{"id":"CVE-2016-0639","details":"Unspecified vulnerability in Oracle MySQL 5.6.29 and earlier and 5.7.11 and earlier allows remote attackers to affect confidentiality, integrity, and availability via vectors related to Pluggable Authentication.","modified":"2026-04-11T12:00:06.401415Z","published":"2016-04-21T10:59:09.070Z","related":["openSUSE-SU-2024:10200-1"],"database_specific":{"unresolved_ranges":[{"cpe":"cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*","extracted_events":[{"last_affected":"6.0"}],"source":"CPE_FIELD"},{"cpe":"cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*","extracted_events":[{"last_affected":"7.0"}],"source":"CPE_FIELD"}]},"references":[{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2016-0705.html"},{"type":"ADVISORY","url":"http://www.securityfocus.com/bid/86418"},{"type":"ADVISORY","url":"http://www.securitytracker.com/id/1035606"},{"type":"ADVISORY","url":"http://www.ubuntu.com/usn/USN-2953-1"},{"type":"ADVISORY","url":"http://www.ubuntu.com/usn/USN-2954-1"},{"type":"FIX","url":"http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/mysql/mysql-server","events":[{"introduced":"0"},{"last_affected":"aed32a928b782859cccb545ad54f66a340356651"},{"last_affected":"67d52e7c7a1a23424e39273cbb6f5f9d56fda8d1"}],"database_specific":{"cpe":"cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*","extracted_events":[{"introduced":"5.6.0"},{"last_affected":"5.6.29"},{"introduced":"5.7.0"},{"last_affected":"5.7.11"}],"source":"CPE_FIELD"}}],"versions":["mysql-3.23.22-beta","mysql-3.23.28-gamma","mysql-3.23.30-gamma","mysql-3.23.31","mysql-3.23.32","mysql-3.23.33","mysql-3.23.36","mysql-4.0.2","mysql-4.0.4","mysql-5.1.4","mysql-5.6.29","mysql-5.7.11"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2016-0639.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}