Lookup for vulnerable packages by Package URL.

GET /api/packages/935230?format=api
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "url": "http://public2.vulnerablecode.io/api/packages/935230?format=api",
    "purl": "pkg:deb/debian/phpmyadmin@4:4.6.6-1?distro=trixie",
    "type": "deb",
    "namespace": "debian",
    "name": "phpmyadmin",
    "version": "4:4.6.6-1",
    "qualifiers": {
        "distro": "trixie"
    },
    "subpath": "",
    "is_vulnerable": false,
    "next_non_vulnerable_version": "4:4.6.6-2",
    "latest_non_vulnerable_version": "4:5.2.3+dfsg-1",
    "affected_by_vulnerabilities": [],
    "fixing_vulnerabilities": [
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/8001?format=api",
            "vulnerability_id": "VCID-24e9-fnt7-jqdu",
            "summary": "Improper Input Validation\nphpMyAdmin is vulnerable to a DoS attack in the replication status by using a specially crafted table name.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-1000018",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01295",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79887",
                            "published_at": "2026-05-16T12:55:00Z"
                        },
                        {
                            "value": "0.01295",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79787",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.01295",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79813",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.01295",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79829",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.01295",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79825",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.01295",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7984",
                            "published_at": "2026-05-12T12:55:00Z"
                        },
                        {
                            "value": "0.01295",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79878",
                            "published_at": "2026-05-14T12:55:00Z"
                        },
                        {
                            "value": "0.01295",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79884",
                            "published_at": "2026-05-15T12:55:00Z"
                        },
                        {
                            "value": "0.01295",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79639",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01295",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79646",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01295",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79667",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01295",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79654",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01295",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79683",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01295",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7969",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01295",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79711",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01295",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79695",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01295",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79688",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01295",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79717",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.01295",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7972",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.01295",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79751",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.01295",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79758",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.01295",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79773",
                            "published_at": "2026-04-29T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-1000018"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000018",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000018"
                },
                {
                    "reference_url": "https://web.archive.org/web/20210123220317/http://www.securityfocus.com/bid/95738",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://web.archive.org/web/20210123220317/http://www.securityfocus.com/bid/95738"
                },
                {
                    "reference_url": "https://www.phpmyadmin.net/security/PMASA-2017-7",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.phpmyadmin.net/security/PMASA-2017-7"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/95738",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/95738"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-1000018",
                    "reference_id": "CVE-2017-1000018",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-1000018"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-47qr-f86f-3wm4",
                    "reference_id": "GHSA-47qr-f86f-3wm4",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "HIGH",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-47qr-f86f-3wm4"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935230?format=api",
                    "purl": "pkg:deb/debian/phpmyadmin@4:4.6.6-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:4.6.6-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935143?format=api",
                    "purl": "pkg:deb/debian/phpmyadmin@4:5.0.4%2Bdfsg2-2%2Bdeb11u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-na3j-h3qr-k7dc"
                        },
                        {
                            "vulnerability": "VCID-ndjn-p6gb-u7g4"
                        },
                        {
                            "vulnerability": "VCID-rqy8-n6fr-hqey"
                        },
                        {
                            "vulnerability": "VCID-zd8d-c1nk-g7a4"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:5.0.4%252Bdfsg2-2%252Bdeb11u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935141?format=api",
                    "purl": "pkg:deb/debian/phpmyadmin@4:5.2.1%2Bdfsg-1%2Bdeb12u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-zd8d-c1nk-g7a4"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:5.2.1%252Bdfsg-1%252Bdeb12u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935145?format=api",
                    "purl": "pkg:deb/debian/phpmyadmin@4:5.2.2-really%2Bdfsg-1%2Bdeb13u1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:5.2.2-really%252Bdfsg-1%252Bdeb13u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935144?format=api",
                    "purl": "pkg:deb/debian/phpmyadmin@4:5.2.3%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:5.2.3%252Bdfsg-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2017-1000018",
                "GHSA-47qr-f86f-3wm4"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-24e9-fnt7-jqdu"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/7992?format=api",
            "vulnerability_id": "VCID-4awg-qnjf-4ua5",
            "summary": "Improper Input Validation\nA weakness was discovered where an attacker can inject arbitrary values in to the browser cookies.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-1000016",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00488",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65672",
                            "published_at": "2026-05-16T12:55:00Z"
                        },
                        {
                            "value": "0.00488",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65513",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00488",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6556",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00488",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65605",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00488",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65576",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.00488",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65596",
                            "published_at": "2026-05-12T12:55:00Z"
                        },
                        {
                            "value": "0.00488",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65653",
                            "published_at": "2026-05-14T12:55:00Z"
                        },
                        {
                            "value": "0.00488",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65662",
                            "published_at": "2026-05-15T12:55:00Z"
                        },
                        {
                            "value": "0.00488",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65392",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00488",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65441",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00488",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65468",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00488",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65433",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00488",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65486",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00488",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65497",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00488",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65516",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00488",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65503",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00488",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65475",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00488",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65511",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00488",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65523",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00488",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65507",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00488",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65525",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00488",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65536",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00488",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65534",
                            "published_at": "2026-04-29T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-1000016"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000016",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000016"
                },
                {
                    "reference_url": "https://github.com/phpmyadmin/phpmyadmin/commit/3b6ed1f",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/phpmyadmin/phpmyadmin/commit/3b6ed1f"
                },
                {
                    "reference_url": "https://www.phpmyadmin.net/security/PMASA-2017-5",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.phpmyadmin.net/security/PMASA-2017-5"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-1000016",
                    "reference_id": "CVE-2017-1000016",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-1000016"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-j2cq-h6v2-f875",
                    "reference_id": "GHSA-j2cq-h6v2-f875",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "HIGH",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-j2cq-h6v2-f875"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935230?format=api",
                    "purl": "pkg:deb/debian/phpmyadmin@4:4.6.6-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:4.6.6-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935143?format=api",
                    "purl": "pkg:deb/debian/phpmyadmin@4:5.0.4%2Bdfsg2-2%2Bdeb11u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-na3j-h3qr-k7dc"
                        },
                        {
                            "vulnerability": "VCID-ndjn-p6gb-u7g4"
                        },
                        {
                            "vulnerability": "VCID-rqy8-n6fr-hqey"
                        },
                        {
                            "vulnerability": "VCID-zd8d-c1nk-g7a4"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:5.0.4%252Bdfsg2-2%252Bdeb11u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935141?format=api",
                    "purl": "pkg:deb/debian/phpmyadmin@4:5.2.1%2Bdfsg-1%2Bdeb12u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-zd8d-c1nk-g7a4"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:5.2.1%252Bdfsg-1%252Bdeb12u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935145?format=api",
                    "purl": "pkg:deb/debian/phpmyadmin@4:5.2.2-really%2Bdfsg-1%2Bdeb13u1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:5.2.2-really%252Bdfsg-1%252Bdeb13u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935144?format=api",
                    "purl": "pkg:deb/debian/phpmyadmin@4:5.2.3%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:5.2.3%252Bdfsg-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2017-1000016",
                "GHSA-j2cq-h6v2-f875"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4awg-qnjf-4ua5"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/7993?format=api",
            "vulnerability_id": "VCID-7h9b-a8dp-57hp",
            "summary": "Cross-site Scripting\nphpMyAdmin is vulnerable to a CSS injection attack through crafted cookie parameters.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-1000015",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00557",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68386",
                            "published_at": "2026-05-16T12:55:00Z"
                        },
                        {
                            "value": "0.00557",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68246",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00557",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68251",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00557",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68225",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00557",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6827",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00557",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68308",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00557",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68272",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.00557",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68299",
                            "published_at": "2026-05-12T12:55:00Z"
                        },
                        {
                            "value": "0.00557",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68359",
                            "published_at": "2026-05-14T12:55:00Z"
                        },
                        {
                            "value": "0.00557",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68371",
                            "published_at": "2026-05-15T12:55:00Z"
                        },
                        {
                            "value": "0.00557",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68101",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00557",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68124",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00557",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68142",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00557",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68119",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00557",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6817",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00557",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68186",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00557",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68211",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00557",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68197",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00557",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68164",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00557",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68202",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00557",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68214",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00557",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68196",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00557",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68238",
                            "published_at": "2026-04-24T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-1000015"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000015",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000015"
                },
                {
                    "reference_url": "https://github.com/phpmyadmin/composer",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/phpmyadmin/composer"
                },
                {
                    "reference_url": "https://web.archive.org/web/20210123220229/http://www.securityfocus.com/bid/95726",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://web.archive.org/web/20210123220229/http://www.securityfocus.com/bid/95726"
                },
                {
                    "reference_url": "https://www.phpmyadmin.net/security/PMASA-2017-4",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.phpmyadmin.net/security/PMASA-2017-4"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/95726",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/95726"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-1000015",
                    "reference_id": "CVE-2017-1000015",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-1000015"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-3fgq-cmr4-97rr",
                    "reference_id": "GHSA-3fgq-cmr4-97rr",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "MODERATE",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-3fgq-cmr4-97rr"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/USN-4843-1/",
                    "reference_id": "USN-USN-4843-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/USN-4843-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935230?format=api",
                    "purl": "pkg:deb/debian/phpmyadmin@4:4.6.6-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:4.6.6-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935143?format=api",
                    "purl": "pkg:deb/debian/phpmyadmin@4:5.0.4%2Bdfsg2-2%2Bdeb11u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-na3j-h3qr-k7dc"
                        },
                        {
                            "vulnerability": "VCID-ndjn-p6gb-u7g4"
                        },
                        {
                            "vulnerability": "VCID-rqy8-n6fr-hqey"
                        },
                        {
                            "vulnerability": "VCID-zd8d-c1nk-g7a4"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:5.0.4%252Bdfsg2-2%252Bdeb11u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935141?format=api",
                    "purl": "pkg:deb/debian/phpmyadmin@4:5.2.1%2Bdfsg-1%2Bdeb12u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-zd8d-c1nk-g7a4"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:5.2.1%252Bdfsg-1%252Bdeb12u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935145?format=api",
                    "purl": "pkg:deb/debian/phpmyadmin@4:5.2.2-really%2Bdfsg-1%2Bdeb13u1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:5.2.2-really%252Bdfsg-1%252Bdeb13u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935144?format=api",
                    "purl": "pkg:deb/debian/phpmyadmin@4:5.2.3%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:5.2.3%252Bdfsg-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2017-1000015",
                "GHSA-3fgq-cmr4-97rr"
            ],
            "risk_score": 3.1,
            "exploitability": "0.5",
            "weighted_severity": "6.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7h9b-a8dp-57hp"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/15637?format=api",
            "vulnerability_id": "VCID-7n1n-uj91-8ugg",
            "summary": "phpMyAdmin server-side request forgery (SSRF)\nThe setup script for phpMyAdmin before 4.0.10.19, 4.4.x before 4.4.15.10, and 4.6.x before 4.6.6 allows remote attackers to conduct server-side request forgery (SSRF) attacks via unspecified vectors.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-6621",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00389",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6008",
                            "published_at": "2026-05-16T12:55:00Z"
                        },
                        {
                            "value": "0.00389",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59955",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00389",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59942",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00389",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59903",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00389",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5995",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00389",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60007",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00389",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59965",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.00389",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59992",
                            "published_at": "2026-05-12T12:55:00Z"
                        },
                        {
                            "value": "0.00389",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60056",
                            "published_at": "2026-05-14T12:55:00Z"
                        },
                        {
                            "value": "0.00389",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60065",
                            "published_at": "2026-05-15T12:55:00Z"
                        },
                        {
                            "value": "0.00389",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59811",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00389",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59888",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00389",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59913",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00389",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59883",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00389",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59933",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00389",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59947",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00389",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59968",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00389",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59953",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00389",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59934",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00389",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59974",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00389",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5998",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00389",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59966",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00389",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59937",
                            "published_at": "2026-04-24T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-6621"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6621",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6621"
                },
                {
                    "reference_url": "https://github.com/phpmyadmin/composer",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/phpmyadmin/composer"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00006.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00006.html"
                },
                {
                    "reference_url": "https://www.phpmyadmin.net/security/PMASA-2016-44",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.phpmyadmin.net/security/PMASA-2016-44"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-6621",
                    "reference_id": "CVE-2016-6621",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-6621"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-44vv-mm86-7cg6",
                    "reference_id": "GHSA-44vv-mm86-7cg6",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "HIGH",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-44vv-mm86-7cg6"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935230?format=api",
                    "purl": "pkg:deb/debian/phpmyadmin@4:4.6.6-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:4.6.6-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935143?format=api",
                    "purl": "pkg:deb/debian/phpmyadmin@4:5.0.4%2Bdfsg2-2%2Bdeb11u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-na3j-h3qr-k7dc"
                        },
                        {
                            "vulnerability": "VCID-ndjn-p6gb-u7g4"
                        },
                        {
                            "vulnerability": "VCID-rqy8-n6fr-hqey"
                        },
                        {
                            "vulnerability": "VCID-zd8d-c1nk-g7a4"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:5.0.4%252Bdfsg2-2%252Bdeb11u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935141?format=api",
                    "purl": "pkg:deb/debian/phpmyadmin@4:5.2.1%2Bdfsg-1%2Bdeb12u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-zd8d-c1nk-g7a4"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:5.2.1%252Bdfsg-1%252Bdeb12u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935145?format=api",
                    "purl": "pkg:deb/debian/phpmyadmin@4:5.2.2-really%2Bdfsg-1%2Bdeb13u1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:5.2.2-really%252Bdfsg-1%252Bdeb13u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935144?format=api",
                    "purl": "pkg:deb/debian/phpmyadmin@4:5.2.3%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:5.2.3%252Bdfsg-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2016-6621",
                "GHSA-44vv-mm86-7cg6"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7n1n-uj91-8ugg"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/8009?format=api",
            "vulnerability_id": "VCID-b5d2-5bfb-bbgz",
            "summary": "Server-Side Request Forgery (SSRF)\nphpMyAdmin is vulnerable to a weakness where a user with appropriate permissions is able to connect to an arbitrary MySQL server.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-1000017",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0092",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76172",
                            "published_at": "2026-05-16T12:55:00Z"
                        },
                        {
                            "value": "0.0092",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76027",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.0092",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76038",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.0092",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76047",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.0092",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76076",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.0092",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76099",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.0092",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76085",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.0092",
                            "scoring_system": "epss",
                            "scoring_elements": "0.761",
                            "published_at": "2026-05-12T12:55:00Z"
                        },
                        {
                            "value": "0.0092",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7615",
                            "published_at": "2026-05-14T12:55:00Z"
                        },
                        {
                            "value": "0.0092",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76164",
                            "published_at": "2026-05-15T12:55:00Z"
                        },
                        {
                            "value": "0.0092",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75898",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.0092",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75902",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0092",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75934",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0092",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75913",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0092",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75946",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0092",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7596",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0092",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75984",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0092",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75961",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0092",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75954",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0092",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75992",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.0092",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75994",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.0092",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75979",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.0092",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76017",
                            "published_at": "2026-04-24T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-1000017"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000017",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000017"
                },
                {
                    "reference_url": "https://github.com/phpmyadmin/composer",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/phpmyadmin/composer"
                },
                {
                    "reference_url": "https://www.phpmyadmin.net/security/PMASA-2017-6",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.phpmyadmin.net/security/PMASA-2017-6"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/95732",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/95732"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-1000017",
                    "reference_id": "CVE-2017-1000017",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-1000017"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-99xj-xqc9-98hr",
                    "reference_id": "GHSA-99xj-xqc9-98hr",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "HIGH",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-99xj-xqc9-98hr"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935230?format=api",
                    "purl": "pkg:deb/debian/phpmyadmin@4:4.6.6-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:4.6.6-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935143?format=api",
                    "purl": "pkg:deb/debian/phpmyadmin@4:5.0.4%2Bdfsg2-2%2Bdeb11u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-na3j-h3qr-k7dc"
                        },
                        {
                            "vulnerability": "VCID-ndjn-p6gb-u7g4"
                        },
                        {
                            "vulnerability": "VCID-rqy8-n6fr-hqey"
                        },
                        {
                            "vulnerability": "VCID-zd8d-c1nk-g7a4"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:5.0.4%252Bdfsg2-2%252Bdeb11u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935141?format=api",
                    "purl": "pkg:deb/debian/phpmyadmin@4:5.2.1%2Bdfsg-1%2Bdeb12u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-zd8d-c1nk-g7a4"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:5.2.1%252Bdfsg-1%252Bdeb12u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935145?format=api",
                    "purl": "pkg:deb/debian/phpmyadmin@4:5.2.2-really%2Bdfsg-1%2Bdeb13u1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:5.2.2-really%252Bdfsg-1%252Bdeb13u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935144?format=api",
                    "purl": "pkg:deb/debian/phpmyadmin@4:5.2.3%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:5.2.3%252Bdfsg-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2017-1000017",
                "GHSA-99xj-xqc9-98hr"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-b5d2-5bfb-bbgz"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/92806?format=api",
            "vulnerability_id": "VCID-f4d7-69e8-sqej",
            "summary": "The plural form formula in ngettext family of calls in php-gettext before 1.0.12 allows remote attackers to execute arbitrary code.",
            "references": [
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-updates/2017-02/msg00015.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-updates/2017-02/msg00015.html"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-8980",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.04573",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89321",
                            "published_at": "2026-05-16T12:55:00Z"
                        },
                        {
                            "value": "0.04573",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89311",
                            "published_at": "2026-05-14T12:55:00Z"
                        },
                        {
                            "value": "0.04573",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89162",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.04573",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89168",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.04573",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89183",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.04573",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89186",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.04573",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89204",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.04573",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89208",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.04573",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89218",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.04573",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89214",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.04573",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89212",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.04573",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89224",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.04573",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8922",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.04573",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89237",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.04573",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89243",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.04573",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89246",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.04573",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89255",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.04573",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89271",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.04573",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89283",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.04573",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8928",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.04573",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89291",
                            "published_at": "2026-05-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-8980"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1367462",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1367462"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8980",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8980"
                },
                {
                    "reference_url": "http://seclists.org/fulldisclosure/2016/Aug/76",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://seclists.org/fulldisclosure/2016/Aug/76"
                },
                {
                    "reference_url": "https://launchpad.net/php-gettext/trunk/1.0.12",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://launchpad.net/php-gettext/trunk/1.0.12"
                },
                {
                    "reference_url": "https://lwn.net/Alerts/708838/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://lwn.net/Alerts/708838/"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2017/01/18/4",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.openwall.com/lists/oss-security/2017/01/18/4"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/95754",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/95754"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=851770",
                    "reference_id": "851770",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=851770"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php-gettext_project:php-gettext:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:php-gettext_project:php-gettext:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php-gettext_project:php-gettext:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:24:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:fedoraproject:fedora:24:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:24:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:opensuse:leap:42.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2015-8980",
                    "reference_id": "CVE-2015-8980",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:P"
                        },
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-8980"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/USN-4779-1/",
                    "reference_id": "USN-USN-4779-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/USN-4779-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935230?format=api",
                    "purl": "pkg:deb/debian/phpmyadmin@4:4.6.6-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:4.6.6-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935143?format=api",
                    "purl": "pkg:deb/debian/phpmyadmin@4:5.0.4%2Bdfsg2-2%2Bdeb11u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-na3j-h3qr-k7dc"
                        },
                        {
                            "vulnerability": "VCID-ndjn-p6gb-u7g4"
                        },
                        {
                            "vulnerability": "VCID-rqy8-n6fr-hqey"
                        },
                        {
                            "vulnerability": "VCID-zd8d-c1nk-g7a4"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:5.0.4%252Bdfsg2-2%252Bdeb11u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935141?format=api",
                    "purl": "pkg:deb/debian/phpmyadmin@4:5.2.1%2Bdfsg-1%2Bdeb12u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-zd8d-c1nk-g7a4"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:5.2.1%252Bdfsg-1%252Bdeb12u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935145?format=api",
                    "purl": "pkg:deb/debian/phpmyadmin@4:5.2.2-really%2Bdfsg-1%2Bdeb13u1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:5.2.2-really%252Bdfsg-1%252Bdeb13u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935144?format=api",
                    "purl": "pkg:deb/debian/phpmyadmin@4:5.2.3%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:5.2.3%252Bdfsg-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2015-8980"
            ],
            "risk_score": 4.4,
            "exploitability": "0.5",
            "weighted_severity": "8.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-f4d7-69e8-sqej"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/8002?format=api",
            "vulnerability_id": "VCID-uw6h-fpzy-x3ap",
            "summary": "URL Redirection to Untrusted Site (Open Redirect)\nphpMyAdmin is vulnerable to an open redirect weakness.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-1000013",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00239",
                            "scoring_system": "epss",
                            "scoring_elements": "0.47045",
                            "published_at": "2026-05-16T12:55:00Z"
                        },
                        {
                            "value": "0.00239",
                            "scoring_system": "epss",
                            "scoring_elements": "0.46983",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00239",
                            "scoring_system": "epss",
                            "scoring_elements": "0.46896",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00239",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4696",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00239",
                            "scoring_system": "epss",
                            "scoring_elements": "0.46979",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00239",
                            "scoring_system": "epss",
                            "scoring_elements": "0.46923",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.00239",
                            "scoring_system": "epss",
                            "scoring_elements": "0.46955",
                            "published_at": "2026-05-12T12:55:00Z"
                        },
                        {
                            "value": "0.00239",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4704",
                            "published_at": "2026-05-15T12:55:00Z"
                        },
                        {
                            "value": "0.00239",
                            "scoring_system": "epss",
                            "scoring_elements": "0.46978",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00239",
                            "scoring_system": "epss",
                            "scoring_elements": "0.47014",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00239",
                            "scoring_system": "epss",
                            "scoring_elements": "0.47033",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00239",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4698",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00239",
                            "scoring_system": "epss",
                            "scoring_elements": "0.47035",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00239",
                            "scoring_system": "epss",
                            "scoring_elements": "0.47031",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00239",
                            "scoring_system": "epss",
                            "scoring_elements": "0.47055",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00239",
                            "scoring_system": "epss",
                            "scoring_elements": "0.47029",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00239",
                            "scoring_system": "epss",
                            "scoring_elements": "0.47036",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00239",
                            "scoring_system": "epss",
                            "scoring_elements": "0.47092",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00239",
                            "scoring_system": "epss",
                            "scoring_elements": "0.47088",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00239",
                            "scoring_system": "epss",
                            "scoring_elements": "0.47024",
                            "published_at": "2026-05-14T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-1000013"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000013",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000013"
                },
                {
                    "reference_url": "https://web.archive.org/web/20210123220100/http://www.securityfocus.com/bid/95720",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://web.archive.org/web/20210123220100/http://www.securityfocus.com/bid/95720"
                },
                {
                    "reference_url": "https://www.phpmyadmin.net/security/PMASA-2017-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.phpmyadmin.net/security/PMASA-2017-1"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/95720",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/95720"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-1000013",
                    "reference_id": "CVE-2017-1000013",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-1000013"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-5h5m-fj48-qpjw",
                    "reference_id": "GHSA-5h5m-fj48-qpjw",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "MODERATE",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-5h5m-fj48-qpjw"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935230?format=api",
                    "purl": "pkg:deb/debian/phpmyadmin@4:4.6.6-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:4.6.6-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935143?format=api",
                    "purl": "pkg:deb/debian/phpmyadmin@4:5.0.4%2Bdfsg2-2%2Bdeb11u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-na3j-h3qr-k7dc"
                        },
                        {
                            "vulnerability": "VCID-ndjn-p6gb-u7g4"
                        },
                        {
                            "vulnerability": "VCID-rqy8-n6fr-hqey"
                        },
                        {
                            "vulnerability": "VCID-zd8d-c1nk-g7a4"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:5.0.4%252Bdfsg2-2%252Bdeb11u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935141?format=api",
                    "purl": "pkg:deb/debian/phpmyadmin@4:5.2.1%2Bdfsg-1%2Bdeb12u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-zd8d-c1nk-g7a4"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:5.2.1%252Bdfsg-1%252Bdeb12u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935145?format=api",
                    "purl": "pkg:deb/debian/phpmyadmin@4:5.2.2-really%2Bdfsg-1%2Bdeb13u1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:5.2.2-really%252Bdfsg-1%252Bdeb13u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935144?format=api",
                    "purl": "pkg:deb/debian/phpmyadmin@4:5.2.3%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:5.2.3%252Bdfsg-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2017-1000013",
                "GHSA-5h5m-fj48-qpjw"
            ],
            "risk_score": 3.1,
            "exploitability": "0.5",
            "weighted_severity": "6.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-uw6h-fpzy-x3ap"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/8006?format=api",
            "vulnerability_id": "VCID-zreq-41ja-pbf1",
            "summary": "Improper Input Validation\nphpMyAdmin is vulnerable to a DoS weakness in the table editing functionality.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-1000014",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01144",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78649",
                            "published_at": "2026-05-16T12:55:00Z"
                        },
                        {
                            "value": "0.01144",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7854",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.01144",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78564",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.01144",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78579",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.01144",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78576",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.01144",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78592",
                            "published_at": "2026-05-12T12:55:00Z"
                        },
                        {
                            "value": "0.01144",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78629",
                            "published_at": "2026-05-14T12:55:00Z"
                        },
                        {
                            "value": "0.01144",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78642",
                            "published_at": "2026-05-15T12:55:00Z"
                        },
                        {
                            "value": "0.01144",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78396",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01144",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78403",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01144",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78434",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01144",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78417",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01144",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78443",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01144",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78448",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01144",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78474",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01144",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78455",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01144",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78475",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.01144",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7847",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.01144",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78503",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.01144",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7851",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.01144",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78525",
                            "published_at": "2026-04-29T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-1000014"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000014",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000014"
                },
                {
                    "reference_url": "https://web.archive.org/web/20210123220105/http://www.securityfocus.com/bid/95721",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://web.archive.org/web/20210123220105/http://www.securityfocus.com/bid/95721"
                },
                {
                    "reference_url": "https://www.phpmyadmin.net/security/PMASA-2017-3",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.phpmyadmin.net/security/PMASA-2017-3"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/95721",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/95721"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-1000014",
                    "reference_id": "CVE-2017-1000014",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-1000014"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-9hrc-rwrq-v6mh",
                    "reference_id": "GHSA-9hrc-rwrq-v6mh",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "HIGH",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-9hrc-rwrq-v6mh"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/USN-4843-1/",
                    "reference_id": "USN-USN-4843-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/USN-4843-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935230?format=api",
                    "purl": "pkg:deb/debian/phpmyadmin@4:4.6.6-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:4.6.6-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935143?format=api",
                    "purl": "pkg:deb/debian/phpmyadmin@4:5.0.4%2Bdfsg2-2%2Bdeb11u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-na3j-h3qr-k7dc"
                        },
                        {
                            "vulnerability": "VCID-ndjn-p6gb-u7g4"
                        },
                        {
                            "vulnerability": "VCID-rqy8-n6fr-hqey"
                        },
                        {
                            "vulnerability": "VCID-zd8d-c1nk-g7a4"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:5.0.4%252Bdfsg2-2%252Bdeb11u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935141?format=api",
                    "purl": "pkg:deb/debian/phpmyadmin@4:5.2.1%2Bdfsg-1%2Bdeb12u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-zd8d-c1nk-g7a4"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:5.2.1%252Bdfsg-1%252Bdeb12u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935145?format=api",
                    "purl": "pkg:deb/debian/phpmyadmin@4:5.2.2-really%2Bdfsg-1%2Bdeb13u1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:5.2.2-really%252Bdfsg-1%252Bdeb13u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/935144?format=api",
                    "purl": "pkg:deb/debian/phpmyadmin@4:5.2.3%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:5.2.3%252Bdfsg-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2017-1000014",
                "GHSA-9hrc-rwrq-v6mh"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-zreq-41ja-pbf1"
        }
    ],
    "risk_score": null,
    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:4.6.6-1%3Fdistro=trixie"
}