{"url":"http://public2.vulnerablecode.io/api/packages/387188?format=json","purl":"pkg:apk/alpine/phpmyadmin@4.4.15.8-r0?arch=x86_64&distroversion=v3.2&reponame=main","type":"apk","namespace":"alpine","name":"phpmyadmin","version":"4.4.15.8-r0","qualifiers":{"arch":"x86_64","distroversion":"v3.2","reponame":"main"},"subpath":"","is_vulnerable":false,"next_non_vulnerable_version":"4.4.15.9-r0","latest_non_vulnerable_version":"4.4.15.9-r0","affected_by_vulnerabilities":[],"fixing_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/7575?format=json","vulnerability_id":"VCID-1dc8-kafr-3qd7","summary":"Cross-site Scripting\nAn issue was discovered in phpMyAdmin. An attacker may be able to trigger a user to download a specially crafted malicious SVG file.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-6628","reference_id":"","reference_type":"","scores":[{"value":"0.00258","scoring_system":"epss","scoring_elements":"0.49265","published_at":"2026-05-16T12:55:00Z"},{"value":"0.00258","scoring_system":"epss","scoring_elements":"0.49212","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00258","scoring_system":"epss","scoring_elements":"0.49257","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00258","scoring_system":"epss","scoring_elements":"0.49255","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00258","scoring_system":"epss","scoring_elements":"0.49225","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00258","scoring_system":"epss","scoring_elements":"0.49223","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00258","scoring_system":"epss","scoring_elements":"0.4918","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00258","scoring_system":"epss","scoring_elements":"0.49096","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00258","scoring_system":"epss","scoring_elements":"0.49159","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00258","scoring_system":"epss","scoring_elements":"0.49187","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00258","scoring_system":"epss","scoring_elements":"0.49136","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00258","scoring_system":"epss","scoring_elements":"0.49163","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00258","scoring_system":"epss","scoring_elements":"0.49238","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00258","scoring_system":"epss","scoring_elements":"0.49258","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00258","scoring_system":"epss","scoring_elements":"0.49155","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00258","scoring_system":"epss","scoring_elements":"0.49186","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00258","scoring_system":"epss","scoring_elements":"0.49214","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00258","scoring_system":"epss","scoring_elements":"0.49165","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00258","scoring_system":"epss","scoring_elements":"0.4922","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00258","scoring_system":"epss","scoring_elements":"0.49216","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00258","scoring_system":"epss","scoring_elements":"0.49234","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00258","scoring_system":"epss","scoring_elements":"0.49207","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-6628"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6628","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6628"},{"reference_url":"https://github.com/phpmyadmin/composer","reference_id":"","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/phpmyadmin/composer"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2019/06/msg00009.html","reference_id":"","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.debian.org/debian-lts-announce/2019/06/msg00009.html"},{"reference_url":"https://security.gentoo.org/glsa/201701-32","reference_id":"","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://security.gentoo.org/glsa/201701-32"},{"reference_url":"https://www.phpmyadmin.net/security/PMASA-2016-51","reference_id":"","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.phpmyadmin.net/security/PMASA-2016-51"},{"reference_url":"http://www.securityfocus.com/bid/92492","reference_id":"","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://www.securityfocus.com/bid/92492"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-6628","reference_id":"CVE-2016-6628","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-6628"},{"reference_url":"https://github.com/advisories/GHSA-phhm-63xx-v9rr","reference_id":"GHSA-phhm-63xx-v9rr","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"cvssv3.1_qr","scoring_elements":""}],"url":"https://github.com/advisories/GHSA-phhm-63xx-v9rr"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/387188?format=json","purl":"pkg:apk/alpine/phpmyadmin@4.4.15.8-r0?arch=x86_64&distroversion=v3.2&reponame=main","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/phpmyadmin@4.4.15.8-r0%3Farch=x86_64&distroversion=v3.2&reponame=main"}],"aliases":["CVE-2016-6628","GHSA-phhm-63xx-v9rr"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-1dc8-kafr-3qd7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/42617?format=json","vulnerability_id":"VCID-5cdg-4z32-syfp","summary":"Multiple vulnerabilities have been found in phpMyAdmin, the worst\n    of which could lead to arbitrary code execution.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-6617","reference_id":"","reference_type":"","scores":[{"value":"0.00376","scoring_system":"epss","scoring_elements":"0.5911","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00376","scoring_system":"epss","scoring_elements":"0.59184","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00376","scoring_system":"epss","scoring_elements":"0.59208","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00376","scoring_system":"epss","scoring_elements":"0.59172","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00376","scoring_system":"epss","scoring_elements":"0.59224","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00376","scoring_system":"epss","scoring_elements":"0.59237","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00376","scoring_system":"epss","scoring_elements":"0.59257","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00376","scoring_system":"epss","scoring_elements":"0.59239","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00376","scoring_system":"epss","scoring_elements":"0.5922","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00376","scoring_system":"epss","scoring_elements":"0.59262","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00376","scoring_system":"epss","scoring_elements":"0.59244","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00376","scoring_system":"epss","scoring_elements":"0.59225","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00376","scoring_system":"epss","scoring_elements":"0.59231","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00376","scoring_system":"epss","scoring_elements":"0.59187","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00376","scoring_system":"epss","scoring_elements":"0.59235","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00376","scoring_system":"epss","scoring_elements":"0.59292","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00376","scoring_system":"epss","scoring_elements":"0.59249","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00376","scoring_system":"epss","scoring_elements":"0.59276","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00376","scoring_system":"epss","scoring_elements":"0.59347","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00376","scoring_system":"epss","scoring_elements":"0.59357","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00376","scoring_system":"epss","scoring_elements":"0.59373","published_at":"2026-05-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-6617"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6617","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6617"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/387188?format=json","purl":"pkg:apk/alpine/phpmyadmin@4.4.15.8-r0?arch=x86_64&distroversion=v3.2&reponame=main","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/phpmyadmin@4.4.15.8-r0%3Farch=x86_64&distroversion=v3.2&reponame=main"}],"aliases":["CVE-2016-6617"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-5cdg-4z32-syfp"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/7602?format=json","vulnerability_id":"VCID-64sy-unts-juf3","summary":"Information Exposure\nAn issue was discovered in phpMyAdmin. An attacker can determine whether a user is logged in to phpMyAdmin. The user session, username, and password are not compromised by this vulnerability.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-6625","reference_id":"","reference_type":"","scores":[{"value":"0.00275","scoring_system":"epss","scoring_elements":"0.50976","published_at":"2026-05-16T12:55:00Z"},{"value":"0.00275","scoring_system":"epss","scoring_elements":"0.50995","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00275","scoring_system":"epss","scoring_elements":"0.50974","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00275","scoring_system":"epss","scoring_elements":"0.50921","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00275","scoring_system":"epss","scoring_elements":"0.50929","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00275","scoring_system":"epss","scoring_elements":"0.50891","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00275","scoring_system":"epss","scoring_elements":"0.50817","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00275","scoring_system":"epss","scoring_elements":"0.50869","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00275","scoring_system":"epss","scoring_elements":"0.509","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00275","scoring_system":"epss","scoring_elements":"0.50855","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00275","scoring_system":"epss","scoring_elements":"0.50885","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00275","scoring_system":"epss","scoring_elements":"0.50961","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00275","scoring_system":"epss","scoring_elements":"0.50851","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00275","scoring_system":"epss","scoring_elements":"0.50909","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00275","scoring_system":"epss","scoring_elements":"0.50935","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00275","scoring_system":"epss","scoring_elements":"0.50892","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00275","scoring_system":"epss","scoring_elements":"0.50949","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00275","scoring_system":"epss","scoring_elements":"0.50947","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00275","scoring_system":"epss","scoring_elements":"0.50989","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00275","scoring_system":"epss","scoring_elements":"0.50967","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00275","scoring_system":"epss","scoring_elements":"0.50951","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00275","scoring_system":"epss","scoring_elements":"0.50988","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-6625"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6625","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6625"},{"reference_url":"https://github.com/phpmyadmin/composer","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/phpmyadmin/composer"},{"reference_url":"https://security.gentoo.org/glsa/201701-32","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://security.gentoo.org/glsa/201701-32"},{"reference_url":"https://www.phpmyadmin.net/security/PMASA-2016-48","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.phpmyadmin.net/security/PMASA-2016-48"},{"reference_url":"http://www.securityfocus.com/bid/92491","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://www.securityfocus.com/bid/92491"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-6625","reference_id":"CVE-2016-6625","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-6625"},{"reference_url":"https://github.com/advisories/GHSA-r643-7xfg-ppc5","reference_id":"GHSA-r643-7xfg-ppc5","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"cvssv3.1_qr","scoring_elements":""}],"url":"https://github.com/advisories/GHSA-r643-7xfg-ppc5"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/387188?format=json","purl":"pkg:apk/alpine/phpmyadmin@4.4.15.8-r0?arch=x86_64&distroversion=v3.2&reponame=main","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/phpmyadmin@4.4.15.8-r0%3Farch=x86_64&distroversion=v3.2&reponame=main"}],"aliases":["CVE-2016-6625","GHSA-r643-7xfg-ppc5"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-64sy-unts-juf3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/42610?format=json","vulnerability_id":"VCID-6qn6-3v4w-pqhw","summary":"Multiple vulnerabilities have been found in phpMyAdmin, the worst\n    of which could lead to arbitrary code execution.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-6606","reference_id":"","reference_type":"","scores":[{"value":"0.00258","scoring_system":"epss","scoring_elements":"0.49159","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00258","scoring_system":"epss","scoring_elements":"0.4919","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00258","scoring_system":"epss","scoring_elements":"0.49218","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00258","scoring_system":"epss","scoring_elements":"0.49169","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00258","scoring_system":"epss","scoring_elements":"0.49224","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00258","scoring_system":"epss","scoring_elements":"0.4922","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00258","scoring_system":"epss","scoring_elements":"0.49238","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00258","scoring_system":"epss","scoring_elements":"0.49211","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00258","scoring_system":"epss","scoring_elements":"0.49216","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00258","scoring_system":"epss","scoring_elements":"0.49262","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00258","scoring_system":"epss","scoring_elements":"0.49259","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00258","scoring_system":"epss","scoring_elements":"0.49229","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00258","scoring_system":"epss","scoring_elements":"0.49226","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00258","scoring_system":"epss","scoring_elements":"0.49184","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00258","scoring_system":"epss","scoring_elements":"0.491","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00258","scoring_system":"epss","scoring_elements":"0.49163","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00258","scoring_system":"epss","scoring_elements":"0.49191","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00258","scoring_system":"epss","scoring_elements":"0.4914","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00258","scoring_system":"epss","scoring_elements":"0.49167","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00258","scoring_system":"epss","scoring_elements":"0.49241","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00258","scoring_system":"epss","scoring_elements":"0.49269","published_at":"2026-05-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-6606"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6606","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6606"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/387188?format=json","purl":"pkg:apk/alpine/phpmyadmin@4.4.15.8-r0?arch=x86_64&distroversion=v3.2&reponame=main","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/phpmyadmin@4.4.15.8-r0%3Farch=x86_64&distroversion=v3.2&reponame=main"}],"aliases":["CVE-2016-6606"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-6qn6-3v4w-pqhw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/7580?format=json","vulnerability_id":"VCID-8fu3-wm7d-qkeu","summary":"Incomplete Cleanup\nAn issue was discovered in phpMyAdmin where, under certain conditions, phpMyAdmin may not delete temporary files during the import of ESRI files.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-6632","reference_id":"","reference_type":"","scores":[{"value":"0.00567","scoring_system":"epss","scoring_elements":"0.68708","published_at":"2026-05-16T12:55:00Z"},{"value":"0.00567","scoring_system":"epss","scoring_elements":"0.68527","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00567","scoring_system":"epss","scoring_elements":"0.6854","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00567","scoring_system":"epss","scoring_elements":"0.68518","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00567","scoring_system":"epss","scoring_elements":"0.68567","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00567","scoring_system":"epss","scoring_elements":"0.68572","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00567","scoring_system":"epss","scoring_elements":"0.68578","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00567","scoring_system":"epss","scoring_elements":"0.68556","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00567","scoring_system":"epss","scoring_elements":"0.68599","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00567","scoring_system":"epss","scoring_elements":"0.68636","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00567","scoring_system":"epss","scoring_elements":"0.68603","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00567","scoring_system":"epss","scoring_elements":"0.68628","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00567","scoring_system":"epss","scoring_elements":"0.68683","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00567","scoring_system":"epss","scoring_elements":"0.68694","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00567","scoring_system":"epss","scoring_elements":"0.68424","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00567","scoring_system":"epss","scoring_elements":"0.68443","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00567","scoring_system":"epss","scoring_elements":"0.68463","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00567","scoring_system":"epss","scoring_elements":"0.68439","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00567","scoring_system":"epss","scoring_elements":"0.68489","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00567","scoring_system":"epss","scoring_elements":"0.68506","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00567","scoring_system":"epss","scoring_elements":"0.68532","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00567","scoring_system":"epss","scoring_elements":"0.6852","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00567","scoring_system":"epss","scoring_elements":"0.68488","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-6632"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6632","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6632"},{"reference_url":"https://github.com/phpmyadmin/composer","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/phpmyadmin/composer"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2019/06/msg00009.html","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.debian.org/debian-lts-announce/2019/06/msg00009.html"},{"reference_url":"https://security.gentoo.org/glsa/201701-32","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://security.gentoo.org/glsa/201701-32"},{"reference_url":"https://www.phpmyadmin.net/security/PMASA-2016-55","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.phpmyadmin.net/security/PMASA-2016-55"},{"reference_url":"http://www.securityfocus.com/bid/92497","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://www.securityfocus.com/bid/92497"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-6632","reference_id":"CVE-2016-6632","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-6632"},{"reference_url":"https://github.com/advisories/GHSA-426q-975p-w5cr","reference_id":"GHSA-426q-975p-w5cr","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"cvssv3.1_qr","scoring_elements":""}],"url":"https://github.com/advisories/GHSA-426q-975p-w5cr"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/387188?format=json","purl":"pkg:apk/alpine/phpmyadmin@4.4.15.8-r0?arch=x86_64&distroversion=v3.2&reponame=main","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/phpmyadmin@4.4.15.8-r0%3Farch=x86_64&distroversion=v3.2&reponame=main"}],"aliases":["CVE-2016-6632","GHSA-426q-975p-w5cr"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-8fu3-wm7d-qkeu"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/42624?format=json","vulnerability_id":"VCID-95rw-mj5a-63cb","summary":"Multiple vulnerabilities have been found in phpMyAdmin, the worst\n    of which could lead to arbitrary code execution.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-6630","reference_id":"","reference_type":"","scores":[{"value":"0.00713","scoring_system":"epss","scoring_elements":"0.72266","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00713","scoring_system":"epss","scoring_elements":"0.72272","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00713","scoring_system":"epss","scoring_elements":"0.72292","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00713","scoring_system":"epss","scoring_elements":"0.72268","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00713","scoring_system":"epss","scoring_elements":"0.72306","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00713","scoring_system":"epss","scoring_elements":"0.72319","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00713","scoring_system":"epss","scoring_elements":"0.72341","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00713","scoring_system":"epss","scoring_elements":"0.72325","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00713","scoring_system":"epss","scoring_elements":"0.72311","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00713","scoring_system":"epss","scoring_elements":"0.72353","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00713","scoring_system":"epss","scoring_elements":"0.72362","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00713","scoring_system":"epss","scoring_elements":"0.7235","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00713","scoring_system":"epss","scoring_elements":"0.72393","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00713","scoring_system":"epss","scoring_elements":"0.72403","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00713","scoring_system":"epss","scoring_elements":"0.72399","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00713","scoring_system":"epss","scoring_elements":"0.7239","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00713","scoring_system":"epss","scoring_elements":"0.7242","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00713","scoring_system":"epss","scoring_elements":"0.72446","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00713","scoring_system":"epss","scoring_elements":"0.72409","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00713","scoring_system":"epss","scoring_elements":"0.72435","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00713","scoring_system":"epss","scoring_elements":"0.72493","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00713","scoring_system":"epss","scoring_elements":"0.72499","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00713","scoring_system":"epss","scoring_elements":"0.72509","published_at":"2026-05-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-6630"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6630","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6630"},{"reference_url":"https://usn.ubuntu.com/USN-4843-1/","reference_id":"USN-USN-4843-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/USN-4843-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/387188?format=json","purl":"pkg:apk/alpine/phpmyadmin@4.4.15.8-r0?arch=x86_64&distroversion=v3.2&reponame=main","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/phpmyadmin@4.4.15.8-r0%3Farch=x86_64&distroversion=v3.2&reponame=main"}],"aliases":["CVE-2016-6630"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-95rw-mj5a-63cb"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/7600?format=json","vulnerability_id":"VCID-9t2s-etzf-t3d2","summary":"Command Injection\nAn issue was discovered in phpMyAdmin. A specially crafted database name could be used to run arbitrary PHP commands through the array export feature.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-6609","reference_id":"","reference_type":"","scores":[{"value":"0.00425","scoring_system":"epss","scoring_elements":"0.62388","published_at":"2026-05-16T12:55:00Z"},{"value":"0.00425","scoring_system":"epss","scoring_elements":"0.62265","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00425","scoring_system":"epss","scoring_elements":"0.62272","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00425","scoring_system":"epss","scoring_elements":"0.62256","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00425","scoring_system":"epss","scoring_elements":"0.62266","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00425","scoring_system":"epss","scoring_elements":"0.62283","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00425","scoring_system":"epss","scoring_elements":"0.62276","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00425","scoring_system":"epss","scoring_elements":"0.62222","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00425","scoring_system":"epss","scoring_elements":"0.6227","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00425","scoring_system":"epss","scoring_elements":"0.62328","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00425","scoring_system":"epss","scoring_elements":"0.62281","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00425","scoring_system":"epss","scoring_elements":"0.62308","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00425","scoring_system":"epss","scoring_elements":"0.62361","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00425","scoring_system":"epss","scoring_elements":"0.62373","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00425","scoring_system":"epss","scoring_elements":"0.62108","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00425","scoring_system":"epss","scoring_elements":"0.62169","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00425","scoring_system":"epss","scoring_elements":"0.62199","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00425","scoring_system":"epss","scoring_elements":"0.62166","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00425","scoring_system":"epss","scoring_elements":"0.62216","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00425","scoring_system":"epss","scoring_elements":"0.62233","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00425","scoring_system":"epss","scoring_elements":"0.62252","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00425","scoring_system":"epss","scoring_elements":"0.62241","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00425","scoring_system":"epss","scoring_elements":"0.6222","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-6609"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6609","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6609"},{"reference_url":"https://github.com/phpmyadmin/composer","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/phpmyadmin/composer"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2018/07/msg00006.html","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.debian.org/debian-lts-announce/2018/07/msg00006.html"},{"reference_url":"https://security.gentoo.org/glsa/201701-32","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://security.gentoo.org/glsa/201701-32"},{"reference_url":"https://www.phpmyadmin.net/security/PMASA-2016-32","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.phpmyadmin.net/security/PMASA-2016-32"},{"reference_url":"http://www.securityfocus.com/bid/94112","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://www.securityfocus.com/bid/94112"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-6609","reference_id":"CVE-2016-6609","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-6609"},{"reference_url":"https://github.com/advisories/GHSA-wpww-hx7x-xfjh","reference_id":"GHSA-wpww-hx7x-xfjh","reference_type":"","scores":[{"value":"HIGH","scoring_system":"cvssv3.1_qr","scoring_elements":""}],"url":"https://github.com/advisories/GHSA-wpww-hx7x-xfjh"},{"reference_url":"https://usn.ubuntu.com/USN-4843-1/","reference_id":"USN-USN-4843-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/USN-4843-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/387188?format=json","purl":"pkg:apk/alpine/phpmyadmin@4.4.15.8-r0?arch=x86_64&distroversion=v3.2&reponame=main","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/phpmyadmin@4.4.15.8-r0%3Farch=x86_64&distroversion=v3.2&reponame=main"}],"aliases":["CVE-2016-6609","GHSA-wpww-hx7x-xfjh"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-9t2s-etzf-t3d2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/42625?format=json","vulnerability_id":"VCID-b4xu-wcz2-9fdh","summary":"Multiple vulnerabilities have been found in phpMyAdmin, the worst\n    of which could lead to arbitrary code execution.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-6631","reference_id":"","reference_type":"","scores":[{"value":"0.03567","scoring_system":"epss","scoring_elements":"0.87666","published_at":"2026-04-01T12:55:00Z"},{"value":"0.03567","scoring_system":"epss","scoring_elements":"0.87676","published_at":"2026-04-02T12:55:00Z"},{"value":"0.03567","scoring_system":"epss","scoring_elements":"0.87688","published_at":"2026-04-04T12:55:00Z"},{"value":"0.03567","scoring_system":"epss","scoring_elements":"0.8769","published_at":"2026-04-07T12:55:00Z"},{"value":"0.03567","scoring_system":"epss","scoring_elements":"0.87711","published_at":"2026-04-08T12:55:00Z"},{"value":"0.03567","scoring_system":"epss","scoring_elements":"0.87717","published_at":"2026-04-09T12:55:00Z"},{"value":"0.03567","scoring_system":"epss","scoring_elements":"0.87729","published_at":"2026-04-11T12:55:00Z"},{"value":"0.03567","scoring_system":"epss","scoring_elements":"0.87722","published_at":"2026-04-12T12:55:00Z"},{"value":"0.03567","scoring_system":"epss","scoring_elements":"0.8772","published_at":"2026-04-13T12:55:00Z"},{"value":"0.03567","scoring_system":"epss","scoring_elements":"0.87734","published_at":"2026-04-18T12:55:00Z"},{"value":"0.03567","scoring_system":"epss","scoring_elements":"0.87731","published_at":"2026-04-21T12:55:00Z"},{"value":"0.03567","scoring_system":"epss","scoring_elements":"0.87749","published_at":"2026-04-24T12:55:00Z"},{"value":"0.03567","scoring_system":"epss","scoring_elements":"0.87756","published_at":"2026-04-26T12:55:00Z"},{"value":"0.03567","scoring_system":"epss","scoring_elements":"0.87754","published_at":"2026-04-29T12:55:00Z"},{"value":"0.03567","scoring_system":"epss","scoring_elements":"0.87768","published_at":"2026-05-05T12:55:00Z"},{"value":"0.03567","scoring_system":"epss","scoring_elements":"0.87783","published_at":"2026-05-07T12:55:00Z"},{"value":"0.03567","scoring_system":"epss","scoring_elements":"0.87801","published_at":"2026-05-09T12:55:00Z"},{"value":"0.03567","scoring_system":"epss","scoring_elements":"0.87798","published_at":"2026-05-11T12:55:00Z"},{"value":"0.03567","scoring_system":"epss","scoring_elements":"0.87812","published_at":"2026-05-12T12:55:00Z"},{"value":"0.03567","scoring_system":"epss","scoring_elements":"0.87843","published_at":"2026-05-14T12:55:00Z"},{"value":"0.03567","scoring_system":"epss","scoring_elements":"0.8785","published_at":"2026-05-15T12:55:00Z"},{"value":"0.03567","scoring_system":"epss","scoring_elements":"0.87852","published_at":"2026-05-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-6631"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6631","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6631"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/387188?format=json","purl":"pkg:apk/alpine/phpmyadmin@4.4.15.8-r0?arch=x86_64&distroversion=v3.2&reponame=main","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/phpmyadmin@4.4.15.8-r0%3Farch=x86_64&distroversion=v3.2&reponame=main"}],"aliases":["CVE-2016-6631"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-b4xu-wcz2-9fdh"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/42616?format=json","vulnerability_id":"VCID-dfgy-a4j1-vfh2","summary":"Multiple vulnerabilities have been found in phpMyAdmin, the worst\n    of which could lead to arbitrary code execution.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-6616","reference_id":"","reference_type":"","scores":[{"value":"0.00316","scoring_system":"epss","scoring_elements":"0.54629","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00316","scoring_system":"epss","scoring_elements":"0.547","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00316","scoring_system":"epss","scoring_elements":"0.54722","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00316","scoring_system":"epss","scoring_elements":"0.54692","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00316","scoring_system":"epss","scoring_elements":"0.54745","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00316","scoring_system":"epss","scoring_elements":"0.54741","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00316","scoring_system":"epss","scoring_elements":"0.54753","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00316","scoring_system":"epss","scoring_elements":"0.54737","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00316","scoring_system":"epss","scoring_elements":"0.54715","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00316","scoring_system":"epss","scoring_elements":"0.54755","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00316","scoring_system":"epss","scoring_elements":"0.54736","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00316","scoring_system":"epss","scoring_elements":"0.54708","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00316","scoring_system":"epss","scoring_elements":"0.54727","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00316","scoring_system":"epss","scoring_elements":"0.54704","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00316","scoring_system":"epss","scoring_elements":"0.5465","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00316","scoring_system":"epss","scoring_elements":"0.54693","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00316","scoring_system":"epss","scoring_elements":"0.54748","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00316","scoring_system":"epss","scoring_elements":"0.54802","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00316","scoring_system":"epss","scoring_elements":"0.54815","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00316","scoring_system":"epss","scoring_elements":"0.54819","published_at":"2026-05-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-6616"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6616","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6616"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/387188?format=json","purl":"pkg:apk/alpine/phpmyadmin@4.4.15.8-r0?arch=x86_64&distroversion=v3.2&reponame=main","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/phpmyadmin@4.4.15.8-r0%3Farch=x86_64&distroversion=v3.2&reponame=main"}],"aliases":["CVE-2016-6616"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-dfgy-a4j1-vfh2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/42615?format=json","vulnerability_id":"VCID-ds3z-k4ry-tqfa","summary":"Multiple vulnerabilities have been found in phpMyAdmin, the worst\n    of which could lead to arbitrary code execution.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-6615","reference_id":"","reference_type":"","scores":[{"value":"0.005","scoring_system":"epss","scoring_elements":"0.65891","published_at":"2026-04-01T12:55:00Z"},{"value":"0.005","scoring_system":"epss","scoring_elements":"0.65932","published_at":"2026-04-02T12:55:00Z"},{"value":"0.005","scoring_system":"epss","scoring_elements":"0.65963","published_at":"2026-04-04T12:55:00Z"},{"value":"0.005","scoring_system":"epss","scoring_elements":"0.65929","published_at":"2026-04-07T12:55:00Z"},{"value":"0.005","scoring_system":"epss","scoring_elements":"0.6598","published_at":"2026-04-08T12:55:00Z"},{"value":"0.005","scoring_system":"epss","scoring_elements":"0.65992","published_at":"2026-04-09T12:55:00Z"},{"value":"0.005","scoring_system":"epss","scoring_elements":"0.66011","published_at":"2026-04-11T12:55:00Z"},{"value":"0.005","scoring_system":"epss","scoring_elements":"0.65998","published_at":"2026-04-12T12:55:00Z"},{"value":"0.005","scoring_system":"epss","scoring_elements":"0.65968","published_at":"2026-04-13T12:55:00Z"},{"value":"0.005","scoring_system":"epss","scoring_elements":"0.66003","published_at":"2026-04-16T12:55:00Z"},{"value":"0.005","scoring_system":"epss","scoring_elements":"0.66017","published_at":"2026-04-18T12:55:00Z"},{"value":"0.005","scoring_system":"epss","scoring_elements":"0.66004","published_at":"2026-04-21T12:55:00Z"},{"value":"0.005","scoring_system":"epss","scoring_elements":"0.66023","published_at":"2026-04-24T12:55:00Z"},{"value":"0.005","scoring_system":"epss","scoring_elements":"0.66034","published_at":"2026-04-26T12:55:00Z"},{"value":"0.005","scoring_system":"epss","scoring_elements":"0.66032","published_at":"2026-04-29T12:55:00Z"},{"value":"0.005","scoring_system":"epss","scoring_elements":"0.66009","published_at":"2026-05-05T12:55:00Z"},{"value":"0.005","scoring_system":"epss","scoring_elements":"0.66055","published_at":"2026-05-07T12:55:00Z"},{"value":"0.005","scoring_system":"epss","scoring_elements":"0.66099","published_at":"2026-05-09T12:55:00Z"},{"value":"0.005","scoring_system":"epss","scoring_elements":"0.66069","published_at":"2026-05-11T12:55:00Z"},{"value":"0.005","scoring_system":"epss","scoring_elements":"0.6609","published_at":"2026-05-12T12:55:00Z"},{"value":"0.005","scoring_system":"epss","scoring_elements":"0.66146","published_at":"2026-05-14T12:55:00Z"},{"value":"0.005","scoring_system":"epss","scoring_elements":"0.66156","published_at":"2026-05-15T12:55:00Z"},{"value":"0.005","scoring_system":"epss","scoring_elements":"0.66169","published_at":"2026-05-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-6615"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6615","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6615"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/387188?format=json","purl":"pkg:apk/alpine/phpmyadmin@4.4.15.8-r0?arch=x86_64&distroversion=v3.2&reponame=main","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/phpmyadmin@4.4.15.8-r0%3Farch=x86_64&distroversion=v3.2&reponame=main"}],"aliases":["CVE-2016-6615"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ds3z-k4ry-tqfa"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/7589?format=json","vulnerability_id":"VCID-e9qs-mvaa-wyc6","summary":"Incomplete List of Disallowed Inputs\nAn issue was discovered in phpMyAdmin involving improper enforcement of the IP-based authentication rules. When phpMyAdmin is used with IPv6 in a proxy server environment, and the proxy server is in the allowed range but the attacking computer is not allowed, this vulnerability can allow the attacking computer to connect despite the IP rules.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-6624","reference_id":"","reference_type":"","scores":[{"value":"0.003","scoring_system":"epss","scoring_elements":"0.53409","published_at":"2026-05-16T12:55:00Z"},{"value":"0.003","scoring_system":"epss","scoring_elements":"0.53347","published_at":"2026-04-16T12:55:00Z"},{"value":"0.003","scoring_system":"epss","scoring_elements":"0.53352","published_at":"2026-04-18T12:55:00Z"},{"value":"0.003","scoring_system":"epss","scoring_elements":"0.53332","published_at":"2026-04-21T12:55:00Z"},{"value":"0.003","scoring_system":"epss","scoring_elements":"0.53304","published_at":"2026-04-24T12:55:00Z"},{"value":"0.003","scoring_system":"epss","scoring_elements":"0.53316","published_at":"2026-04-26T12:55:00Z"},{"value":"0.003","scoring_system":"epss","scoring_elements":"0.53279","published_at":"2026-04-29T12:55:00Z"},{"value":"0.003","scoring_system":"epss","scoring_elements":"0.53236","published_at":"2026-05-05T12:55:00Z"},{"value":"0.003","scoring_system":"epss","scoring_elements":"0.53286","published_at":"2026-05-07T12:55:00Z"},{"value":"0.003","scoring_system":"epss","scoring_elements":"0.53338","published_at":"2026-05-09T12:55:00Z"},{"value":"0.003","scoring_system":"epss","scoring_elements":"0.53299","published_at":"2026-05-11T12:55:00Z"},{"value":"0.003","scoring_system":"epss","scoring_elements":"0.53325","published_at":"2026-05-12T12:55:00Z"},{"value":"0.003","scoring_system":"epss","scoring_elements":"0.53393","published_at":"2026-05-14T12:55:00Z"},{"value":"0.003","scoring_system":"epss","scoring_elements":"0.53404","published_at":"2026-05-15T12:55:00Z"},{"value":"0.003","scoring_system":"epss","scoring_elements":"0.53227","published_at":"2026-04-01T12:55:00Z"},{"value":"0.003","scoring_system":"epss","scoring_elements":"0.53251","published_at":"2026-04-02T12:55:00Z"},{"value":"0.003","scoring_system":"epss","scoring_elements":"0.53276","published_at":"2026-04-04T12:55:00Z"},{"value":"0.003","scoring_system":"epss","scoring_elements":"0.53244","published_at":"2026-04-07T12:55:00Z"},{"value":"0.003","scoring_system":"epss","scoring_elements":"0.53296","published_at":"2026-04-08T12:55:00Z"},{"value":"0.003","scoring_system":"epss","scoring_elements":"0.53291","published_at":"2026-04-09T12:55:00Z"},{"value":"0.003","scoring_system":"epss","scoring_elements":"0.53341","published_at":"2026-04-11T12:55:00Z"},{"value":"0.003","scoring_system":"epss","scoring_elements":"0.53326","published_at":"2026-04-12T12:55:00Z"},{"value":"0.003","scoring_system":"epss","scoring_elements":"0.53309","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-6624"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6624","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6624"},{"reference_url":"https://github.com/phpmyadmin/composer","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/phpmyadmin/composer"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2019/06/msg00009.html","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.debian.org/debian-lts-announce/2019/06/msg00009.html"},{"reference_url":"https://security.gentoo.org/glsa/201701-32","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://security.gentoo.org/glsa/201701-32"},{"reference_url":"https://www.phpmyadmin.net/security/PMASA-2016-47","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.phpmyadmin.net/security/PMASA-2016-47"},{"reference_url":"http://www.securityfocus.com/bid/92489","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://www.securityfocus.com/bid/92489"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-6624","reference_id":"CVE-2016-6624","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-6624"},{"reference_url":"https://github.com/advisories/GHSA-mhxj-6vf8-mwv3","reference_id":"GHSA-mhxj-6vf8-mwv3","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"cvssv3.1_qr","scoring_elements":""}],"url":"https://github.com/advisories/GHSA-mhxj-6vf8-mwv3"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/387188?format=json","purl":"pkg:apk/alpine/phpmyadmin@4.4.15.8-r0?arch=x86_64&distroversion=v3.2&reponame=main","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/phpmyadmin@4.4.15.8-r0%3Farch=x86_64&distroversion=v3.2&reponame=main"}],"aliases":["CVE-2016-6624","GHSA-mhxj-6vf8-mwv3"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-e9qs-mvaa-wyc6"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/42613?format=json","vulnerability_id":"VCID-ff6r-sq16-nbff","summary":"Multiple vulnerabilities have been found in phpMyAdmin, the worst\n    of which could lead to arbitrary code execution.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-6611","reference_id":"","reference_type":"","scores":[{"value":"0.00365","scoring_system":"epss","scoring_elements":"0.58388","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00365","scoring_system":"epss","scoring_elements":"0.58474","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00365","scoring_system":"epss","scoring_elements":"0.58494","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00365","scoring_system":"epss","scoring_elements":"0.58465","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00365","scoring_system":"epss","scoring_elements":"0.58517","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00365","scoring_system":"epss","scoring_elements":"0.58524","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00365","scoring_system":"epss","scoring_elements":"0.5854","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00365","scoring_system":"epss","scoring_elements":"0.58521","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00365","scoring_system":"epss","scoring_elements":"0.58501","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00365","scoring_system":"epss","scoring_elements":"0.58534","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00365","scoring_system":"epss","scoring_elements":"0.58539","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00365","scoring_system":"epss","scoring_elements":"0.58483","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00365","scoring_system":"epss","scoring_elements":"0.58495","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00365","scoring_system":"epss","scoring_elements":"0.58482","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00365","scoring_system":"epss","scoring_elements":"0.58447","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00365","scoring_system":"epss","scoring_elements":"0.58491","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00365","scoring_system":"epss","scoring_elements":"0.58549","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00365","scoring_system":"epss","scoring_elements":"0.58502","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00365","scoring_system":"epss","scoring_elements":"0.58531","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00365","scoring_system":"epss","scoring_elements":"0.58602","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00365","scoring_system":"epss","scoring_elements":"0.58612","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00365","scoring_system":"epss","scoring_elements":"0.58624","published_at":"2026-05-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-6611"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6611","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6611"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/387188?format=json","purl":"pkg:apk/alpine/phpmyadmin@4.4.15.8-r0?arch=x86_64&distroversion=v3.2&reponame=main","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/phpmyadmin@4.4.15.8-r0%3Farch=x86_64&distroversion=v3.2&reponame=main"}],"aliases":["CVE-2016-6611"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ff6r-sq16-nbff"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/7587?format=json","vulnerability_id":"VCID-fgr8-8j61-cufq","summary":"Information Exposure\nAn issue was discovered in phpMyAdmin. A user can exploit the \"LOAD LOCAL INFILE\" functionality to expose files on the server to the database system.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-6612","reference_id":"","reference_type":"","scores":[{"value":"0.00411","scoring_system":"epss","scoring_elements":"0.61583","published_at":"2026-05-16T12:55:00Z"},{"value":"0.00411","scoring_system":"epss","scoring_elements":"0.61465","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00411","scoring_system":"epss","scoring_elements":"0.61469","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00411","scoring_system":"epss","scoring_elements":"0.61453","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00411","scoring_system":"epss","scoring_elements":"0.61441","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00411","scoring_system":"epss","scoring_elements":"0.61456","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00411","scoring_system":"epss","scoring_elements":"0.6145","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00411","scoring_system":"epss","scoring_elements":"0.61402","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00411","scoring_system":"epss","scoring_elements":"0.61451","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00411","scoring_system":"epss","scoring_elements":"0.61511","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00411","scoring_system":"epss","scoring_elements":"0.61473","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00411","scoring_system":"epss","scoring_elements":"0.615","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00411","scoring_system":"epss","scoring_elements":"0.61554","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00411","scoring_system":"epss","scoring_elements":"0.61569","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00411","scoring_system":"epss","scoring_elements":"0.61298","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00411","scoring_system":"epss","scoring_elements":"0.61377","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00411","scoring_system":"epss","scoring_elements":"0.61406","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00411","scoring_system":"epss","scoring_elements":"0.61375","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00411","scoring_system":"epss","scoring_elements":"0.61422","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00411","scoring_system":"epss","scoring_elements":"0.61437","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00411","scoring_system":"epss","scoring_elements":"0.61459","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00411","scoring_system":"epss","scoring_elements":"0.61444","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00411","scoring_system":"epss","scoring_elements":"0.61426","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-6612"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6612","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6612"},{"reference_url":"https://github.com/phpmyadmin/composer","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/phpmyadmin/composer"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2019/06/msg00009.html","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.debian.org/debian-lts-announce/2019/06/msg00009.html"},{"reference_url":"https://security.gentoo.org/glsa/201701-32","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://security.gentoo.org/glsa/201701-32"},{"reference_url":"https://www.phpmyadmin.net/security/PMASA-2016-35","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.phpmyadmin.net/security/PMASA-2016-35"},{"reference_url":"http://www.securityfocus.com/bid/94113","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://www.securityfocus.com/bid/94113"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-6612","reference_id":"CVE-2016-6612","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-6612"},{"reference_url":"https://github.com/advisories/GHSA-fcgm-62p3-f7cm","reference_id":"GHSA-fcgm-62p3-f7cm","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"cvssv3.1_qr","scoring_elements":""}],"url":"https://github.com/advisories/GHSA-fcgm-62p3-f7cm"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/387188?format=json","purl":"pkg:apk/alpine/phpmyadmin@4.4.15.8-r0?arch=x86_64&distroversion=v3.2&reponame=main","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/phpmyadmin@4.4.15.8-r0%3Farch=x86_64&distroversion=v3.2&reponame=main"}],"aliases":["CVE-2016-6612","GHSA-fcgm-62p3-f7cm"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-fgr8-8j61-cufq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/7596?format=json","vulnerability_id":"VCID-fvnp-w4kk-3qfq","summary":"Cross-site Scripting\nXSS issues were discovered in phpMyAdmin. This affects the database privilege check and the \"Remove partitioning\" functionality. Specially crafted database names can trigger the XSS attack.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-6608","reference_id":"","reference_type":"","scores":[{"value":"0.00452","scoring_system":"epss","scoring_elements":"0.639","published_at":"2026-05-16T12:55:00Z"},{"value":"0.00452","scoring_system":"epss","scoring_elements":"0.63751","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00452","scoring_system":"epss","scoring_elements":"0.63756","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00452","scoring_system":"epss","scoring_elements":"0.63769","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00452","scoring_system":"epss","scoring_elements":"0.63767","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00452","scoring_system":"epss","scoring_elements":"0.63738","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00452","scoring_system":"epss","scoring_elements":"0.63781","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00452","scoring_system":"epss","scoring_elements":"0.63831","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00452","scoring_system":"epss","scoring_elements":"0.63798","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00452","scoring_system":"epss","scoring_elements":"0.63825","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00452","scoring_system":"epss","scoring_elements":"0.63877","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00452","scoring_system":"epss","scoring_elements":"0.63885","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00452","scoring_system":"epss","scoring_elements":"0.63625","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00452","scoring_system":"epss","scoring_elements":"0.63685","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00452","scoring_system":"epss","scoring_elements":"0.63711","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00452","scoring_system":"epss","scoring_elements":"0.63671","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00452","scoring_system":"epss","scoring_elements":"0.63723","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00452","scoring_system":"epss","scoring_elements":"0.63741","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00452","scoring_system":"epss","scoring_elements":"0.63755","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00452","scoring_system":"epss","scoring_elements":"0.6374","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00452","scoring_system":"epss","scoring_elements":"0.63706","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00452","scoring_system":"epss","scoring_elements":"0.63742","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-6608"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6608","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6608"},{"reference_url":"https://github.com/phpmyadmin/composer","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/phpmyadmin/composer"},{"reference_url":"https://security.gentoo.org/glsa/201701-32","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://security.gentoo.org/glsa/201701-32"},{"reference_url":"https://www.phpmyadmin.net/security/PMASA-2016-31","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.phpmyadmin.net/security/PMASA-2016-31"},{"reference_url":"http://www.securityfocus.com/bid/93258","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://www.securityfocus.com/bid/93258"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-6608","reference_id":"CVE-2016-6608","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-6608"},{"reference_url":"https://github.com/advisories/GHSA-jfmj-27fp-qp67","reference_id":"GHSA-jfmj-27fp-qp67","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"cvssv3.1_qr","scoring_elements":""}],"url":"https://github.com/advisories/GHSA-jfmj-27fp-qp67"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/387188?format=json","purl":"pkg:apk/alpine/phpmyadmin@4.4.15.8-r0?arch=x86_64&distroversion=v3.2&reponame=main","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/phpmyadmin@4.4.15.8-r0%3Farch=x86_64&distroversion=v3.2&reponame=main"}],"aliases":["CVE-2016-6608","GHSA-jfmj-27fp-qp67"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-fvnp-w4kk-3qfq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/7585?format=json","vulnerability_id":"VCID-h5wu-ugm7-4bah","summary":"Code Injection\nAn issue was discovered in phpMyAdmin. phpMyAdmin can be used to trigger a remote code execution attack against certain PHP installations that are running with the dbase extension.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-6633","reference_id":"","reference_type":"","scores":[{"value":"0.01833","scoring_system":"epss","scoring_elements":"0.83121","published_at":"2026-05-16T12:55:00Z"},{"value":"0.01833","scoring_system":"epss","scoring_elements":"0.8296","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01833","scoring_system":"epss","scoring_elements":"0.8298","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01833","scoring_system":"epss","scoring_elements":"0.8299","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01833","scoring_system":"epss","scoring_elements":"0.82994","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01833","scoring_system":"epss","scoring_elements":"0.83017","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01833","scoring_system":"epss","scoring_elements":"0.83037","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01833","scoring_system":"epss","scoring_elements":"0.83058","published_at":"2026-05-09T12:55:00Z"},{"value":"0.01833","scoring_system":"epss","scoring_elements":"0.83057","published_at":"2026-05-11T12:55:00Z"},{"value":"0.01833","scoring_system":"epss","scoring_elements":"0.83073","published_at":"2026-05-12T12:55:00Z"},{"value":"0.01833","scoring_system":"epss","scoring_elements":"0.83109","published_at":"2026-05-14T12:55:00Z"},{"value":"0.01833","scoring_system":"epss","scoring_elements":"0.83119","published_at":"2026-05-15T12:55:00Z"},{"value":"0.01833","scoring_system":"epss","scoring_elements":"0.82853","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01833","scoring_system":"epss","scoring_elements":"0.82869","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01833","scoring_system":"epss","scoring_elements":"0.82882","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01833","scoring_system":"epss","scoring_elements":"0.82878","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01833","scoring_system":"epss","scoring_elements":"0.82903","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01833","scoring_system":"epss","scoring_elements":"0.82911","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01833","scoring_system":"epss","scoring_elements":"0.82926","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01833","scoring_system":"epss","scoring_elements":"0.82922","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01833","scoring_system":"epss","scoring_elements":"0.82918","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01833","scoring_system":"epss","scoring_elements":"0.82957","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-6633"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6633","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6633"},{"reference_url":"https://github.com/phpmyadmin/composer","reference_id":"","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/phpmyadmin/composer"},{"reference_url":"https://security.gentoo.org/glsa/201701-32","reference_id":"","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://security.gentoo.org/glsa/201701-32"},{"reference_url":"https://www.phpmyadmin.net/security/PMASA-2016-56","reference_id":"","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.phpmyadmin.net/security/PMASA-2016-56"},{"reference_url":"http://www.securityfocus.com/bid/92500","reference_id":"","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://www.securityfocus.com/bid/92500"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-6633","reference_id":"CVE-2016-6633","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-6633"},{"reference_url":"https://github.com/advisories/GHSA-p849-vf5f-f3x7","reference_id":"GHSA-p849-vf5f-f3x7","reference_type":"","scores":[{"value":"HIGH","scoring_system":"cvssv3.1_qr","scoring_elements":""}],"url":"https://github.com/advisories/GHSA-p849-vf5f-f3x7"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/387188?format=json","purl":"pkg:apk/alpine/phpmyadmin@4.4.15.8-r0?arch=x86_64&distroversion=v3.2&reponame=main","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/phpmyadmin@4.4.15.8-r0%3Farch=x86_64&distroversion=v3.2&reponame=main"}],"aliases":["CVE-2016-6633","GHSA-p849-vf5f-f3x7"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-h5wu-ugm7-4bah"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/42619?format=json","vulnerability_id":"VCID-j3s8-nxah-pqgz","summary":"Multiple vulnerabilities have been found in phpMyAdmin, the worst\n    of which could lead to arbitrary code execution.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-6620","reference_id":"","reference_type":"","scores":[{"value":"0.01398","scoring_system":"epss","scoring_elements":"0.8035","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01398","scoring_system":"epss","scoring_elements":"0.80357","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01398","scoring_system":"epss","scoring_elements":"0.80376","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01398","scoring_system":"epss","scoring_elements":"0.80366","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01398","scoring_system":"epss","scoring_elements":"0.80395","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01398","scoring_system":"epss","scoring_elements":"0.80405","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01398","scoring_system":"epss","scoring_elements":"0.80423","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01398","scoring_system":"epss","scoring_elements":"0.80408","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01398","scoring_system":"epss","scoring_elements":"0.80401","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01398","scoring_system":"epss","scoring_elements":"0.80431","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01398","scoring_system":"epss","scoring_elements":"0.80432","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01398","scoring_system":"epss","scoring_elements":"0.80435","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01398","scoring_system":"epss","scoring_elements":"0.80462","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01398","scoring_system":"epss","scoring_elements":"0.80468","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01398","scoring_system":"epss","scoring_elements":"0.80485","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01398","scoring_system":"epss","scoring_elements":"0.805","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01398","scoring_system":"epss","scoring_elements":"0.80523","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01398","scoring_system":"epss","scoring_elements":"0.80543","published_at":"2026-05-09T12:55:00Z"},{"value":"0.01398","scoring_system":"epss","scoring_elements":"0.80537","published_at":"2026-05-11T12:55:00Z"},{"value":"0.01398","scoring_system":"epss","scoring_elements":"0.80554","published_at":"2026-05-12T12:55:00Z"},{"value":"0.01887","scoring_system":"epss","scoring_elements":"0.83368","published_at":"2026-05-14T12:55:00Z"},{"value":"0.01887","scoring_system":"epss","scoring_elements":"0.83379","published_at":"2026-05-15T12:55:00Z"},{"value":"0.01887","scoring_system":"epss","scoring_elements":"0.8338","published_at":"2026-05-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-6620"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6620","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6620"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/387188?format=json","purl":"pkg:apk/alpine/phpmyadmin@4.4.15.8-r0?arch=x86_64&distroversion=v3.2&reponame=main","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/phpmyadmin@4.4.15.8-r0%3Farch=x86_64&distroversion=v3.2&reponame=main"}],"aliases":["CVE-2016-6620"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-j3s8-nxah-pqgz"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/42614?format=json","vulnerability_id":"VCID-qfg6-ugqq-3fdx","summary":"Multiple vulnerabilities have been found in phpMyAdmin, the worst\n    of which could lead to arbitrary code execution.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-6614","reference_id":"","reference_type":"","scores":[{"value":"0.0111","scoring_system":"epss","scoring_elements":"0.78078","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0111","scoring_system":"epss","scoring_elements":"0.78087","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0111","scoring_system":"epss","scoring_elements":"0.78117","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0111","scoring_system":"epss","scoring_elements":"0.78099","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0111","scoring_system":"epss","scoring_elements":"0.78126","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0111","scoring_system":"epss","scoring_elements":"0.78132","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0111","scoring_system":"epss","scoring_elements":"0.78158","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0111","scoring_system":"epss","scoring_elements":"0.7814","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0111","scoring_system":"epss","scoring_elements":"0.78136","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0111","scoring_system":"epss","scoring_elements":"0.78169","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0111","scoring_system":"epss","scoring_elements":"0.78168","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0111","scoring_system":"epss","scoring_elements":"0.78163","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0111","scoring_system":"epss","scoring_elements":"0.78195","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0111","scoring_system":"epss","scoring_elements":"0.78201","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0111","scoring_system":"epss","scoring_elements":"0.78215","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0111","scoring_system":"epss","scoring_elements":"0.78229","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0111","scoring_system":"epss","scoring_elements":"0.78255","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0111","scoring_system":"epss","scoring_elements":"0.78272","published_at":"2026-05-09T12:55:00Z"},{"value":"0.0111","scoring_system":"epss","scoring_elements":"0.78267","published_at":"2026-05-11T12:55:00Z"},{"value":"0.0111","scoring_system":"epss","scoring_elements":"0.78284","published_at":"2026-05-12T12:55:00Z"},{"value":"0.0111","scoring_system":"epss","scoring_elements":"0.78323","published_at":"2026-05-14T12:55:00Z"},{"value":"0.0111","scoring_system":"epss","scoring_elements":"0.78337","published_at":"2026-05-15T12:55:00Z"},{"value":"0.0111","scoring_system":"epss","scoring_elements":"0.78345","published_at":"2026-05-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-6614"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6614","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6614"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/387188?format=json","purl":"pkg:apk/alpine/phpmyadmin@4.4.15.8-r0?arch=x86_64&distroversion=v3.2&reponame=main","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/phpmyadmin@4.4.15.8-r0%3Farch=x86_64&distroversion=v3.2&reponame=main"}],"aliases":["CVE-2016-6614"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-qfg6-ugqq-3fdx"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/42622?format=json","vulnerability_id":"VCID-qyt8-pcq2-kufz","summary":"Multiple vulnerabilities have been found in phpMyAdmin, the worst\n    of which could lead to arbitrary code execution.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-6626","reference_id":"","reference_type":"","scores":[{"value":"0.00433","scoring_system":"epss","scoring_elements":"0.62624","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00433","scoring_system":"epss","scoring_elements":"0.62682","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00433","scoring_system":"epss","scoring_elements":"0.62715","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00433","scoring_system":"epss","scoring_elements":"0.62679","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00433","scoring_system":"epss","scoring_elements":"0.62731","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00433","scoring_system":"epss","scoring_elements":"0.62747","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00433","scoring_system":"epss","scoring_elements":"0.62765","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00433","scoring_system":"epss","scoring_elements":"0.62755","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00433","scoring_system":"epss","scoring_elements":"0.62772","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00433","scoring_system":"epss","scoring_elements":"0.6278","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00433","scoring_system":"epss","scoring_elements":"0.62761","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00433","scoring_system":"epss","scoring_elements":"0.62777","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00433","scoring_system":"epss","scoring_elements":"0.62793","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00433","scoring_system":"epss","scoring_elements":"0.62792","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00433","scoring_system":"epss","scoring_elements":"0.62744","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00433","scoring_system":"epss","scoring_elements":"0.62846","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00433","scoring_system":"epss","scoring_elements":"0.62804","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00433","scoring_system":"epss","scoring_elements":"0.6283","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00433","scoring_system":"epss","scoring_elements":"0.62885","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00433","scoring_system":"epss","scoring_elements":"0.62896","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00433","scoring_system":"epss","scoring_elements":"0.62911","published_at":"2026-05-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-6626"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6626","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6626"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/387188?format=json","purl":"pkg:apk/alpine/phpmyadmin@4.4.15.8-r0?arch=x86_64&distroversion=v3.2&reponame=main","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/phpmyadmin@4.4.15.8-r0%3Farch=x86_64&distroversion=v3.2&reponame=main"}],"aliases":["CVE-2016-6626"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-qyt8-pcq2-kufz"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/42618?format=json","vulnerability_id":"VCID-tgeh-wkw1-67bw","summary":"Multiple vulnerabilities have been found in phpMyAdmin, the worst\n    of which could lead to arbitrary code execution.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-6619","reference_id":"","reference_type":"","scores":[{"value":"0.00332","scoring_system":"epss","scoring_elements":"0.55961","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00332","scoring_system":"epss","scoring_elements":"0.56072","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00332","scoring_system":"epss","scoring_elements":"0.56093","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00332","scoring_system":"epss","scoring_elements":"0.56124","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00332","scoring_system":"epss","scoring_elements":"0.56129","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00332","scoring_system":"epss","scoring_elements":"0.5614","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00332","scoring_system":"epss","scoring_elements":"0.56117","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00332","scoring_system":"epss","scoring_elements":"0.561","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00332","scoring_system":"epss","scoring_elements":"0.56134","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00332","scoring_system":"epss","scoring_elements":"0.56137","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00332","scoring_system":"epss","scoring_elements":"0.56107","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00332","scoring_system":"epss","scoring_elements":"0.56033","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00332","scoring_system":"epss","scoring_elements":"0.56054","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00332","scoring_system":"epss","scoring_elements":"0.56029","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00332","scoring_system":"epss","scoring_elements":"0.55982","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00332","scoring_system":"epss","scoring_elements":"0.5609","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00332","scoring_system":"epss","scoring_elements":"0.56039","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00332","scoring_system":"epss","scoring_elements":"0.56063","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00332","scoring_system":"epss","scoring_elements":"0.5612","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00332","scoring_system":"epss","scoring_elements":"0.56135","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00332","scoring_system":"epss","scoring_elements":"0.56139","published_at":"2026-05-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-6619"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6619","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6619"},{"reference_url":"https://usn.ubuntu.com/USN-4843-1/","reference_id":"USN-USN-4843-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/USN-4843-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/387188?format=json","purl":"pkg:apk/alpine/phpmyadmin@4.4.15.8-r0?arch=x86_64&distroversion=v3.2&reponame=main","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/phpmyadmin@4.4.15.8-r0%3Farch=x86_64&distroversion=v3.2&reponame=main"}],"aliases":["CVE-2016-6619"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-tgeh-wkw1-67bw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/7577?format=json","vulnerability_id":"VCID-tydk-zjv1-nye6","summary":"Improper Input Validation\nAn issue was discovered in phpMyAdmin. An unauthenticated user is able to execute a denial-of-service (DoS) attack by forcing persistent connections when phpMyAdmin is running with `$cfg['AllowArbitraryServer']=true`.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-6622","reference_id":"","reference_type":"","scores":[{"value":"0.01016","scoring_system":"epss","scoring_elements":"0.77382","published_at":"2026-05-16T12:55:00Z"},{"value":"0.01016","scoring_system":"epss","scoring_elements":"0.77197","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01016","scoring_system":"epss","scoring_elements":"0.77233","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01016","scoring_system":"epss","scoring_elements":"0.77239","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01016","scoring_system":"epss","scoring_elements":"0.77255","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01016","scoring_system":"epss","scoring_elements":"0.77259","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01016","scoring_system":"epss","scoring_elements":"0.77289","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01016","scoring_system":"epss","scoring_elements":"0.7731","published_at":"2026-05-09T12:55:00Z"},{"value":"0.01016","scoring_system":"epss","scoring_elements":"0.773","published_at":"2026-05-11T12:55:00Z"},{"value":"0.01016","scoring_system":"epss","scoring_elements":"0.77317","published_at":"2026-05-12T12:55:00Z"},{"value":"0.01016","scoring_system":"epss","scoring_elements":"0.77363","published_at":"2026-05-14T12:55:00Z"},{"value":"0.01016","scoring_system":"epss","scoring_elements":"0.77377","published_at":"2026-05-15T12:55:00Z"},{"value":"0.01016","scoring_system":"epss","scoring_elements":"0.77104","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01016","scoring_system":"epss","scoring_elements":"0.7711","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01016","scoring_system":"epss","scoring_elements":"0.7714","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01016","scoring_system":"epss","scoring_elements":"0.77122","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01016","scoring_system":"epss","scoring_elements":"0.77155","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01016","scoring_system":"epss","scoring_elements":"0.77163","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01016","scoring_system":"epss","scoring_elements":"0.77191","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01016","scoring_system":"epss","scoring_elements":"0.7717","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01016","scoring_system":"epss","scoring_elements":"0.77165","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01016","scoring_system":"epss","scoring_elements":"0.77206","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01016","scoring_system":"epss","scoring_elements":"0.77207","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-6622"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6622","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6622"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2018/07/msg00006.html","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.debian.org/debian-lts-announce/2018/07/msg00006.html"},{"reference_url":"https://security.gentoo.org/glsa/201701-32","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://security.gentoo.org/glsa/201701-32"},{"reference_url":"https://web.archive.org/web/20210125183746/http://www.securityfocus.com/bid/95049","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://web.archive.org/web/20210125183746/http://www.securityfocus.com/bid/95049"},{"reference_url":"https://www.phpmyadmin.net/security/PMASA-2016-45","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.phpmyadmin.net/security/PMASA-2016-45"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-6622","reference_id":"CVE-2016-6622","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-6622"},{"reference_url":"https://github.com/advisories/GHSA-qf3f-7x69-qfv3","reference_id":"GHSA-qf3f-7x69-qfv3","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"cvssv3.1_qr","scoring_elements":""}],"url":"https://github.com/advisories/GHSA-qf3f-7x69-qfv3"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/387188?format=json","purl":"pkg:apk/alpine/phpmyadmin@4.4.15.8-r0?arch=x86_64&distroversion=v3.2&reponame=main","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/phpmyadmin@4.4.15.8-r0%3Farch=x86_64&distroversion=v3.2&reponame=main"}],"aliases":["CVE-2016-6622","GHSA-qf3f-7x69-qfv3"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-tydk-zjv1-nye6"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/42623?format=json","vulnerability_id":"VCID-ukgh-86dw-5yf1","summary":"Multiple vulnerabilities have been found in phpMyAdmin, the worst\n    of which could lead to arbitrary code execution.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-6627","reference_id":"","reference_type":"","scores":[{"value":"0.0035","scoring_system":"epss","scoring_elements":"0.57363","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0035","scoring_system":"epss","scoring_elements":"0.57446","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0035","scoring_system":"epss","scoring_elements":"0.57468","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0035","scoring_system":"epss","scoring_elements":"0.57445","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0035","scoring_system":"epss","scoring_elements":"0.57497","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0035","scoring_system":"epss","scoring_elements":"0.57501","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0035","scoring_system":"epss","scoring_elements":"0.57517","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0035","scoring_system":"epss","scoring_elements":"0.57494","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0035","scoring_system":"epss","scoring_elements":"0.57475","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0035","scoring_system":"epss","scoring_elements":"0.57498","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0035","scoring_system":"epss","scoring_elements":"0.57476","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0035","scoring_system":"epss","scoring_elements":"0.57434","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0035","scoring_system":"epss","scoring_elements":"0.57453","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0035","scoring_system":"epss","scoring_elements":"0.57432","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0035","scoring_system":"epss","scoring_elements":"0.57383","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0035","scoring_system":"epss","scoring_elements":"0.57426","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0035","scoring_system":"epss","scoring_elements":"0.57489","published_at":"2026-05-09T12:55:00Z"},{"value":"0.0035","scoring_system":"epss","scoring_elements":"0.57438","published_at":"2026-05-11T12:55:00Z"},{"value":"0.0035","scoring_system":"epss","scoring_elements":"0.57463","published_at":"2026-05-12T12:55:00Z"},{"value":"0.0035","scoring_system":"epss","scoring_elements":"0.57528","published_at":"2026-05-14T12:55:00Z"},{"value":"0.0035","scoring_system":"epss","scoring_elements":"0.57543","published_at":"2026-05-15T12:55:00Z"},{"value":"0.0035","scoring_system":"epss","scoring_elements":"0.57548","published_at":"2026-05-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-6627"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6627","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6627"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/387188?format=json","purl":"pkg:apk/alpine/phpmyadmin@4.4.15.8-r0?arch=x86_64&distroversion=v3.2&reponame=main","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/phpmyadmin@4.4.15.8-r0%3Farch=x86_64&distroversion=v3.2&reponame=main"}],"aliases":["CVE-2016-6627"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ukgh-86dw-5yf1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/7593?format=json","vulnerability_id":"VCID-v66b-3ghf-9uas","summary":"Improper Input Validation\nAn issue was discovered in phpMyAdmin involving the `$cfg['ArbitraryServerRegexp']` configuration directive. An attacker could reuse certain cookie values in a way of bypassing the servers defined by `ArbitraryServerRegexp`.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-6629","reference_id":"","reference_type":"","scores":[{"value":"0.0032","scoring_system":"epss","scoring_elements":"0.55161","published_at":"2026-05-16T12:55:00Z"},{"value":"0.0032","scoring_system":"epss","scoring_elements":"0.55121","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0032","scoring_system":"epss","scoring_elements":"0.55056","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0032","scoring_system":"epss","scoring_elements":"0.55048","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0032","scoring_system":"epss","scoring_elements":"0.54998","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0032","scoring_system":"epss","scoring_elements":"0.55039","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0032","scoring_system":"epss","scoring_elements":"0.55097","published_at":"2026-05-09T12:55:00Z"},{"value":"0.0032","scoring_system":"epss","scoring_elements":"0.55057","published_at":"2026-05-11T12:55:00Z"},{"value":"0.0032","scoring_system":"epss","scoring_elements":"0.55083","published_at":"2026-05-12T12:55:00Z"},{"value":"0.0032","scoring_system":"epss","scoring_elements":"0.55157","published_at":"2026-05-15T12:55:00Z"},{"value":"0.0032","scoring_system":"epss","scoring_elements":"0.54974","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0032","scoring_system":"epss","scoring_elements":"0.55075","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0032","scoring_system":"epss","scoring_elements":"0.55101","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0032","scoring_system":"epss","scoring_elements":"0.55076","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0032","scoring_system":"epss","scoring_elements":"0.55126","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0032","scoring_system":"epss","scoring_elements":"0.55138","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0032","scoring_system":"epss","scoring_elements":"0.55118","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0032","scoring_system":"epss","scoring_elements":"0.551","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0032","scoring_system":"epss","scoring_elements":"0.55142","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-6629"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6629","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6629"},{"reference_url":"https://security.gentoo.org/glsa/201701-32","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"CRITICAL","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://security.gentoo.org/glsa/201701-32"},{"reference_url":"https://web.archive.org/web/20210725054025/http://www.securityfocus.com/bid/92493","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"CRITICAL","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://web.archive.org/web/20210725054025/http://www.securityfocus.com/bid/92493"},{"reference_url":"https://www.phpmyadmin.net/security/PMASA-2016-52","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"CRITICAL","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.phpmyadmin.net/security/PMASA-2016-52"},{"reference_url":"http://www.securityfocus.com/bid/92493","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/92493"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-6629","reference_id":"CVE-2016-6629","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"CRITICAL","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-6629"},{"reference_url":"https://github.com/advisories/GHSA-567r-vqj7-5cw7","reference_id":"GHSA-567r-vqj7-5cw7","reference_type":"","scores":[{"value":"CRITICAL","scoring_system":"cvssv3.1_qr","scoring_elements":""}],"url":"https://github.com/advisories/GHSA-567r-vqj7-5cw7"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/387188?format=json","purl":"pkg:apk/alpine/phpmyadmin@4.4.15.8-r0?arch=x86_64&distroversion=v3.2&reponame=main","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/phpmyadmin@4.4.15.8-r0%3Farch=x86_64&distroversion=v3.2&reponame=main"}],"aliases":["CVE-2016-6629","GHSA-567r-vqj7-5cw7"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-v66b-3ghf-9uas"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/42612?format=json","vulnerability_id":"VCID-xm9j-76hy-1qcp","summary":"Multiple vulnerabilities have been found in phpMyAdmin, the worst\n    of which could lead to arbitrary code execution.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-6610","reference_id":"","reference_type":"","scores":[{"value":"0.00449","scoring_system":"epss","scoring_elements":"0.63508","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00449","scoring_system":"epss","scoring_elements":"0.63568","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00449","scoring_system":"epss","scoring_elements":"0.63595","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00449","scoring_system":"epss","scoring_elements":"0.63559","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00449","scoring_system":"epss","scoring_elements":"0.6361","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00449","scoring_system":"epss","scoring_elements":"0.63627","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00449","scoring_system":"epss","scoring_elements":"0.63642","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00449","scoring_system":"epss","scoring_elements":"0.63593","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00449","scoring_system":"epss","scoring_elements":"0.6363","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00449","scoring_system":"epss","scoring_elements":"0.63639","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00449","scoring_system":"epss","scoring_elements":"0.63622","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00449","scoring_system":"epss","scoring_elements":"0.6364","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00449","scoring_system":"epss","scoring_elements":"0.63653","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00449","scoring_system":"epss","scoring_elements":"0.63647","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00449","scoring_system":"epss","scoring_elements":"0.63621","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00449","scoring_system":"epss","scoring_elements":"0.63664","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00449","scoring_system":"epss","scoring_elements":"0.63716","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00449","scoring_system":"epss","scoring_elements":"0.6368","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00449","scoring_system":"epss","scoring_elements":"0.63706","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00449","scoring_system":"epss","scoring_elements":"0.63758","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00449","scoring_system":"epss","scoring_elements":"0.63766","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00449","scoring_system":"epss","scoring_elements":"0.63781","published_at":"2026-05-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-6610"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6610","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6610"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/387188?format=json","purl":"pkg:apk/alpine/phpmyadmin@4.4.15.8-r0?arch=x86_64&distroversion=v3.2&reponame=main","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/phpmyadmin@4.4.15.8-r0%3Farch=x86_64&distroversion=v3.2&reponame=main"}],"aliases":["CVE-2016-6610"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-xm9j-76hy-1qcp"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/42621?format=json","vulnerability_id":"VCID-xu1c-xtb4-9ygg","summary":"Multiple vulnerabilities have been found in phpMyAdmin, the worst\n    of which could lead to arbitrary code execution.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-6623","reference_id":"","reference_type":"","scores":[{"value":"0.0055","scoring_system":"epss","scoring_elements":"0.68174","published_at":"2026-05-16T12:55:00Z"},{"value":"0.0055","scoring_system":"epss","scoring_elements":"0.67983","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0055","scoring_system":"epss","scoring_elements":"0.68025","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0055","scoring_system":"epss","scoring_elements":"0.68034","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0055","scoring_system":"epss","scoring_elements":"0.68039","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0055","scoring_system":"epss","scoring_elements":"0.68013","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0055","scoring_system":"epss","scoring_elements":"0.68056","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0055","scoring_system":"epss","scoring_elements":"0.68097","published_at":"2026-05-09T12:55:00Z"},{"value":"0.0055","scoring_system":"epss","scoring_elements":"0.68064","published_at":"2026-05-11T12:55:00Z"},{"value":"0.0055","scoring_system":"epss","scoring_elements":"0.6809","published_at":"2026-05-12T12:55:00Z"},{"value":"0.0055","scoring_system":"epss","scoring_elements":"0.68147","published_at":"2026-05-14T12:55:00Z"},{"value":"0.0055","scoring_system":"epss","scoring_elements":"0.6816","published_at":"2026-05-15T12:55:00Z"},{"value":"0.0055","scoring_system":"epss","scoring_elements":"0.67889","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0055","scoring_system":"epss","scoring_elements":"0.67912","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0055","scoring_system":"epss","scoring_elements":"0.67931","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0055","scoring_system":"epss","scoring_elements":"0.6791","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0055","scoring_system":"epss","scoring_elements":"0.67961","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0055","scoring_system":"epss","scoring_elements":"0.67975","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0055","scoring_system":"epss","scoring_elements":"0.67998","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0055","scoring_system":"epss","scoring_elements":"0.67985","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0055","scoring_system":"epss","scoring_elements":"0.6795","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0055","scoring_system":"epss","scoring_elements":"0.67987","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0055","scoring_system":"epss","scoring_elements":"0.68","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-6623"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6623","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6623"},{"reference_url":"https://github.com/phpmyadmin/composer","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/phpmyadmin/composer"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-6623","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-6623"},{"reference_url":"https://security.gentoo.org/glsa/201701-32","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://security.gentoo.org/glsa/201701-32"},{"reference_url":"https://web.archive.org/web/20210123204343/http://www.securityfocus.com/bid/95052","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://web.archive.org/web/20210123204343/http://www.securityfocus.com/bid/95052"},{"reference_url":"https://www.phpmyadmin.net/security/PMASA-2016-46","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.phpmyadmin.net/security/PMASA-2016-46"},{"reference_url":"https://github.com/advisories/GHSA-2mcj-3r3r-v5wm","reference_id":"GHSA-2mcj-3r3r-v5wm","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"cvssv3.1_qr","scoring_elements":""}],"url":"https://github.com/advisories/GHSA-2mcj-3r3r-v5wm"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/387188?format=json","purl":"pkg:apk/alpine/phpmyadmin@4.4.15.8-r0?arch=x86_64&distroversion=v3.2&reponame=main","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/phpmyadmin@4.4.15.8-r0%3Farch=x86_64&distroversion=v3.2&reponame=main"}],"aliases":["CVE-2016-6623","GHSA-2mcj-3r3r-v5wm"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-xu1c-xtb4-9ygg"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/42611?format=json","vulnerability_id":"VCID-xwyg-wr8p-r7he","summary":"Multiple vulnerabilities have been found in phpMyAdmin, the worst\n    of which could lead to arbitrary code execution.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-6607","reference_id":"","reference_type":"","scores":[{"value":"0.00541","scoring_system":"epss","scoring_elements":"0.67583","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00541","scoring_system":"epss","scoring_elements":"0.67619","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00541","scoring_system":"epss","scoring_elements":"0.6764","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00541","scoring_system":"epss","scoring_elements":"0.6762","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00541","scoring_system":"epss","scoring_elements":"0.67671","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00541","scoring_system":"epss","scoring_elements":"0.67686","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00541","scoring_system":"epss","scoring_elements":"0.67709","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00541","scoring_system":"epss","scoring_elements":"0.67694","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00541","scoring_system":"epss","scoring_elements":"0.6766","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00541","scoring_system":"epss","scoring_elements":"0.67696","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00541","scoring_system":"epss","scoring_elements":"0.67708","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00541","scoring_system":"epss","scoring_elements":"0.67688","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00541","scoring_system":"epss","scoring_elements":"0.67719","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00541","scoring_system":"epss","scoring_elements":"0.67722","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00541","scoring_system":"epss","scoring_elements":"0.67699","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00541","scoring_system":"epss","scoring_elements":"0.67742","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00541","scoring_system":"epss","scoring_elements":"0.67779","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00541","scoring_system":"epss","scoring_elements":"0.67749","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00541","scoring_system":"epss","scoring_elements":"0.67774","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00541","scoring_system":"epss","scoring_elements":"0.67832","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00541","scoring_system":"epss","scoring_elements":"0.67845","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00541","scoring_system":"epss","scoring_elements":"0.67858","published_at":"2026-05-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-6607"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6607","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6607"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/387188?format=json","purl":"pkg:apk/alpine/phpmyadmin@4.4.15.8-r0?arch=x86_64&distroversion=v3.2&reponame=main","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/phpmyadmin@4.4.15.8-r0%3Farch=x86_64&distroversion=v3.2&reponame=main"}],"aliases":["CVE-2016-6607"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-xwyg-wr8p-r7he"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/7603?format=json","vulnerability_id":"VCID-z22z-a5bq-97d3","summary":"Uncontrolled Resouce Consumption\nAn issue was discovered in phpMyAdmin. The transformation feature allows a user to trigger a denial-of-service (DoS) attack against the server.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-6618","reference_id":"","reference_type":"","scores":[{"value":"0.0055","scoring_system":"epss","scoring_elements":"0.68174","published_at":"2026-05-16T12:55:00Z"},{"value":"0.0055","scoring_system":"epss","scoring_elements":"0.67987","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0055","scoring_system":"epss","scoring_elements":"0.68","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0055","scoring_system":"epss","scoring_elements":"0.67983","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0055","scoring_system":"epss","scoring_elements":"0.68025","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0055","scoring_system":"epss","scoring_elements":"0.68034","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0055","scoring_system":"epss","scoring_elements":"0.68039","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0055","scoring_system":"epss","scoring_elements":"0.68013","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0055","scoring_system":"epss","scoring_elements":"0.68056","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0055","scoring_system":"epss","scoring_elements":"0.68097","published_at":"2026-05-09T12:55:00Z"},{"value":"0.0055","scoring_system":"epss","scoring_elements":"0.68064","published_at":"2026-05-11T12:55:00Z"},{"value":"0.0055","scoring_system":"epss","scoring_elements":"0.6809","published_at":"2026-05-12T12:55:00Z"},{"value":"0.0055","scoring_system":"epss","scoring_elements":"0.68147","published_at":"2026-05-14T12:55:00Z"},{"value":"0.0055","scoring_system":"epss","scoring_elements":"0.6816","published_at":"2026-05-15T12:55:00Z"},{"value":"0.0055","scoring_system":"epss","scoring_elements":"0.67889","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0055","scoring_system":"epss","scoring_elements":"0.67912","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0055","scoring_system":"epss","scoring_elements":"0.67931","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0055","scoring_system":"epss","scoring_elements":"0.6791","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0055","scoring_system":"epss","scoring_elements":"0.67961","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0055","scoring_system":"epss","scoring_elements":"0.67975","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0055","scoring_system":"epss","scoring_elements":"0.67998","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0055","scoring_system":"epss","scoring_elements":"0.67985","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0055","scoring_system":"epss","scoring_elements":"0.6795","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-6618"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6618","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6618"},{"reference_url":"https://github.com/phpmyadmin/composer","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/phpmyadmin/composer"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2018/07/msg00006.html","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.debian.org/debian-lts-announce/2018/07/msg00006.html"},{"reference_url":"https://security.gentoo.org/glsa/201701-32","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://security.gentoo.org/glsa/201701-32"},{"reference_url":"https://www.phpmyadmin.net/security/PMASA-2016-41","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.phpmyadmin.net/security/PMASA-2016-41"},{"reference_url":"http://www.securityfocus.com/bid/95047","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://www.securityfocus.com/bid/95047"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-6618","reference_id":"CVE-2016-6618","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-6618"},{"reference_url":"https://github.com/advisories/GHSA-rv6m-chvv-wmxg","reference_id":"GHSA-rv6m-chvv-wmxg","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"cvssv3.1_qr","scoring_elements":""}],"url":"https://github.com/advisories/GHSA-rv6m-chvv-wmxg"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/387188?format=json","purl":"pkg:apk/alpine/phpmyadmin@4.4.15.8-r0?arch=x86_64&distroversion=v3.2&reponame=main","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/phpmyadmin@4.4.15.8-r0%3Farch=x86_64&distroversion=v3.2&reponame=main"}],"aliases":["CVE-2016-6618","GHSA-rv6m-chvv-wmxg"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-z22z-a5bq-97d3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/7598?format=json","vulnerability_id":"VCID-zg16-dfu1-g7dn","summary":"Information Exposure\nAn issue was discovered in phpMyAdmin. A user can specially craft a symlink on disk, to a file which phpMyAdmin is permitted to read but the user is not, which phpMyAdmin will then expose to the user.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-6613","reference_id":"","reference_type":"","scores":[{"value":"0.00411","scoring_system":"epss","scoring_elements":"0.61583","published_at":"2026-05-16T12:55:00Z"},{"value":"0.00411","scoring_system":"epss","scoring_elements":"0.61465","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00411","scoring_system":"epss","scoring_elements":"0.61469","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00411","scoring_system":"epss","scoring_elements":"0.61453","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00411","scoring_system":"epss","scoring_elements":"0.61441","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00411","scoring_system":"epss","scoring_elements":"0.61456","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00411","scoring_system":"epss","scoring_elements":"0.6145","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00411","scoring_system":"epss","scoring_elements":"0.61402","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00411","scoring_system":"epss","scoring_elements":"0.61451","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00411","scoring_system":"epss","scoring_elements":"0.61511","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00411","scoring_system":"epss","scoring_elements":"0.61473","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00411","scoring_system":"epss","scoring_elements":"0.615","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00411","scoring_system":"epss","scoring_elements":"0.61554","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00411","scoring_system":"epss","scoring_elements":"0.61569","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00411","scoring_system":"epss","scoring_elements":"0.61298","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00411","scoring_system":"epss","scoring_elements":"0.61377","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00411","scoring_system":"epss","scoring_elements":"0.61406","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00411","scoring_system":"epss","scoring_elements":"0.61375","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00411","scoring_system":"epss","scoring_elements":"0.61422","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00411","scoring_system":"epss","scoring_elements":"0.61437","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00411","scoring_system":"epss","scoring_elements":"0.61459","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00411","scoring_system":"epss","scoring_elements":"0.61444","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00411","scoring_system":"epss","scoring_elements":"0.61426","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-6613"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6613","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6613"},{"reference_url":"https://github.com/phpmyadmin/composer","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/phpmyadmin/composer"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2019/06/msg00009.html","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.debian.org/debian-lts-announce/2019/06/msg00009.html"},{"reference_url":"https://security.gentoo.org/glsa/201701-32","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://security.gentoo.org/glsa/201701-32"},{"reference_url":"https://www.phpmyadmin.net/security/PMASA-2016-36","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.phpmyadmin.net/security/PMASA-2016-36"},{"reference_url":"http://www.securityfocus.com/bid/94115","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://www.securityfocus.com/bid/94115"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-6613","reference_id":"CVE-2016-6613","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-6613"},{"reference_url":"https://github.com/advisories/GHSA-6j2v-g9rg-qcm5","reference_id":"GHSA-6j2v-g9rg-qcm5","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"cvssv3.1_qr","scoring_elements":""}],"url":"https://github.com/advisories/GHSA-6j2v-g9rg-qcm5"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/387188?format=json","purl":"pkg:apk/alpine/phpmyadmin@4.4.15.8-r0?arch=x86_64&distroversion=v3.2&reponame=main","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/phpmyadmin@4.4.15.8-r0%3Farch=x86_64&distroversion=v3.2&reponame=main"}],"aliases":["CVE-2016-6613","GHSA-6j2v-g9rg-qcm5"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-zg16-dfu1-g7dn"}],"risk_score":null,"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/phpmyadmin@4.4.15.8-r0%3Farch=x86_64&distroversion=v3.2&reponame=main"}