Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/phpmyadmin@4:4.6.4%2Bdfsg1-1?distro=trixie
Typedeb
Namespacedebian
Namephpmyadmin
Version4:4.6.4+dfsg1-1
Qualifiers
distro trixie
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version4:4.6.5.1-1
Latest_non_vulnerable_version4:5.2.3+dfsg-1
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-1dc8-kafr-3qd7
vulnerability_id VCID-1dc8-kafr-3qd7
summary
Cross-site Scripting
An issue was discovered in phpMyAdmin. An attacker may be able to trigger a user to download a specially crafted malicious SVG file.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-6628
reference_id
reference_type
scores
0
value 0.00258
scoring_system epss
scoring_elements 0.49225
published_at 2026-04-21T12:55:00Z
1
value 0.00258
scoring_system epss
scoring_elements 0.49155
published_at 2026-04-01T12:55:00Z
2
value 0.00258
scoring_system epss
scoring_elements 0.49186
published_at 2026-04-02T12:55:00Z
3
value 0.00258
scoring_system epss
scoring_elements 0.49214
published_at 2026-04-04T12:55:00Z
4
value 0.00258
scoring_system epss
scoring_elements 0.49165
published_at 2026-04-07T12:55:00Z
5
value 0.00258
scoring_system epss
scoring_elements 0.4922
published_at 2026-04-08T12:55:00Z
6
value 0.00258
scoring_system epss
scoring_elements 0.49216
published_at 2026-04-09T12:55:00Z
7
value 0.00258
scoring_system epss
scoring_elements 0.49234
published_at 2026-04-11T12:55:00Z
8
value 0.00258
scoring_system epss
scoring_elements 0.49207
published_at 2026-04-12T12:55:00Z
9
value 0.00258
scoring_system epss
scoring_elements 0.49212
published_at 2026-04-13T12:55:00Z
10
value 0.00258
scoring_system epss
scoring_elements 0.49257
published_at 2026-04-16T12:55:00Z
11
value 0.00258
scoring_system epss
scoring_elements 0.49255
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-6628
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6628
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6628
2
reference_url https://github.com/phpmyadmin/composer
reference_id
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/phpmyadmin/composer
3
reference_url https://lists.debian.org/debian-lts-announce/2019/06/msg00009.html
reference_id
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.debian.org/debian-lts-announce/2019/06/msg00009.html
4
reference_url https://security.gentoo.org/glsa/201701-32
reference_id
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://security.gentoo.org/glsa/201701-32
5
reference_url https://www.phpmyadmin.net/security/PMASA-2016-51
reference_id
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://www.phpmyadmin.net/security/PMASA-2016-51
6
reference_url http://www.securityfocus.com/bid/92492
reference_id
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.securityfocus.com/bid/92492
7
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-6628
reference_id CVE-2016-6628
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2016-6628
8
reference_url https://github.com/advisories/GHSA-phhm-63xx-v9rr
reference_id GHSA-phhm-63xx-v9rr
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-phhm-63xx-v9rr
fixed_packages
0
url pkg:deb/debian/phpmyadmin@4:4.6.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/phpmyadmin@4:4.6.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:4.6.4%252Bdfsg1-1%3Fdistro=trixie
1
url pkg:deb/debian/phpmyadmin@4:5.0.4%2Bdfsg2-2%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/phpmyadmin@4:5.0.4%2Bdfsg2-2%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-na3j-h3qr-k7dc
1
vulnerability VCID-ndjn-p6gb-u7g4
2
vulnerability VCID-rqy8-n6fr-hqey
3
vulnerability VCID-zd8d-c1nk-g7a4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:5.0.4%252Bdfsg2-2%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/phpmyadmin@4:5.2.1%2Bdfsg-1%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/phpmyadmin@4:5.2.1%2Bdfsg-1%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-zd8d-c1nk-g7a4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:5.2.1%252Bdfsg-1%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/phpmyadmin@4:5.2.2-really%2Bdfsg-1%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/phpmyadmin@4:5.2.2-really%2Bdfsg-1%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:5.2.2-really%252Bdfsg-1%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/phpmyadmin@4:5.2.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/phpmyadmin@4:5.2.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:5.2.3%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2016-6628, GHSA-phhm-63xx-v9rr
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1dc8-kafr-3qd7
1
url VCID-5cdg-4z32-syfp
vulnerability_id VCID-5cdg-4z32-syfp
summary
Multiple vulnerabilities have been found in phpMyAdmin, the worst
    of which could lead to arbitrary code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-6617
reference_id
reference_type
scores
0
value 0.00376
scoring_system epss
scoring_elements 0.5911
published_at 2026-04-01T12:55:00Z
1
value 0.00376
scoring_system epss
scoring_elements 0.59184
published_at 2026-04-02T12:55:00Z
2
value 0.00376
scoring_system epss
scoring_elements 0.59208
published_at 2026-04-04T12:55:00Z
3
value 0.00376
scoring_system epss
scoring_elements 0.59172
published_at 2026-04-07T12:55:00Z
4
value 0.00376
scoring_system epss
scoring_elements 0.59224
published_at 2026-04-08T12:55:00Z
5
value 0.00376
scoring_system epss
scoring_elements 0.59237
published_at 2026-04-09T12:55:00Z
6
value 0.00376
scoring_system epss
scoring_elements 0.59257
published_at 2026-04-16T12:55:00Z
7
value 0.00376
scoring_system epss
scoring_elements 0.59239
published_at 2026-04-12T12:55:00Z
8
value 0.00376
scoring_system epss
scoring_elements 0.5922
published_at 2026-04-13T12:55:00Z
9
value 0.00376
scoring_system epss
scoring_elements 0.59262
published_at 2026-04-18T12:55:00Z
10
value 0.00376
scoring_system epss
scoring_elements 0.59244
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-6617
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6617
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6617
fixed_packages
0
url pkg:deb/debian/phpmyadmin@4:4.6.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/phpmyadmin@4:4.6.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:4.6.4%252Bdfsg1-1%3Fdistro=trixie
1
url pkg:deb/debian/phpmyadmin@4:5.0.4%2Bdfsg2-2%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/phpmyadmin@4:5.0.4%2Bdfsg2-2%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-na3j-h3qr-k7dc
1
vulnerability VCID-ndjn-p6gb-u7g4
2
vulnerability VCID-rqy8-n6fr-hqey
3
vulnerability VCID-zd8d-c1nk-g7a4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:5.0.4%252Bdfsg2-2%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/phpmyadmin@4:5.2.1%2Bdfsg-1%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/phpmyadmin@4:5.2.1%2Bdfsg-1%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-zd8d-c1nk-g7a4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:5.2.1%252Bdfsg-1%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/phpmyadmin@4:5.2.2-really%2Bdfsg-1%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/phpmyadmin@4:5.2.2-really%2Bdfsg-1%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:5.2.2-really%252Bdfsg-1%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/phpmyadmin@4:5.2.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/phpmyadmin@4:5.2.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:5.2.3%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2016-6617
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5cdg-4z32-syfp
2
url VCID-64sy-unts-juf3
vulnerability_id VCID-64sy-unts-juf3
summary
Information Exposure
An issue was discovered in phpMyAdmin. An attacker can determine whether a user is logged in to phpMyAdmin. The user session, username, and password are not compromised by this vulnerability.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-6625
reference_id
reference_type
scores
0
value 0.00275
scoring_system epss
scoring_elements 0.50974
published_at 2026-04-21T12:55:00Z
1
value 0.00275
scoring_system epss
scoring_elements 0.50851
published_at 2026-04-01T12:55:00Z
2
value 0.00275
scoring_system epss
scoring_elements 0.50909
published_at 2026-04-02T12:55:00Z
3
value 0.00275
scoring_system epss
scoring_elements 0.50935
published_at 2026-04-04T12:55:00Z
4
value 0.00275
scoring_system epss
scoring_elements 0.50892
published_at 2026-04-07T12:55:00Z
5
value 0.00275
scoring_system epss
scoring_elements 0.50949
published_at 2026-04-08T12:55:00Z
6
value 0.00275
scoring_system epss
scoring_elements 0.50947
published_at 2026-04-09T12:55:00Z
7
value 0.00275
scoring_system epss
scoring_elements 0.50989
published_at 2026-04-11T12:55:00Z
8
value 0.00275
scoring_system epss
scoring_elements 0.50967
published_at 2026-04-12T12:55:00Z
9
value 0.00275
scoring_system epss
scoring_elements 0.50951
published_at 2026-04-13T12:55:00Z
10
value 0.00275
scoring_system epss
scoring_elements 0.50988
published_at 2026-04-16T12:55:00Z
11
value 0.00275
scoring_system epss
scoring_elements 0.50995
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-6625
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6625
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6625
2
reference_url https://github.com/phpmyadmin/composer
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/phpmyadmin/composer
3
reference_url https://security.gentoo.org/glsa/201701-32
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://security.gentoo.org/glsa/201701-32
4
reference_url https://www.phpmyadmin.net/security/PMASA-2016-48
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://www.phpmyadmin.net/security/PMASA-2016-48
5
reference_url http://www.securityfocus.com/bid/92491
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.securityfocus.com/bid/92491
6
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-6625
reference_id CVE-2016-6625
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2016-6625
7
reference_url https://github.com/advisories/GHSA-r643-7xfg-ppc5
reference_id GHSA-r643-7xfg-ppc5
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-r643-7xfg-ppc5
fixed_packages
0
url pkg:deb/debian/phpmyadmin@4:4.6.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/phpmyadmin@4:4.6.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:4.6.4%252Bdfsg1-1%3Fdistro=trixie
1
url pkg:deb/debian/phpmyadmin@4:5.0.4%2Bdfsg2-2%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/phpmyadmin@4:5.0.4%2Bdfsg2-2%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-na3j-h3qr-k7dc
1
vulnerability VCID-ndjn-p6gb-u7g4
2
vulnerability VCID-rqy8-n6fr-hqey
3
vulnerability VCID-zd8d-c1nk-g7a4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:5.0.4%252Bdfsg2-2%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/phpmyadmin@4:5.2.1%2Bdfsg-1%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/phpmyadmin@4:5.2.1%2Bdfsg-1%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-zd8d-c1nk-g7a4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:5.2.1%252Bdfsg-1%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/phpmyadmin@4:5.2.2-really%2Bdfsg-1%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/phpmyadmin@4:5.2.2-really%2Bdfsg-1%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:5.2.2-really%252Bdfsg-1%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/phpmyadmin@4:5.2.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/phpmyadmin@4:5.2.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:5.2.3%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2016-6625, GHSA-r643-7xfg-ppc5
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-64sy-unts-juf3
3
url VCID-6qn6-3v4w-pqhw
vulnerability_id VCID-6qn6-3v4w-pqhw
summary
Multiple vulnerabilities have been found in phpMyAdmin, the worst
    of which could lead to arbitrary code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-6606
reference_id
reference_type
scores
0
value 0.00258
scoring_system epss
scoring_elements 0.49159
published_at 2026-04-01T12:55:00Z
1
value 0.00258
scoring_system epss
scoring_elements 0.4919
published_at 2026-04-02T12:55:00Z
2
value 0.00258
scoring_system epss
scoring_elements 0.49218
published_at 2026-04-04T12:55:00Z
3
value 0.00258
scoring_system epss
scoring_elements 0.49169
published_at 2026-04-07T12:55:00Z
4
value 0.00258
scoring_system epss
scoring_elements 0.49224
published_at 2026-04-08T12:55:00Z
5
value 0.00258
scoring_system epss
scoring_elements 0.4922
published_at 2026-04-09T12:55:00Z
6
value 0.00258
scoring_system epss
scoring_elements 0.49238
published_at 2026-04-11T12:55:00Z
7
value 0.00258
scoring_system epss
scoring_elements 0.49211
published_at 2026-04-12T12:55:00Z
8
value 0.00258
scoring_system epss
scoring_elements 0.49216
published_at 2026-04-13T12:55:00Z
9
value 0.00258
scoring_system epss
scoring_elements 0.49262
published_at 2026-04-16T12:55:00Z
10
value 0.00258
scoring_system epss
scoring_elements 0.49259
published_at 2026-04-18T12:55:00Z
11
value 0.00258
scoring_system epss
scoring_elements 0.49229
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-6606
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6606
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6606
fixed_packages
0
url pkg:deb/debian/phpmyadmin@4:4.6.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/phpmyadmin@4:4.6.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:4.6.4%252Bdfsg1-1%3Fdistro=trixie
1
url pkg:deb/debian/phpmyadmin@4:5.0.4%2Bdfsg2-2%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/phpmyadmin@4:5.0.4%2Bdfsg2-2%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-na3j-h3qr-k7dc
1
vulnerability VCID-ndjn-p6gb-u7g4
2
vulnerability VCID-rqy8-n6fr-hqey
3
vulnerability VCID-zd8d-c1nk-g7a4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:5.0.4%252Bdfsg2-2%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/phpmyadmin@4:5.2.1%2Bdfsg-1%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/phpmyadmin@4:5.2.1%2Bdfsg-1%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-zd8d-c1nk-g7a4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:5.2.1%252Bdfsg-1%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/phpmyadmin@4:5.2.2-really%2Bdfsg-1%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/phpmyadmin@4:5.2.2-really%2Bdfsg-1%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:5.2.2-really%252Bdfsg-1%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/phpmyadmin@4:5.2.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/phpmyadmin@4:5.2.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:5.2.3%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2016-6606
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6qn6-3v4w-pqhw
4
url VCID-8fu3-wm7d-qkeu
vulnerability_id VCID-8fu3-wm7d-qkeu
summary
Incomplete Cleanup
An issue was discovered in phpMyAdmin where, under certain conditions, phpMyAdmin may not delete temporary files during the import of ESRI files.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-6632
reference_id
reference_type
scores
0
value 0.00567
scoring_system epss
scoring_elements 0.68518
published_at 2026-04-21T12:55:00Z
1
value 0.00567
scoring_system epss
scoring_elements 0.68424
published_at 2026-04-01T12:55:00Z
2
value 0.00567
scoring_system epss
scoring_elements 0.68443
published_at 2026-04-02T12:55:00Z
3
value 0.00567
scoring_system epss
scoring_elements 0.68463
published_at 2026-04-04T12:55:00Z
4
value 0.00567
scoring_system epss
scoring_elements 0.68439
published_at 2026-04-07T12:55:00Z
5
value 0.00567
scoring_system epss
scoring_elements 0.68489
published_at 2026-04-08T12:55:00Z
6
value 0.00567
scoring_system epss
scoring_elements 0.68506
published_at 2026-04-09T12:55:00Z
7
value 0.00567
scoring_system epss
scoring_elements 0.68532
published_at 2026-04-11T12:55:00Z
8
value 0.00567
scoring_system epss
scoring_elements 0.6852
published_at 2026-04-12T12:55:00Z
9
value 0.00567
scoring_system epss
scoring_elements 0.68488
published_at 2026-04-13T12:55:00Z
10
value 0.00567
scoring_system epss
scoring_elements 0.68527
published_at 2026-04-16T12:55:00Z
11
value 0.00567
scoring_system epss
scoring_elements 0.6854
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-6632
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6632
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6632
2
reference_url https://github.com/phpmyadmin/composer
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/phpmyadmin/composer
3
reference_url https://lists.debian.org/debian-lts-announce/2019/06/msg00009.html
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.debian.org/debian-lts-announce/2019/06/msg00009.html
4
reference_url https://security.gentoo.org/glsa/201701-32
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://security.gentoo.org/glsa/201701-32
5
reference_url https://www.phpmyadmin.net/security/PMASA-2016-55
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://www.phpmyadmin.net/security/PMASA-2016-55
6
reference_url http://www.securityfocus.com/bid/92497
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.securityfocus.com/bid/92497
7
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-6632
reference_id CVE-2016-6632
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2016-6632
8
reference_url https://github.com/advisories/GHSA-426q-975p-w5cr
reference_id GHSA-426q-975p-w5cr
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-426q-975p-w5cr
fixed_packages
0
url pkg:deb/debian/phpmyadmin@4:4.6.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/phpmyadmin@4:4.6.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:4.6.4%252Bdfsg1-1%3Fdistro=trixie
1
url pkg:deb/debian/phpmyadmin@4:5.0.4%2Bdfsg2-2%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/phpmyadmin@4:5.0.4%2Bdfsg2-2%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-na3j-h3qr-k7dc
1
vulnerability VCID-ndjn-p6gb-u7g4
2
vulnerability VCID-rqy8-n6fr-hqey
3
vulnerability VCID-zd8d-c1nk-g7a4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:5.0.4%252Bdfsg2-2%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/phpmyadmin@4:5.2.1%2Bdfsg-1%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/phpmyadmin@4:5.2.1%2Bdfsg-1%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-zd8d-c1nk-g7a4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:5.2.1%252Bdfsg-1%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/phpmyadmin@4:5.2.2-really%2Bdfsg-1%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/phpmyadmin@4:5.2.2-really%2Bdfsg-1%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:5.2.2-really%252Bdfsg-1%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/phpmyadmin@4:5.2.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/phpmyadmin@4:5.2.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:5.2.3%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2016-6632, GHSA-426q-975p-w5cr
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8fu3-wm7d-qkeu
5
url VCID-95rw-mj5a-63cb
vulnerability_id VCID-95rw-mj5a-63cb
summary
Multiple vulnerabilities have been found in phpMyAdmin, the worst
    of which could lead to arbitrary code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-6630
reference_id
reference_type
scores
0
value 0.00713
scoring_system epss
scoring_elements 0.72266
published_at 2026-04-01T12:55:00Z
1
value 0.00713
scoring_system epss
scoring_elements 0.72272
published_at 2026-04-02T12:55:00Z
2
value 0.00713
scoring_system epss
scoring_elements 0.72292
published_at 2026-04-04T12:55:00Z
3
value 0.00713
scoring_system epss
scoring_elements 0.72268
published_at 2026-04-07T12:55:00Z
4
value 0.00713
scoring_system epss
scoring_elements 0.72306
published_at 2026-04-08T12:55:00Z
5
value 0.00713
scoring_system epss
scoring_elements 0.72319
published_at 2026-04-09T12:55:00Z
6
value 0.00713
scoring_system epss
scoring_elements 0.72341
published_at 2026-04-11T12:55:00Z
7
value 0.00713
scoring_system epss
scoring_elements 0.72325
published_at 2026-04-12T12:55:00Z
8
value 0.00713
scoring_system epss
scoring_elements 0.72311
published_at 2026-04-13T12:55:00Z
9
value 0.00713
scoring_system epss
scoring_elements 0.72353
published_at 2026-04-16T12:55:00Z
10
value 0.00713
scoring_system epss
scoring_elements 0.72362
published_at 2026-04-18T12:55:00Z
11
value 0.00713
scoring_system epss
scoring_elements 0.7235
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-6630
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6630
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6630
2
reference_url https://usn.ubuntu.com/USN-4843-1/
reference_id USN-USN-4843-1
reference_type
scores
url https://usn.ubuntu.com/USN-4843-1/
fixed_packages
0
url pkg:deb/debian/phpmyadmin@4:4.6.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/phpmyadmin@4:4.6.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:4.6.4%252Bdfsg1-1%3Fdistro=trixie
1
url pkg:deb/debian/phpmyadmin@4:5.0.4%2Bdfsg2-2%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/phpmyadmin@4:5.0.4%2Bdfsg2-2%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-na3j-h3qr-k7dc
1
vulnerability VCID-ndjn-p6gb-u7g4
2
vulnerability VCID-rqy8-n6fr-hqey
3
vulnerability VCID-zd8d-c1nk-g7a4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:5.0.4%252Bdfsg2-2%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/phpmyadmin@4:5.2.1%2Bdfsg-1%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/phpmyadmin@4:5.2.1%2Bdfsg-1%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-zd8d-c1nk-g7a4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:5.2.1%252Bdfsg-1%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/phpmyadmin@4:5.2.2-really%2Bdfsg-1%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/phpmyadmin@4:5.2.2-really%2Bdfsg-1%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:5.2.2-really%252Bdfsg-1%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/phpmyadmin@4:5.2.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/phpmyadmin@4:5.2.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:5.2.3%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2016-6630
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-95rw-mj5a-63cb
6
url VCID-9t2s-etzf-t3d2
vulnerability_id VCID-9t2s-etzf-t3d2
summary
Command Injection
An issue was discovered in phpMyAdmin. A specially crafted database name could be used to run arbitrary PHP commands through the array export feature.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-6609
reference_id
reference_type
scores
0
value 0.00425
scoring_system epss
scoring_elements 0.62256
published_at 2026-04-21T12:55:00Z
1
value 0.00425
scoring_system epss
scoring_elements 0.62108
published_at 2026-04-01T12:55:00Z
2
value 0.00425
scoring_system epss
scoring_elements 0.62169
published_at 2026-04-02T12:55:00Z
3
value 0.00425
scoring_system epss
scoring_elements 0.62199
published_at 2026-04-04T12:55:00Z
4
value 0.00425
scoring_system epss
scoring_elements 0.62166
published_at 2026-04-07T12:55:00Z
5
value 0.00425
scoring_system epss
scoring_elements 0.62216
published_at 2026-04-08T12:55:00Z
6
value 0.00425
scoring_system epss
scoring_elements 0.62233
published_at 2026-04-09T12:55:00Z
7
value 0.00425
scoring_system epss
scoring_elements 0.62252
published_at 2026-04-11T12:55:00Z
8
value 0.00425
scoring_system epss
scoring_elements 0.62241
published_at 2026-04-12T12:55:00Z
9
value 0.00425
scoring_system epss
scoring_elements 0.6222
published_at 2026-04-13T12:55:00Z
10
value 0.00425
scoring_system epss
scoring_elements 0.62265
published_at 2026-04-16T12:55:00Z
11
value 0.00425
scoring_system epss
scoring_elements 0.62272
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-6609
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6609
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6609
2
reference_url https://github.com/phpmyadmin/composer
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/phpmyadmin/composer
3
reference_url https://lists.debian.org/debian-lts-announce/2018/07/msg00006.html
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.debian.org/debian-lts-announce/2018/07/msg00006.html
4
reference_url https://security.gentoo.org/glsa/201701-32
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://security.gentoo.org/glsa/201701-32
5
reference_url https://www.phpmyadmin.net/security/PMASA-2016-32
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://www.phpmyadmin.net/security/PMASA-2016-32
6
reference_url http://www.securityfocus.com/bid/94112
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url http://www.securityfocus.com/bid/94112
7
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-6609
reference_id CVE-2016-6609
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2016-6609
8
reference_url https://github.com/advisories/GHSA-wpww-hx7x-xfjh
reference_id GHSA-wpww-hx7x-xfjh
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-wpww-hx7x-xfjh
9
reference_url https://usn.ubuntu.com/USN-4843-1/
reference_id USN-USN-4843-1
reference_type
scores
url https://usn.ubuntu.com/USN-4843-1/
fixed_packages
0
url pkg:deb/debian/phpmyadmin@4:4.6.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/phpmyadmin@4:4.6.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:4.6.4%252Bdfsg1-1%3Fdistro=trixie
1
url pkg:deb/debian/phpmyadmin@4:5.0.4%2Bdfsg2-2%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/phpmyadmin@4:5.0.4%2Bdfsg2-2%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-na3j-h3qr-k7dc
1
vulnerability VCID-ndjn-p6gb-u7g4
2
vulnerability VCID-rqy8-n6fr-hqey
3
vulnerability VCID-zd8d-c1nk-g7a4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:5.0.4%252Bdfsg2-2%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/phpmyadmin@4:5.2.1%2Bdfsg-1%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/phpmyadmin@4:5.2.1%2Bdfsg-1%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-zd8d-c1nk-g7a4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:5.2.1%252Bdfsg-1%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/phpmyadmin@4:5.2.2-really%2Bdfsg-1%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/phpmyadmin@4:5.2.2-really%2Bdfsg-1%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:5.2.2-really%252Bdfsg-1%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/phpmyadmin@4:5.2.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/phpmyadmin@4:5.2.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:5.2.3%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2016-6609, GHSA-wpww-hx7x-xfjh
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9t2s-etzf-t3d2
7
url VCID-b4xu-wcz2-9fdh
vulnerability_id VCID-b4xu-wcz2-9fdh
summary
Multiple vulnerabilities have been found in phpMyAdmin, the worst
    of which could lead to arbitrary code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-6631
reference_id
reference_type
scores
0
value 0.03567
scoring_system epss
scoring_elements 0.87666
published_at 2026-04-01T12:55:00Z
1
value 0.03567
scoring_system epss
scoring_elements 0.87676
published_at 2026-04-02T12:55:00Z
2
value 0.03567
scoring_system epss
scoring_elements 0.87688
published_at 2026-04-04T12:55:00Z
3
value 0.03567
scoring_system epss
scoring_elements 0.8769
published_at 2026-04-07T12:55:00Z
4
value 0.03567
scoring_system epss
scoring_elements 0.87711
published_at 2026-04-08T12:55:00Z
5
value 0.03567
scoring_system epss
scoring_elements 0.87717
published_at 2026-04-09T12:55:00Z
6
value 0.03567
scoring_system epss
scoring_elements 0.87729
published_at 2026-04-11T12:55:00Z
7
value 0.03567
scoring_system epss
scoring_elements 0.87722
published_at 2026-04-12T12:55:00Z
8
value 0.03567
scoring_system epss
scoring_elements 0.8772
published_at 2026-04-13T12:55:00Z
9
value 0.03567
scoring_system epss
scoring_elements 0.87734
published_at 2026-04-18T12:55:00Z
10
value 0.03567
scoring_system epss
scoring_elements 0.87731
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-6631
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6631
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6631
fixed_packages
0
url pkg:deb/debian/phpmyadmin@4:4.6.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/phpmyadmin@4:4.6.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:4.6.4%252Bdfsg1-1%3Fdistro=trixie
1
url pkg:deb/debian/phpmyadmin@4:5.0.4%2Bdfsg2-2%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/phpmyadmin@4:5.0.4%2Bdfsg2-2%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-na3j-h3qr-k7dc
1
vulnerability VCID-ndjn-p6gb-u7g4
2
vulnerability VCID-rqy8-n6fr-hqey
3
vulnerability VCID-zd8d-c1nk-g7a4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:5.0.4%252Bdfsg2-2%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/phpmyadmin@4:5.2.1%2Bdfsg-1%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/phpmyadmin@4:5.2.1%2Bdfsg-1%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-zd8d-c1nk-g7a4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:5.2.1%252Bdfsg-1%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/phpmyadmin@4:5.2.2-really%2Bdfsg-1%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/phpmyadmin@4:5.2.2-really%2Bdfsg-1%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:5.2.2-really%252Bdfsg-1%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/phpmyadmin@4:5.2.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/phpmyadmin@4:5.2.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:5.2.3%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2016-6631
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-b4xu-wcz2-9fdh
8
url VCID-dfgy-a4j1-vfh2
vulnerability_id VCID-dfgy-a4j1-vfh2
summary
Multiple vulnerabilities have been found in phpMyAdmin, the worst
    of which could lead to arbitrary code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-6616
reference_id
reference_type
scores
0
value 0.00316
scoring_system epss
scoring_elements 0.54629
published_at 2026-04-01T12:55:00Z
1
value 0.00316
scoring_system epss
scoring_elements 0.547
published_at 2026-04-02T12:55:00Z
2
value 0.00316
scoring_system epss
scoring_elements 0.54722
published_at 2026-04-04T12:55:00Z
3
value 0.00316
scoring_system epss
scoring_elements 0.54692
published_at 2026-04-07T12:55:00Z
4
value 0.00316
scoring_system epss
scoring_elements 0.54745
published_at 2026-04-08T12:55:00Z
5
value 0.00316
scoring_system epss
scoring_elements 0.54741
published_at 2026-04-09T12:55:00Z
6
value 0.00316
scoring_system epss
scoring_elements 0.54753
published_at 2026-04-16T12:55:00Z
7
value 0.00316
scoring_system epss
scoring_elements 0.54737
published_at 2026-04-12T12:55:00Z
8
value 0.00316
scoring_system epss
scoring_elements 0.54715
published_at 2026-04-13T12:55:00Z
9
value 0.00316
scoring_system epss
scoring_elements 0.54755
published_at 2026-04-18T12:55:00Z
10
value 0.00316
scoring_system epss
scoring_elements 0.54736
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-6616
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6616
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6616
fixed_packages
0
url pkg:deb/debian/phpmyadmin@4:4.6.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/phpmyadmin@4:4.6.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:4.6.4%252Bdfsg1-1%3Fdistro=trixie
1
url pkg:deb/debian/phpmyadmin@4:5.0.4%2Bdfsg2-2%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/phpmyadmin@4:5.0.4%2Bdfsg2-2%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-na3j-h3qr-k7dc
1
vulnerability VCID-ndjn-p6gb-u7g4
2
vulnerability VCID-rqy8-n6fr-hqey
3
vulnerability VCID-zd8d-c1nk-g7a4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:5.0.4%252Bdfsg2-2%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/phpmyadmin@4:5.2.1%2Bdfsg-1%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/phpmyadmin@4:5.2.1%2Bdfsg-1%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-zd8d-c1nk-g7a4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:5.2.1%252Bdfsg-1%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/phpmyadmin@4:5.2.2-really%2Bdfsg-1%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/phpmyadmin@4:5.2.2-really%2Bdfsg-1%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:5.2.2-really%252Bdfsg-1%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/phpmyadmin@4:5.2.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/phpmyadmin@4:5.2.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:5.2.3%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2016-6616
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dfgy-a4j1-vfh2
9
url VCID-ds3z-k4ry-tqfa
vulnerability_id VCID-ds3z-k4ry-tqfa
summary
Multiple vulnerabilities have been found in phpMyAdmin, the worst
    of which could lead to arbitrary code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-6615
reference_id
reference_type
scores
0
value 0.005
scoring_system epss
scoring_elements 0.65891
published_at 2026-04-01T12:55:00Z
1
value 0.005
scoring_system epss
scoring_elements 0.65932
published_at 2026-04-02T12:55:00Z
2
value 0.005
scoring_system epss
scoring_elements 0.65963
published_at 2026-04-04T12:55:00Z
3
value 0.005
scoring_system epss
scoring_elements 0.65929
published_at 2026-04-07T12:55:00Z
4
value 0.005
scoring_system epss
scoring_elements 0.6598
published_at 2026-04-08T12:55:00Z
5
value 0.005
scoring_system epss
scoring_elements 0.65992
published_at 2026-04-09T12:55:00Z
6
value 0.005
scoring_system epss
scoring_elements 0.66011
published_at 2026-04-11T12:55:00Z
7
value 0.005
scoring_system epss
scoring_elements 0.65998
published_at 2026-04-12T12:55:00Z
8
value 0.005
scoring_system epss
scoring_elements 0.65968
published_at 2026-04-13T12:55:00Z
9
value 0.005
scoring_system epss
scoring_elements 0.66003
published_at 2026-04-16T12:55:00Z
10
value 0.005
scoring_system epss
scoring_elements 0.66017
published_at 2026-04-18T12:55:00Z
11
value 0.005
scoring_system epss
scoring_elements 0.66004
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-6615
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6615
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6615
fixed_packages
0
url pkg:deb/debian/phpmyadmin@4:4.6.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/phpmyadmin@4:4.6.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:4.6.4%252Bdfsg1-1%3Fdistro=trixie
1
url pkg:deb/debian/phpmyadmin@4:5.0.4%2Bdfsg2-2%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/phpmyadmin@4:5.0.4%2Bdfsg2-2%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-na3j-h3qr-k7dc
1
vulnerability VCID-ndjn-p6gb-u7g4
2
vulnerability VCID-rqy8-n6fr-hqey
3
vulnerability VCID-zd8d-c1nk-g7a4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:5.0.4%252Bdfsg2-2%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/phpmyadmin@4:5.2.1%2Bdfsg-1%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/phpmyadmin@4:5.2.1%2Bdfsg-1%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-zd8d-c1nk-g7a4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:5.2.1%252Bdfsg-1%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/phpmyadmin@4:5.2.2-really%2Bdfsg-1%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/phpmyadmin@4:5.2.2-really%2Bdfsg-1%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:5.2.2-really%252Bdfsg-1%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/phpmyadmin@4:5.2.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/phpmyadmin@4:5.2.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:5.2.3%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2016-6615
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ds3z-k4ry-tqfa
10
url VCID-e9qs-mvaa-wyc6
vulnerability_id VCID-e9qs-mvaa-wyc6
summary
Incomplete List of Disallowed Inputs
An issue was discovered in phpMyAdmin involving improper enforcement of the IP-based authentication rules. When phpMyAdmin is used with IPv6 in a proxy server environment, and the proxy server is in the allowed range but the attacking computer is not allowed, this vulnerability can allow the attacking computer to connect despite the IP rules.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-6624
reference_id
reference_type
scores
0
value 0.003
scoring_system epss
scoring_elements 0.53332
published_at 2026-04-21T12:55:00Z
1
value 0.003
scoring_system epss
scoring_elements 0.53227
published_at 2026-04-01T12:55:00Z
2
value 0.003
scoring_system epss
scoring_elements 0.53251
published_at 2026-04-02T12:55:00Z
3
value 0.003
scoring_system epss
scoring_elements 0.53276
published_at 2026-04-04T12:55:00Z
4
value 0.003
scoring_system epss
scoring_elements 0.53244
published_at 2026-04-07T12:55:00Z
5
value 0.003
scoring_system epss
scoring_elements 0.53296
published_at 2026-04-08T12:55:00Z
6
value 0.003
scoring_system epss
scoring_elements 0.53291
published_at 2026-04-09T12:55:00Z
7
value 0.003
scoring_system epss
scoring_elements 0.53341
published_at 2026-04-11T12:55:00Z
8
value 0.003
scoring_system epss
scoring_elements 0.53326
published_at 2026-04-12T12:55:00Z
9
value 0.003
scoring_system epss
scoring_elements 0.53309
published_at 2026-04-13T12:55:00Z
10
value 0.003
scoring_system epss
scoring_elements 0.53347
published_at 2026-04-16T12:55:00Z
11
value 0.003
scoring_system epss
scoring_elements 0.53352
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-6624
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6624
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6624
2
reference_url https://github.com/phpmyadmin/composer
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/phpmyadmin/composer
3
reference_url https://lists.debian.org/debian-lts-announce/2019/06/msg00009.html
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.debian.org/debian-lts-announce/2019/06/msg00009.html
4
reference_url https://security.gentoo.org/glsa/201701-32
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://security.gentoo.org/glsa/201701-32
5
reference_url https://www.phpmyadmin.net/security/PMASA-2016-47
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://www.phpmyadmin.net/security/PMASA-2016-47
6
reference_url http://www.securityfocus.com/bid/92489
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.securityfocus.com/bid/92489
7
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-6624
reference_id CVE-2016-6624
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2016-6624
8
reference_url https://github.com/advisories/GHSA-mhxj-6vf8-mwv3
reference_id GHSA-mhxj-6vf8-mwv3
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-mhxj-6vf8-mwv3
fixed_packages
0
url pkg:deb/debian/phpmyadmin@4:4.6.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/phpmyadmin@4:4.6.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:4.6.4%252Bdfsg1-1%3Fdistro=trixie
1
url pkg:deb/debian/phpmyadmin@4:5.0.4%2Bdfsg2-2%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/phpmyadmin@4:5.0.4%2Bdfsg2-2%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-na3j-h3qr-k7dc
1
vulnerability VCID-ndjn-p6gb-u7g4
2
vulnerability VCID-rqy8-n6fr-hqey
3
vulnerability VCID-zd8d-c1nk-g7a4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:5.0.4%252Bdfsg2-2%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/phpmyadmin@4:5.2.1%2Bdfsg-1%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/phpmyadmin@4:5.2.1%2Bdfsg-1%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-zd8d-c1nk-g7a4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:5.2.1%252Bdfsg-1%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/phpmyadmin@4:5.2.2-really%2Bdfsg-1%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/phpmyadmin@4:5.2.2-really%2Bdfsg-1%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:5.2.2-really%252Bdfsg-1%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/phpmyadmin@4:5.2.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/phpmyadmin@4:5.2.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:5.2.3%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2016-6624, GHSA-mhxj-6vf8-mwv3
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-e9qs-mvaa-wyc6
11
url VCID-ff6r-sq16-nbff
vulnerability_id VCID-ff6r-sq16-nbff
summary
Multiple vulnerabilities have been found in phpMyAdmin, the worst
    of which could lead to arbitrary code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-6611
reference_id
reference_type
scores
0
value 0.00365
scoring_system epss
scoring_elements 0.58388
published_at 2026-04-01T12:55:00Z
1
value 0.00365
scoring_system epss
scoring_elements 0.58474
published_at 2026-04-02T12:55:00Z
2
value 0.00365
scoring_system epss
scoring_elements 0.58494
published_at 2026-04-04T12:55:00Z
3
value 0.00365
scoring_system epss
scoring_elements 0.58465
published_at 2026-04-07T12:55:00Z
4
value 0.00365
scoring_system epss
scoring_elements 0.58517
published_at 2026-04-21T12:55:00Z
5
value 0.00365
scoring_system epss
scoring_elements 0.58524
published_at 2026-04-09T12:55:00Z
6
value 0.00365
scoring_system epss
scoring_elements 0.5854
published_at 2026-04-11T12:55:00Z
7
value 0.00365
scoring_system epss
scoring_elements 0.58521
published_at 2026-04-12T12:55:00Z
8
value 0.00365
scoring_system epss
scoring_elements 0.58501
published_at 2026-04-13T12:55:00Z
9
value 0.00365
scoring_system epss
scoring_elements 0.58534
published_at 2026-04-16T12:55:00Z
10
value 0.00365
scoring_system epss
scoring_elements 0.58539
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-6611
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6611
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6611
fixed_packages
0
url pkg:deb/debian/phpmyadmin@4:4.6.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/phpmyadmin@4:4.6.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:4.6.4%252Bdfsg1-1%3Fdistro=trixie
1
url pkg:deb/debian/phpmyadmin@4:5.0.4%2Bdfsg2-2%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/phpmyadmin@4:5.0.4%2Bdfsg2-2%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-na3j-h3qr-k7dc
1
vulnerability VCID-ndjn-p6gb-u7g4
2
vulnerability VCID-rqy8-n6fr-hqey
3
vulnerability VCID-zd8d-c1nk-g7a4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:5.0.4%252Bdfsg2-2%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/phpmyadmin@4:5.2.1%2Bdfsg-1%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/phpmyadmin@4:5.2.1%2Bdfsg-1%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-zd8d-c1nk-g7a4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:5.2.1%252Bdfsg-1%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/phpmyadmin@4:5.2.2-really%2Bdfsg-1%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/phpmyadmin@4:5.2.2-really%2Bdfsg-1%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:5.2.2-really%252Bdfsg-1%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/phpmyadmin@4:5.2.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/phpmyadmin@4:5.2.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:5.2.3%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2016-6611
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ff6r-sq16-nbff
12
url VCID-fgr8-8j61-cufq
vulnerability_id VCID-fgr8-8j61-cufq
summary
Information Exposure
An issue was discovered in phpMyAdmin. A user can exploit the "LOAD LOCAL INFILE" functionality to expose files on the server to the database system.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-6612
reference_id
reference_type
scores
0
value 0.00411
scoring_system epss
scoring_elements 0.61453
published_at 2026-04-21T12:55:00Z
1
value 0.00411
scoring_system epss
scoring_elements 0.61298
published_at 2026-04-01T12:55:00Z
2
value 0.00411
scoring_system epss
scoring_elements 0.61377
published_at 2026-04-02T12:55:00Z
3
value 0.00411
scoring_system epss
scoring_elements 0.61406
published_at 2026-04-04T12:55:00Z
4
value 0.00411
scoring_system epss
scoring_elements 0.61375
published_at 2026-04-07T12:55:00Z
5
value 0.00411
scoring_system epss
scoring_elements 0.61422
published_at 2026-04-08T12:55:00Z
6
value 0.00411
scoring_system epss
scoring_elements 0.61437
published_at 2026-04-09T12:55:00Z
7
value 0.00411
scoring_system epss
scoring_elements 0.61459
published_at 2026-04-11T12:55:00Z
8
value 0.00411
scoring_system epss
scoring_elements 0.61444
published_at 2026-04-12T12:55:00Z
9
value 0.00411
scoring_system epss
scoring_elements 0.61426
published_at 2026-04-13T12:55:00Z
10
value 0.00411
scoring_system epss
scoring_elements 0.61465
published_at 2026-04-16T12:55:00Z
11
value 0.00411
scoring_system epss
scoring_elements 0.61469
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-6612
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6612
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6612
2
reference_url https://github.com/phpmyadmin/composer
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/phpmyadmin/composer
3
reference_url https://lists.debian.org/debian-lts-announce/2019/06/msg00009.html
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.debian.org/debian-lts-announce/2019/06/msg00009.html
4
reference_url https://security.gentoo.org/glsa/201701-32
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://security.gentoo.org/glsa/201701-32
5
reference_url https://www.phpmyadmin.net/security/PMASA-2016-35
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://www.phpmyadmin.net/security/PMASA-2016-35
6
reference_url http://www.securityfocus.com/bid/94113
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.securityfocus.com/bid/94113
7
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-6612
reference_id CVE-2016-6612
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2016-6612
8
reference_url https://github.com/advisories/GHSA-fcgm-62p3-f7cm
reference_id GHSA-fcgm-62p3-f7cm
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-fcgm-62p3-f7cm
fixed_packages
0
url pkg:deb/debian/phpmyadmin@4:4.6.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/phpmyadmin@4:4.6.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:4.6.4%252Bdfsg1-1%3Fdistro=trixie
1
url pkg:deb/debian/phpmyadmin@4:5.0.4%2Bdfsg2-2%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/phpmyadmin@4:5.0.4%2Bdfsg2-2%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-na3j-h3qr-k7dc
1
vulnerability VCID-ndjn-p6gb-u7g4
2
vulnerability VCID-rqy8-n6fr-hqey
3
vulnerability VCID-zd8d-c1nk-g7a4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:5.0.4%252Bdfsg2-2%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/phpmyadmin@4:5.2.1%2Bdfsg-1%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/phpmyadmin@4:5.2.1%2Bdfsg-1%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-zd8d-c1nk-g7a4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:5.2.1%252Bdfsg-1%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/phpmyadmin@4:5.2.2-really%2Bdfsg-1%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/phpmyadmin@4:5.2.2-really%2Bdfsg-1%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:5.2.2-really%252Bdfsg-1%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/phpmyadmin@4:5.2.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/phpmyadmin@4:5.2.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:5.2.3%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2016-6612, GHSA-fcgm-62p3-f7cm
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fgr8-8j61-cufq
13
url VCID-fvnp-w4kk-3qfq
vulnerability_id VCID-fvnp-w4kk-3qfq
summary
Cross-site Scripting
XSS issues were discovered in phpMyAdmin. This affects the database privilege check and the "Remove partitioning" functionality. Specially crafted database names can trigger the XSS attack.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-6608
reference_id
reference_type
scores
0
value 0.00452
scoring_system epss
scoring_elements 0.63751
published_at 2026-04-18T12:55:00Z
1
value 0.00452
scoring_system epss
scoring_elements 0.63625
published_at 2026-04-01T12:55:00Z
2
value 0.00452
scoring_system epss
scoring_elements 0.63685
published_at 2026-04-02T12:55:00Z
3
value 0.00452
scoring_system epss
scoring_elements 0.63711
published_at 2026-04-04T12:55:00Z
4
value 0.00452
scoring_system epss
scoring_elements 0.63671
published_at 2026-04-07T12:55:00Z
5
value 0.00452
scoring_system epss
scoring_elements 0.63723
published_at 2026-04-08T12:55:00Z
6
value 0.00452
scoring_system epss
scoring_elements 0.63741
published_at 2026-04-09T12:55:00Z
7
value 0.00452
scoring_system epss
scoring_elements 0.63755
published_at 2026-04-11T12:55:00Z
8
value 0.00452
scoring_system epss
scoring_elements 0.6374
published_at 2026-04-21T12:55:00Z
9
value 0.00452
scoring_system epss
scoring_elements 0.63706
published_at 2026-04-13T12:55:00Z
10
value 0.00452
scoring_system epss
scoring_elements 0.63742
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-6608
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6608
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6608
2
reference_url https://github.com/phpmyadmin/composer
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/phpmyadmin/composer
3
reference_url https://security.gentoo.org/glsa/201701-32
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://security.gentoo.org/glsa/201701-32
4
reference_url https://www.phpmyadmin.net/security/PMASA-2016-31
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://www.phpmyadmin.net/security/PMASA-2016-31
5
reference_url http://www.securityfocus.com/bid/93258
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.securityfocus.com/bid/93258
6
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-6608
reference_id CVE-2016-6608
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2016-6608
7
reference_url https://github.com/advisories/GHSA-jfmj-27fp-qp67
reference_id GHSA-jfmj-27fp-qp67
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-jfmj-27fp-qp67
fixed_packages
0
url pkg:deb/debian/phpmyadmin@4:4.6.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/phpmyadmin@4:4.6.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:4.6.4%252Bdfsg1-1%3Fdistro=trixie
1
url pkg:deb/debian/phpmyadmin@4:5.0.4%2Bdfsg2-2%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/phpmyadmin@4:5.0.4%2Bdfsg2-2%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-na3j-h3qr-k7dc
1
vulnerability VCID-ndjn-p6gb-u7g4
2
vulnerability VCID-rqy8-n6fr-hqey
3
vulnerability VCID-zd8d-c1nk-g7a4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:5.0.4%252Bdfsg2-2%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/phpmyadmin@4:5.2.1%2Bdfsg-1%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/phpmyadmin@4:5.2.1%2Bdfsg-1%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-zd8d-c1nk-g7a4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:5.2.1%252Bdfsg-1%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/phpmyadmin@4:5.2.2-really%2Bdfsg-1%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/phpmyadmin@4:5.2.2-really%2Bdfsg-1%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:5.2.2-really%252Bdfsg-1%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/phpmyadmin@4:5.2.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/phpmyadmin@4:5.2.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:5.2.3%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2016-6608, GHSA-jfmj-27fp-qp67
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fvnp-w4kk-3qfq
14
url VCID-h5wu-ugm7-4bah
vulnerability_id VCID-h5wu-ugm7-4bah
summary
Code Injection
An issue was discovered in phpMyAdmin. phpMyAdmin can be used to trigger a remote code execution attack against certain PHP installations that are running with the dbase extension.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-6633
reference_id
reference_type
scores
0
value 0.01833
scoring_system epss
scoring_elements 0.8296
published_at 2026-04-21T12:55:00Z
1
value 0.01833
scoring_system epss
scoring_elements 0.82853
published_at 2026-04-01T12:55:00Z
2
value 0.01833
scoring_system epss
scoring_elements 0.82869
published_at 2026-04-02T12:55:00Z
3
value 0.01833
scoring_system epss
scoring_elements 0.82882
published_at 2026-04-04T12:55:00Z
4
value 0.01833
scoring_system epss
scoring_elements 0.82878
published_at 2026-04-07T12:55:00Z
5
value 0.01833
scoring_system epss
scoring_elements 0.82903
published_at 2026-04-08T12:55:00Z
6
value 0.01833
scoring_system epss
scoring_elements 0.82911
published_at 2026-04-09T12:55:00Z
7
value 0.01833
scoring_system epss
scoring_elements 0.82926
published_at 2026-04-11T12:55:00Z
8
value 0.01833
scoring_system epss
scoring_elements 0.82922
published_at 2026-04-12T12:55:00Z
9
value 0.01833
scoring_system epss
scoring_elements 0.82918
published_at 2026-04-13T12:55:00Z
10
value 0.01833
scoring_system epss
scoring_elements 0.82957
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-6633
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6633
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6633
2
reference_url https://github.com/phpmyadmin/composer
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/phpmyadmin/composer
3
reference_url https://security.gentoo.org/glsa/201701-32
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://security.gentoo.org/glsa/201701-32
4
reference_url https://www.phpmyadmin.net/security/PMASA-2016-56
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://www.phpmyadmin.net/security/PMASA-2016-56
5
reference_url http://www.securityfocus.com/bid/92500
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url http://www.securityfocus.com/bid/92500
6
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-6633
reference_id CVE-2016-6633
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2016-6633
7
reference_url https://github.com/advisories/GHSA-p849-vf5f-f3x7
reference_id GHSA-p849-vf5f-f3x7
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-p849-vf5f-f3x7
fixed_packages
0
url pkg:deb/debian/phpmyadmin@4:4.6.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/phpmyadmin@4:4.6.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:4.6.4%252Bdfsg1-1%3Fdistro=trixie
1
url pkg:deb/debian/phpmyadmin@4:5.0.4%2Bdfsg2-2%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/phpmyadmin@4:5.0.4%2Bdfsg2-2%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-na3j-h3qr-k7dc
1
vulnerability VCID-ndjn-p6gb-u7g4
2
vulnerability VCID-rqy8-n6fr-hqey
3
vulnerability VCID-zd8d-c1nk-g7a4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:5.0.4%252Bdfsg2-2%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/phpmyadmin@4:5.2.1%2Bdfsg-1%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/phpmyadmin@4:5.2.1%2Bdfsg-1%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-zd8d-c1nk-g7a4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:5.2.1%252Bdfsg-1%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/phpmyadmin@4:5.2.2-really%2Bdfsg-1%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/phpmyadmin@4:5.2.2-really%2Bdfsg-1%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:5.2.2-really%252Bdfsg-1%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/phpmyadmin@4:5.2.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/phpmyadmin@4:5.2.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:5.2.3%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2016-6633, GHSA-p849-vf5f-f3x7
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-h5wu-ugm7-4bah
15
url VCID-j3s8-nxah-pqgz
vulnerability_id VCID-j3s8-nxah-pqgz
summary
Multiple vulnerabilities have been found in phpMyAdmin, the worst
    of which could lead to arbitrary code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-6620
reference_id
reference_type
scores
0
value 0.01398
scoring_system epss
scoring_elements 0.8035
published_at 2026-04-01T12:55:00Z
1
value 0.01398
scoring_system epss
scoring_elements 0.80357
published_at 2026-04-02T12:55:00Z
2
value 0.01398
scoring_system epss
scoring_elements 0.80376
published_at 2026-04-04T12:55:00Z
3
value 0.01398
scoring_system epss
scoring_elements 0.80366
published_at 2026-04-07T12:55:00Z
4
value 0.01398
scoring_system epss
scoring_elements 0.80395
published_at 2026-04-08T12:55:00Z
5
value 0.01398
scoring_system epss
scoring_elements 0.80405
published_at 2026-04-09T12:55:00Z
6
value 0.01398
scoring_system epss
scoring_elements 0.80423
published_at 2026-04-11T12:55:00Z
7
value 0.01398
scoring_system epss
scoring_elements 0.80408
published_at 2026-04-12T12:55:00Z
8
value 0.01398
scoring_system epss
scoring_elements 0.80401
published_at 2026-04-13T12:55:00Z
9
value 0.01398
scoring_system epss
scoring_elements 0.80431
published_at 2026-04-16T12:55:00Z
10
value 0.01398
scoring_system epss
scoring_elements 0.80432
published_at 2026-04-18T12:55:00Z
11
value 0.01398
scoring_system epss
scoring_elements 0.80435
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-6620
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6620
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6620
fixed_packages
0
url pkg:deb/debian/phpmyadmin@4:4.6.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/phpmyadmin@4:4.6.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:4.6.4%252Bdfsg1-1%3Fdistro=trixie
1
url pkg:deb/debian/phpmyadmin@4:5.0.4%2Bdfsg2-2%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/phpmyadmin@4:5.0.4%2Bdfsg2-2%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-na3j-h3qr-k7dc
1
vulnerability VCID-ndjn-p6gb-u7g4
2
vulnerability VCID-rqy8-n6fr-hqey
3
vulnerability VCID-zd8d-c1nk-g7a4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:5.0.4%252Bdfsg2-2%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/phpmyadmin@4:5.2.1%2Bdfsg-1%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/phpmyadmin@4:5.2.1%2Bdfsg-1%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-zd8d-c1nk-g7a4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:5.2.1%252Bdfsg-1%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/phpmyadmin@4:5.2.2-really%2Bdfsg-1%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/phpmyadmin@4:5.2.2-really%2Bdfsg-1%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:5.2.2-really%252Bdfsg-1%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/phpmyadmin@4:5.2.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/phpmyadmin@4:5.2.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:5.2.3%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2016-6620
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-j3s8-nxah-pqgz
16
url VCID-qfg6-ugqq-3fdx
vulnerability_id VCID-qfg6-ugqq-3fdx
summary
Multiple vulnerabilities have been found in phpMyAdmin, the worst
    of which could lead to arbitrary code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-6614
reference_id
reference_type
scores
0
value 0.0111
scoring_system epss
scoring_elements 0.78078
published_at 2026-04-01T12:55:00Z
1
value 0.0111
scoring_system epss
scoring_elements 0.78087
published_at 2026-04-02T12:55:00Z
2
value 0.0111
scoring_system epss
scoring_elements 0.78117
published_at 2026-04-04T12:55:00Z
3
value 0.0111
scoring_system epss
scoring_elements 0.78099
published_at 2026-04-07T12:55:00Z
4
value 0.0111
scoring_system epss
scoring_elements 0.78126
published_at 2026-04-08T12:55:00Z
5
value 0.0111
scoring_system epss
scoring_elements 0.78132
published_at 2026-04-09T12:55:00Z
6
value 0.0111
scoring_system epss
scoring_elements 0.78158
published_at 2026-04-11T12:55:00Z
7
value 0.0111
scoring_system epss
scoring_elements 0.7814
published_at 2026-04-12T12:55:00Z
8
value 0.0111
scoring_system epss
scoring_elements 0.78136
published_at 2026-04-13T12:55:00Z
9
value 0.0111
scoring_system epss
scoring_elements 0.78169
published_at 2026-04-16T12:55:00Z
10
value 0.0111
scoring_system epss
scoring_elements 0.78168
published_at 2026-04-18T12:55:00Z
11
value 0.0111
scoring_system epss
scoring_elements 0.78163
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-6614
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6614
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6614
fixed_packages
0
url pkg:deb/debian/phpmyadmin@4:4.6.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/phpmyadmin@4:4.6.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:4.6.4%252Bdfsg1-1%3Fdistro=trixie
1
url pkg:deb/debian/phpmyadmin@4:5.0.4%2Bdfsg2-2%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/phpmyadmin@4:5.0.4%2Bdfsg2-2%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-na3j-h3qr-k7dc
1
vulnerability VCID-ndjn-p6gb-u7g4
2
vulnerability VCID-rqy8-n6fr-hqey
3
vulnerability VCID-zd8d-c1nk-g7a4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:5.0.4%252Bdfsg2-2%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/phpmyadmin@4:5.2.1%2Bdfsg-1%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/phpmyadmin@4:5.2.1%2Bdfsg-1%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-zd8d-c1nk-g7a4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:5.2.1%252Bdfsg-1%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/phpmyadmin@4:5.2.2-really%2Bdfsg-1%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/phpmyadmin@4:5.2.2-really%2Bdfsg-1%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:5.2.2-really%252Bdfsg-1%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/phpmyadmin@4:5.2.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/phpmyadmin@4:5.2.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:5.2.3%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2016-6614
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qfg6-ugqq-3fdx
17
url VCID-qyt8-pcq2-kufz
vulnerability_id VCID-qyt8-pcq2-kufz
summary
Multiple vulnerabilities have been found in phpMyAdmin, the worst
    of which could lead to arbitrary code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-6626
reference_id
reference_type
scores
0
value 0.00433
scoring_system epss
scoring_elements 0.62624
published_at 2026-04-01T12:55:00Z
1
value 0.00433
scoring_system epss
scoring_elements 0.62682
published_at 2026-04-02T12:55:00Z
2
value 0.00433
scoring_system epss
scoring_elements 0.62715
published_at 2026-04-04T12:55:00Z
3
value 0.00433
scoring_system epss
scoring_elements 0.62679
published_at 2026-04-07T12:55:00Z
4
value 0.00433
scoring_system epss
scoring_elements 0.62731
published_at 2026-04-13T12:55:00Z
5
value 0.00433
scoring_system epss
scoring_elements 0.62747
published_at 2026-04-09T12:55:00Z
6
value 0.00433
scoring_system epss
scoring_elements 0.62765
published_at 2026-04-11T12:55:00Z
7
value 0.00433
scoring_system epss
scoring_elements 0.62755
published_at 2026-04-12T12:55:00Z
8
value 0.00433
scoring_system epss
scoring_elements 0.62772
published_at 2026-04-16T12:55:00Z
9
value 0.00433
scoring_system epss
scoring_elements 0.6278
published_at 2026-04-18T12:55:00Z
10
value 0.00433
scoring_system epss
scoring_elements 0.62761
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-6626
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6626
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6626
fixed_packages
0
url pkg:deb/debian/phpmyadmin@4:4.6.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/phpmyadmin@4:4.6.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:4.6.4%252Bdfsg1-1%3Fdistro=trixie
1
url pkg:deb/debian/phpmyadmin@4:5.0.4%2Bdfsg2-2%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/phpmyadmin@4:5.0.4%2Bdfsg2-2%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-na3j-h3qr-k7dc
1
vulnerability VCID-ndjn-p6gb-u7g4
2
vulnerability VCID-rqy8-n6fr-hqey
3
vulnerability VCID-zd8d-c1nk-g7a4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:5.0.4%252Bdfsg2-2%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/phpmyadmin@4:5.2.1%2Bdfsg-1%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/phpmyadmin@4:5.2.1%2Bdfsg-1%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-zd8d-c1nk-g7a4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:5.2.1%252Bdfsg-1%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/phpmyadmin@4:5.2.2-really%2Bdfsg-1%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/phpmyadmin@4:5.2.2-really%2Bdfsg-1%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:5.2.2-really%252Bdfsg-1%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/phpmyadmin@4:5.2.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/phpmyadmin@4:5.2.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:5.2.3%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2016-6626
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qyt8-pcq2-kufz
18
url VCID-tgeh-wkw1-67bw
vulnerability_id VCID-tgeh-wkw1-67bw
summary
Multiple vulnerabilities have been found in phpMyAdmin, the worst
    of which could lead to arbitrary code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-6619
reference_id
reference_type
scores
0
value 0.00332
scoring_system epss
scoring_elements 0.55961
published_at 2026-04-01T12:55:00Z
1
value 0.00332
scoring_system epss
scoring_elements 0.56072
published_at 2026-04-07T12:55:00Z
2
value 0.00332
scoring_system epss
scoring_elements 0.56093
published_at 2026-04-04T12:55:00Z
3
value 0.00332
scoring_system epss
scoring_elements 0.56124
published_at 2026-04-08T12:55:00Z
4
value 0.00332
scoring_system epss
scoring_elements 0.56129
published_at 2026-04-09T12:55:00Z
5
value 0.00332
scoring_system epss
scoring_elements 0.5614
published_at 2026-04-11T12:55:00Z
6
value 0.00332
scoring_system epss
scoring_elements 0.56117
published_at 2026-04-12T12:55:00Z
7
value 0.00332
scoring_system epss
scoring_elements 0.561
published_at 2026-04-13T12:55:00Z
8
value 0.00332
scoring_system epss
scoring_elements 0.56134
published_at 2026-04-16T12:55:00Z
9
value 0.00332
scoring_system epss
scoring_elements 0.56137
published_at 2026-04-18T12:55:00Z
10
value 0.00332
scoring_system epss
scoring_elements 0.56107
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-6619
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6619
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6619
2
reference_url https://usn.ubuntu.com/USN-4843-1/
reference_id USN-USN-4843-1
reference_type
scores
url https://usn.ubuntu.com/USN-4843-1/
fixed_packages
0
url pkg:deb/debian/phpmyadmin@4:4.6.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/phpmyadmin@4:4.6.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:4.6.4%252Bdfsg1-1%3Fdistro=trixie
1
url pkg:deb/debian/phpmyadmin@4:5.0.4%2Bdfsg2-2%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/phpmyadmin@4:5.0.4%2Bdfsg2-2%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-na3j-h3qr-k7dc
1
vulnerability VCID-ndjn-p6gb-u7g4
2
vulnerability VCID-rqy8-n6fr-hqey
3
vulnerability VCID-zd8d-c1nk-g7a4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:5.0.4%252Bdfsg2-2%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/phpmyadmin@4:5.2.1%2Bdfsg-1%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/phpmyadmin@4:5.2.1%2Bdfsg-1%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-zd8d-c1nk-g7a4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:5.2.1%252Bdfsg-1%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/phpmyadmin@4:5.2.2-really%2Bdfsg-1%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/phpmyadmin@4:5.2.2-really%2Bdfsg-1%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:5.2.2-really%252Bdfsg-1%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/phpmyadmin@4:5.2.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/phpmyadmin@4:5.2.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:5.2.3%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2016-6619
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tgeh-wkw1-67bw
19
url VCID-tydk-zjv1-nye6
vulnerability_id VCID-tydk-zjv1-nye6
summary
Improper Input Validation
An issue was discovered in phpMyAdmin. An unauthenticated user is able to execute a denial-of-service (DoS) attack by forcing persistent connections when phpMyAdmin is running with `$cfg['AllowArbitraryServer']=true`.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-6622
reference_id
reference_type
scores
0
value 0.01016
scoring_system epss
scoring_elements 0.77197
published_at 2026-04-21T12:55:00Z
1
value 0.01016
scoring_system epss
scoring_elements 0.77104
published_at 2026-04-01T12:55:00Z
2
value 0.01016
scoring_system epss
scoring_elements 0.7711
published_at 2026-04-02T12:55:00Z
3
value 0.01016
scoring_system epss
scoring_elements 0.7714
published_at 2026-04-04T12:55:00Z
4
value 0.01016
scoring_system epss
scoring_elements 0.77122
published_at 2026-04-07T12:55:00Z
5
value 0.01016
scoring_system epss
scoring_elements 0.77155
published_at 2026-04-08T12:55:00Z
6
value 0.01016
scoring_system epss
scoring_elements 0.77163
published_at 2026-04-09T12:55:00Z
7
value 0.01016
scoring_system epss
scoring_elements 0.77191
published_at 2026-04-11T12:55:00Z
8
value 0.01016
scoring_system epss
scoring_elements 0.7717
published_at 2026-04-12T12:55:00Z
9
value 0.01016
scoring_system epss
scoring_elements 0.77165
published_at 2026-04-13T12:55:00Z
10
value 0.01016
scoring_system epss
scoring_elements 0.77206
published_at 2026-04-16T12:55:00Z
11
value 0.01016
scoring_system epss
scoring_elements 0.77207
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-6622
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6622
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6622
2
reference_url https://lists.debian.org/debian-lts-announce/2018/07/msg00006.html
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.debian.org/debian-lts-announce/2018/07/msg00006.html
3
reference_url https://security.gentoo.org/glsa/201701-32
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://security.gentoo.org/glsa/201701-32
4
reference_url https://web.archive.org/web/20210125183746/http://www.securityfocus.com/bid/95049
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://web.archive.org/web/20210125183746/http://www.securityfocus.com/bid/95049
5
reference_url https://www.phpmyadmin.net/security/PMASA-2016-45
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://www.phpmyadmin.net/security/PMASA-2016-45
6
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-6622
reference_id CVE-2016-6622
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2016-6622
7
reference_url https://github.com/advisories/GHSA-qf3f-7x69-qfv3
reference_id GHSA-qf3f-7x69-qfv3
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-qf3f-7x69-qfv3
fixed_packages
0
url pkg:deb/debian/phpmyadmin@4:4.6.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/phpmyadmin@4:4.6.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:4.6.4%252Bdfsg1-1%3Fdistro=trixie
1
url pkg:deb/debian/phpmyadmin@4:5.0.4%2Bdfsg2-2%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/phpmyadmin@4:5.0.4%2Bdfsg2-2%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-na3j-h3qr-k7dc
1
vulnerability VCID-ndjn-p6gb-u7g4
2
vulnerability VCID-rqy8-n6fr-hqey
3
vulnerability VCID-zd8d-c1nk-g7a4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:5.0.4%252Bdfsg2-2%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/phpmyadmin@4:5.2.1%2Bdfsg-1%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/phpmyadmin@4:5.2.1%2Bdfsg-1%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-zd8d-c1nk-g7a4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:5.2.1%252Bdfsg-1%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/phpmyadmin@4:5.2.2-really%2Bdfsg-1%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/phpmyadmin@4:5.2.2-really%2Bdfsg-1%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:5.2.2-really%252Bdfsg-1%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/phpmyadmin@4:5.2.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/phpmyadmin@4:5.2.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:5.2.3%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2016-6622, GHSA-qf3f-7x69-qfv3
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tydk-zjv1-nye6
20
url VCID-ukgh-86dw-5yf1
vulnerability_id VCID-ukgh-86dw-5yf1
summary
Multiple vulnerabilities have been found in phpMyAdmin, the worst
    of which could lead to arbitrary code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-6627
reference_id
reference_type
scores
0
value 0.0035
scoring_system epss
scoring_elements 0.57363
published_at 2026-04-01T12:55:00Z
1
value 0.0035
scoring_system epss
scoring_elements 0.57446
published_at 2026-04-02T12:55:00Z
2
value 0.0035
scoring_system epss
scoring_elements 0.57468
published_at 2026-04-04T12:55:00Z
3
value 0.0035
scoring_system epss
scoring_elements 0.57445
published_at 2026-04-07T12:55:00Z
4
value 0.0035
scoring_system epss
scoring_elements 0.57497
published_at 2026-04-08T12:55:00Z
5
value 0.0035
scoring_system epss
scoring_elements 0.57501
published_at 2026-04-16T12:55:00Z
6
value 0.0035
scoring_system epss
scoring_elements 0.57517
published_at 2026-04-11T12:55:00Z
7
value 0.0035
scoring_system epss
scoring_elements 0.57494
published_at 2026-04-12T12:55:00Z
8
value 0.0035
scoring_system epss
scoring_elements 0.57475
published_at 2026-04-13T12:55:00Z
9
value 0.0035
scoring_system epss
scoring_elements 0.57498
published_at 2026-04-18T12:55:00Z
10
value 0.0035
scoring_system epss
scoring_elements 0.57476
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-6627
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6627
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6627
fixed_packages
0
url pkg:deb/debian/phpmyadmin@4:4.6.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/phpmyadmin@4:4.6.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:4.6.4%252Bdfsg1-1%3Fdistro=trixie
1
url pkg:deb/debian/phpmyadmin@4:5.0.4%2Bdfsg2-2%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/phpmyadmin@4:5.0.4%2Bdfsg2-2%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-na3j-h3qr-k7dc
1
vulnerability VCID-ndjn-p6gb-u7g4
2
vulnerability VCID-rqy8-n6fr-hqey
3
vulnerability VCID-zd8d-c1nk-g7a4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:5.0.4%252Bdfsg2-2%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/phpmyadmin@4:5.2.1%2Bdfsg-1%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/phpmyadmin@4:5.2.1%2Bdfsg-1%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-zd8d-c1nk-g7a4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:5.2.1%252Bdfsg-1%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/phpmyadmin@4:5.2.2-really%2Bdfsg-1%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/phpmyadmin@4:5.2.2-really%2Bdfsg-1%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:5.2.2-really%252Bdfsg-1%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/phpmyadmin@4:5.2.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/phpmyadmin@4:5.2.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:5.2.3%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2016-6627
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ukgh-86dw-5yf1
21
url VCID-v66b-3ghf-9uas
vulnerability_id VCID-v66b-3ghf-9uas
summary
Improper Input Validation
An issue was discovered in phpMyAdmin involving the `$cfg['ArbitraryServerRegexp']` configuration directive. An attacker could reuse certain cookie values in a way of bypassing the servers defined by `ArbitraryServerRegexp`.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-6629
reference_id
reference_type
scores
0
value 0.0032
scoring_system epss
scoring_elements 0.55121
published_at 2026-04-21T12:55:00Z
1
value 0.0032
scoring_system epss
scoring_elements 0.54974
published_at 2026-04-01T12:55:00Z
2
value 0.0032
scoring_system epss
scoring_elements 0.55075
published_at 2026-04-02T12:55:00Z
3
value 0.0032
scoring_system epss
scoring_elements 0.55101
published_at 2026-04-04T12:55:00Z
4
value 0.0032
scoring_system epss
scoring_elements 0.55076
published_at 2026-04-07T12:55:00Z
5
value 0.0032
scoring_system epss
scoring_elements 0.55126
published_at 2026-04-09T12:55:00Z
6
value 0.0032
scoring_system epss
scoring_elements 0.55138
published_at 2026-04-16T12:55:00Z
7
value 0.0032
scoring_system epss
scoring_elements 0.55118
published_at 2026-04-12T12:55:00Z
8
value 0.0032
scoring_system epss
scoring_elements 0.551
published_at 2026-04-13T12:55:00Z
9
value 0.0032
scoring_system epss
scoring_elements 0.55142
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-6629
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6629
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6629
2
reference_url https://security.gentoo.org/glsa/201701-32
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://security.gentoo.org/glsa/201701-32
3
reference_url https://web.archive.org/web/20210725054025/http://www.securityfocus.com/bid/92493
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://web.archive.org/web/20210725054025/http://www.securityfocus.com/bid/92493
4
reference_url https://www.phpmyadmin.net/security/PMASA-2016-52
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://www.phpmyadmin.net/security/PMASA-2016-52
5
reference_url http://www.securityfocus.com/bid/92493
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/92493
6
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-6629
reference_id CVE-2016-6629
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2016-6629
7
reference_url https://github.com/advisories/GHSA-567r-vqj7-5cw7
reference_id GHSA-567r-vqj7-5cw7
reference_type
scores
0
value CRITICAL
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-567r-vqj7-5cw7
fixed_packages
0
url pkg:deb/debian/phpmyadmin@4:4.6.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/phpmyadmin@4:4.6.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:4.6.4%252Bdfsg1-1%3Fdistro=trixie
1
url pkg:deb/debian/phpmyadmin@4:5.0.4%2Bdfsg2-2%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/phpmyadmin@4:5.0.4%2Bdfsg2-2%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-na3j-h3qr-k7dc
1
vulnerability VCID-ndjn-p6gb-u7g4
2
vulnerability VCID-rqy8-n6fr-hqey
3
vulnerability VCID-zd8d-c1nk-g7a4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:5.0.4%252Bdfsg2-2%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/phpmyadmin@4:5.2.1%2Bdfsg-1%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/phpmyadmin@4:5.2.1%2Bdfsg-1%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-zd8d-c1nk-g7a4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:5.2.1%252Bdfsg-1%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/phpmyadmin@4:5.2.2-really%2Bdfsg-1%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/phpmyadmin@4:5.2.2-really%2Bdfsg-1%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:5.2.2-really%252Bdfsg-1%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/phpmyadmin@4:5.2.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/phpmyadmin@4:5.2.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:5.2.3%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2016-6629, GHSA-567r-vqj7-5cw7
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-v66b-3ghf-9uas
22
url VCID-xm9j-76hy-1qcp
vulnerability_id VCID-xm9j-76hy-1qcp
summary
Multiple vulnerabilities have been found in phpMyAdmin, the worst
    of which could lead to arbitrary code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-6610
reference_id
reference_type
scores
0
value 0.00449
scoring_system epss
scoring_elements 0.63508
published_at 2026-04-01T12:55:00Z
1
value 0.00449
scoring_system epss
scoring_elements 0.63568
published_at 2026-04-02T12:55:00Z
2
value 0.00449
scoring_system epss
scoring_elements 0.63595
published_at 2026-04-04T12:55:00Z
3
value 0.00449
scoring_system epss
scoring_elements 0.63559
published_at 2026-04-07T12:55:00Z
4
value 0.00449
scoring_system epss
scoring_elements 0.6361
published_at 2026-04-08T12:55:00Z
5
value 0.00449
scoring_system epss
scoring_elements 0.63627
published_at 2026-04-12T12:55:00Z
6
value 0.00449
scoring_system epss
scoring_elements 0.63642
published_at 2026-04-11T12:55:00Z
7
value 0.00449
scoring_system epss
scoring_elements 0.63593
published_at 2026-04-13T12:55:00Z
8
value 0.00449
scoring_system epss
scoring_elements 0.6363
published_at 2026-04-16T12:55:00Z
9
value 0.00449
scoring_system epss
scoring_elements 0.63639
published_at 2026-04-18T12:55:00Z
10
value 0.00449
scoring_system epss
scoring_elements 0.63622
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-6610
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6610
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6610
fixed_packages
0
url pkg:deb/debian/phpmyadmin@4:4.6.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/phpmyadmin@4:4.6.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:4.6.4%252Bdfsg1-1%3Fdistro=trixie
1
url pkg:deb/debian/phpmyadmin@4:5.0.4%2Bdfsg2-2%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/phpmyadmin@4:5.0.4%2Bdfsg2-2%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-na3j-h3qr-k7dc
1
vulnerability VCID-ndjn-p6gb-u7g4
2
vulnerability VCID-rqy8-n6fr-hqey
3
vulnerability VCID-zd8d-c1nk-g7a4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:5.0.4%252Bdfsg2-2%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/phpmyadmin@4:5.2.1%2Bdfsg-1%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/phpmyadmin@4:5.2.1%2Bdfsg-1%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-zd8d-c1nk-g7a4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:5.2.1%252Bdfsg-1%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/phpmyadmin@4:5.2.2-really%2Bdfsg-1%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/phpmyadmin@4:5.2.2-really%2Bdfsg-1%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:5.2.2-really%252Bdfsg-1%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/phpmyadmin@4:5.2.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/phpmyadmin@4:5.2.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:5.2.3%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2016-6610
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xm9j-76hy-1qcp
23
url VCID-xu1c-xtb4-9ygg
vulnerability_id VCID-xu1c-xtb4-9ygg
summary
Multiple vulnerabilities have been found in phpMyAdmin, the worst
    of which could lead to arbitrary code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-6623
reference_id
reference_type
scores
0
value 0.0055
scoring_system epss
scoring_elements 0.67983
published_at 2026-04-21T12:55:00Z
1
value 0.0055
scoring_system epss
scoring_elements 0.67889
published_at 2026-04-01T12:55:00Z
2
value 0.0055
scoring_system epss
scoring_elements 0.67912
published_at 2026-04-02T12:55:00Z
3
value 0.0055
scoring_system epss
scoring_elements 0.67931
published_at 2026-04-04T12:55:00Z
4
value 0.0055
scoring_system epss
scoring_elements 0.6791
published_at 2026-04-07T12:55:00Z
5
value 0.0055
scoring_system epss
scoring_elements 0.67961
published_at 2026-04-08T12:55:00Z
6
value 0.0055
scoring_system epss
scoring_elements 0.67975
published_at 2026-04-09T12:55:00Z
7
value 0.0055
scoring_system epss
scoring_elements 0.67998
published_at 2026-04-11T12:55:00Z
8
value 0.0055
scoring_system epss
scoring_elements 0.67985
published_at 2026-04-12T12:55:00Z
9
value 0.0055
scoring_system epss
scoring_elements 0.6795
published_at 2026-04-13T12:55:00Z
10
value 0.0055
scoring_system epss
scoring_elements 0.67987
published_at 2026-04-16T12:55:00Z
11
value 0.0055
scoring_system epss
scoring_elements 0.68
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-6623
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6623
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6623
2
reference_url https://github.com/phpmyadmin/composer
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/phpmyadmin/composer
3
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-6623
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2016-6623
4
reference_url https://security.gentoo.org/glsa/201701-32
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://security.gentoo.org/glsa/201701-32
5
reference_url https://web.archive.org/web/20210123204343/http://www.securityfocus.com/bid/95052
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://web.archive.org/web/20210123204343/http://www.securityfocus.com/bid/95052
6
reference_url https://www.phpmyadmin.net/security/PMASA-2016-46
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://www.phpmyadmin.net/security/PMASA-2016-46
7
reference_url https://github.com/advisories/GHSA-2mcj-3r3r-v5wm
reference_id GHSA-2mcj-3r3r-v5wm
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-2mcj-3r3r-v5wm
fixed_packages
0
url pkg:deb/debian/phpmyadmin@4:4.6.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/phpmyadmin@4:4.6.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:4.6.4%252Bdfsg1-1%3Fdistro=trixie
1
url pkg:deb/debian/phpmyadmin@4:5.0.4%2Bdfsg2-2%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/phpmyadmin@4:5.0.4%2Bdfsg2-2%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-na3j-h3qr-k7dc
1
vulnerability VCID-ndjn-p6gb-u7g4
2
vulnerability VCID-rqy8-n6fr-hqey
3
vulnerability VCID-zd8d-c1nk-g7a4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:5.0.4%252Bdfsg2-2%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/phpmyadmin@4:5.2.1%2Bdfsg-1%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/phpmyadmin@4:5.2.1%2Bdfsg-1%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-zd8d-c1nk-g7a4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:5.2.1%252Bdfsg-1%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/phpmyadmin@4:5.2.2-really%2Bdfsg-1%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/phpmyadmin@4:5.2.2-really%2Bdfsg-1%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:5.2.2-really%252Bdfsg-1%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/phpmyadmin@4:5.2.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/phpmyadmin@4:5.2.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:5.2.3%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2016-6623, GHSA-2mcj-3r3r-v5wm
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xu1c-xtb4-9ygg
24
url VCID-xwyg-wr8p-r7he
vulnerability_id VCID-xwyg-wr8p-r7he
summary
Multiple vulnerabilities have been found in phpMyAdmin, the worst
    of which could lead to arbitrary code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-6607
reference_id
reference_type
scores
0
value 0.00541
scoring_system epss
scoring_elements 0.67583
published_at 2026-04-01T12:55:00Z
1
value 0.00541
scoring_system epss
scoring_elements 0.67619
published_at 2026-04-02T12:55:00Z
2
value 0.00541
scoring_system epss
scoring_elements 0.6764
published_at 2026-04-04T12:55:00Z
3
value 0.00541
scoring_system epss
scoring_elements 0.6762
published_at 2026-04-07T12:55:00Z
4
value 0.00541
scoring_system epss
scoring_elements 0.67671
published_at 2026-04-08T12:55:00Z
5
value 0.00541
scoring_system epss
scoring_elements 0.67686
published_at 2026-04-09T12:55:00Z
6
value 0.00541
scoring_system epss
scoring_elements 0.67709
published_at 2026-04-11T12:55:00Z
7
value 0.00541
scoring_system epss
scoring_elements 0.67694
published_at 2026-04-12T12:55:00Z
8
value 0.00541
scoring_system epss
scoring_elements 0.6766
published_at 2026-04-13T12:55:00Z
9
value 0.00541
scoring_system epss
scoring_elements 0.67696
published_at 2026-04-16T12:55:00Z
10
value 0.00541
scoring_system epss
scoring_elements 0.67708
published_at 2026-04-18T12:55:00Z
11
value 0.00541
scoring_system epss
scoring_elements 0.67688
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-6607
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6607
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6607
fixed_packages
0
url pkg:deb/debian/phpmyadmin@4:4.6.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/phpmyadmin@4:4.6.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:4.6.4%252Bdfsg1-1%3Fdistro=trixie
1
url pkg:deb/debian/phpmyadmin@4:5.0.4%2Bdfsg2-2%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/phpmyadmin@4:5.0.4%2Bdfsg2-2%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-na3j-h3qr-k7dc
1
vulnerability VCID-ndjn-p6gb-u7g4
2
vulnerability VCID-rqy8-n6fr-hqey
3
vulnerability VCID-zd8d-c1nk-g7a4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:5.0.4%252Bdfsg2-2%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/phpmyadmin@4:5.2.1%2Bdfsg-1%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/phpmyadmin@4:5.2.1%2Bdfsg-1%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-zd8d-c1nk-g7a4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:5.2.1%252Bdfsg-1%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/phpmyadmin@4:5.2.2-really%2Bdfsg-1%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/phpmyadmin@4:5.2.2-really%2Bdfsg-1%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:5.2.2-really%252Bdfsg-1%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/phpmyadmin@4:5.2.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/phpmyadmin@4:5.2.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:5.2.3%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2016-6607
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xwyg-wr8p-r7he
25
url VCID-z22z-a5bq-97d3
vulnerability_id VCID-z22z-a5bq-97d3
summary
Uncontrolled Resouce Consumption
An issue was discovered in phpMyAdmin. The transformation feature allows a user to trigger a denial-of-service (DoS) attack against the server.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-6618
reference_id
reference_type
scores
0
value 0.0055
scoring_system epss
scoring_elements 0.67983
published_at 2026-04-21T12:55:00Z
1
value 0.0055
scoring_system epss
scoring_elements 0.67889
published_at 2026-04-01T12:55:00Z
2
value 0.0055
scoring_system epss
scoring_elements 0.67912
published_at 2026-04-02T12:55:00Z
3
value 0.0055
scoring_system epss
scoring_elements 0.67931
published_at 2026-04-04T12:55:00Z
4
value 0.0055
scoring_system epss
scoring_elements 0.6791
published_at 2026-04-07T12:55:00Z
5
value 0.0055
scoring_system epss
scoring_elements 0.67961
published_at 2026-04-08T12:55:00Z
6
value 0.0055
scoring_system epss
scoring_elements 0.67975
published_at 2026-04-09T12:55:00Z
7
value 0.0055
scoring_system epss
scoring_elements 0.67998
published_at 2026-04-11T12:55:00Z
8
value 0.0055
scoring_system epss
scoring_elements 0.67985
published_at 2026-04-12T12:55:00Z
9
value 0.0055
scoring_system epss
scoring_elements 0.6795
published_at 2026-04-13T12:55:00Z
10
value 0.0055
scoring_system epss
scoring_elements 0.67987
published_at 2026-04-16T12:55:00Z
11
value 0.0055
scoring_system epss
scoring_elements 0.68
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-6618
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6618
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6618
2
reference_url https://github.com/phpmyadmin/composer
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/phpmyadmin/composer
3
reference_url https://lists.debian.org/debian-lts-announce/2018/07/msg00006.html
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.debian.org/debian-lts-announce/2018/07/msg00006.html
4
reference_url https://security.gentoo.org/glsa/201701-32
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://security.gentoo.org/glsa/201701-32
5
reference_url https://www.phpmyadmin.net/security/PMASA-2016-41
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://www.phpmyadmin.net/security/PMASA-2016-41
6
reference_url http://www.securityfocus.com/bid/95047
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.securityfocus.com/bid/95047
7
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-6618
reference_id CVE-2016-6618
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2016-6618
8
reference_url https://github.com/advisories/GHSA-rv6m-chvv-wmxg
reference_id GHSA-rv6m-chvv-wmxg
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-rv6m-chvv-wmxg
fixed_packages
0
url pkg:deb/debian/phpmyadmin@4:4.6.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/phpmyadmin@4:4.6.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:4.6.4%252Bdfsg1-1%3Fdistro=trixie
1
url pkg:deb/debian/phpmyadmin@4:5.0.4%2Bdfsg2-2%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/phpmyadmin@4:5.0.4%2Bdfsg2-2%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-na3j-h3qr-k7dc
1
vulnerability VCID-ndjn-p6gb-u7g4
2
vulnerability VCID-rqy8-n6fr-hqey
3
vulnerability VCID-zd8d-c1nk-g7a4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:5.0.4%252Bdfsg2-2%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/phpmyadmin@4:5.2.1%2Bdfsg-1%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/phpmyadmin@4:5.2.1%2Bdfsg-1%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-zd8d-c1nk-g7a4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:5.2.1%252Bdfsg-1%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/phpmyadmin@4:5.2.2-really%2Bdfsg-1%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/phpmyadmin@4:5.2.2-really%2Bdfsg-1%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:5.2.2-really%252Bdfsg-1%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/phpmyadmin@4:5.2.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/phpmyadmin@4:5.2.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:5.2.3%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2016-6618, GHSA-rv6m-chvv-wmxg
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-z22z-a5bq-97d3
26
url VCID-zg16-dfu1-g7dn
vulnerability_id VCID-zg16-dfu1-g7dn
summary
Information Exposure
An issue was discovered in phpMyAdmin. A user can specially craft a symlink on disk, to a file which phpMyAdmin is permitted to read but the user is not, which phpMyAdmin will then expose to the user.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-6613
reference_id
reference_type
scores
0
value 0.00411
scoring_system epss
scoring_elements 0.61453
published_at 2026-04-21T12:55:00Z
1
value 0.00411
scoring_system epss
scoring_elements 0.61298
published_at 2026-04-01T12:55:00Z
2
value 0.00411
scoring_system epss
scoring_elements 0.61377
published_at 2026-04-02T12:55:00Z
3
value 0.00411
scoring_system epss
scoring_elements 0.61406
published_at 2026-04-04T12:55:00Z
4
value 0.00411
scoring_system epss
scoring_elements 0.61375
published_at 2026-04-07T12:55:00Z
5
value 0.00411
scoring_system epss
scoring_elements 0.61422
published_at 2026-04-08T12:55:00Z
6
value 0.00411
scoring_system epss
scoring_elements 0.61437
published_at 2026-04-09T12:55:00Z
7
value 0.00411
scoring_system epss
scoring_elements 0.61459
published_at 2026-04-11T12:55:00Z
8
value 0.00411
scoring_system epss
scoring_elements 0.61444
published_at 2026-04-12T12:55:00Z
9
value 0.00411
scoring_system epss
scoring_elements 0.61426
published_at 2026-04-13T12:55:00Z
10
value 0.00411
scoring_system epss
scoring_elements 0.61465
published_at 2026-04-16T12:55:00Z
11
value 0.00411
scoring_system epss
scoring_elements 0.61469
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-6613
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6613
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6613
2
reference_url https://github.com/phpmyadmin/composer
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/phpmyadmin/composer
3
reference_url https://lists.debian.org/debian-lts-announce/2019/06/msg00009.html
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.debian.org/debian-lts-announce/2019/06/msg00009.html
4
reference_url https://security.gentoo.org/glsa/201701-32
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://security.gentoo.org/glsa/201701-32
5
reference_url https://www.phpmyadmin.net/security/PMASA-2016-36
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://www.phpmyadmin.net/security/PMASA-2016-36
6
reference_url http://www.securityfocus.com/bid/94115
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.securityfocus.com/bid/94115
7
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-6613
reference_id CVE-2016-6613
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2016-6613
8
reference_url https://github.com/advisories/GHSA-6j2v-g9rg-qcm5
reference_id GHSA-6j2v-g9rg-qcm5
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-6j2v-g9rg-qcm5
fixed_packages
0
url pkg:deb/debian/phpmyadmin@4:4.6.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/phpmyadmin@4:4.6.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:4.6.4%252Bdfsg1-1%3Fdistro=trixie
1
url pkg:deb/debian/phpmyadmin@4:5.0.4%2Bdfsg2-2%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/phpmyadmin@4:5.0.4%2Bdfsg2-2%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-na3j-h3qr-k7dc
1
vulnerability VCID-ndjn-p6gb-u7g4
2
vulnerability VCID-rqy8-n6fr-hqey
3
vulnerability VCID-zd8d-c1nk-g7a4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:5.0.4%252Bdfsg2-2%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/phpmyadmin@4:5.2.1%2Bdfsg-1%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/phpmyadmin@4:5.2.1%2Bdfsg-1%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-zd8d-c1nk-g7a4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:5.2.1%252Bdfsg-1%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/phpmyadmin@4:5.2.2-really%2Bdfsg-1%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/phpmyadmin@4:5.2.2-really%2Bdfsg-1%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:5.2.2-really%252Bdfsg-1%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/phpmyadmin@4:5.2.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/phpmyadmin@4:5.2.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:5.2.3%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2016-6613, GHSA-6j2v-g9rg-qcm5
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zg16-dfu1-g7dn
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/phpmyadmin@4:4.6.4%252Bdfsg1-1%3Fdistro=trixie