Vulnerability Instance
Lookup for vulnerabilities affecting packages.
GET /api/vulnerabilities/85209?format=api
{ "url": "http://public2.vulnerablecode.io/api/vulnerabilities/85209?format=api", "vulnerability_id": "VCID-e14d-gnxq-s7h1", "summary": "mysql: unspecified vulnerability in subcomponent: Server: Pluggable Authentication (CPU April 2016)", "aliases": [ { "alias": "CVE-2016-0639" } ], "fixed_packages": [], "affected_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/114494?format=api", "purl": "pkg:rpm/redhat/rh-mysql56-mysql@5.6.30-1?arch=el7", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2jer-ss8p-7kbg" }, { "vulnerability": "VCID-2vp1-j324-dkat" }, { "vulnerability": "VCID-3fnd-29cd-2bhu" }, { "vulnerability": "VCID-3qjy-4cen-7qev" }, { "vulnerability": "VCID-55fg-6c2c-6bg8" }, { "vulnerability": "VCID-5yzf-3vz6-9yhu" }, { "vulnerability": "VCID-77xe-spj2-qfce" }, { "vulnerability": "VCID-77zq-ytd2-mucj" }, { "vulnerability": "VCID-7tj3-dfxj-bke7" }, { "vulnerability": "VCID-7w3v-5s98-a7ec" }, { "vulnerability": "VCID-9591-6344-yuga" }, { "vulnerability": "VCID-a17z-sywx-n7h8" }, { "vulnerability": "VCID-a3hx-qz7x-7ybk" }, { "vulnerability": "VCID-b77g-bp2p-v7gq" }, { "vulnerability": "VCID-bfnh-7k45-nkg2" }, { "vulnerability": "VCID-ca85-vx8c-huht" }, { "vulnerability": "VCID-ceyn-dgzv-5qak" }, { "vulnerability": "VCID-ctzs-ypzj-t7dg" }, { "vulnerability": "VCID-cyqa-e362-yyaf" }, { "vulnerability": "VCID-denv-jkeu-hfdn" }, { "vulnerability": "VCID-dpnk-4h8c-cfg2" }, { "vulnerability": "VCID-dqg6-2gmj-judy" }, { "vulnerability": "VCID-e14d-gnxq-s7h1" }, { "vulnerability": "VCID-esfk-umc5-ska4" }, { "vulnerability": "VCID-f2w4-p77n-muf7" }, { "vulnerability": "VCID-f9vz-r6zv-t7ev" }, { "vulnerability": "VCID-fnks-p4e9-13es" }, { "vulnerability": "VCID-gn7y-qgmb-9far" }, { "vulnerability": "VCID-h5ur-uuwn-ukbz" }, { "vulnerability": "VCID-hg16-rg46-4fe3" }, { "vulnerability": "VCID-jqmx-5tfh-qqff" }, { "vulnerability": "VCID-k8sz-12hn-akfk" }, { "vulnerability": "VCID-kwrj-3fxz-g7c6" }, { "vulnerability": "VCID-mzrq-ykxm-kkcx" }, { "vulnerability": "VCID-nw5h-p35b-2khv" }, { "vulnerability": "VCID-q1vh-jwcy-87cz" }, { "vulnerability": "VCID-qyb6-7ees-ukcm" }, { "vulnerability": "VCID-rfz7-vha1-e7gy" }, { "vulnerability": "VCID-rgdk-rhch-dqgp" }, { "vulnerability": "VCID-s5bz-57vv-b7bz" }, { "vulnerability": "VCID-tazb-gd49-73b4" }, { "vulnerability": "VCID-tcxt-fwvr-yfc1" }, { "vulnerability": "VCID-tq89-2zh8-pkex" }, { "vulnerability": "VCID-v18v-kyda-sye9" }, { "vulnerability": "VCID-xegm-n9yj-ckhs" }, { "vulnerability": "VCID-xvv1-nxs6-n7ab" }, { "vulnerability": "VCID-y6p4-vfkn-q7fc" }, { "vulnerability": "VCID-yzzc-qh9x-pfd6" }, { "vulnerability": "VCID-zb4s-9rj3-ebea" }, { "vulnerability": "VCID-zdym-6xaq-dyas" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/rh-mysql56-mysql@5.6.30-1%3Farch=el7" }, { "url": "http://public2.vulnerablecode.io/api/packages/114492?format=api", "purl": "pkg:rpm/redhat/rh-mysql56-mysql@5.6.30-1?arch=el6", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2jer-ss8p-7kbg" }, { "vulnerability": "VCID-2vp1-j324-dkat" }, { "vulnerability": "VCID-3fnd-29cd-2bhu" }, { "vulnerability": "VCID-3qjy-4cen-7qev" }, { "vulnerability": "VCID-55fg-6c2c-6bg8" }, { "vulnerability": "VCID-5yzf-3vz6-9yhu" }, { "vulnerability": "VCID-77xe-spj2-qfce" }, { "vulnerability": "VCID-77zq-ytd2-mucj" }, { "vulnerability": "VCID-7tj3-dfxj-bke7" }, { "vulnerability": "VCID-7w3v-5s98-a7ec" }, { "vulnerability": "VCID-9591-6344-yuga" }, { "vulnerability": "VCID-a17z-sywx-n7h8" }, { "vulnerability": "VCID-a3hx-qz7x-7ybk" }, { "vulnerability": "VCID-b77g-bp2p-v7gq" }, { "vulnerability": "VCID-bfnh-7k45-nkg2" }, { "vulnerability": "VCID-ca85-vx8c-huht" }, { "vulnerability": "VCID-ceyn-dgzv-5qak" }, { "vulnerability": "VCID-ctzs-ypzj-t7dg" }, { "vulnerability": "VCID-cyqa-e362-yyaf" }, { "vulnerability": "VCID-denv-jkeu-hfdn" }, { "vulnerability": "VCID-dpnk-4h8c-cfg2" }, { "vulnerability": "VCID-dqg6-2gmj-judy" }, { "vulnerability": "VCID-e14d-gnxq-s7h1" }, { "vulnerability": "VCID-esfk-umc5-ska4" }, { "vulnerability": "VCID-f2w4-p77n-muf7" }, { "vulnerability": "VCID-f9vz-r6zv-t7ev" }, { "vulnerability": "VCID-fnks-p4e9-13es" }, { "vulnerability": "VCID-gn7y-qgmb-9far" }, { "vulnerability": "VCID-h5ur-uuwn-ukbz" }, { "vulnerability": "VCID-hg16-rg46-4fe3" }, { "vulnerability": "VCID-jqmx-5tfh-qqff" }, { "vulnerability": "VCID-k8sz-12hn-akfk" }, { "vulnerability": "VCID-kwrj-3fxz-g7c6" }, { "vulnerability": "VCID-mzrq-ykxm-kkcx" }, { "vulnerability": "VCID-nw5h-p35b-2khv" }, { "vulnerability": "VCID-q1vh-jwcy-87cz" }, { "vulnerability": "VCID-qyb6-7ees-ukcm" }, { "vulnerability": "VCID-rfz7-vha1-e7gy" }, { "vulnerability": "VCID-rgdk-rhch-dqgp" }, { "vulnerability": "VCID-s5bz-57vv-b7bz" }, { "vulnerability": "VCID-tazb-gd49-73b4" }, { "vulnerability": "VCID-tcxt-fwvr-yfc1" }, { "vulnerability": "VCID-tq89-2zh8-pkex" }, { "vulnerability": "VCID-v18v-kyda-sye9" }, { "vulnerability": "VCID-xegm-n9yj-ckhs" }, { "vulnerability": "VCID-xvv1-nxs6-n7ab" }, { "vulnerability": "VCID-y6p4-vfkn-q7fc" }, { "vulnerability": "VCID-yzzc-qh9x-pfd6" }, { "vulnerability": "VCID-zb4s-9rj3-ebea" }, { "vulnerability": "VCID-zdym-6xaq-dyas" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/rh-mysql56-mysql@5.6.30-1%3Farch=el6" } ], "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:53:06Z/" } ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0705.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:53:06Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0705.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0639.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0639.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-0639", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.15283", "scoring_system": "epss", "scoring_elements": "0.94695", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.15283", "scoring_system": "epss", "scoring_elements": "0.94643", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.15283", "scoring_system": "epss", "scoring_elements": "0.94644", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.15283", "scoring_system": "epss", "scoring_elements": "0.94652", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.15283", "scoring_system": "epss", "scoring_elements": "0.9466", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.15283", "scoring_system": "epss", "scoring_elements": "0.9467", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.15283", "scoring_system": "epss", "scoring_elements": "0.94676", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.15283", "scoring_system": "epss", "scoring_elements": "0.94681", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.15283", "scoring_system": "epss", "scoring_elements": "0.94583", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.15283", "scoring_system": "epss", "scoring_elements": "0.94591", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.15283", "scoring_system": "epss", "scoring_elements": "0.94597", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.15283", "scoring_system": "epss", "scoring_elements": "0.94599", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.15283", "scoring_system": "epss", "scoring_elements": "0.94609", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.15283", "scoring_system": "epss", "scoring_elements": "0.94614", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.15283", "scoring_system": "epss", "scoring_elements": "0.94617", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.15283", "scoring_system": "epss", "scoring_elements": "0.94621", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.15283", "scoring_system": "epss", "scoring_elements": "0.94633", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.15283", "scoring_system": "epss", "scoring_elements": "0.94637", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.15283", "scoring_system": "epss", "scoring_elements": "0.94642", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-0639" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "10", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:C/I:C/A:C" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:53:06Z/" } ], "url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html" }, { "reference_url": "http://www.securityfocus.com/bid/86418", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:53:06Z/" } ], "url": "http://www.securityfocus.com/bid/86418" }, { "reference_url": "http://www.securitytracker.com/id/1035606", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:53:06Z/" } ], "url": "http://www.securitytracker.com/id/1035606" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2953-1", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:53:06Z/" } ], "url": "http://www.ubuntu.com/usn/USN-2953-1" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2954-1", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:53:06Z/" } ], "url": "http://www.ubuntu.com/usn/USN-2954-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1329238", "reference_id": "1329238", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1329238" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-0639", "reference_id": "CVE-2016-0639", "reference_type": "", "scores": [ { "value": "10.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:C/I:C/A:C" }, { "value": "9.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-0639" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:0705", "reference_id": "RHSA-2016:0705", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:0705" }, { "reference_url": "https://usn.ubuntu.com/2953-1/", "reference_id": "USN-2953-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2953-1/" }, { "reference_url": "https://usn.ubuntu.com/2954-1/", "reference_id": "USN-2954-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2954-1/" } ], "weaknesses": [ { "cwe_id": 190, "name": "Integer Overflow or Wraparound", "description": "The product performs a calculation that can produce an integer overflow or wraparound, when the logic assumes that the resulting value will always be larger than the original value. This can introduce other weaknesses when the calculation is used for resource management or execution control." } ], "exploits": [], "severity_range_score": "9.8 - 10.0", "exploitability": "0.5", "weighted_severity": "9.0", "risk_score": 4.5, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-e14d-gnxq-s7h1" }