Search for vulnerabilities
Vulnerability details: VCID-96h9-nz2g-g3be
Vulnerability ID VCID-96h9-nz2g-g3be
Aliases CVE-2016-6618
GHSA-rv6m-chvv-wmxg
Summary phpMyAdmin Denial of service (DOS) attack in transformation feature An issue was discovered in phpMyAdmin. The transformation feature allows a user to trigger a denial-of-service (DoS) attack against the server. All 4.6.x versions (prior to 4.6.4), 4.4.x versions (prior to 4.4.15.8), and 4.0.x versions (prior to 4.0.10.17) are affected.
Status Published
Exploitability 0.5
Weighted Severity 6.2
Risk 3.1
Affected and Fixed Packages Package Details
Weaknesses (2)
System Score Found at
epss 0.0055 https://api.first.org/data/v1/epss?cve=CVE-2016-6618
epss 0.0055 https://api.first.org/data/v1/epss?cve=CVE-2016-6618
epss 0.0055 https://api.first.org/data/v1/epss?cve=CVE-2016-6618
epss 0.0055 https://api.first.org/data/v1/epss?cve=CVE-2016-6618
epss 0.0055 https://api.first.org/data/v1/epss?cve=CVE-2016-6618
epss 0.0055 https://api.first.org/data/v1/epss?cve=CVE-2016-6618
epss 0.0055 https://api.first.org/data/v1/epss?cve=CVE-2016-6618
epss 0.0055 https://api.first.org/data/v1/epss?cve=CVE-2016-6618
epss 0.0055 https://api.first.org/data/v1/epss?cve=CVE-2016-6618
epss 0.0055 https://api.first.org/data/v1/epss?cve=CVE-2016-6618
epss 0.0055 https://api.first.org/data/v1/epss?cve=CVE-2016-6618
epss 0.0055 https://api.first.org/data/v1/epss?cve=CVE-2016-6618
epss 0.0055 https://api.first.org/data/v1/epss?cve=CVE-2016-6618
epss 0.0055 https://api.first.org/data/v1/epss?cve=CVE-2016-6618
epss 0.0055 https://api.first.org/data/v1/epss?cve=CVE-2016-6618
epss 0.0055 https://api.first.org/data/v1/epss?cve=CVE-2016-6618
epss 0.0055 https://api.first.org/data/v1/epss?cve=CVE-2016-6618
epss 0.0055 https://api.first.org/data/v1/epss?cve=CVE-2016-6618
epss 0.0055 https://api.first.org/data/v1/epss?cve=CVE-2016-6618
epss 0.0055 https://api.first.org/data/v1/epss?cve=CVE-2016-6618
epss 0.0055 https://api.first.org/data/v1/epss?cve=CVE-2016-6618
epss 0.0055 https://api.first.org/data/v1/epss?cve=CVE-2016-6618
epss 0.0055 https://api.first.org/data/v1/epss?cve=CVE-2016-6618
epss 0.0055 https://api.first.org/data/v1/epss?cve=CVE-2016-6618
epss 0.0055 https://api.first.org/data/v1/epss?cve=CVE-2016-6618
epss 0.0055 https://api.first.org/data/v1/epss?cve=CVE-2016-6618
epss 0.0055 https://api.first.org/data/v1/epss?cve=CVE-2016-6618
epss 0.0055 https://api.first.org/data/v1/epss?cve=CVE-2016-6618
cvssv3.1_qr MODERATE https://github.com/advisories/GHSA-rv6m-chvv-wmxg
cvssv3.1 6.5 https://github.com/phpmyadmin/composer
generic_textual MODERATE https://github.com/phpmyadmin/composer
cvssv3.1 6.5 https://lists.debian.org/debian-lts-announce/2018/07/msg00006.html
generic_textual MODERATE https://lists.debian.org/debian-lts-announce/2018/07/msg00006.html
cvssv3.1 6.5 https://nvd.nist.gov/vuln/detail/CVE-2016-6618
generic_textual MODERATE https://nvd.nist.gov/vuln/detail/CVE-2016-6618
cvssv3.1 6.5 https://security.gentoo.org/glsa/201701-32
generic_textual MODERATE https://security.gentoo.org/glsa/201701-32
cvssv3.1 6.5 https://www.phpmyadmin.net/security/PMASA-2016-41
generic_textual MODERATE https://www.phpmyadmin.net/security/PMASA-2016-41
cvssv3.1 6.5 http://www.securityfocus.com/bid/95047
generic_textual MODERATE http://www.securityfocus.com/bid/95047
No exploits are available.
Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Found at https://github.com/phpmyadmin/composer
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Found at https://lists.debian.org/debian-lts-announce/2018/07/msg00006.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Found at https://nvd.nist.gov/vuln/detail/CVE-2016-6618
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Found at https://security.gentoo.org/glsa/201701-32
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Found at https://www.phpmyadmin.net/security/PMASA-2016-41
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Found at http://www.securityfocus.com/bid/95047
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.66949
EPSS Score 0.0055
Published At July 30, 2025, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
2025-07-31T09:10:40.082238+00:00 GithubOSV Importer Import https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-rv6m-chvv-wmxg/GHSA-rv6m-chvv-wmxg.json 37.0.0