Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/935230?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/935230?format=api", "purl": "pkg:deb/debian/phpmyadmin@4:4.6.6-1?distro=trixie", "type": "deb", "namespace": "debian", "name": "phpmyadmin", "version": "4:4.6.6-1", "qualifiers": { "distro": "trixie" }, "subpath": "", "is_vulnerable": false, "next_non_vulnerable_version": "4:4.6.6-2", "latest_non_vulnerable_version": "4:5.2.3+dfsg-1", "affected_by_vulnerabilities": [], "fixing_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/8001?format=api", "vulnerability_id": "VCID-24e9-fnt7-jqdu", "summary": "Improper Input Validation\nphpMyAdmin is vulnerable to a DoS attack in the replication status by using a specially crafted table name.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-1000018", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01295", "scoring_system": "epss", "scoring_elements": "0.79887", "published_at": "2026-05-16T12:55:00Z" }, { "value": "0.01295", "scoring_system": "epss", "scoring_elements": "0.79787", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.01295", "scoring_system": "epss", "scoring_elements": "0.79813", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.01295", "scoring_system": "epss", "scoring_elements": "0.79829", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.01295", "scoring_system": "epss", "scoring_elements": "0.79825", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.01295", "scoring_system": "epss", "scoring_elements": "0.7984", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.01295", "scoring_system": "epss", "scoring_elements": "0.79878", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.01295", "scoring_system": "epss", "scoring_elements": "0.79884", "published_at": "2026-05-15T12:55:00Z" }, { "value": "0.01295", "scoring_system": "epss", "scoring_elements": "0.79639", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01295", "scoring_system": "epss", "scoring_elements": "0.79646", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01295", "scoring_system": "epss", "scoring_elements": "0.79667", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01295", "scoring_system": "epss", "scoring_elements": "0.79654", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01295", "scoring_system": "epss", "scoring_elements": "0.79683", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01295", "scoring_system": "epss", "scoring_elements": "0.7969", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01295", "scoring_system": "epss", "scoring_elements": "0.79711", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01295", "scoring_system": "epss", "scoring_elements": "0.79695", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01295", "scoring_system": "epss", "scoring_elements": "0.79688", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01295", "scoring_system": "epss", "scoring_elements": "0.79717", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01295", "scoring_system": "epss", "scoring_elements": "0.7972", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01295", "scoring_system": "epss", "scoring_elements": "0.79751", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01295", "scoring_system": "epss", "scoring_elements": "0.79758", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.01295", "scoring_system": "epss", "scoring_elements": "0.79773", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-1000018" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000018", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000018" }, { "reference_url": "https://web.archive.org/web/20210123220317/http://www.securityfocus.com/bid/95738", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://web.archive.org/web/20210123220317/http://www.securityfocus.com/bid/95738" }, { "reference_url": "https://www.phpmyadmin.net/security/PMASA-2017-7", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.phpmyadmin.net/security/PMASA-2017-7" }, { "reference_url": "http://www.securityfocus.com/bid/95738", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/95738" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-1000018", "reference_id": "CVE-2017-1000018", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-1000018" }, { "reference_url": "https://github.com/advisories/GHSA-47qr-f86f-3wm4", "reference_id": "GHSA-47qr-f86f-3wm4", "reference_type": "", "scores": [ { "value": "HIGH", "scoring_system": "cvssv3.1_qr", "scoring_elements": "" } ], "url": "https://github.com/advisories/GHSA-47qr-f86f-3wm4" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/935230?format=api", "purl": "pkg:deb/debian/phpmyadmin@4:4.6.6-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:4.6.6-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935143?format=api", "purl": "pkg:deb/debian/phpmyadmin@4:5.0.4%2Bdfsg2-2%2Bdeb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-na3j-h3qr-k7dc" }, { "vulnerability": "VCID-ndjn-p6gb-u7g4" }, { "vulnerability": "VCID-rqy8-n6fr-hqey" }, { "vulnerability": "VCID-zd8d-c1nk-g7a4" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:5.0.4%252Bdfsg2-2%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935141?format=api", "purl": "pkg:deb/debian/phpmyadmin@4:5.2.1%2Bdfsg-1%2Bdeb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-zd8d-c1nk-g7a4" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:5.2.1%252Bdfsg-1%252Bdeb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935145?format=api", "purl": "pkg:deb/debian/phpmyadmin@4:5.2.2-really%2Bdfsg-1%2Bdeb13u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:5.2.2-really%252Bdfsg-1%252Bdeb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935144?format=api", "purl": "pkg:deb/debian/phpmyadmin@4:5.2.3%2Bdfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:5.2.3%252Bdfsg-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2017-1000018", "GHSA-47qr-f86f-3wm4" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-24e9-fnt7-jqdu" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/7992?format=api", "vulnerability_id": "VCID-4awg-qnjf-4ua5", "summary": "Improper Input Validation\nA weakness was discovered where an attacker can inject arbitrary values in to the browser cookies.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-1000016", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00488", "scoring_system": "epss", "scoring_elements": "0.65672", "published_at": "2026-05-16T12:55:00Z" }, { "value": "0.00488", "scoring_system": "epss", "scoring_elements": "0.65513", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00488", "scoring_system": "epss", "scoring_elements": "0.6556", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00488", "scoring_system": "epss", "scoring_elements": "0.65605", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00488", "scoring_system": "epss", "scoring_elements": "0.65576", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00488", "scoring_system": "epss", "scoring_elements": "0.65596", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00488", "scoring_system": "epss", "scoring_elements": "0.65653", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00488", "scoring_system": "epss", "scoring_elements": "0.65662", "published_at": "2026-05-15T12:55:00Z" }, { "value": "0.00488", "scoring_system": "epss", "scoring_elements": "0.65392", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00488", "scoring_system": "epss", "scoring_elements": "0.65441", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00488", "scoring_system": "epss", "scoring_elements": "0.65468", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00488", "scoring_system": "epss", "scoring_elements": "0.65433", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00488", "scoring_system": "epss", "scoring_elements": "0.65486", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00488", "scoring_system": "epss", "scoring_elements": "0.65497", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00488", "scoring_system": "epss", "scoring_elements": "0.65516", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00488", "scoring_system": "epss", "scoring_elements": "0.65503", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00488", "scoring_system": "epss", "scoring_elements": "0.65475", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00488", "scoring_system": "epss", "scoring_elements": "0.65511", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00488", "scoring_system": "epss", "scoring_elements": "0.65523", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00488", "scoring_system": "epss", "scoring_elements": "0.65507", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00488", "scoring_system": "epss", "scoring_elements": "0.65525", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00488", "scoring_system": "epss", "scoring_elements": "0.65536", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00488", "scoring_system": "epss", "scoring_elements": "0.65534", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-1000016" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000016", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000016" }, { "reference_url": "https://github.com/phpmyadmin/phpmyadmin/commit/3b6ed1f", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/phpmyadmin/phpmyadmin/commit/3b6ed1f" }, { "reference_url": "https://www.phpmyadmin.net/security/PMASA-2017-5", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.phpmyadmin.net/security/PMASA-2017-5" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-1000016", "reference_id": "CVE-2017-1000016", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-1000016" }, { "reference_url": "https://github.com/advisories/GHSA-j2cq-h6v2-f875", "reference_id": "GHSA-j2cq-h6v2-f875", "reference_type": "", "scores": [ { "value": "HIGH", "scoring_system": "cvssv3.1_qr", "scoring_elements": "" } ], "url": "https://github.com/advisories/GHSA-j2cq-h6v2-f875" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/935230?format=api", "purl": "pkg:deb/debian/phpmyadmin@4:4.6.6-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:4.6.6-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935143?format=api", "purl": "pkg:deb/debian/phpmyadmin@4:5.0.4%2Bdfsg2-2%2Bdeb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-na3j-h3qr-k7dc" }, { "vulnerability": "VCID-ndjn-p6gb-u7g4" }, { "vulnerability": "VCID-rqy8-n6fr-hqey" }, { "vulnerability": "VCID-zd8d-c1nk-g7a4" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:5.0.4%252Bdfsg2-2%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935141?format=api", "purl": "pkg:deb/debian/phpmyadmin@4:5.2.1%2Bdfsg-1%2Bdeb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-zd8d-c1nk-g7a4" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:5.2.1%252Bdfsg-1%252Bdeb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935145?format=api", "purl": "pkg:deb/debian/phpmyadmin@4:5.2.2-really%2Bdfsg-1%2Bdeb13u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:5.2.2-really%252Bdfsg-1%252Bdeb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935144?format=api", "purl": "pkg:deb/debian/phpmyadmin@4:5.2.3%2Bdfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:5.2.3%252Bdfsg-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2017-1000016", "GHSA-j2cq-h6v2-f875" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4awg-qnjf-4ua5" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/7993?format=api", "vulnerability_id": "VCID-7h9b-a8dp-57hp", "summary": "Cross-site Scripting\nphpMyAdmin is vulnerable to a CSS injection attack through crafted cookie parameters.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-1000015", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00557", "scoring_system": "epss", "scoring_elements": "0.68386", "published_at": "2026-05-16T12:55:00Z" }, { "value": "0.00557", "scoring_system": "epss", "scoring_elements": "0.68246", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00557", "scoring_system": "epss", "scoring_elements": "0.68251", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00557", "scoring_system": "epss", "scoring_elements": "0.68225", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00557", "scoring_system": "epss", "scoring_elements": "0.6827", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00557", "scoring_system": "epss", "scoring_elements": "0.68308", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00557", "scoring_system": "epss", "scoring_elements": "0.68272", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00557", "scoring_system": "epss", "scoring_elements": "0.68299", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00557", "scoring_system": "epss", "scoring_elements": "0.68359", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00557", "scoring_system": "epss", "scoring_elements": "0.68371", "published_at": "2026-05-15T12:55:00Z" }, { "value": "0.00557", "scoring_system": "epss", "scoring_elements": "0.68101", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00557", "scoring_system": "epss", "scoring_elements": "0.68124", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00557", "scoring_system": "epss", "scoring_elements": "0.68142", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00557", "scoring_system": "epss", "scoring_elements": "0.68119", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00557", "scoring_system": "epss", "scoring_elements": "0.6817", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00557", "scoring_system": "epss", "scoring_elements": "0.68186", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00557", "scoring_system": "epss", "scoring_elements": "0.68211", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00557", "scoring_system": "epss", "scoring_elements": "0.68197", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00557", "scoring_system": "epss", "scoring_elements": "0.68164", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00557", "scoring_system": "epss", "scoring_elements": "0.68202", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00557", "scoring_system": "epss", "scoring_elements": "0.68214", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00557", "scoring_system": "epss", "scoring_elements": "0.68196", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00557", "scoring_system": "epss", "scoring_elements": "0.68238", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-1000015" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000015", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000015" }, { "reference_url": "https://github.com/phpmyadmin/composer", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/phpmyadmin/composer" }, { "reference_url": "https://web.archive.org/web/20210123220229/http://www.securityfocus.com/bid/95726", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://web.archive.org/web/20210123220229/http://www.securityfocus.com/bid/95726" }, { "reference_url": "https://www.phpmyadmin.net/security/PMASA-2017-4", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.phpmyadmin.net/security/PMASA-2017-4" }, { "reference_url": "http://www.securityfocus.com/bid/95726", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/95726" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-1000015", "reference_id": "CVE-2017-1000015", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-1000015" }, { "reference_url": "https://github.com/advisories/GHSA-3fgq-cmr4-97rr", "reference_id": "GHSA-3fgq-cmr4-97rr", "reference_type": "", "scores": [ { "value": "MODERATE", "scoring_system": "cvssv3.1_qr", "scoring_elements": "" } ], "url": "https://github.com/advisories/GHSA-3fgq-cmr4-97rr" }, { "reference_url": "https://usn.ubuntu.com/USN-4843-1/", "reference_id": "USN-USN-4843-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/USN-4843-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/935230?format=api", "purl": "pkg:deb/debian/phpmyadmin@4:4.6.6-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:4.6.6-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935143?format=api", "purl": "pkg:deb/debian/phpmyadmin@4:5.0.4%2Bdfsg2-2%2Bdeb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-na3j-h3qr-k7dc" }, { "vulnerability": "VCID-ndjn-p6gb-u7g4" }, { "vulnerability": "VCID-rqy8-n6fr-hqey" }, { "vulnerability": "VCID-zd8d-c1nk-g7a4" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:5.0.4%252Bdfsg2-2%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935141?format=api", "purl": "pkg:deb/debian/phpmyadmin@4:5.2.1%2Bdfsg-1%2Bdeb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-zd8d-c1nk-g7a4" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:5.2.1%252Bdfsg-1%252Bdeb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935145?format=api", "purl": "pkg:deb/debian/phpmyadmin@4:5.2.2-really%2Bdfsg-1%2Bdeb13u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:5.2.2-really%252Bdfsg-1%252Bdeb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935144?format=api", "purl": "pkg:deb/debian/phpmyadmin@4:5.2.3%2Bdfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:5.2.3%252Bdfsg-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2017-1000015", "GHSA-3fgq-cmr4-97rr" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7h9b-a8dp-57hp" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/15637?format=api", "vulnerability_id": "VCID-7n1n-uj91-8ugg", "summary": "phpMyAdmin server-side request forgery (SSRF)\nThe setup script for phpMyAdmin before 4.0.10.19, 4.4.x before 4.4.15.10, and 4.6.x before 4.6.6 allows remote attackers to conduct server-side request forgery (SSRF) attacks via unspecified vectors.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-6621", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00389", "scoring_system": "epss", "scoring_elements": "0.6008", "published_at": "2026-05-16T12:55:00Z" }, { "value": "0.00389", "scoring_system": "epss", "scoring_elements": "0.59955", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00389", "scoring_system": "epss", "scoring_elements": "0.59942", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00389", "scoring_system": "epss", "scoring_elements": "0.59903", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00389", "scoring_system": "epss", "scoring_elements": "0.5995", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00389", "scoring_system": "epss", "scoring_elements": "0.60007", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00389", "scoring_system": "epss", "scoring_elements": "0.59965", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00389", "scoring_system": "epss", "scoring_elements": "0.59992", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00389", "scoring_system": "epss", "scoring_elements": "0.60056", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00389", "scoring_system": "epss", "scoring_elements": "0.60065", "published_at": "2026-05-15T12:55:00Z" }, { "value": "0.00389", "scoring_system": "epss", "scoring_elements": "0.59811", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00389", "scoring_system": "epss", "scoring_elements": "0.59888", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00389", "scoring_system": "epss", "scoring_elements": "0.59913", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00389", "scoring_system": "epss", "scoring_elements": "0.59883", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00389", "scoring_system": "epss", "scoring_elements": "0.59933", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00389", "scoring_system": "epss", "scoring_elements": "0.59947", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00389", "scoring_system": "epss", "scoring_elements": "0.59968", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00389", "scoring_system": "epss", "scoring_elements": "0.59953", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00389", "scoring_system": "epss", "scoring_elements": "0.59934", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00389", "scoring_system": "epss", "scoring_elements": "0.59974", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00389", "scoring_system": "epss", "scoring_elements": "0.5998", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00389", "scoring_system": "epss", "scoring_elements": "0.59966", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00389", "scoring_system": "epss", "scoring_elements": "0.59937", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-6621" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6621", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6621" }, { "reference_url": "https://github.com/phpmyadmin/composer", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/phpmyadmin/composer" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00006.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00006.html" }, { "reference_url": "https://www.phpmyadmin.net/security/PMASA-2016-44", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.phpmyadmin.net/security/PMASA-2016-44" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-6621", "reference_id": "CVE-2016-6621", "reference_type": "", "scores": [ { "value": "8.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-6621" }, { "reference_url": "https://github.com/advisories/GHSA-44vv-mm86-7cg6", "reference_id": "GHSA-44vv-mm86-7cg6", "reference_type": "", "scores": [ { "value": "HIGH", "scoring_system": "cvssv3.1_qr", "scoring_elements": "" } ], "url": "https://github.com/advisories/GHSA-44vv-mm86-7cg6" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/935230?format=api", "purl": "pkg:deb/debian/phpmyadmin@4:4.6.6-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:4.6.6-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935143?format=api", "purl": "pkg:deb/debian/phpmyadmin@4:5.0.4%2Bdfsg2-2%2Bdeb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-na3j-h3qr-k7dc" }, { "vulnerability": "VCID-ndjn-p6gb-u7g4" }, { "vulnerability": "VCID-rqy8-n6fr-hqey" }, { "vulnerability": "VCID-zd8d-c1nk-g7a4" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:5.0.4%252Bdfsg2-2%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935141?format=api", "purl": "pkg:deb/debian/phpmyadmin@4:5.2.1%2Bdfsg-1%2Bdeb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-zd8d-c1nk-g7a4" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:5.2.1%252Bdfsg-1%252Bdeb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935145?format=api", "purl": "pkg:deb/debian/phpmyadmin@4:5.2.2-really%2Bdfsg-1%2Bdeb13u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:5.2.2-really%252Bdfsg-1%252Bdeb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935144?format=api", "purl": "pkg:deb/debian/phpmyadmin@4:5.2.3%2Bdfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:5.2.3%252Bdfsg-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2016-6621", "GHSA-44vv-mm86-7cg6" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7n1n-uj91-8ugg" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/8009?format=api", "vulnerability_id": "VCID-b5d2-5bfb-bbgz", "summary": "Server-Side Request Forgery (SSRF)\nphpMyAdmin is vulnerable to a weakness where a user with appropriate permissions is able to connect to an arbitrary MySQL server.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-1000017", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0092", "scoring_system": "epss", "scoring_elements": "0.76172", "published_at": "2026-05-16T12:55:00Z" }, { "value": "0.0092", "scoring_system": "epss", "scoring_elements": "0.76027", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.0092", "scoring_system": "epss", "scoring_elements": "0.76038", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.0092", "scoring_system": "epss", "scoring_elements": "0.76047", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.0092", "scoring_system": "epss", "scoring_elements": "0.76076", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.0092", "scoring_system": "epss", "scoring_elements": "0.76099", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.0092", "scoring_system": "epss", "scoring_elements": "0.76085", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.0092", "scoring_system": "epss", "scoring_elements": "0.761", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.0092", "scoring_system": "epss", "scoring_elements": "0.7615", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.0092", "scoring_system": "epss", "scoring_elements": "0.76164", "published_at": "2026-05-15T12:55:00Z" }, { "value": "0.0092", "scoring_system": "epss", "scoring_elements": "0.75898", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0092", "scoring_system": "epss", "scoring_elements": "0.75902", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0092", "scoring_system": "epss", "scoring_elements": "0.75934", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0092", "scoring_system": "epss", "scoring_elements": "0.75913", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0092", "scoring_system": "epss", "scoring_elements": "0.75946", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0092", "scoring_system": "epss", "scoring_elements": "0.7596", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0092", "scoring_system": "epss", "scoring_elements": "0.75984", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0092", "scoring_system": "epss", "scoring_elements": "0.75961", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0092", "scoring_system": "epss", "scoring_elements": "0.75954", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0092", "scoring_system": "epss", "scoring_elements": "0.75992", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0092", "scoring_system": "epss", "scoring_elements": "0.75994", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0092", "scoring_system": "epss", "scoring_elements": "0.75979", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0092", "scoring_system": "epss", "scoring_elements": "0.76017", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-1000017" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000017", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000017" }, { "reference_url": "https://github.com/phpmyadmin/composer", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/phpmyadmin/composer" }, { "reference_url": "https://www.phpmyadmin.net/security/PMASA-2017-6", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.phpmyadmin.net/security/PMASA-2017-6" }, { "reference_url": "http://www.securityfocus.com/bid/95732", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "http://www.securityfocus.com/bid/95732" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-1000017", "reference_id": "CVE-2017-1000017", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-1000017" }, { "reference_url": "https://github.com/advisories/GHSA-99xj-xqc9-98hr", "reference_id": "GHSA-99xj-xqc9-98hr", "reference_type": "", "scores": [ { "value": "HIGH", "scoring_system": "cvssv3.1_qr", "scoring_elements": "" } ], "url": "https://github.com/advisories/GHSA-99xj-xqc9-98hr" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/935230?format=api", "purl": "pkg:deb/debian/phpmyadmin@4:4.6.6-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:4.6.6-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935143?format=api", "purl": "pkg:deb/debian/phpmyadmin@4:5.0.4%2Bdfsg2-2%2Bdeb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-na3j-h3qr-k7dc" }, { "vulnerability": "VCID-ndjn-p6gb-u7g4" }, { "vulnerability": "VCID-rqy8-n6fr-hqey" }, { "vulnerability": "VCID-zd8d-c1nk-g7a4" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:5.0.4%252Bdfsg2-2%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935141?format=api", "purl": "pkg:deb/debian/phpmyadmin@4:5.2.1%2Bdfsg-1%2Bdeb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-zd8d-c1nk-g7a4" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:5.2.1%252Bdfsg-1%252Bdeb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935145?format=api", "purl": "pkg:deb/debian/phpmyadmin@4:5.2.2-really%2Bdfsg-1%2Bdeb13u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:5.2.2-really%252Bdfsg-1%252Bdeb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935144?format=api", "purl": "pkg:deb/debian/phpmyadmin@4:5.2.3%2Bdfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:5.2.3%252Bdfsg-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2017-1000017", "GHSA-99xj-xqc9-98hr" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-b5d2-5bfb-bbgz" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/92806?format=api", "vulnerability_id": "VCID-f4d7-69e8-sqej", "summary": "The plural form formula in ngettext family of calls in php-gettext before 1.0.12 allows remote attackers to execute arbitrary code.", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-updates/2017-02/msg00015.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2017-02/msg00015.html" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-8980", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.04573", "scoring_system": "epss", "scoring_elements": "0.89321", "published_at": "2026-05-16T12:55:00Z" }, { "value": "0.04573", "scoring_system": "epss", "scoring_elements": "0.89311", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.04573", "scoring_system": "epss", "scoring_elements": "0.89162", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.04573", "scoring_system": "epss", "scoring_elements": "0.89168", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.04573", "scoring_system": "epss", "scoring_elements": "0.89183", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.04573", "scoring_system": "epss", "scoring_elements": "0.89186", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.04573", "scoring_system": "epss", "scoring_elements": "0.89204", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.04573", "scoring_system": "epss", "scoring_elements": "0.89208", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.04573", "scoring_system": "epss", "scoring_elements": "0.89218", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.04573", "scoring_system": "epss", "scoring_elements": "0.89214", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.04573", "scoring_system": "epss", "scoring_elements": "0.89212", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.04573", "scoring_system": "epss", "scoring_elements": "0.89224", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.04573", "scoring_system": "epss", "scoring_elements": "0.8922", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.04573", "scoring_system": "epss", "scoring_elements": "0.89237", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.04573", "scoring_system": "epss", "scoring_elements": "0.89243", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.04573", "scoring_system": "epss", "scoring_elements": "0.89246", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.04573", "scoring_system": "epss", "scoring_elements": "0.89255", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.04573", "scoring_system": "epss", "scoring_elements": "0.89271", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.04573", "scoring_system": "epss", "scoring_elements": "0.89283", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.04573", "scoring_system": "epss", "scoring_elements": "0.8928", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.04573", "scoring_system": "epss", "scoring_elements": "0.89291", "published_at": "2026-05-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-8980" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1367462", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1367462" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8980", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8980" }, { "reference_url": "http://seclists.org/fulldisclosure/2016/Aug/76", "reference_id": "", "reference_type": "", "scores": [], "url": "http://seclists.org/fulldisclosure/2016/Aug/76" }, { "reference_url": "https://launchpad.net/php-gettext/trunk/1.0.12", "reference_id": "", "reference_type": "", "scores": [], "url": "https://launchpad.net/php-gettext/trunk/1.0.12" }, { "reference_url": "https://lwn.net/Alerts/708838/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lwn.net/Alerts/708838/" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2017/01/18/4", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2017/01/18/4" }, { "reference_url": "http://www.securityfocus.com/bid/95754", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/95754" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=851770", "reference_id": "851770", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=851770" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php-gettext_project:php-gettext:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:php-gettext_project:php-gettext:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php-gettext_project:php-gettext:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:24:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:fedoraproject:fedora:24:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:24:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:leap:42.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2015-8980", "reference_id": "CVE-2015-8980", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:P" }, { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-8980" }, { "reference_url": "https://usn.ubuntu.com/USN-4779-1/", "reference_id": "USN-USN-4779-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/USN-4779-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/935230?format=api", "purl": "pkg:deb/debian/phpmyadmin@4:4.6.6-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:4.6.6-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935143?format=api", "purl": "pkg:deb/debian/phpmyadmin@4:5.0.4%2Bdfsg2-2%2Bdeb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-na3j-h3qr-k7dc" }, { "vulnerability": "VCID-ndjn-p6gb-u7g4" }, { "vulnerability": "VCID-rqy8-n6fr-hqey" }, { "vulnerability": "VCID-zd8d-c1nk-g7a4" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:5.0.4%252Bdfsg2-2%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935141?format=api", "purl": "pkg:deb/debian/phpmyadmin@4:5.2.1%2Bdfsg-1%2Bdeb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-zd8d-c1nk-g7a4" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:5.2.1%252Bdfsg-1%252Bdeb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935145?format=api", "purl": "pkg:deb/debian/phpmyadmin@4:5.2.2-really%2Bdfsg-1%2Bdeb13u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:5.2.2-really%252Bdfsg-1%252Bdeb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935144?format=api", "purl": "pkg:deb/debian/phpmyadmin@4:5.2.3%2Bdfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:5.2.3%252Bdfsg-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2015-8980" ], "risk_score": 4.4, "exploitability": "0.5", "weighted_severity": "8.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-f4d7-69e8-sqej" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/8002?format=api", "vulnerability_id": "VCID-uw6h-fpzy-x3ap", "summary": "URL Redirection to Untrusted Site (Open Redirect)\nphpMyAdmin is vulnerable to an open redirect weakness.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-1000013", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00239", "scoring_system": "epss", "scoring_elements": "0.47045", "published_at": "2026-05-16T12:55:00Z" }, { "value": "0.00239", "scoring_system": "epss", "scoring_elements": "0.46983", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00239", "scoring_system": "epss", "scoring_elements": "0.46896", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00239", "scoring_system": "epss", "scoring_elements": "0.4696", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00239", "scoring_system": "epss", "scoring_elements": "0.46979", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00239", "scoring_system": "epss", "scoring_elements": "0.46923", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00239", "scoring_system": "epss", "scoring_elements": "0.46955", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00239", "scoring_system": "epss", "scoring_elements": "0.4704", "published_at": "2026-05-15T12:55:00Z" }, { "value": "0.00239", "scoring_system": "epss", "scoring_elements": "0.46978", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00239", "scoring_system": "epss", "scoring_elements": "0.47014", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00239", "scoring_system": "epss", "scoring_elements": "0.47033", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00239", "scoring_system": "epss", "scoring_elements": "0.4698", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00239", "scoring_system": "epss", "scoring_elements": "0.47035", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00239", "scoring_system": "epss", "scoring_elements": "0.47031", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00239", "scoring_system": "epss", "scoring_elements": "0.47055", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00239", "scoring_system": "epss", "scoring_elements": "0.47029", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00239", "scoring_system": "epss", "scoring_elements": "0.47036", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00239", "scoring_system": "epss", "scoring_elements": "0.47092", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00239", "scoring_system": "epss", "scoring_elements": "0.47088", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00239", "scoring_system": "epss", "scoring_elements": "0.47024", "published_at": "2026-05-14T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-1000013" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000013", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000013" }, { "reference_url": "https://web.archive.org/web/20210123220100/http://www.securityfocus.com/bid/95720", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://web.archive.org/web/20210123220100/http://www.securityfocus.com/bid/95720" }, { "reference_url": "https://www.phpmyadmin.net/security/PMASA-2017-1", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.phpmyadmin.net/security/PMASA-2017-1" }, { "reference_url": "http://www.securityfocus.com/bid/95720", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/95720" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-1000013", "reference_id": "CVE-2017-1000013", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-1000013" }, { "reference_url": "https://github.com/advisories/GHSA-5h5m-fj48-qpjw", "reference_id": "GHSA-5h5m-fj48-qpjw", "reference_type": "", "scores": [ { "value": "MODERATE", "scoring_system": "cvssv3.1_qr", "scoring_elements": "" } ], "url": "https://github.com/advisories/GHSA-5h5m-fj48-qpjw" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/935230?format=api", "purl": "pkg:deb/debian/phpmyadmin@4:4.6.6-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:4.6.6-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935143?format=api", "purl": "pkg:deb/debian/phpmyadmin@4:5.0.4%2Bdfsg2-2%2Bdeb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-na3j-h3qr-k7dc" }, { "vulnerability": "VCID-ndjn-p6gb-u7g4" }, { "vulnerability": "VCID-rqy8-n6fr-hqey" }, { "vulnerability": "VCID-zd8d-c1nk-g7a4" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:5.0.4%252Bdfsg2-2%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935141?format=api", "purl": "pkg:deb/debian/phpmyadmin@4:5.2.1%2Bdfsg-1%2Bdeb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-zd8d-c1nk-g7a4" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:5.2.1%252Bdfsg-1%252Bdeb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935145?format=api", "purl": "pkg:deb/debian/phpmyadmin@4:5.2.2-really%2Bdfsg-1%2Bdeb13u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:5.2.2-really%252Bdfsg-1%252Bdeb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935144?format=api", "purl": "pkg:deb/debian/phpmyadmin@4:5.2.3%2Bdfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:5.2.3%252Bdfsg-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2017-1000013", "GHSA-5h5m-fj48-qpjw" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-uw6h-fpzy-x3ap" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/8006?format=api", "vulnerability_id": "VCID-zreq-41ja-pbf1", "summary": "Improper Input Validation\nphpMyAdmin is vulnerable to a DoS weakness in the table editing functionality.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-1000014", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01144", "scoring_system": "epss", "scoring_elements": "0.78649", "published_at": "2026-05-16T12:55:00Z" }, { "value": "0.01144", "scoring_system": "epss", "scoring_elements": "0.7854", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.01144", "scoring_system": "epss", "scoring_elements": "0.78564", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.01144", "scoring_system": "epss", "scoring_elements": "0.78579", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.01144", "scoring_system": "epss", "scoring_elements": "0.78576", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.01144", "scoring_system": "epss", "scoring_elements": "0.78592", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.01144", "scoring_system": "epss", "scoring_elements": "0.78629", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.01144", "scoring_system": "epss", "scoring_elements": "0.78642", "published_at": "2026-05-15T12:55:00Z" }, { "value": "0.01144", "scoring_system": "epss", "scoring_elements": "0.78396", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01144", "scoring_system": "epss", "scoring_elements": "0.78403", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01144", "scoring_system": "epss", "scoring_elements": "0.78434", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01144", "scoring_system": "epss", "scoring_elements": "0.78417", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01144", "scoring_system": "epss", "scoring_elements": "0.78443", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01144", "scoring_system": "epss", "scoring_elements": "0.78448", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01144", "scoring_system": "epss", "scoring_elements": "0.78474", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01144", "scoring_system": "epss", "scoring_elements": "0.78455", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01144", "scoring_system": "epss", "scoring_elements": "0.78475", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01144", "scoring_system": "epss", "scoring_elements": "0.7847", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01144", "scoring_system": "epss", "scoring_elements": "0.78503", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01144", "scoring_system": "epss", "scoring_elements": "0.7851", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.01144", "scoring_system": "epss", "scoring_elements": "0.78525", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-1000014" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000014", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000014" }, { "reference_url": "https://web.archive.org/web/20210123220105/http://www.securityfocus.com/bid/95721", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://web.archive.org/web/20210123220105/http://www.securityfocus.com/bid/95721" }, { "reference_url": "https://www.phpmyadmin.net/security/PMASA-2017-3", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.phpmyadmin.net/security/PMASA-2017-3" }, { "reference_url": "http://www.securityfocus.com/bid/95721", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/95721" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-1000014", "reference_id": "CVE-2017-1000014", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-1000014" }, { "reference_url": "https://github.com/advisories/GHSA-9hrc-rwrq-v6mh", "reference_id": "GHSA-9hrc-rwrq-v6mh", "reference_type": "", "scores": [ { "value": "HIGH", "scoring_system": "cvssv3.1_qr", "scoring_elements": "" } ], "url": "https://github.com/advisories/GHSA-9hrc-rwrq-v6mh" }, { "reference_url": "https://usn.ubuntu.com/USN-4843-1/", "reference_id": "USN-USN-4843-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/USN-4843-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/935230?format=api", "purl": "pkg:deb/debian/phpmyadmin@4:4.6.6-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:4.6.6-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935143?format=api", "purl": "pkg:deb/debian/phpmyadmin@4:5.0.4%2Bdfsg2-2%2Bdeb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-na3j-h3qr-k7dc" }, { "vulnerability": "VCID-ndjn-p6gb-u7g4" }, { "vulnerability": "VCID-rqy8-n6fr-hqey" }, { "vulnerability": "VCID-zd8d-c1nk-g7a4" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:5.0.4%252Bdfsg2-2%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935141?format=api", "purl": "pkg:deb/debian/phpmyadmin@4:5.2.1%2Bdfsg-1%2Bdeb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-zd8d-c1nk-g7a4" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:5.2.1%252Bdfsg-1%252Bdeb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935145?format=api", "purl": "pkg:deb/debian/phpmyadmin@4:5.2.2-really%2Bdfsg-1%2Bdeb13u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:5.2.2-really%252Bdfsg-1%252Bdeb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935144?format=api", "purl": "pkg:deb/debian/phpmyadmin@4:5.2.3%2Bdfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:5.2.3%252Bdfsg-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2017-1000014", "GHSA-9hrc-rwrq-v6mh" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-zreq-41ja-pbf1" } ], "risk_score": null, "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:4.6.6-1%3Fdistro=trixie" }