api", "purl": "pkg:deb/debian/phpmyadmin@4:2.9.1.1-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:2.9.1.1-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935143?format=api", "purl": "pkg:deb/debian/phpmyadmin@4:5.0.4%2Bdfsg2-2%2Bdeb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-na3j-h3qr-k7dc" }, { "vulnerability": "VCID-ndjn-p6gb-u7g4" }, { "vulnerability": "VCID-rqy8-n6fr-hqey" }, { "vulnerability": "VCID-zd8d-c1nk-g7a4" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:5.0.4%252Bdfsg2-2%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935141?format=api", "purl": "pkg:deb/debian/phpmyadmin@4:5.2.1%2Bdfsg-1%2Bdeb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-zd8d-c1nk-g7a4" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:5.2.1%252Bdfsg-1%252Bdeb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935145?format=api", "purl": "pkg:deb/debian/phpmyadmin@4:5.2.2-really%2Bdfsg-1%2Bdeb13u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:5.2.2-really%252Bdfsg-1%252Bdeb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935144?format=api", "purl": "pkg:deb/debian/phpmyadmin@4:5.2.3%2Bdfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:5.2.3%252Bdfsg-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2007-0204" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "6.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-rk3e-t7v8-vuac" } ], "risk_score": null, "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:2.9.1.1-2%3Fdistro=trixie" }