Search for vulnerabilities
Vulnerability details: VCID-dpv2-3xj4-s7hm
Vulnerability ID VCID-dpv2-3xj4-s7hm
Aliases CVE-2016-5706
GHSA-9rmm-8fp4-26hv
Summary phpMyAdmin Denial Of Service (DOS) attack js/get_scripts.js.php in phpMyAdmin 4.0.x before 4.0.10.16, 4.4.x before 4.4.15.7, and 4.6.x before 4.6.3 allows remote attackers to cause a denial of service via a large array in the scripts parameter.
Status Published
Exploitability 0.5
Weighted Severity 8.0
Risk 4.0
Affected and Fixed Packages Package Details
Weaknesses (3)
System Score Found at
cvssv3.1 7.5 http://lists.opensuse.org/opensuse-updates/2016-06/msg00113.html
generic_textual HIGH http://lists.opensuse.org/opensuse-updates/2016-06/msg00113.html
cvssv3.1 7.5 http://lists.opensuse.org/opensuse-updates/2016-06/msg00114.html
generic_textual HIGH http://lists.opensuse.org/opensuse-updates/2016-06/msg00114.html
epss 0.02024 https://api.first.org/data/v1/epss?cve=CVE-2016-5706
epss 0.02024 https://api.first.org/data/v1/epss?cve=CVE-2016-5706
epss 0.02024 https://api.first.org/data/v1/epss?cve=CVE-2016-5706
epss 0.02024 https://api.first.org/data/v1/epss?cve=CVE-2016-5706
epss 0.02024 https://api.first.org/data/v1/epss?cve=CVE-2016-5706
epss 0.02024 https://api.first.org/data/v1/epss?cve=CVE-2016-5706
epss 0.02024 https://api.first.org/data/v1/epss?cve=CVE-2016-5706
epss 0.02024 https://api.first.org/data/v1/epss?cve=CVE-2016-5706
epss 0.02024 https://api.first.org/data/v1/epss?cve=CVE-2016-5706
epss 0.02024 https://api.first.org/data/v1/epss?cve=CVE-2016-5706
epss 0.02024 https://api.first.org/data/v1/epss?cve=CVE-2016-5706
epss 0.02024 https://api.first.org/data/v1/epss?cve=CVE-2016-5706
epss 0.02147 https://api.first.org/data/v1/epss?cve=CVE-2016-5706
epss 0.02147 https://api.first.org/data/v1/epss?cve=CVE-2016-5706
epss 0.02147 https://api.first.org/data/v1/epss?cve=CVE-2016-5706
epss 0.02147 https://api.first.org/data/v1/epss?cve=CVE-2016-5706
epss 0.02147 https://api.first.org/data/v1/epss?cve=CVE-2016-5706
epss 0.02147 https://api.first.org/data/v1/epss?cve=CVE-2016-5706
epss 0.02147 https://api.first.org/data/v1/epss?cve=CVE-2016-5706
epss 0.02147 https://api.first.org/data/v1/epss?cve=CVE-2016-5706
epss 0.02147 https://api.first.org/data/v1/epss?cve=CVE-2016-5706
epss 0.02147 https://api.first.org/data/v1/epss?cve=CVE-2016-5706
epss 0.02147 https://api.first.org/data/v1/epss?cve=CVE-2016-5706
epss 0.02147 https://api.first.org/data/v1/epss?cve=CVE-2016-5706
cvssv3.1_qr HIGH https://github.com/advisories/GHSA-9rmm-8fp4-26hv
cvssv3.1 7.5 https://github.com/phpmyadmin/composer
generic_textual HIGH https://github.com/phpmyadmin/composer
cvssv3.1 7.5 https://github.com/phpmyadmin/phpmyadmin/commit/4767f24ea4c1e3822ce71a636c341e8ad8d07aa6
generic_textual HIGH https://github.com/phpmyadmin/phpmyadmin/commit/4767f24ea4c1e3822ce71a636c341e8ad8d07aa6
cvssv3.1 7.5 https://github.com/phpmyadmin/phpmyadmin/commit/805225a28c1428d7809e613c731c2126960e98df
generic_textual HIGH https://github.com/phpmyadmin/phpmyadmin/commit/805225a28c1428d7809e613c731c2126960e98df
cvssv3.1 7.5 https://github.com/phpmyadmin/phpmyadmin/commit/abb3685c8702de887988fee31a97ef4d80d856a1
generic_textual HIGH https://github.com/phpmyadmin/phpmyadmin/commit/abb3685c8702de887988fee31a97ef4d80d856a1
cvssv3.1 7.5 https://nvd.nist.gov/vuln/detail/CVE-2016-5706
generic_textual HIGH https://nvd.nist.gov/vuln/detail/CVE-2016-5706
cvssv3.1 7.5 https://security.gentoo.org/glsa/201701-32
generic_textual HIGH https://security.gentoo.org/glsa/201701-32
cvssv3.1 7.5 https://www.phpmyadmin.net/security/PMASA-2016-22
generic_textual HIGH https://www.phpmyadmin.net/security/PMASA-2016-22
cvssv3.1 7.5 http://www.debian.org/security/2016/dsa-3627
generic_textual HIGH http://www.debian.org/security/2016/dsa-3627
cvssv3.1 7.5 http://www.securityfocus.com/bid/91376
generic_textual HIGH http://www.securityfocus.com/bid/91376
Reference id Reference type URL
http://lists.opensuse.org/opensuse-updates/2016-06/msg00113.html
http://lists.opensuse.org/opensuse-updates/2016-06/msg00114.html
https://api.first.org/data/v1/epss?cve=CVE-2016-5706
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1927
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2039
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2040
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2041
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2560
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2561
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5099
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5701
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5705
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5706
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5731
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5733
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5739
https://github.com/phpmyadmin/composer
https://github.com/phpmyadmin/phpmyadmin/commit/4767f24ea4c1e3822ce71a636c341e8ad8d07aa6
https://github.com/phpmyadmin/phpmyadmin/commit/805225a28c1428d7809e613c731c2126960e98df
https://github.com/phpmyadmin/phpmyadmin/commit/abb3685c8702de887988fee31a97ef4d80d856a1
https://nvd.nist.gov/vuln/detail/CVE-2016-5706
https://security.gentoo.org/glsa/201701-32
https://www.phpmyadmin.net/security/PMASA-2016-22
http://www.debian.org/security/2016/dsa-3627
http://www.securityfocus.com/bid/91376
GHSA-9rmm-8fp4-26hv https://github.com/advisories/GHSA-9rmm-8fp4-26hv
No exploits are available.
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at http://lists.opensuse.org/opensuse-updates/2016-06/msg00113.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at http://lists.opensuse.org/opensuse-updates/2016-06/msg00114.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://github.com/phpmyadmin/composer
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://github.com/phpmyadmin/phpmyadmin/commit/4767f24ea4c1e3822ce71a636c341e8ad8d07aa6
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://github.com/phpmyadmin/phpmyadmin/commit/805225a28c1428d7809e613c731c2126960e98df
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://github.com/phpmyadmin/phpmyadmin/commit/abb3685c8702de887988fee31a97ef4d80d856a1
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://nvd.nist.gov/vuln/detail/CVE-2016-5706
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://security.gentoo.org/glsa/201701-32
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://www.phpmyadmin.net/security/PMASA-2016-22
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at http://www.debian.org/security/2016/dsa-3627
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at http://www.securityfocus.com/bid/91376
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.83024
EPSS Score 0.02024
Published At Aug. 16, 2025, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
2025-07-31T09:12:28.633818+00:00 GithubOSV Importer Import https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-9rmm-8fp4-26hv/GHSA-9rmm-8fp4-26hv.json 37.0.0