Lookup for vulnerable packages by Package URL.

GET /api/packages/387187?format=api
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "url": "http://public2.vulnerablecode.io/api/packages/387187?format=api",
    "purl": "pkg:apk/alpine/phpmyadmin@4.4.15.8-r0?arch=x86&distroversion=v3.2&reponame=main",
    "type": "apk",
    "namespace": "alpine",
    "name": "phpmyadmin",
    "version": "4.4.15.8-r0",
    "qualifiers": {
        "arch": "x86",
        "distroversion": "v3.2",
        "reponame": "main"
    },
    "subpath": "",
    "is_vulnerable": false,
    "next_non_vulnerable_version": "4.4.15.9-r0",
    "latest_non_vulnerable_version": "4.4.15.9-r0",
    "affected_by_vulnerabilities": [],
    "fixing_vulnerabilities": [
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/7575?format=api",
            "vulnerability_id": "VCID-1dc8-kafr-3qd7",
            "summary": "Cross-site Scripting\nAn issue was discovered in phpMyAdmin. An attacker may be able to trigger a user to download a specially crafted malicious SVG file.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-6628",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00258",
                            "scoring_system": "epss",
                            "scoring_elements": "0.49225",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00258",
                            "scoring_system": "epss",
                            "scoring_elements": "0.49155",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00258",
                            "scoring_system": "epss",
                            "scoring_elements": "0.49186",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00258",
                            "scoring_system": "epss",
                            "scoring_elements": "0.49214",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00258",
                            "scoring_system": "epss",
                            "scoring_elements": "0.49165",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00258",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4922",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00258",
                            "scoring_system": "epss",
                            "scoring_elements": "0.49216",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00258",
                            "scoring_system": "epss",
                            "scoring_elements": "0.49234",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00258",
                            "scoring_system": "epss",
                            "scoring_elements": "0.49207",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00258",
                            "scoring_system": "epss",
                            "scoring_elements": "0.49212",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00258",
                            "scoring_system": "epss",
                            "scoring_elements": "0.49257",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00258",
                            "scoring_system": "epss",
                            "scoring_elements": "0.49255",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-6628"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6628",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6628"
                },
                {
                    "reference_url": "https://github.com/phpmyadmin/composer",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/phpmyadmin/composer"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2019/06/msg00009.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2019/06/msg00009.html"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201701-32",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201701-32"
                },
                {
                    "reference_url": "https://www.phpmyadmin.net/security/PMASA-2016-51",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.phpmyadmin.net/security/PMASA-2016-51"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/92492",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/92492"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-6628",
                    "reference_id": "CVE-2016-6628",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-6628"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-phhm-63xx-v9rr",
                    "reference_id": "GHSA-phhm-63xx-v9rr",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "MODERATE",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-phhm-63xx-v9rr"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/387187?format=api",
                    "purl": "pkg:apk/alpine/phpmyadmin@4.4.15.8-r0?arch=x86&distroversion=v3.2&reponame=main",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/phpmyadmin@4.4.15.8-r0%3Farch=x86&distroversion=v3.2&reponame=main"
                }
            ],
            "aliases": [
                "CVE-2016-6628",
                "GHSA-phhm-63xx-v9rr"
            ],
            "risk_score": 3.1,
            "exploitability": "0.5",
            "weighted_severity": "6.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-1dc8-kafr-3qd7"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/42617?format=api",
            "vulnerability_id": "VCID-5cdg-4z32-syfp",
            "summary": "Multiple vulnerabilities have been found in phpMyAdmin, the worst\n    of which could lead to arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-6617",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00376",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5911",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00376",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59184",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00376",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59208",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00376",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59172",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00376",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59224",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00376",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59237",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00376",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59257",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00376",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59239",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00376",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5922",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00376",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59262",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00376",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59244",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-6617"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6617",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6617"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/387187?format=api",
                    "purl": "pkg:apk/alpine/phpmyadmin@4.4.15.8-r0?arch=x86&distroversion=v3.2&reponame=main",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/phpmyadmin@4.4.15.8-r0%3Farch=x86&distroversion=v3.2&reponame=main"
                }
            ],
            "aliases": [
                "CVE-2016-6617"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-5cdg-4z32-syfp"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/7602?format=api",
            "vulnerability_id": "VCID-64sy-unts-juf3",
            "summary": "Information Exposure\nAn issue was discovered in phpMyAdmin. An attacker can determine whether a user is logged in to phpMyAdmin. The user session, username, and password are not compromised by this vulnerability.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-6625",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00275",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50974",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00275",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50851",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00275",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50909",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00275",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50935",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00275",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50892",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00275",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50949",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00275",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50947",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00275",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50989",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00275",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50967",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00275",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50951",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00275",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50988",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00275",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50995",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-6625"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6625",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6625"
                },
                {
                    "reference_url": "https://github.com/phpmyadmin/composer",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/phpmyadmin/composer"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201701-32",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201701-32"
                },
                {
                    "reference_url": "https://www.phpmyadmin.net/security/PMASA-2016-48",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.phpmyadmin.net/security/PMASA-2016-48"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/92491",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/92491"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-6625",
                    "reference_id": "CVE-2016-6625",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-6625"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-r643-7xfg-ppc5",
                    "reference_id": "GHSA-r643-7xfg-ppc5",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "MODERATE",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-r643-7xfg-ppc5"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/387187?format=api",
                    "purl": "pkg:apk/alpine/phpmyadmin@4.4.15.8-r0?arch=x86&distroversion=v3.2&reponame=main",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/phpmyadmin@4.4.15.8-r0%3Farch=x86&distroversion=v3.2&reponame=main"
                }
            ],
            "aliases": [
                "CVE-2016-6625",
                "GHSA-r643-7xfg-ppc5"
            ],
            "risk_score": 3.1,
            "exploitability": "0.5",
            "weighted_severity": "6.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-64sy-unts-juf3"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/42610?format=api",
            "vulnerability_id": "VCID-6qn6-3v4w-pqhw",
            "summary": "Multiple vulnerabilities have been found in phpMyAdmin, the worst\n    of which could lead to arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-6606",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00258",
                            "scoring_system": "epss",
                            "scoring_elements": "0.49159",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00258",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4919",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00258",
                            "scoring_system": "epss",
                            "scoring_elements": "0.49218",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00258",
                            "scoring_system": "epss",
                            "scoring_elements": "0.49169",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00258",
                            "scoring_system": "epss",
                            "scoring_elements": "0.49224",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00258",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4922",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00258",
                            "scoring_system": "epss",
                            "scoring_elements": "0.49238",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00258",
                            "scoring_system": "epss",
                            "scoring_elements": "0.49211",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00258",
                            "scoring_system": "epss",
                            "scoring_elements": "0.49216",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00258",
                            "scoring_system": "epss",
                            "scoring_elements": "0.49262",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00258",
                            "scoring_system": "epss",
                            "scoring_elements": "0.49259",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00258",
                            "scoring_system": "epss",
                            "scoring_elements": "0.49229",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-6606"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6606",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6606"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/387187?format=api",
                    "purl": "pkg:apk/alpine/phpmyadmin@4.4.15.8-r0?arch=x86&distroversion=v3.2&reponame=main",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/phpmyadmin@4.4.15.8-r0%3Farch=x86&distroversion=v3.2&reponame=main"
                }
            ],
            "aliases": [
                "CVE-2016-6606"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6qn6-3v4w-pqhw"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/7580?format=api",
            "vulnerability_id": "VCID-8fu3-wm7d-qkeu",
            "summary": "Incomplete Cleanup\nAn issue was discovered in phpMyAdmin where, under certain conditions, phpMyAdmin may not delete temporary files during the import of ESRI files.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-6632",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00567",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68518",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00567",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68424",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00567",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68443",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00567",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68463",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00567",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68439",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00567",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68489",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00567",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68506",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00567",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68532",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00567",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6852",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00567",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68488",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00567",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68527",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00567",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6854",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-6632"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6632",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6632"
                },
                {
                    "reference_url": "https://github.com/phpmyadmin/composer",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/phpmyadmin/composer"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2019/06/msg00009.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2019/06/msg00009.html"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201701-32",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201701-32"
                },
                {
                    "reference_url": "https://www.phpmyadmin.net/security/PMASA-2016-55",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.phpmyadmin.net/security/PMASA-2016-55"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/92497",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/92497"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-6632",
                    "reference_id": "CVE-2016-6632",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-6632"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-426q-975p-w5cr",
                    "reference_id": "GHSA-426q-975p-w5cr",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "MODERATE",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-426q-975p-w5cr"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/387187?format=api",
                    "purl": "pkg:apk/alpine/phpmyadmin@4.4.15.8-r0?arch=x86&distroversion=v3.2&reponame=main",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/phpmyadmin@4.4.15.8-r0%3Farch=x86&distroversion=v3.2&reponame=main"
                }
            ],
            "aliases": [
                "CVE-2016-6632",
                "GHSA-426q-975p-w5cr"
            ],
            "risk_score": 3.1,
            "exploitability": "0.5",
            "weighted_severity": "6.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-8fu3-wm7d-qkeu"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/42624?format=api",
            "vulnerability_id": "VCID-95rw-mj5a-63cb",
            "summary": "Multiple vulnerabilities have been found in phpMyAdmin, the worst\n    of which could lead to arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-6630",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00713",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72266",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00713",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72272",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00713",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72292",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00713",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72268",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00713",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72306",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00713",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72319",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00713",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72341",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00713",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72325",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00713",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72311",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00713",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72353",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00713",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72362",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00713",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7235",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-6630"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6630",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6630"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/USN-4843-1/",
                    "reference_id": "USN-USN-4843-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/USN-4843-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/387187?format=api",
                    "purl": "pkg:apk/alpine/phpmyadmin@4.4.15.8-r0?arch=x86&distroversion=v3.2&reponame=main",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/phpmyadmin@4.4.15.8-r0%3Farch=x86&distroversion=v3.2&reponame=main"
                }
            ],
            "aliases": [
                "CVE-2016-6630"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-95rw-mj5a-63cb"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/7600?format=api",
            "vulnerability_id": "VCID-9t2s-etzf-t3d2",
            "summary": "Command Injection\nAn issue was discovered in phpMyAdmin. A specially crafted database name could be used to run arbitrary PHP commands through the array export feature.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-6609",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00425",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62256",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00425",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62108",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00425",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62169",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00425",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62199",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00425",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62166",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00425",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62216",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00425",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62233",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00425",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62252",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00425",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62241",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00425",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6222",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00425",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62265",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00425",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62272",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-6609"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6609",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6609"
                },
                {
                    "reference_url": "https://github.com/phpmyadmin/composer",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/phpmyadmin/composer"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00006.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00006.html"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201701-32",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201701-32"
                },
                {
                    "reference_url": "https://www.phpmyadmin.net/security/PMASA-2016-32",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.phpmyadmin.net/security/PMASA-2016-32"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/94112",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/94112"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-6609",
                    "reference_id": "CVE-2016-6609",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-6609"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-wpww-hx7x-xfjh",
                    "reference_id": "GHSA-wpww-hx7x-xfjh",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "HIGH",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-wpww-hx7x-xfjh"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/USN-4843-1/",
                    "reference_id": "USN-USN-4843-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/USN-4843-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/387187?format=api",
                    "purl": "pkg:apk/alpine/phpmyadmin@4.4.15.8-r0?arch=x86&distroversion=v3.2&reponame=main",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/phpmyadmin@4.4.15.8-r0%3Farch=x86&distroversion=v3.2&reponame=main"
                }
            ],
            "aliases": [
                "CVE-2016-6609",
                "GHSA-wpww-hx7x-xfjh"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9t2s-etzf-t3d2"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/42625?format=api",
            "vulnerability_id": "VCID-b4xu-wcz2-9fdh",
            "summary": "Multiple vulnerabilities have been found in phpMyAdmin, the worst\n    of which could lead to arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-6631",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.03567",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87666",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.03567",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87676",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.03567",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87688",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.03567",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8769",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.03567",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87711",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.03567",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87717",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.03567",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87729",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.03567",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87722",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.03567",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8772",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.03567",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87734",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.03567",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87731",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-6631"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6631",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6631"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/387187?format=api",
                    "purl": "pkg:apk/alpine/phpmyadmin@4.4.15.8-r0?arch=x86&distroversion=v3.2&reponame=main",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/phpmyadmin@4.4.15.8-r0%3Farch=x86&distroversion=v3.2&reponame=main"
                }
            ],
            "aliases": [
                "CVE-2016-6631"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-b4xu-wcz2-9fdh"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/42616?format=api",
            "vulnerability_id": "VCID-dfgy-a4j1-vfh2",
            "summary": "Multiple vulnerabilities have been found in phpMyAdmin, the worst\n    of which could lead to arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-6616",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00316",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54629",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00316",
                            "scoring_system": "epss",
                            "scoring_elements": "0.547",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00316",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54722",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00316",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54692",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00316",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54745",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00316",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54741",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00316",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54753",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00316",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54737",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00316",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54715",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00316",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54755",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00316",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54736",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-6616"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6616",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6616"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/387187?format=api",
                    "purl": "pkg:apk/alpine/phpmyadmin@4.4.15.8-r0?arch=x86&distroversion=v3.2&reponame=main",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/phpmyadmin@4.4.15.8-r0%3Farch=x86&distroversion=v3.2&reponame=main"
                }
            ],
            "aliases": [
                "CVE-2016-6616"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-dfgy-a4j1-vfh2"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/42615?format=api",
            "vulnerability_id": "VCID-ds3z-k4ry-tqfa",
            "summary": "Multiple vulnerabilities have been found in phpMyAdmin, the worst\n    of which could lead to arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-6615",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.005",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65891",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.005",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65932",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.005",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65963",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.005",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65929",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.005",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6598",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.005",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65992",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.005",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66011",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.005",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65998",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.005",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65968",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.005",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66003",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.005",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66017",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.005",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66004",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-6615"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6615",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6615"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/387187?format=api",
                    "purl": "pkg:apk/alpine/phpmyadmin@4.4.15.8-r0?arch=x86&distroversion=v3.2&reponame=main",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/phpmyadmin@4.4.15.8-r0%3Farch=x86&distroversion=v3.2&reponame=main"
                }
            ],
            "aliases": [
                "CVE-2016-6615"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ds3z-k4ry-tqfa"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/7589?format=api",
            "vulnerability_id": "VCID-e9qs-mvaa-wyc6",
            "summary": "Incomplete List of Disallowed Inputs\nAn issue was discovered in phpMyAdmin involving improper enforcement of the IP-based authentication rules. When phpMyAdmin is used with IPv6 in a proxy server environment, and the proxy server is in the allowed range but the attacking computer is not allowed, this vulnerability can allow the attacking computer to connect despite the IP rules.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-6624",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.003",
                            "scoring_system": "epss",
                            "scoring_elements": "0.53332",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.003",
                            "scoring_system": "epss",
                            "scoring_elements": "0.53227",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.003",
                            "scoring_system": "epss",
                            "scoring_elements": "0.53251",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.003",
                            "scoring_system": "epss",
                            "scoring_elements": "0.53276",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.003",
                            "scoring_system": "epss",
                            "scoring_elements": "0.53244",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.003",
                            "scoring_system": "epss",
                            "scoring_elements": "0.53296",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.003",
                            "scoring_system": "epss",
                            "scoring_elements": "0.53291",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.003",
                            "scoring_system": "epss",
                            "scoring_elements": "0.53341",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.003",
                            "scoring_system": "epss",
                            "scoring_elements": "0.53326",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.003",
                            "scoring_system": "epss",
                            "scoring_elements": "0.53309",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.003",
                            "scoring_system": "epss",
                            "scoring_elements": "0.53347",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.003",
                            "scoring_system": "epss",
                            "scoring_elements": "0.53352",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-6624"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6624",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6624"
                },
                {
                    "reference_url": "https://github.com/phpmyadmin/composer",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/phpmyadmin/composer"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2019/06/msg00009.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2019/06/msg00009.html"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201701-32",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201701-32"
                },
                {
                    "reference_url": "https://www.phpmyadmin.net/security/PMASA-2016-47",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.phpmyadmin.net/security/PMASA-2016-47"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/92489",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/92489"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-6624",
                    "reference_id": "CVE-2016-6624",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-6624"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-mhxj-6vf8-mwv3",
                    "reference_id": "GHSA-mhxj-6vf8-mwv3",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "MODERATE",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-mhxj-6vf8-mwv3"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/387187?format=api",
                    "purl": "pkg:apk/alpine/phpmyadmin@4.4.15.8-r0?arch=x86&distroversion=v3.2&reponame=main",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/phpmyadmin@4.4.15.8-r0%3Farch=x86&distroversion=v3.2&reponame=main"
                }
            ],
            "aliases": [
                "CVE-2016-6624",
                "GHSA-mhxj-6vf8-mwv3"
            ],
            "risk_score": 3.1,
            "exploitability": "0.5",
            "weighted_severity": "6.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-e9qs-mvaa-wyc6"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/42613?format=api",
            "vulnerability_id": "VCID-ff6r-sq16-nbff",
            "summary": "Multiple vulnerabilities have been found in phpMyAdmin, the worst\n    of which could lead to arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-6611",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00365",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58388",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00365",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58474",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00365",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58494",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00365",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58465",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00365",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58517",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00365",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58524",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00365",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5854",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00365",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58521",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00365",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58501",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00365",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58534",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00365",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58539",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-6611"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6611",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6611"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/387187?format=api",
                    "purl": "pkg:apk/alpine/phpmyadmin@4.4.15.8-r0?arch=x86&distroversion=v3.2&reponame=main",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/phpmyadmin@4.4.15.8-r0%3Farch=x86&distroversion=v3.2&reponame=main"
                }
            ],
            "aliases": [
                "CVE-2016-6611"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ff6r-sq16-nbff"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/7587?format=api",
            "vulnerability_id": "VCID-fgr8-8j61-cufq",
            "summary": "Information Exposure\nAn issue was discovered in phpMyAdmin. A user can exploit the \"LOAD LOCAL INFILE\" functionality to expose files on the server to the database system.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-6612",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00411",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61453",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00411",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61298",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00411",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61377",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00411",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61406",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00411",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61375",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00411",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61422",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00411",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61437",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00411",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61459",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00411",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61444",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00411",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61426",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00411",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61465",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00411",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61469",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-6612"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6612",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6612"
                },
                {
                    "reference_url": "https://github.com/phpmyadmin/composer",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/phpmyadmin/composer"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2019/06/msg00009.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2019/06/msg00009.html"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201701-32",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201701-32"
                },
                {
                    "reference_url": "https://www.phpmyadmin.net/security/PMASA-2016-35",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.phpmyadmin.net/security/PMASA-2016-35"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/94113",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/94113"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-6612",
                    "reference_id": "CVE-2016-6612",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-6612"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-fcgm-62p3-f7cm",
                    "reference_id": "GHSA-fcgm-62p3-f7cm",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "MODERATE",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-fcgm-62p3-f7cm"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/387187?format=api",
                    "purl": "pkg:apk/alpine/phpmyadmin@4.4.15.8-r0?arch=x86&distroversion=v3.2&reponame=main",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/phpmyadmin@4.4.15.8-r0%3Farch=x86&distroversion=v3.2&reponame=main"
                }
            ],
            "aliases": [
                "CVE-2016-6612",
                "GHSA-fcgm-62p3-f7cm"
            ],
            "risk_score": 3.1,
            "exploitability": "0.5",
            "weighted_severity": "6.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-fgr8-8j61-cufq"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/7596?format=api",
            "vulnerability_id": "VCID-fvnp-w4kk-3qfq",
            "summary": "Cross-site Scripting\nXSS issues were discovered in phpMyAdmin. This affects the database privilege check and the \"Remove partitioning\" functionality. Specially crafted database names can trigger the XSS attack.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-6608",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00452",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63751",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00452",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63625",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00452",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63685",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00452",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63711",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00452",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63671",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00452",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63723",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00452",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63741",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00452",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63755",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00452",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6374",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00452",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63706",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00452",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63742",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-6608"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6608",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6608"
                },
                {
                    "reference_url": "https://github.com/phpmyadmin/composer",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/phpmyadmin/composer"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201701-32",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201701-32"
                },
                {
                    "reference_url": "https://www.phpmyadmin.net/security/PMASA-2016-31",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.phpmyadmin.net/security/PMASA-2016-31"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/93258",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/93258"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-6608",
                    "reference_id": "CVE-2016-6608",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-6608"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-jfmj-27fp-qp67",
                    "reference_id": "GHSA-jfmj-27fp-qp67",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "MODERATE",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-jfmj-27fp-qp67"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/387187?format=api",
                    "purl": "pkg:apk/alpine/phpmyadmin@4.4.15.8-r0?arch=x86&distroversion=v3.2&reponame=main",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/phpmyadmin@4.4.15.8-r0%3Farch=x86&distroversion=v3.2&reponame=main"
                }
            ],
            "aliases": [
                "CVE-2016-6608",
                "GHSA-jfmj-27fp-qp67"
            ],
            "risk_score": 3.1,
            "exploitability": "0.5",
            "weighted_severity": "6.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-fvnp-w4kk-3qfq"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/7585?format=api",
            "vulnerability_id": "VCID-h5wu-ugm7-4bah",
            "summary": "Code Injection\nAn issue was discovered in phpMyAdmin. phpMyAdmin can be used to trigger a remote code execution attack against certain PHP installations that are running with the dbase extension.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-6633",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01833",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8296",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.01833",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82853",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01833",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82869",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01833",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82882",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01833",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82878",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01833",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82903",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01833",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82911",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01833",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82926",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01833",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82922",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01833",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82918",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01833",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82957",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-6633"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6633",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6633"
                },
                {
                    "reference_url": "https://github.com/phpmyadmin/composer",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/phpmyadmin/composer"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201701-32",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201701-32"
                },
                {
                    "reference_url": "https://www.phpmyadmin.net/security/PMASA-2016-56",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.phpmyadmin.net/security/PMASA-2016-56"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/92500",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/92500"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-6633",
                    "reference_id": "CVE-2016-6633",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-6633"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-p849-vf5f-f3x7",
                    "reference_id": "GHSA-p849-vf5f-f3x7",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "HIGH",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-p849-vf5f-f3x7"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/387187?format=api",
                    "purl": "pkg:apk/alpine/phpmyadmin@4.4.15.8-r0?arch=x86&distroversion=v3.2&reponame=main",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/phpmyadmin@4.4.15.8-r0%3Farch=x86&distroversion=v3.2&reponame=main"
                }
            ],
            "aliases": [
                "CVE-2016-6633",
                "GHSA-p849-vf5f-f3x7"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-h5wu-ugm7-4bah"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/42619?format=api",
            "vulnerability_id": "VCID-j3s8-nxah-pqgz",
            "summary": "Multiple vulnerabilities have been found in phpMyAdmin, the worst\n    of which could lead to arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-6620",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01398",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8035",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01398",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80357",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01398",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80376",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01398",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80366",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01398",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80395",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01398",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80405",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01398",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80423",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01398",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80408",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01398",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80401",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01398",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80431",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.01398",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80432",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.01398",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80435",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-6620"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6620",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6620"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/387187?format=api",
                    "purl": "pkg:apk/alpine/phpmyadmin@4.4.15.8-r0?arch=x86&distroversion=v3.2&reponame=main",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/phpmyadmin@4.4.15.8-r0%3Farch=x86&distroversion=v3.2&reponame=main"
                }
            ],
            "aliases": [
                "CVE-2016-6620"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-j3s8-nxah-pqgz"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/42614?format=api",
            "vulnerability_id": "VCID-qfg6-ugqq-3fdx",
            "summary": "Multiple vulnerabilities have been found in phpMyAdmin, the worst\n    of which could lead to arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-6614",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0111",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78078",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.0111",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78087",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0111",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78117",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0111",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78099",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0111",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78126",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0111",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78132",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0111",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78158",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0111",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7814",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0111",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78136",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0111",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78169",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.0111",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78168",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.0111",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78163",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-6614"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6614",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6614"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/387187?format=api",
                    "purl": "pkg:apk/alpine/phpmyadmin@4.4.15.8-r0?arch=x86&distroversion=v3.2&reponame=main",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/phpmyadmin@4.4.15.8-r0%3Farch=x86&distroversion=v3.2&reponame=main"
                }
            ],
            "aliases": [
                "CVE-2016-6614"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qfg6-ugqq-3fdx"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/42622?format=api",
            "vulnerability_id": "VCID-qyt8-pcq2-kufz",
            "summary": "Multiple vulnerabilities have been found in phpMyAdmin, the worst\n    of which could lead to arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-6626",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00433",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62624",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00433",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62682",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00433",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62715",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00433",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62679",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00433",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62731",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00433",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62747",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00433",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62765",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00433",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62755",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00433",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62772",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00433",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6278",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00433",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62761",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-6626"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6626",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6626"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/387187?format=api",
                    "purl": "pkg:apk/alpine/phpmyadmin@4.4.15.8-r0?arch=x86&distroversion=v3.2&reponame=main",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/phpmyadmin@4.4.15.8-r0%3Farch=x86&distroversion=v3.2&reponame=main"
                }
            ],
            "aliases": [
                "CVE-2016-6626"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qyt8-pcq2-kufz"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/42618?format=api",
            "vulnerability_id": "VCID-tgeh-wkw1-67bw",
            "summary": "Multiple vulnerabilities have been found in phpMyAdmin, the worst\n    of which could lead to arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-6619",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00332",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55961",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00332",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56072",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00332",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56093",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00332",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56124",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00332",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56129",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00332",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5614",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00332",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56117",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00332",
                            "scoring_system": "epss",
                            "scoring_elements": "0.561",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00332",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56134",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00332",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56137",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00332",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56107",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-6619"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6619",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6619"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/USN-4843-1/",
                    "reference_id": "USN-USN-4843-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/USN-4843-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/387187?format=api",
                    "purl": "pkg:apk/alpine/phpmyadmin@4.4.15.8-r0?arch=x86&distroversion=v3.2&reponame=main",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/phpmyadmin@4.4.15.8-r0%3Farch=x86&distroversion=v3.2&reponame=main"
                }
            ],
            "aliases": [
                "CVE-2016-6619"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-tgeh-wkw1-67bw"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/7577?format=api",
            "vulnerability_id": "VCID-tydk-zjv1-nye6",
            "summary": "Improper Input Validation\nAn issue was discovered in phpMyAdmin. An unauthenticated user is able to execute a denial-of-service (DoS) attack by forcing persistent connections when phpMyAdmin is running with `$cfg['AllowArbitraryServer']=true`.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-6622",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77197",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.01016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77104",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7711",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7714",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77122",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77155",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77163",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77191",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7717",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77165",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77206",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.01016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77207",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-6622"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6622",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6622"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00006.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00006.html"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201701-32",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201701-32"
                },
                {
                    "reference_url": "https://web.archive.org/web/20210125183746/http://www.securityfocus.com/bid/95049",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://web.archive.org/web/20210125183746/http://www.securityfocus.com/bid/95049"
                },
                {
                    "reference_url": "https://www.phpmyadmin.net/security/PMASA-2016-45",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.phpmyadmin.net/security/PMASA-2016-45"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-6622",
                    "reference_id": "CVE-2016-6622",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-6622"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-qf3f-7x69-qfv3",
                    "reference_id": "GHSA-qf3f-7x69-qfv3",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "MODERATE",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-qf3f-7x69-qfv3"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/387187?format=api",
                    "purl": "pkg:apk/alpine/phpmyadmin@4.4.15.8-r0?arch=x86&distroversion=v3.2&reponame=main",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/phpmyadmin@4.4.15.8-r0%3Farch=x86&distroversion=v3.2&reponame=main"
                }
            ],
            "aliases": [
                "CVE-2016-6622",
                "GHSA-qf3f-7x69-qfv3"
            ],
            "risk_score": 3.1,
            "exploitability": "0.5",
            "weighted_severity": "6.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-tydk-zjv1-nye6"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/42623?format=api",
            "vulnerability_id": "VCID-ukgh-86dw-5yf1",
            "summary": "Multiple vulnerabilities have been found in phpMyAdmin, the worst\n    of which could lead to arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-6627",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57363",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.0035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57446",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57468",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57445",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57497",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57501",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.0035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57517",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57494",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57475",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57498",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.0035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57476",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-6627"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6627",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6627"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/387187?format=api",
                    "purl": "pkg:apk/alpine/phpmyadmin@4.4.15.8-r0?arch=x86&distroversion=v3.2&reponame=main",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/phpmyadmin@4.4.15.8-r0%3Farch=x86&distroversion=v3.2&reponame=main"
                }
            ],
            "aliases": [
                "CVE-2016-6627"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ukgh-86dw-5yf1"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/7593?format=api",
            "vulnerability_id": "VCID-v66b-3ghf-9uas",
            "summary": "Improper Input Validation\nAn issue was discovered in phpMyAdmin involving the `$cfg['ArbitraryServerRegexp']` configuration directive. An attacker could reuse certain cookie values in a way of bypassing the servers defined by `ArbitraryServerRegexp`.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-6629",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55121",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.0032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54974",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.0032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55075",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55101",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55076",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55126",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55138",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.0032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55118",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.551",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55142",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-6629"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6629",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6629"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201701-32",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "CRITICAL",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201701-32"
                },
                {
                    "reference_url": "https://web.archive.org/web/20210725054025/http://www.securityfocus.com/bid/92493",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "CRITICAL",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://web.archive.org/web/20210725054025/http://www.securityfocus.com/bid/92493"
                },
                {
                    "reference_url": "https://www.phpmyadmin.net/security/PMASA-2016-52",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "CRITICAL",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.phpmyadmin.net/security/PMASA-2016-52"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/92493",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/92493"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-6629",
                    "reference_id": "CVE-2016-6629",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "CRITICAL",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-6629"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-567r-vqj7-5cw7",
                    "reference_id": "GHSA-567r-vqj7-5cw7",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "CRITICAL",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-567r-vqj7-5cw7"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/387187?format=api",
                    "purl": "pkg:apk/alpine/phpmyadmin@4.4.15.8-r0?arch=x86&distroversion=v3.2&reponame=main",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/phpmyadmin@4.4.15.8-r0%3Farch=x86&distroversion=v3.2&reponame=main"
                }
            ],
            "aliases": [
                "CVE-2016-6629",
                "GHSA-567r-vqj7-5cw7"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-v66b-3ghf-9uas"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/42612?format=api",
            "vulnerability_id": "VCID-xm9j-76hy-1qcp",
            "summary": "Multiple vulnerabilities have been found in phpMyAdmin, the worst\n    of which could lead to arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-6610",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00449",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63508",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00449",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63568",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00449",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63595",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00449",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63559",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00449",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6361",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00449",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63627",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00449",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63642",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00449",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63593",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00449",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6363",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00449",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63639",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00449",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63622",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-6610"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6610",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6610"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/387187?format=api",
                    "purl": "pkg:apk/alpine/phpmyadmin@4.4.15.8-r0?arch=x86&distroversion=v3.2&reponame=main",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/phpmyadmin@4.4.15.8-r0%3Farch=x86&distroversion=v3.2&reponame=main"
                }
            ],
            "aliases": [
                "CVE-2016-6610"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xm9j-76hy-1qcp"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/42621?format=api",
            "vulnerability_id": "VCID-xu1c-xtb4-9ygg",
            "summary": "Multiple vulnerabilities have been found in phpMyAdmin, the worst\n    of which could lead to arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-6623",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0055",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67983",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.0055",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67889",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.0055",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67912",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0055",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67931",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0055",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6791",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0055",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67961",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0055",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67975",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0055",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67998",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0055",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67985",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0055",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6795",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0055",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67987",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.0055",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-6623"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6623",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6623"
                },
                {
                    "reference_url": "https://github.com/phpmyadmin/composer",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/phpmyadmin/composer"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-6623",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-6623"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201701-32",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201701-32"
                },
                {
                    "reference_url": "https://web.archive.org/web/20210123204343/http://www.securityfocus.com/bid/95052",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://web.archive.org/web/20210123204343/http://www.securityfocus.com/bid/95052"
                },
                {
                    "reference_url": "https://www.phpmyadmin.net/security/PMASA-2016-46",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.phpmyadmin.net/security/PMASA-2016-46"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-2mcj-3r3r-v5wm",
                    "reference_id": "GHSA-2mcj-3r3r-v5wm",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "MODERATE",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-2mcj-3r3r-v5wm"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/387187?format=api",
                    "purl": "pkg:apk/alpine/phpmyadmin@4.4.15.8-r0?arch=x86&distroversion=v3.2&reponame=main",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/phpmyadmin@4.4.15.8-r0%3Farch=x86&distroversion=v3.2&reponame=main"
                }
            ],
            "aliases": [
                "CVE-2016-6623",
                "GHSA-2mcj-3r3r-v5wm"
            ],
            "risk_score": 3.1,
            "exploitability": "0.5",
            "weighted_severity": "6.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xu1c-xtb4-9ygg"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/42611?format=api",
            "vulnerability_id": "VCID-xwyg-wr8p-r7he",
            "summary": "Multiple vulnerabilities have been found in phpMyAdmin, the worst\n    of which could lead to arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-6607",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00541",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67583",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00541",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67619",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00541",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6764",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00541",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6762",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00541",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67671",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00541",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67686",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00541",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67709",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00541",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67694",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00541",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6766",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00541",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67696",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00541",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67708",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00541",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67688",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-6607"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6607",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6607"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/387187?format=api",
                    "purl": "pkg:apk/alpine/phpmyadmin@4.4.15.8-r0?arch=x86&distroversion=v3.2&reponame=main",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/phpmyadmin@4.4.15.8-r0%3Farch=x86&distroversion=v3.2&reponame=main"
                }
            ],
            "aliases": [
                "CVE-2016-6607"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xwyg-wr8p-r7he"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/7603?format=api",
            "vulnerability_id": "VCID-z22z-a5bq-97d3",
            "summary": "Uncontrolled Resouce Consumption\nAn issue was discovered in phpMyAdmin. The transformation feature allows a user to trigger a denial-of-service (DoS) attack against the server.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-6618",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0055",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67983",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.0055",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67889",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.0055",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67912",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0055",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67931",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0055",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6791",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0055",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67961",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0055",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67975",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0055",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67998",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0055",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67985",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0055",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6795",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0055",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67987",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.0055",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-6618"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6618",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6618"
                },
                {
                    "reference_url": "https://github.com/phpmyadmin/composer",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/phpmyadmin/composer"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00006.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00006.html"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201701-32",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201701-32"
                },
                {
                    "reference_url": "https://www.phpmyadmin.net/security/PMASA-2016-41",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.phpmyadmin.net/security/PMASA-2016-41"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/95047",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/95047"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-6618",
                    "reference_id": "CVE-2016-6618",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-6618"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-rv6m-chvv-wmxg",
                    "reference_id": "GHSA-rv6m-chvv-wmxg",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "MODERATE",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-rv6m-chvv-wmxg"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/387187?format=api",
                    "purl": "pkg:apk/alpine/phpmyadmin@4.4.15.8-r0?arch=x86&distroversion=v3.2&reponame=main",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/phpmyadmin@4.4.15.8-r0%3Farch=x86&distroversion=v3.2&reponame=main"
                }
            ],
            "aliases": [
                "CVE-2016-6618",
                "GHSA-rv6m-chvv-wmxg"
            ],
            "risk_score": 3.1,
            "exploitability": "0.5",
            "weighted_severity": "6.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-z22z-a5bq-97d3"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/7598?format=api",
            "vulnerability_id": "VCID-zg16-dfu1-g7dn",
            "summary": "Information Exposure\nAn issue was discovered in phpMyAdmin. A user can specially craft a symlink on disk, to a file which phpMyAdmin is permitted to read but the user is not, which phpMyAdmin will then expose to the user.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-6613",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00411",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61453",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00411",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61298",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00411",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61377",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00411",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61406",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00411",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61375",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00411",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61422",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00411",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61437",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00411",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61459",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00411",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61444",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00411",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61426",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00411",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61465",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00411",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61469",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-6613"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6613",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6613"
                },
                {
                    "reference_url": "https://github.com/phpmyadmin/composer",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/phpmyadmin/composer"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2019/06/msg00009.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2019/06/msg00009.html"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201701-32",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201701-32"
                },
                {
                    "reference_url": "https://www.phpmyadmin.net/security/PMASA-2016-36",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.phpmyadmin.net/security/PMASA-2016-36"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/94115",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/94115"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-6613",
                    "reference_id": "CVE-2016-6613",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-6613"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-6j2v-g9rg-qcm5",
                    "reference_id": "GHSA-6j2v-g9rg-qcm5",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "MODERATE",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-6j2v-g9rg-qcm5"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/387187?format=api",
                    "purl": "pkg:apk/alpine/phpmyadmin@4.4.15.8-r0?arch=x86&distroversion=v3.2&reponame=main",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/phpmyadmin@4.4.15.8-r0%3Farch=x86&distroversion=v3.2&reponame=main"
                }
            ],
            "aliases": [
                "CVE-2016-6613",
                "GHSA-6j2v-g9rg-qcm5"
            ],
            "risk_score": 3.1,
            "exploitability": "0.5",
            "weighted_severity": "6.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-zg16-dfu1-g7dn"
        }
    ],
    "risk_score": null,
    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/phpmyadmin@4.4.15.8-r0%3Farch=x86&distroversion=v3.2&reponame=main"
}