{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/85209?format=json","vulnerability_id":"VCID-e14d-gnxq-s7h1","summary":"mysql: unspecified vulnerability in subcomponent: Server: Pluggable Authentication (CPU April 2016)","aliases":[{"alias":"CVE-2016-0639"}],"fixed_packages":[],"affected_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/114494?format=json","purl":"pkg:rpm/redhat/rh-mysql56-mysql@5.6.30-1?arch=el7","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2jer-ss8p-7kbg"},{"vulnerability":"VCID-2vp1-j324-dkat"},{"vulnerability":"VCID-3fnd-29cd-2bhu"},{"vulnerability":"VCID-3qjy-4cen-7qev"},{"vulnerability":"VCID-55fg-6c2c-6bg8"},{"vulnerability":"VCID-5yzf-3vz6-9yhu"},{"vulnerability":"VCID-77xe-spj2-qfce"},{"vulnerability":"VCID-77zq-ytd2-mucj"},{"vulnerability":"VCID-7tj3-dfxj-bke7"},{"vulnerability":"VCID-7w3v-5s98-a7ec"},{"vulnerability":"VCID-9591-6344-yuga"},{"vulnerability":"VCID-a17z-sywx-n7h8"},{"vulnerability":"VCID-a3hx-qz7x-7ybk"},{"vulnerability":"VCID-b77g-bp2p-v7gq"},{"vulnerability":"VCID-bfnh-7k45-nkg2"},{"vulnerability":"VCID-ca85-vx8c-huht"},{"vulnerability":"VCID-ceyn-dgzv-5qak"},{"vulnerability":"VCID-ctzs-ypzj-t7dg"},{"vulnerability":"VCID-cyqa-e362-yyaf"},{"vulnerability":"VCID-denv-jkeu-hfdn"},{"vulnerability":"VCID-dpnk-4h8c-cfg2"},{"vulnerability":"VCID-dqg6-2gmj-judy"},{"vulnerability":"VCID-e14d-gnxq-s7h1"},{"vulnerability":"VCID-esfk-umc5-ska4"},{"vulnerability":"VCID-f2w4-p77n-muf7"},{"vulnerability":"VCID-f9vz-r6zv-t7ev"},{"vulnerability":"VCID-fnks-p4e9-13es"},{"vulnerability":"VCID-gn7y-qgmb-9far"},{"vulnerability":"VCID-h5ur-uuwn-ukbz"},{"vulnerability":"VCID-hg16-rg46-4fe3"},{"vulnerability":"VCID-jqmx-5tfh-qqff"},{"vulnerability":"VCID-k8sz-12hn-akfk"},{"vulnerability":"VCID-kwrj-3fxz-g7c6"},{"vulnerability":"VCID-mzrq-ykxm-kkcx"},{"vulnerability":"VCID-nw5h-p35b-2khv"},{"vulnerability":"VCID-q1vh-jwcy-87cz"},{"vulnerability":"VCID-qyb6-7ees-ukcm"},{"vulnerability":"VCID-rfz7-vha1-e7gy"},{"vulnerability":"VCID-rgdk-rhch-dqgp"},{"vulnerability":"VCID-s5bz-57vv-b7bz"},{"vulnerability":"VCID-tazb-gd49-73b4"},{"vulnerability":"VCID-tcxt-fwvr-yfc1"},{"vulnerability":"VCID-tq89-2zh8-pkex"},{"vulnerability":"VCID-v18v-kyda-sye9"},{"vulnerability":"VCID-xegm-n9yj-ckhs"},{"vulnerability":"VCID-xvv1-nxs6-n7ab"},{"vulnerability":"VCID-y6p4-vfkn-q7fc"},{"vulnerability":"VCID-yzzc-qh9x-pfd6"},{"vulnerability":"VCID-zb4s-9rj3-ebea"},{"vulnerability":"VCID-zdym-6xaq-dyas"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/rh-mysql56-mysql@5.6.30-1%3Farch=el7"},{"url":"http://public2.vulnerablecode.io/api/packages/114492?format=json","purl":"pkg:rpm/redhat/rh-mysql56-mysql@5.6.30-1?arch=el6","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2jer-ss8p-7kbg"},{"vulnerability":"VCID-2vp1-j324-dkat"},{"vulnerability":"VCID-3fnd-29cd-2bhu"},{"vulnerability":"VCID-3qjy-4cen-7qev"},{"vulnerability":"VCID-55fg-6c2c-6bg8"},{"vulnerability":"VCID-5yzf-3vz6-9yhu"},{"vulnerability":"VCID-77xe-spj2-qfce"},{"vulnerability":"VCID-77zq-ytd2-mucj"},{"vulnerability":"VCID-7tj3-dfxj-bke7"},{"vulnerability":"VCID-7w3v-5s98-a7ec"},{"vulnerability":"VCID-9591-6344-yuga"},{"vulnerability":"VCID-a17z-sywx-n7h8"},{"vulnerability":"VCID-a3hx-qz7x-7ybk"},{"vulnerability":"VCID-b77g-bp2p-v7gq"},{"vulnerability":"VCID-bfnh-7k45-nkg2"},{"vulnerability":"VCID-ca85-vx8c-huht"},{"vulnerability":"VCID-ceyn-dgzv-5qak"},{"vulnerability":"VCID-ctzs-ypzj-t7dg"},{"vulnerability":"VCID-cyqa-e362-yyaf"},{"vulnerability":"VCID-denv-jkeu-hfdn"},{"vulnerability":"VCID-dpnk-4h8c-cfg2"},{"vulnerability":"VCID-dqg6-2gmj-judy"},{"vulnerability":"VCID-e14d-gnxq-s7h1"},{"vulnerability":"VCID-esfk-umc5-ska4"},{"vulnerability":"VCID-f2w4-p77n-muf7"},{"vulnerability":"VCID-f9vz-r6zv-t7ev"},{"vulnerability":"VCID-fnks-p4e9-13es"},{"vulnerability":"VCID-gn7y-qgmb-9far"},{"vulnerability":"VCID-h5ur-uuwn-ukbz"},{"vulnerability":"VCID-hg16-rg46-4fe3"},{"vulnerability":"VCID-jqmx-5tfh-qqff"},{"vulnerability":"VCID-k8sz-12hn-akfk"},{"vulnerability":"VCID-kwrj-3fxz-g7c6"},{"vulnerability":"VCID-mzrq-ykxm-kkcx"},{"vulnerability":"VCID-nw5h-p35b-2khv"},{"vulnerability":"VCID-q1vh-jwcy-87cz"},{"vulnerability":"VCID-qyb6-7ees-ukcm"},{"vulnerability":"VCID-rfz7-vha1-e7gy"},{"vulnerability":"VCID-rgdk-rhch-dqgp"},{"vulnerability":"VCID-s5bz-57vv-b7bz"},{"vulnerability":"VCID-tazb-gd49-73b4"},{"vulnerability":"VCID-tcxt-fwvr-yfc1"},{"vulnerability":"VCID-tq89-2zh8-pkex"},{"vulnerability":"VCID-v18v-kyda-sye9"},{"vulnerability":"VCID-xegm-n9yj-ckhs"},{"vulnerability":"VCID-xvv1-nxs6-n7ab"},{"vulnerability":"VCID-y6p4-vfkn-q7fc"},{"vulnerability":"VCID-yzzc-qh9x-pfd6"},{"vulnerability":"VCID-zb4s-9rj3-ebea"},{"vulnerability":"VCID-zdym-6xaq-dyas"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/rh-mysql56-mysql@5.6.30-1%3Farch=el6"}],"references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:53:06Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0705.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:53:06Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-0705.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0639.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0639.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-0639","reference_id":"","reference_type":"","scores":[{"value":"0.15283","scoring_system":"epss","scoring_elements":"0.94698","published_at":"2026-05-15T12:55:00Z"},{"value":"0.15283","scoring_system":"epss","scoring_elements":"0.94644","published_at":"2026-04-29T12:55:00Z"},{"value":"0.15283","scoring_system":"epss","scoring_elements":"0.94652","published_at":"2026-05-05T12:55:00Z"},{"value":"0.15283","scoring_system":"epss","scoring_elements":"0.9466","published_at":"2026-05-07T12:55:00Z"},{"value":"0.15283","scoring_system":"epss","scoring_elements":"0.9467","published_at":"2026-05-09T12:55:00Z"},{"value":"0.15283","scoring_system":"epss","scoring_elements":"0.94676","published_at":"2026-05-11T12:55:00Z"},{"value":"0.15283","scoring_system":"epss","scoring_elements":"0.94681","published_at":"2026-05-12T12:55:00Z"},{"value":"0.15283","scoring_system":"epss","scoring_elements":"0.94695","published_at":"2026-05-14T12:55:00Z"},{"value":"0.15283","scoring_system":"epss","scoring_elements":"0.94583","published_at":"2026-04-01T12:55:00Z"},{"value":"0.15283","scoring_system":"epss","scoring_elements":"0.94591","published_at":"2026-04-02T12:55:00Z"},{"value":"0.15283","scoring_system":"epss","scoring_elements":"0.94597","published_at":"2026-04-04T12:55:00Z"},{"value":"0.15283","scoring_system":"epss","scoring_elements":"0.94599","published_at":"2026-04-07T12:55:00Z"},{"value":"0.15283","scoring_system":"epss","scoring_elements":"0.94609","published_at":"2026-04-08T12:55:00Z"},{"value":"0.15283","scoring_system":"epss","scoring_elements":"0.94614","published_at":"2026-04-09T12:55:00Z"},{"value":"0.15283","scoring_system":"epss","scoring_elements":"0.94617","published_at":"2026-04-11T12:55:00Z"},{"value":"0.15283","scoring_system":"epss","scoring_elements":"0.94621","published_at":"2026-04-13T12:55:00Z"},{"value":"0.15283","scoring_system":"epss","scoring_elements":"0.94633","published_at":"2026-04-16T12:55:00Z"},{"value":"0.15283","scoring_system":"epss","scoring_elements":"0.94637","published_at":"2026-04-18T12:55:00Z"},{"value":"0.15283","scoring_system":"epss","scoring_elements":"0.94642","published_at":"2026-04-21T12:55:00Z"},{"value":"0.15283","scoring_system":"epss","scoring_elements":"0.94643","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-0639"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"10","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:C/I:C/A:C"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:53:06Z/"}],"url":"http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html"},{"reference_url":"http://www.securityfocus.com/bid/86418","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:53:06Z/"}],"url":"http://www.securityfocus.com/bid/86418"},{"reference_url":"http://www.securitytracker.com/id/1035606","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:53:06Z/"}],"url":"http://www.securitytracker.com/id/1035606"},{"reference_url":"http://www.ubuntu.com/usn/USN-2953-1","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:53:06Z/"}],"url":"http://www.ubuntu.com/usn/USN-2953-1"},{"reference_url":"http://www.ubuntu.com/usn/USN-2954-1","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:53:06Z/"}],"url":"http://www.ubuntu.com/usn/USN-2954-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1329238","reference_id":"1329238","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1329238"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-0639","reference_id":"CVE-2016-0639","reference_type":"","scores":[{"value":"10.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:C/I:C/A:C"},{"value":"9.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-0639"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0705","reference_id":"RHSA-2016:0705","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0705"},{"reference_url":"https://usn.ubuntu.com/2953-1/","reference_id":"USN-2953-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2953-1/"},{"reference_url":"https://usn.ubuntu.com/2954-1/","reference_id":"USN-2954-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2954-1/"}],"weaknesses":[{"cwe_id":190,"name":"Integer Overflow or Wraparound","description":"The product performs a calculation that can produce an integer overflow or wraparound, when the logic assumes that the resulting value will always be larger than the original value. This can introduce other weaknesses when the calculation is used for resource management or execution control."}],"exploits":[],"severity_range_score":"9.8 - 10.0","exploitability":"0.5","weighted_severity":"9.0","risk_score":4.5,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-e14d-gnxq-s7h1"}