Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/mariadb-10.0@10.0.25-0%2Bdeb8u1
Typedeb
Namespacedebian
Namemariadb-10.0
Version10.0.25-0+deb8u1
Qualifiers
Subpath
Is_vulnerabletrue
Next_non_vulnerable_version10.0.32-0+deb8u1
Latest_non_vulnerable_version10.0.32-0+deb8u1
Affected_by_vulnerabilities
0
url VCID-1gmc-pj6y-rkfx
vulnerability_id VCID-1gmc-pj6y-rkfx
summary
Multiple vulnerabilities were found in MySQL, the worst of which
    may allow remote execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3636.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3636.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-3636
reference_id
reference_type
scores
0
value 0.00075
scoring_system epss
scoring_elements 0.22632
published_at 2026-04-02T12:55:00Z
1
value 0.00075
scoring_system epss
scoring_elements 0.22465
published_at 2026-04-07T12:55:00Z
2
value 0.00075
scoring_system epss
scoring_elements 0.22547
published_at 2026-04-08T12:55:00Z
3
value 0.00075
scoring_system epss
scoring_elements 0.22601
published_at 2026-04-09T12:55:00Z
4
value 0.00075
scoring_system epss
scoring_elements 0.22617
published_at 2026-04-11T12:55:00Z
5
value 0.00075
scoring_system epss
scoring_elements 0.22576
published_at 2026-04-12T12:55:00Z
6
value 0.00075
scoring_system epss
scoring_elements 0.22522
published_at 2026-04-13T12:55:00Z
7
value 0.00075
scoring_system epss
scoring_elements 0.22536
published_at 2026-04-16T12:55:00Z
8
value 0.00075
scoring_system epss
scoring_elements 0.22531
published_at 2026-04-18T12:55:00Z
9
value 0.00075
scoring_system epss
scoring_elements 0.22458
published_at 2026-04-01T12:55:00Z
10
value 0.00075
scoring_system epss
scoring_elements 0.22675
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-3636
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10286
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10286
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10379
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10379
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10384
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10384
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3308
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3308
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3309
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3309
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3453
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3453
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3456
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3456
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3464
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3464
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3635
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3635
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3636
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3636
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3641
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3641
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3648
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3648
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3651
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3651
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3652
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3652
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3653
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3653
17
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:S/C:P/I:P/A:P
1
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
18
reference_url http://www.securitytracker.com/id/1038928
reference_id 1038928
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:48:23Z/
url http://www.securitytracker.com/id/1038928
19
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1472686
reference_id 1472686
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1472686
20
reference_url http://www.securityfocus.com/bid/99736
reference_id 99736
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:48:23Z/
url http://www.securityfocus.com/bid/99736
21
reference_url http://www.debian.org/security/2017/dsa-3922
reference_id dsa-3922
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:48:23Z/
url http://www.debian.org/security/2017/dsa-3922
22
reference_url https://www.debian.org/security/2017/dsa-3955
reference_id dsa-3955
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:48:23Z/
url https://www.debian.org/security/2017/dsa-3955
23
reference_url https://security.gentoo.org/glsa/201802-04
reference_id GLSA-201802-04
reference_type
scores
url https://security.gentoo.org/glsa/201802-04
24
reference_url https://access.redhat.com/errata/RHSA-2017:2787
reference_id RHSA-2017:2787
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:48:23Z/
url https://access.redhat.com/errata/RHSA-2017:2787
25
reference_url https://access.redhat.com/errata/RHSA-2018:0279
reference_id RHSA-2018:0279
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:48:23Z/
url https://access.redhat.com/errata/RHSA-2018:0279
26
reference_url https://access.redhat.com/errata/RHSA-2018:0574
reference_id RHSA-2018:0574
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:48:23Z/
url https://access.redhat.com/errata/RHSA-2018:0574
27
reference_url https://access.redhat.com/errata/RHSA-2018:2439
reference_id RHSA-2018:2439
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:48:23Z/
url https://access.redhat.com/errata/RHSA-2018:2439
28
reference_url https://access.redhat.com/errata/RHSA-2018:2729
reference_id RHSA-2018:2729
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:48:23Z/
url https://access.redhat.com/errata/RHSA-2018:2729
29
reference_url https://usn.ubuntu.com/3357-1/
reference_id USN-3357-1
reference_type
scores
url https://usn.ubuntu.com/3357-1/
30
reference_url https://usn.ubuntu.com/3357-2/
reference_id USN-3357-2
reference_type
scores
url https://usn.ubuntu.com/3357-2/
fixed_packages
0
url pkg:deb/debian/mariadb-10.0@10.0.32-0%2Bdeb8u1
purl pkg:deb/debian/mariadb-10.0@10.0.32-0%2Bdeb8u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.0@10.0.32-0%252Bdeb8u1
aliases CVE-2017-3636
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1gmc-pj6y-rkfx
1
url VCID-2gyq-q761-h3br
vulnerability_id VCID-2gyq-q761-h3br
summary
Multiple vulnerabilities have been found in MariaDB, the worst of
    which could lead to privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3312.json
reference_id
reference_type
scores
0
value 6.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3312.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-3312
reference_id
reference_type
scores
0
value 0.00123
scoring_system epss
scoring_elements 0.31395
published_at 2026-04-18T12:55:00Z
1
value 0.00123
scoring_system epss
scoring_elements 0.31376
published_at 2026-04-01T12:55:00Z
2
value 0.00123
scoring_system epss
scoring_elements 0.31555
published_at 2026-04-04T12:55:00Z
3
value 0.00123
scoring_system epss
scoring_elements 0.31373
published_at 2026-04-07T12:55:00Z
4
value 0.00123
scoring_system epss
scoring_elements 0.31426
published_at 2026-04-08T12:55:00Z
5
value 0.00123
scoring_system epss
scoring_elements 0.31457
published_at 2026-04-09T12:55:00Z
6
value 0.00123
scoring_system epss
scoring_elements 0.3146
published_at 2026-04-11T12:55:00Z
7
value 0.00123
scoring_system epss
scoring_elements 0.31417
published_at 2026-04-12T12:55:00Z
8
value 0.00123
scoring_system epss
scoring_elements 0.31381
published_at 2026-04-13T12:55:00Z
9
value 0.00123
scoring_system epss
scoring_elements 0.31415
published_at 2026-04-16T12:55:00Z
10
value 0.00123
scoring_system epss
scoring_elements 0.31513
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-3312
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6664
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6664
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3238
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3238
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3243
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3243
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3244
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3244
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3257
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3257
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3258
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3258
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3265
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3265
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3291
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3291
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3312
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3312
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3313
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3313
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3317
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3317
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3318
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3318
14
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.2
scoring_system cvssv2
scoring_elements AV:L/AC:H/Au:N/C:C/I:C/A:C
1
value 6.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1414133
reference_id 1414133
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1414133
16
reference_url http://www.securityfocus.com/bid/95491
reference_id 95491
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:06:01Z/
url http://www.securityfocus.com/bid/95491
17
reference_url http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
reference_id cpujan2017-2881727.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:06:01Z/
url http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
18
reference_url http://www.debian.org/security/2017/dsa-3767
reference_id dsa-3767
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:06:01Z/
url http://www.debian.org/security/2017/dsa-3767
19
reference_url http://www.debian.org/security/2017/dsa-3770
reference_id dsa-3770
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:06:01Z/
url http://www.debian.org/security/2017/dsa-3770
20
reference_url https://security.gentoo.org/glsa/201702-17
reference_id GLSA-201702-17
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:06:01Z/
url https://security.gentoo.org/glsa/201702-17
21
reference_url https://security.gentoo.org/glsa/201702-18
reference_id GLSA-201702-18
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:06:01Z/
url https://security.gentoo.org/glsa/201702-18
22
reference_url https://access.redhat.com/errata/RHSA-2017:2192
reference_id RHSA-2017:2192
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:06:01Z/
url https://access.redhat.com/errata/RHSA-2017:2192
23
reference_url https://access.redhat.com/errata/RHSA-2017:2787
reference_id RHSA-2017:2787
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:06:01Z/
url https://access.redhat.com/errata/RHSA-2017:2787
24
reference_url https://access.redhat.com/errata/RHSA-2017:2886
reference_id RHSA-2017:2886
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:06:01Z/
url https://access.redhat.com/errata/RHSA-2017:2886
25
reference_url https://access.redhat.com/errata/RHSA-2018:0279
reference_id RHSA-2018:0279
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:06:01Z/
url https://access.redhat.com/errata/RHSA-2018:0279
26
reference_url https://access.redhat.com/errata/RHSA-2018:0574
reference_id RHSA-2018:0574
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:06:01Z/
url https://access.redhat.com/errata/RHSA-2018:0574
27
reference_url https://usn.ubuntu.com/3174-1/
reference_id USN-3174-1
reference_type
scores
url https://usn.ubuntu.com/3174-1/
fixed_packages
0
url pkg:deb/debian/mariadb-10.0@10.0.30-0%2Bdeb8u2
purl pkg:deb/debian/mariadb-10.0@10.0.30-0%2Bdeb8u2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1gmc-pj6y-rkfx
1
vulnerability VCID-4yz4-vxnh-b3dp
2
vulnerability VCID-5sjj-599v-vybg
3
vulnerability VCID-6g4n-3xfu-hfee
4
vulnerability VCID-6muh-rg1z-pqab
5
vulnerability VCID-bhxk-8byp-eyap
6
vulnerability VCID-ej67-ayfh-sqdt
7
vulnerability VCID-jgff-4jyp-9fgr
8
vulnerability VCID-mde2-1ynu-auh2
9
vulnerability VCID-v4gv-g9n5-ukgc
10
vulnerability VCID-yx79-3g2x-pqex
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.0@10.0.30-0%252Bdeb8u2
aliases CVE-2017-3312
risk_score 3.0
exploitability 0.5
weighted_severity 6.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2gyq-q761-h3br
2
url VCID-2rf6-qaey-1ubn
vulnerability_id VCID-2rf6-qaey-1ubn
summary
Multiple vulnerabilities have been found in MariaDB, the worst of
    which could lead to privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3257.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3257.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-3257
reference_id
reference_type
scores
0
value 0.0029
scoring_system epss
scoring_elements 0.52507
published_at 2026-04-18T12:55:00Z
1
value 0.0029
scoring_system epss
scoring_elements 0.52402
published_at 2026-04-02T12:55:00Z
2
value 0.0029
scoring_system epss
scoring_elements 0.52395
published_at 2026-04-07T12:55:00Z
3
value 0.0029
scoring_system epss
scoring_elements 0.52448
published_at 2026-04-08T12:55:00Z
4
value 0.0029
scoring_system epss
scoring_elements 0.52442
published_at 2026-04-09T12:55:00Z
5
value 0.0029
scoring_system epss
scoring_elements 0.52493
published_at 2026-04-11T12:55:00Z
6
value 0.0029
scoring_system epss
scoring_elements 0.52477
published_at 2026-04-12T12:55:00Z
7
value 0.0029
scoring_system epss
scoring_elements 0.5246
published_at 2026-04-13T12:55:00Z
8
value 0.0029
scoring_system epss
scoring_elements 0.52501
published_at 2026-04-16T12:55:00Z
9
value 0.0029
scoring_system epss
scoring_elements 0.52357
published_at 2026-04-01T12:55:00Z
10
value 0.0029
scoring_system epss
scoring_elements 0.5243
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-3257
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6664
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6664
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3238
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3238
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3243
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3243
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3244
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3244
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3257
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3257
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3258
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3258
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3265
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3265
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3291
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3291
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3312
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3312
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3317
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3317
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3318
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3318
13
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:C
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
14
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1414350
reference_id 1414350
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1414350
15
reference_url http://www.securityfocus.com/bid/95589
reference_id 95589
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:12Z/
url http://www.securityfocus.com/bid/95589
16
reference_url http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
reference_id cpujan2017-2881727.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:12Z/
url http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
17
reference_url http://www.debian.org/security/2017/dsa-3770
reference_id dsa-3770
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:12Z/
url http://www.debian.org/security/2017/dsa-3770
18
reference_url https://security.gentoo.org/glsa/201702-17
reference_id GLSA-201702-17
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:12Z/
url https://security.gentoo.org/glsa/201702-17
19
reference_url https://security.gentoo.org/glsa/201702-18
reference_id GLSA-201702-18
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:12Z/
url https://security.gentoo.org/glsa/201702-18
20
reference_url https://access.redhat.com/errata/RHSA-2017:2787
reference_id RHSA-2017:2787
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:12Z/
url https://access.redhat.com/errata/RHSA-2017:2787
21
reference_url https://access.redhat.com/errata/RHSA-2017:2886
reference_id RHSA-2017:2886
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:12Z/
url https://access.redhat.com/errata/RHSA-2017:2886
22
reference_url https://access.redhat.com/errata/RHSA-2018:0279
reference_id RHSA-2018:0279
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:12Z/
url https://access.redhat.com/errata/RHSA-2018:0279
23
reference_url https://access.redhat.com/errata/RHSA-2018:0574
reference_id RHSA-2018:0574
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:12Z/
url https://access.redhat.com/errata/RHSA-2018:0574
fixed_packages
0
url pkg:deb/debian/mariadb-10.0@10.0.30-0%2Bdeb8u2
purl pkg:deb/debian/mariadb-10.0@10.0.30-0%2Bdeb8u2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1gmc-pj6y-rkfx
1
vulnerability VCID-4yz4-vxnh-b3dp
2
vulnerability VCID-5sjj-599v-vybg
3
vulnerability VCID-6g4n-3xfu-hfee
4
vulnerability VCID-6muh-rg1z-pqab
5
vulnerability VCID-bhxk-8byp-eyap
6
vulnerability VCID-ej67-ayfh-sqdt
7
vulnerability VCID-jgff-4jyp-9fgr
8
vulnerability VCID-mde2-1ynu-auh2
9
vulnerability VCID-v4gv-g9n5-ukgc
10
vulnerability VCID-yx79-3g2x-pqex
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.0@10.0.30-0%252Bdeb8u2
aliases CVE-2017-3257
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2rf6-qaey-1ubn
3
url VCID-45hn-ezks-j7br
vulnerability_id VCID-45hn-ezks-j7br
summary security update
references
0
reference_url http://lists.opensuse.org/opensuse-updates/2016-09/msg00042.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:47:47Z/
url http://lists.opensuse.org/opensuse-updates/2016-09/msg00042.html
1
reference_url http://rhn.redhat.com/errata/RHSA-2016-1480.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:47:47Z/
url http://rhn.redhat.com/errata/RHSA-2016-1480.html
2
reference_url http://rhn.redhat.com/errata/RHSA-2016-1601.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:47:47Z/
url http://rhn.redhat.com/errata/RHSA-2016-1601.html
3
reference_url http://rhn.redhat.com/errata/RHSA-2016-1602.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:47:47Z/
url http://rhn.redhat.com/errata/RHSA-2016-1602.html
4
reference_url http://rhn.redhat.com/errata/RHSA-2016-1603.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:47:47Z/
url http://rhn.redhat.com/errata/RHSA-2016-1603.html
5
reference_url http://rhn.redhat.com/errata/RHSA-2016-1604.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:47:47Z/
url http://rhn.redhat.com/errata/RHSA-2016-1604.html
6
reference_url http://rhn.redhat.com/errata/RHSA-2016-1637.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:47:47Z/
url http://rhn.redhat.com/errata/RHSA-2016-1637.html
7
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3615.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3615.json
8
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-3615
reference_id
reference_type
scores
0
value 0.01847
scoring_system epss
scoring_elements 0.82919
published_at 2026-04-01T12:55:00Z
1
value 0.01847
scoring_system epss
scoring_elements 0.83022
published_at 2026-04-18T12:55:00Z
2
value 0.01847
scoring_system epss
scoring_elements 0.82945
published_at 2026-04-07T12:55:00Z
3
value 0.01847
scoring_system epss
scoring_elements 0.82948
published_at 2026-04-04T12:55:00Z
4
value 0.01847
scoring_system epss
scoring_elements 0.82935
published_at 2026-04-02T12:55:00Z
5
value 0.01847
scoring_system epss
scoring_elements 0.82983
published_at 2026-04-13T12:55:00Z
6
value 0.01847
scoring_system epss
scoring_elements 0.82987
published_at 2026-04-12T12:55:00Z
7
value 0.01847
scoring_system epss
scoring_elements 0.82992
published_at 2026-04-11T12:55:00Z
8
value 0.01847
scoring_system epss
scoring_elements 0.82977
published_at 2026-04-09T12:55:00Z
9
value 0.01847
scoring_system epss
scoring_elements 0.8297
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-3615
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3477
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3477
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3521
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3521
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3615
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3615
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5440
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5440
13
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:S/C:N/I:N/A:C
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
14
reference_url https://mariadb.com/kb/en/mariadb/mariadb-10026-release-notes/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:47:47Z/
url https://mariadb.com/kb/en/mariadb/mariadb-10026-release-notes/
15
reference_url https://mariadb.com/kb/en/mariadb/mariadb-10115-release-notes/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:47:47Z/
url https://mariadb.com/kb/en/mariadb/mariadb-10115-release-notes/
16
reference_url https://mariadb.com/kb/en/mariadb/mariadb-5550-release-notes/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:47:47Z/
url https://mariadb.com/kb/en/mariadb/mariadb-5550-release-notes/
17
reference_url http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:47:47Z/
url http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168
18
reference_url http://www.debian.org/security/2016/dsa-3624
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:47:47Z/
url http://www.debian.org/security/2016/dsa-3624
19
reference_url http://www.debian.org/security/2016/dsa-3632
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:47:47Z/
url http://www.debian.org/security/2016/dsa-3632
20
reference_url http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:47:47Z/
url http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
21
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:47:47Z/
url http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
22
reference_url http://www.securityfocus.com/bid/91787
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:47:47Z/
url http://www.securityfocus.com/bid/91787
23
reference_url http://www.securityfocus.com/bid/91960
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:47:47Z/
url http://www.securityfocus.com/bid/91960
24
reference_url http://www.securitytracker.com/id/1036362
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:47:47Z/
url http://www.securitytracker.com/id/1036362
25
reference_url http://www.ubuntu.com/usn/USN-3040-1
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:47:47Z/
url http://www.ubuntu.com/usn/USN-3040-1
26
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1358212
reference_id 1358212
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1358212
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:powerkvm:2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ibm:powerkvm:2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:powerkvm:2.1:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:powerkvm:3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ibm:powerkvm:3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:powerkvm:3.1:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-3615
reference_id CVE-2016-3615
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
1
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2016-3615
38
reference_url https://access.redhat.com/errata/RHSA-2016:1480
reference_id RHSA-2016:1480
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1480
39
reference_url https://access.redhat.com/errata/RHSA-2016:1601
reference_id RHSA-2016:1601
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1601
40
reference_url https://access.redhat.com/errata/RHSA-2016:1602
reference_id RHSA-2016:1602
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1602
41
reference_url https://access.redhat.com/errata/RHSA-2016:1603
reference_id RHSA-2016:1603
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1603
42
reference_url https://access.redhat.com/errata/RHSA-2016:1604
reference_id RHSA-2016:1604
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1604
43
reference_url https://access.redhat.com/errata/RHSA-2016:1637
reference_id RHSA-2016:1637
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1637
44
reference_url https://usn.ubuntu.com/3040-1/
reference_id USN-3040-1
reference_type
scores
url https://usn.ubuntu.com/3040-1/
fixed_packages
0
url pkg:deb/debian/mariadb-10.0@10.0.30-0%2Bdeb8u2
purl pkg:deb/debian/mariadb-10.0@10.0.30-0%2Bdeb8u2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1gmc-pj6y-rkfx
1
vulnerability VCID-4yz4-vxnh-b3dp
2
vulnerability VCID-5sjj-599v-vybg
3
vulnerability VCID-6g4n-3xfu-hfee
4
vulnerability VCID-6muh-rg1z-pqab
5
vulnerability VCID-bhxk-8byp-eyap
6
vulnerability VCID-ej67-ayfh-sqdt
7
vulnerability VCID-jgff-4jyp-9fgr
8
vulnerability VCID-mde2-1ynu-auh2
9
vulnerability VCID-v4gv-g9n5-ukgc
10
vulnerability VCID-yx79-3g2x-pqex
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.0@10.0.30-0%252Bdeb8u2
aliases CVE-2016-3615
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-45hn-ezks-j7br
4
url VCID-4cnj-7fur-3qe3
vulnerability_id VCID-4cnj-7fur-3qe3
summary
Multiple vulnerabilities have been found in MariaDB, the worst of
    which could lead to privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3265.json
reference_id
reference_type
scores
0
value 5.6
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3265.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-3265
reference_id
reference_type
scores
0
value 0.00225
scoring_system epss
scoring_elements 0.45254
published_at 2026-04-18T12:55:00Z
1
value 0.00225
scoring_system epss
scoring_elements 0.45118
published_at 2026-04-01T12:55:00Z
2
value 0.00225
scoring_system epss
scoring_elements 0.452
published_at 2026-04-02T12:55:00Z
3
value 0.00225
scoring_system epss
scoring_elements 0.45222
published_at 2026-04-04T12:55:00Z
4
value 0.00225
scoring_system epss
scoring_elements 0.45164
published_at 2026-04-07T12:55:00Z
5
value 0.00225
scoring_system epss
scoring_elements 0.45218
published_at 2026-04-09T12:55:00Z
6
value 0.00225
scoring_system epss
scoring_elements 0.45239
published_at 2026-04-11T12:55:00Z
7
value 0.00225
scoring_system epss
scoring_elements 0.45207
published_at 2026-04-12T12:55:00Z
8
value 0.00225
scoring_system epss
scoring_elements 0.45209
published_at 2026-04-13T12:55:00Z
9
value 0.00225
scoring_system epss
scoring_elements 0.4526
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-3265
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6664
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6664
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3238
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3238
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3243
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3243
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3244
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3244
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3257
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3257
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3258
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3258
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3265
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3265
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3291
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3291
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3312
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3312
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3313
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3313
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3317
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3317
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3318
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3318
14
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv2
scoring_elements AV:L/AC:H/Au:S/C:C/I:N/A:C
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1414423
reference_id 1414423
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1414423
16
reference_url http://www.securityfocus.com/bid/95520
reference_id 95520
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:05Z/
url http://www.securityfocus.com/bid/95520
17
reference_url http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
reference_id cpujan2017-2881727.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:05Z/
url http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
18
reference_url http://www.debian.org/security/2017/dsa-3767
reference_id dsa-3767
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:05Z/
url http://www.debian.org/security/2017/dsa-3767
19
reference_url http://www.debian.org/security/2017/dsa-3770
reference_id dsa-3770
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:05Z/
url http://www.debian.org/security/2017/dsa-3770
20
reference_url https://security.gentoo.org/glsa/201702-17
reference_id GLSA-201702-17
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:05Z/
url https://security.gentoo.org/glsa/201702-17
21
reference_url https://security.gentoo.org/glsa/201702-18
reference_id GLSA-201702-18
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:05Z/
url https://security.gentoo.org/glsa/201702-18
22
reference_url https://access.redhat.com/errata/RHSA-2017:2192
reference_id RHSA-2017:2192
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:05Z/
url https://access.redhat.com/errata/RHSA-2017:2192
23
reference_url https://access.redhat.com/errata/RHSA-2017:2787
reference_id RHSA-2017:2787
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:05Z/
url https://access.redhat.com/errata/RHSA-2017:2787
24
reference_url https://access.redhat.com/errata/RHSA-2018:0279
reference_id RHSA-2018:0279
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:05Z/
url https://access.redhat.com/errata/RHSA-2018:0279
25
reference_url https://access.redhat.com/errata/RHSA-2018:0574
reference_id RHSA-2018:0574
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:05Z/
url https://access.redhat.com/errata/RHSA-2018:0574
26
reference_url https://usn.ubuntu.com/3174-1/
reference_id USN-3174-1
reference_type
scores
url https://usn.ubuntu.com/3174-1/
fixed_packages
0
url pkg:deb/debian/mariadb-10.0@10.0.30-0%2Bdeb8u2
purl pkg:deb/debian/mariadb-10.0@10.0.30-0%2Bdeb8u2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1gmc-pj6y-rkfx
1
vulnerability VCID-4yz4-vxnh-b3dp
2
vulnerability VCID-5sjj-599v-vybg
3
vulnerability VCID-6g4n-3xfu-hfee
4
vulnerability VCID-6muh-rg1z-pqab
5
vulnerability VCID-bhxk-8byp-eyap
6
vulnerability VCID-ej67-ayfh-sqdt
7
vulnerability VCID-jgff-4jyp-9fgr
8
vulnerability VCID-mde2-1ynu-auh2
9
vulnerability VCID-v4gv-g9n5-ukgc
10
vulnerability VCID-yx79-3g2x-pqex
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.0@10.0.30-0%252Bdeb8u2
aliases CVE-2017-3265
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4cnj-7fur-3qe3
5
url VCID-4yz4-vxnh-b3dp
vulnerability_id VCID-4yz4-vxnh-b3dp
summary
Multiple vulnerabilities were found in MySQL, the worst of which
    may allow remote execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3464.json
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3464.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-3464
reference_id
reference_type
scores
0
value 0.00217
scoring_system epss
scoring_elements 0.44307
published_at 2026-04-18T12:55:00Z
1
value 0.00217
scoring_system epss
scoring_elements 0.44283
published_at 2026-04-04T12:55:00Z
2
value 0.00217
scoring_system epss
scoring_elements 0.44216
published_at 2026-04-07T12:55:00Z
3
value 0.00217
scoring_system epss
scoring_elements 0.44268
published_at 2026-04-08T12:55:00Z
4
value 0.00217
scoring_system epss
scoring_elements 0.44272
published_at 2026-04-09T12:55:00Z
5
value 0.00217
scoring_system epss
scoring_elements 0.4429
published_at 2026-04-11T12:55:00Z
6
value 0.00217
scoring_system epss
scoring_elements 0.44258
published_at 2026-04-13T12:55:00Z
7
value 0.00217
scoring_system epss
scoring_elements 0.44316
published_at 2026-04-16T12:55:00Z
8
value 0.00217
scoring_system epss
scoring_elements 0.4426
published_at 2026-04-02T12:55:00Z
9
value 0.00217
scoring_system epss
scoring_elements 0.44193
published_at 2026-04-01T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-3464
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10286
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10286
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10379
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10379
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10384
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10384
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3302
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3302
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3305
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3305
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3308
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3308
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3309
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3309
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3329
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3329
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3453
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3453
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3456
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3456
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3461
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3461
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3462
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3462
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3463
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3463
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3464
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3464
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3600
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3600
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3636
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3636
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3641
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3641
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3653
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3653
20
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 2.1
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:S/C:N/I:P/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
21
reference_url http://www.debian.org/security/2017/dsa-3834
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:55Z/
url http://www.debian.org/security/2017/dsa-3834
22
reference_url http://www.debian.org/security/2017/dsa-3944
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:55Z/
url http://www.debian.org/security/2017/dsa-3944
23
reference_url http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:55Z/
url http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
24
reference_url http://www.securityfocus.com/bid/97818
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:55Z/
url http://www.securityfocus.com/bid/97818
25
reference_url http://www.securitytracker.com/id/1038287
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:55Z/
url http://www.securitytracker.com/id/1038287
26
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1443379
reference_id 1443379
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1443379
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-3464
reference_id CVE-2017-3464
reference_type
scores
0
value 4.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:P/A:N
1
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2017-3464
40
reference_url https://security.gentoo.org/glsa/201802-04
reference_id GLSA-201802-04
reference_type
scores
url https://security.gentoo.org/glsa/201802-04
41
reference_url https://access.redhat.com/errata/RHSA-2017:2192
reference_id RHSA-2017:2192
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:55Z/
url https://access.redhat.com/errata/RHSA-2017:2192
42
reference_url https://access.redhat.com/errata/RHSA-2017:2787
reference_id RHSA-2017:2787
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:55Z/
url https://access.redhat.com/errata/RHSA-2017:2787
43
reference_url https://access.redhat.com/errata/RHSA-2017:2886
reference_id RHSA-2017:2886
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:55Z/
url https://access.redhat.com/errata/RHSA-2017:2886
44
reference_url https://access.redhat.com/errata/RHSA-2018:0279
reference_id RHSA-2018:0279
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:55Z/
url https://access.redhat.com/errata/RHSA-2018:0279
45
reference_url https://access.redhat.com/errata/RHSA-2018:0574
reference_id RHSA-2018:0574
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:55Z/
url https://access.redhat.com/errata/RHSA-2018:0574
46
reference_url https://usn.ubuntu.com/3269-1/
reference_id USN-3269-1
reference_type
scores
url https://usn.ubuntu.com/3269-1/
47
reference_url https://usn.ubuntu.com/3357-2/
reference_id USN-3357-2
reference_type
scores
url https://usn.ubuntu.com/3357-2/
fixed_packages
0
url pkg:deb/debian/mariadb-10.0@10.0.32-0%2Bdeb8u1
purl pkg:deb/debian/mariadb-10.0@10.0.32-0%2Bdeb8u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.0@10.0.32-0%252Bdeb8u1
aliases CVE-2017-3464
risk_score 1.9
exploitability 0.5
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4yz4-vxnh-b3dp
6
url VCID-5sjj-599v-vybg
vulnerability_id VCID-5sjj-599v-vybg
summary
Multiple vulnerabilities were found in MySQL, the worst of which
    may allow remote execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3653.json
reference_id
reference_type
scores
0
value 3.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3653.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-3653
reference_id
reference_type
scores
0
value 0.0027
scoring_system epss
scoring_elements 0.5054
published_at 2026-04-18T12:55:00Z
1
value 0.0027
scoring_system epss
scoring_elements 0.50399
published_at 2026-04-01T12:55:00Z
2
value 0.0027
scoring_system epss
scoring_elements 0.50454
published_at 2026-04-02T12:55:00Z
3
value 0.0027
scoring_system epss
scoring_elements 0.50483
published_at 2026-04-04T12:55:00Z
4
value 0.0027
scoring_system epss
scoring_elements 0.50436
published_at 2026-04-07T12:55:00Z
5
value 0.0027
scoring_system epss
scoring_elements 0.5049
published_at 2026-04-08T12:55:00Z
6
value 0.0027
scoring_system epss
scoring_elements 0.50487
published_at 2026-04-09T12:55:00Z
7
value 0.0027
scoring_system epss
scoring_elements 0.5053
published_at 2026-04-11T12:55:00Z
8
value 0.0027
scoring_system epss
scoring_elements 0.50507
published_at 2026-04-12T12:55:00Z
9
value 0.0027
scoring_system epss
scoring_elements 0.50492
published_at 2026-04-13T12:55:00Z
10
value 0.0027
scoring_system epss
scoring_elements 0.50534
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-3653
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10286
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10286
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10379
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10379
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10384
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10384
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3308
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3308
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3309
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3309
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3453
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3453
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3456
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3456
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3464
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3464
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3635
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3635
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3636
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3636
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3641
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3641
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3648
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3648
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3651
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3651
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3652
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3652
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3653
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3653
17
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 2.1
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:S/C:N/I:P/A:N
1
value 3.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
18
reference_url http://www.securitytracker.com/id/1038928
reference_id 1038928
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:47:41Z/
url http://www.securitytracker.com/id/1038928
19
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1472711
reference_id 1472711
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1472711
20
reference_url http://www.securityfocus.com/bid/99810
reference_id 99810
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:47:41Z/
url http://www.securityfocus.com/bid/99810
21
reference_url http://www.debian.org/security/2017/dsa-3922
reference_id dsa-3922
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:47:41Z/
url http://www.debian.org/security/2017/dsa-3922
22
reference_url https://www.debian.org/security/2017/dsa-3955
reference_id dsa-3955
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:47:41Z/
url https://www.debian.org/security/2017/dsa-3955
23
reference_url https://security.gentoo.org/glsa/201802-04
reference_id GLSA-201802-04
reference_type
scores
url https://security.gentoo.org/glsa/201802-04
24
reference_url https://access.redhat.com/errata/RHSA-2017:2787
reference_id RHSA-2017:2787
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:47:41Z/
url https://access.redhat.com/errata/RHSA-2017:2787
25
reference_url https://access.redhat.com/errata/RHSA-2017:2886
reference_id RHSA-2017:2886
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:47:41Z/
url https://access.redhat.com/errata/RHSA-2017:2886
26
reference_url https://access.redhat.com/errata/RHSA-2018:0279
reference_id RHSA-2018:0279
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:47:41Z/
url https://access.redhat.com/errata/RHSA-2018:0279
27
reference_url https://access.redhat.com/errata/RHSA-2018:0574
reference_id RHSA-2018:0574
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:47:41Z/
url https://access.redhat.com/errata/RHSA-2018:0574
28
reference_url https://access.redhat.com/errata/RHSA-2018:2439
reference_id RHSA-2018:2439
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:47:41Z/
url https://access.redhat.com/errata/RHSA-2018:2439
29
reference_url https://access.redhat.com/errata/RHSA-2018:2729
reference_id RHSA-2018:2729
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:47:41Z/
url https://access.redhat.com/errata/RHSA-2018:2729
30
reference_url https://usn.ubuntu.com/3357-1/
reference_id USN-3357-1
reference_type
scores
url https://usn.ubuntu.com/3357-1/
31
reference_url https://usn.ubuntu.com/3357-2/
reference_id USN-3357-2
reference_type
scores
url https://usn.ubuntu.com/3357-2/
fixed_packages
0
url pkg:deb/debian/mariadb-10.0@10.0.32-0%2Bdeb8u1
purl pkg:deb/debian/mariadb-10.0@10.0.32-0%2Bdeb8u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.0@10.0.32-0%252Bdeb8u1
aliases CVE-2017-3653
risk_score 1.4
exploitability 0.5
weighted_severity 2.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5sjj-599v-vybg
7
url VCID-6g4n-3xfu-hfee
vulnerability_id VCID-6g4n-3xfu-hfee
summary
Multiple vulnerabilities were found in MySQL, the worst of which
    may allow remote execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3308.json
reference_id
reference_type
scores
0
value 7.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3308.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-3308
reference_id
reference_type
scores
0
value 0.00321
scoring_system epss
scoring_elements 0.55162
published_at 2026-04-18T12:55:00Z
1
value 0.00321
scoring_system epss
scoring_elements 0.54995
published_at 2026-04-01T12:55:00Z
2
value 0.00321
scoring_system epss
scoring_elements 0.55096
published_at 2026-04-02T12:55:00Z
3
value 0.00321
scoring_system epss
scoring_elements 0.5512
published_at 2026-04-04T12:55:00Z
4
value 0.00321
scoring_system epss
scoring_elements 0.55095
published_at 2026-04-07T12:55:00Z
5
value 0.00321
scoring_system epss
scoring_elements 0.55146
published_at 2026-04-08T12:55:00Z
6
value 0.00321
scoring_system epss
scoring_elements 0.55145
published_at 2026-04-09T12:55:00Z
7
value 0.00321
scoring_system epss
scoring_elements 0.55157
published_at 2026-04-11T12:55:00Z
8
value 0.00321
scoring_system epss
scoring_elements 0.55137
published_at 2026-04-12T12:55:00Z
9
value 0.00321
scoring_system epss
scoring_elements 0.55119
published_at 2026-04-13T12:55:00Z
10
value 0.00321
scoring_system epss
scoring_elements 0.55158
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-3308
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10286
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10286
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10379
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10379
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10384
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10384
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3302
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3302
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3305
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3305
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3308
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3308
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3309
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3309
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3329
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3329
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3453
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3453
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3456
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3456
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3461
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3461
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3462
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3462
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3463
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3463
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3464
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3464
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3600
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3600
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3636
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3636
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3641
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3641
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3653
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3653
20
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 2.1
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:S/C:N/I:N/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
21
reference_url http://www.debian.org/security/2017/dsa-3834
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:46:18Z/
url http://www.debian.org/security/2017/dsa-3834
22
reference_url http://www.debian.org/security/2017/dsa-3944
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:46:18Z/
url http://www.debian.org/security/2017/dsa-3944
23
reference_url http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:46:18Z/
url http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
24
reference_url http://www.securityfocus.com/bid/97725
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:46:18Z/
url http://www.securityfocus.com/bid/97725
25
reference_url http://www.securitytracker.com/id/1038287
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:46:18Z/
url http://www.securitytracker.com/id/1038287
26
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1443358
reference_id 1443358
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1443358
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-3308
reference_id CVE-2017-3308
reference_type
scores
0
value 4.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:P
1
value 7.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-3308
43
reference_url https://security.gentoo.org/glsa/201802-04
reference_id GLSA-201802-04
reference_type
scores
url https://security.gentoo.org/glsa/201802-04
44
reference_url https://access.redhat.com/errata/RHSA-2017:2192
reference_id RHSA-2017:2192
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:46:18Z/
url https://access.redhat.com/errata/RHSA-2017:2192
45
reference_url https://access.redhat.com/errata/RHSA-2017:2787
reference_id RHSA-2017:2787
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:46:18Z/
url https://access.redhat.com/errata/RHSA-2017:2787
46
reference_url https://access.redhat.com/errata/RHSA-2017:2886
reference_id RHSA-2017:2886
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:46:18Z/
url https://access.redhat.com/errata/RHSA-2017:2886
47
reference_url https://access.redhat.com/errata/RHSA-2018:0279
reference_id RHSA-2018:0279
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:46:18Z/
url https://access.redhat.com/errata/RHSA-2018:0279
48
reference_url https://access.redhat.com/errata/RHSA-2018:0574
reference_id RHSA-2018:0574
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:46:18Z/
url https://access.redhat.com/errata/RHSA-2018:0574
49
reference_url https://usn.ubuntu.com/3269-1/
reference_id USN-3269-1
reference_type
scores
url https://usn.ubuntu.com/3269-1/
50
reference_url https://usn.ubuntu.com/3357-2/
reference_id USN-3357-2
reference_type
scores
url https://usn.ubuntu.com/3357-2/
fixed_packages
0
url pkg:deb/debian/mariadb-10.0@10.0.32-0%2Bdeb8u1
purl pkg:deb/debian/mariadb-10.0@10.0.32-0%2Bdeb8u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.0@10.0.32-0%252Bdeb8u1
aliases CVE-2017-3308
risk_score 3.5
exploitability 0.5
weighted_severity 6.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6g4n-3xfu-hfee
8
url VCID-6muh-rg1z-pqab
vulnerability_id VCID-6muh-rg1z-pqab
summary
Multiple vulnerabilities were found in MySQL, the worst of which
    may allow remote execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10286.json
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10286.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-10286
reference_id
reference_type
scores
0
value 0.00326
scoring_system epss
scoring_elements 0.5562
published_at 2026-04-16T12:55:00Z
1
value 0.00326
scoring_system epss
scoring_elements 0.55582
published_at 2026-04-13T12:55:00Z
2
value 0.00326
scoring_system epss
scoring_elements 0.55623
published_at 2026-04-18T12:55:00Z
3
value 0.00326
scoring_system epss
scoring_elements 0.55599
published_at 2026-04-12T12:55:00Z
4
value 0.00514
scoring_system epss
scoring_elements 0.66546
published_at 2026-04-07T12:55:00Z
5
value 0.00514
scoring_system epss
scoring_elements 0.66548
published_at 2026-04-02T12:55:00Z
6
value 0.00514
scoring_system epss
scoring_elements 0.66573
published_at 2026-04-04T12:55:00Z
7
value 0.00514
scoring_system epss
scoring_elements 0.66593
published_at 2026-04-08T12:55:00Z
8
value 0.00514
scoring_system epss
scoring_elements 0.66626
published_at 2026-04-11T12:55:00Z
9
value 0.00514
scoring_system epss
scoring_elements 0.66607
published_at 2026-04-09T12:55:00Z
10
value 0.00534
scoring_system epss
scoring_elements 0.67342
published_at 2026-04-01T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-10286
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10286
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10286
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10379
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10379
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10384
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10384
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3308
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3308
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3309
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3309
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3453
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3453
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3456
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3456
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3464
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3464
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3636
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3636
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3641
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3641
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3653
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3653
13
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.6
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:M/C:N/I:N/A:C
1
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
14
reference_url https://security.netapp.com/advisory/ntap-20171019-0002/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:45:47Z/
url https://security.netapp.com/advisory/ntap-20171019-0002/
15
reference_url http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:45:47Z/
url http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
16
reference_url http://www.securityfocus.com/bid/101397
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:45:47Z/
url http://www.securityfocus.com/bid/101397
17
reference_url http://www.securitytracker.com/id/1039597
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:45:47Z/
url http://www.securitytracker.com/id/1039597
18
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1503669
reference_id 1503669
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1503669
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
reference_id cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
reference_id cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_balance:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_balance:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_balance:-:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_performance_manager:-:*:*:*:*:vmware_vsphere:*:*
reference_id cpe:2.3:a:netapp:oncommand_performance_manager:-:*:*:*:*:vmware_vsphere:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_performance_manager:-:*:*:*:*:vmware_vsphere:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vsphere:*:*
reference_id cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vsphere:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vsphere:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:windows:*:*
reference_id cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:windows:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:windows:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-10286
reference_id CVE-2017-10286
reference_type
scores
0
value 3.5
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:S/C:N/I:N/A:P
1
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-10286
31
reference_url https://security.gentoo.org/glsa/201802-04
reference_id GLSA-201802-04
reference_type
scores
url https://security.gentoo.org/glsa/201802-04
32
reference_url https://access.redhat.com/errata/RHSA-2017:3265
reference_id RHSA-2017:3265
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:45:47Z/
url https://access.redhat.com/errata/RHSA-2017:3265
33
reference_url https://access.redhat.com/errata/RHSA-2017:3442
reference_id RHSA-2017:3442
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:45:47Z/
url https://access.redhat.com/errata/RHSA-2017:3442
34
reference_url https://access.redhat.com/errata/RHSA-2018:0279
reference_id RHSA-2018:0279
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:45:47Z/
url https://access.redhat.com/errata/RHSA-2018:0279
35
reference_url https://access.redhat.com/errata/RHSA-2018:0574
reference_id RHSA-2018:0574
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:45:47Z/
url https://access.redhat.com/errata/RHSA-2018:0574
36
reference_url https://usn.ubuntu.com/3459-1/
reference_id USN-3459-1
reference_type
scores
url https://usn.ubuntu.com/3459-1/
fixed_packages
0
url pkg:deb/debian/mariadb-10.0@10.0.32-0%2Bdeb8u1
purl pkg:deb/debian/mariadb-10.0@10.0.32-0%2Bdeb8u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.0@10.0.32-0%252Bdeb8u1
aliases CVE-2017-10286
risk_score 2.0
exploitability 0.5
weighted_severity 4.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6muh-rg1z-pqab
9
url VCID-8djb-knkk-s3c8
vulnerability_id VCID-8djb-knkk-s3c8
summary
Multiple vulnerabilities have been found in MariaDB, the worst of
    which could lead to privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-6664.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-6664.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-6664
reference_id
reference_type
scores
0
value 0.54393
scoring_system epss
scoring_elements 0.98006
published_at 2026-04-01T12:55:00Z
1
value 0.54393
scoring_system epss
scoring_elements 0.98032
published_at 2026-04-18T12:55:00Z
2
value 0.54393
scoring_system epss
scoring_elements 0.98024
published_at 2026-04-11T12:55:00Z
3
value 0.54393
scoring_system epss
scoring_elements 0.98025
published_at 2026-04-13T12:55:00Z
4
value 0.54393
scoring_system epss
scoring_elements 0.98011
published_at 2026-04-02T12:55:00Z
5
value 0.54393
scoring_system epss
scoring_elements 0.98014
published_at 2026-04-04T12:55:00Z
6
value 0.54393
scoring_system epss
scoring_elements 0.98015
published_at 2026-04-07T12:55:00Z
7
value 0.54393
scoring_system epss
scoring_elements 0.9802
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-6664
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6664
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6664
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3238
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3238
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3243
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3243
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3244
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3244
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3257
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3257
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3258
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3258
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3265
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3265
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3291
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3291
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3312
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3312
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3317
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3317
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3318
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3318
13
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:S/C:C/I:C/A:C
1
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
14
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1386564
reference_id 1386564
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1386564
15
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/40679.sh
reference_id CVE-2016-6664;CVE-2016-5617
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/40679.sh
16
reference_url https://legalhackers.com/advisories/MySQL-Maria-Percona-RootPrivEsc-CVE-2016-6664-5617-Exploit.html
reference_id CVE-2016-6664;CVE-2016-5617
reference_type exploit
scores
url https://legalhackers.com/advisories/MySQL-Maria-Percona-RootPrivEsc-CVE-2016-6664-5617-Exploit.html
17
reference_url https://security.gentoo.org/glsa/201702-18
reference_id GLSA-201702-18
reference_type
scores
url https://security.gentoo.org/glsa/201702-18
18
reference_url https://access.redhat.com/errata/RHSA-2016:2130
reference_id RHSA-2016:2130
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2130
19
reference_url https://access.redhat.com/errata/RHSA-2016:2749
reference_id RHSA-2016:2749
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2749
20
reference_url https://access.redhat.com/errata/RHSA-2017:2192
reference_id RHSA-2017:2192
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:2192
21
reference_url https://access.redhat.com/errata/RHSA-2018:0279
reference_id RHSA-2018:0279
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:0279
22
reference_url https://access.redhat.com/errata/RHSA-2018:0574
reference_id RHSA-2018:0574
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:0574
fixed_packages
0
url pkg:deb/debian/mariadb-10.0@10.0.30-0%2Bdeb8u2
purl pkg:deb/debian/mariadb-10.0@10.0.30-0%2Bdeb8u2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1gmc-pj6y-rkfx
1
vulnerability VCID-4yz4-vxnh-b3dp
2
vulnerability VCID-5sjj-599v-vybg
3
vulnerability VCID-6g4n-3xfu-hfee
4
vulnerability VCID-6muh-rg1z-pqab
5
vulnerability VCID-bhxk-8byp-eyap
6
vulnerability VCID-ej67-ayfh-sqdt
7
vulnerability VCID-jgff-4jyp-9fgr
8
vulnerability VCID-mde2-1ynu-auh2
9
vulnerability VCID-v4gv-g9n5-ukgc
10
vulnerability VCID-yx79-3g2x-pqex
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.0@10.0.30-0%252Bdeb8u2
aliases CVE-2016-6664
risk_score 10.0
exploitability 2.0
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8djb-knkk-s3c8
10
url VCID-8krv-jqjg-uqc8
vulnerability_id VCID-8krv-jqjg-uqc8
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7440.json
reference_id
reference_type
scores
0
value 5.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7440.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-7440
reference_id
reference_type
scores
0
value 0.0008
scoring_system epss
scoring_elements 0.23554
published_at 2026-04-01T12:55:00Z
1
value 0.0008
scoring_system epss
scoring_elements 0.23711
published_at 2026-04-02T12:55:00Z
2
value 0.0008
scoring_system epss
scoring_elements 0.23754
published_at 2026-04-04T12:55:00Z
3
value 0.0008
scoring_system epss
scoring_elements 0.23535
published_at 2026-04-07T12:55:00Z
4
value 0.0008
scoring_system epss
scoring_elements 0.23606
published_at 2026-04-08T12:55:00Z
5
value 0.0008
scoring_system epss
scoring_elements 0.23651
published_at 2026-04-09T12:55:00Z
6
value 0.0008
scoring_system epss
scoring_elements 0.23667
published_at 2026-04-11T12:55:00Z
7
value 0.0008
scoring_system epss
scoring_elements 0.23625
published_at 2026-04-12T12:55:00Z
8
value 0.0008
scoring_system epss
scoring_elements 0.23568
published_at 2026-04-13T12:55:00Z
9
value 0.0008
scoring_system epss
scoring_elements 0.2358
published_at 2026-04-16T12:55:00Z
10
value 0.0008
scoring_system epss
scoring_elements 0.23569
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-7440
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3492
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3492
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5584
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5584
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5624
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5624
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5626
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5626
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5629
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5629
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6663
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6663
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7440
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7440
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8283
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8283
10
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4
scoring_system cvssv2
scoring_elements AV:L/AC:H/Au:N/C:C/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1386584
reference_id 1386584
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1386584
12
reference_url https://usn.ubuntu.com/3109-1/
reference_id USN-3109-1
reference_type
scores
url https://usn.ubuntu.com/3109-1/
fixed_packages
0
url pkg:deb/debian/mariadb-10.0@10.0.30-0%2Bdeb8u2
purl pkg:deb/debian/mariadb-10.0@10.0.30-0%2Bdeb8u2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1gmc-pj6y-rkfx
1
vulnerability VCID-4yz4-vxnh-b3dp
2
vulnerability VCID-5sjj-599v-vybg
3
vulnerability VCID-6g4n-3xfu-hfee
4
vulnerability VCID-6muh-rg1z-pqab
5
vulnerability VCID-bhxk-8byp-eyap
6
vulnerability VCID-ej67-ayfh-sqdt
7
vulnerability VCID-jgff-4jyp-9fgr
8
vulnerability VCID-mde2-1ynu-auh2
9
vulnerability VCID-v4gv-g9n5-ukgc
10
vulnerability VCID-yx79-3g2x-pqex
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.0@10.0.30-0%252Bdeb8u2
aliases CVE-2016-7440
risk_score 2.3
exploitability 0.5
weighted_severity 4.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8krv-jqjg-uqc8
11
url VCID-8kvb-5u8c-zbc4
vulnerability_id VCID-8kvb-5u8c-zbc4
summary
Multiple vulnerabilities have been found in MariaDB and MySQL, the
    worst of which could lead to the remote execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5584.json
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5584.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-5584
reference_id
reference_type
scores
0
value 0.00442
scoring_system epss
scoring_elements 0.63214
published_at 2026-04-01T12:55:00Z
1
value 0.00442
scoring_system epss
scoring_elements 0.63345
published_at 2026-04-18T12:55:00Z
2
value 0.00442
scoring_system epss
scoring_elements 0.63273
published_at 2026-04-02T12:55:00Z
3
value 0.00442
scoring_system epss
scoring_elements 0.63302
published_at 2026-04-13T12:55:00Z
4
value 0.00442
scoring_system epss
scoring_elements 0.63268
published_at 2026-04-07T12:55:00Z
5
value 0.00442
scoring_system epss
scoring_elements 0.63319
published_at 2026-04-08T12:55:00Z
6
value 0.00442
scoring_system epss
scoring_elements 0.63337
published_at 2026-04-16T12:55:00Z
7
value 0.00442
scoring_system epss
scoring_elements 0.63355
published_at 2026-04-11T12:55:00Z
8
value 0.00442
scoring_system epss
scoring_elements 0.63338
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-5584
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3492
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3492
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5584
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5584
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5624
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5624
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5626
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5626
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5629
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5629
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6663
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6663
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7440
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7440
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8283
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8283
10
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:S/C:C/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
11
reference_url http://www.securitytracker.com/id/1037050
reference_id 1037050
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:08Z/
url http://www.securitytracker.com/id/1037050
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1386557
reference_id 1386557
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1386557
13
reference_url http://www.securityfocus.com/bid/93735
reference_id 93735
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:08Z/
url http://www.securityfocus.com/bid/93735
14
reference_url http://www.debian.org/security/2016/dsa-3706
reference_id dsa-3706
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:08Z/
url http://www.debian.org/security/2016/dsa-3706
15
reference_url https://security.gentoo.org/glsa/201701-01
reference_id GLSA-201701-01
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:08Z/
url https://security.gentoo.org/glsa/201701-01
16
reference_url https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/
reference_id mariadb-10028-release-notes
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:08Z/
url https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/
17
reference_url https://usn.ubuntu.com/3109-1/
reference_id USN-3109-1
reference_type
scores
url https://usn.ubuntu.com/3109-1/
fixed_packages
0
url pkg:deb/debian/mariadb-10.0@10.0.30-0%2Bdeb8u2
purl pkg:deb/debian/mariadb-10.0@10.0.30-0%2Bdeb8u2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1gmc-pj6y-rkfx
1
vulnerability VCID-4yz4-vxnh-b3dp
2
vulnerability VCID-5sjj-599v-vybg
3
vulnerability VCID-6g4n-3xfu-hfee
4
vulnerability VCID-6muh-rg1z-pqab
5
vulnerability VCID-bhxk-8byp-eyap
6
vulnerability VCID-ej67-ayfh-sqdt
7
vulnerability VCID-jgff-4jyp-9fgr
8
vulnerability VCID-mde2-1ynu-auh2
9
vulnerability VCID-v4gv-g9n5-ukgc
10
vulnerability VCID-yx79-3g2x-pqex
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.0@10.0.30-0%252Bdeb8u2
aliases CVE-2016-5584
risk_score 2.0
exploitability 0.5
weighted_severity 4.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8kvb-5u8c-zbc4
12
url VCID-8sya-wktg-dqa5
vulnerability_id VCID-8sya-wktg-dqa5
summary security update
references
0
reference_url http://lists.opensuse.org/opensuse-updates/2016-09/msg00042.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:47:35Z/
url http://lists.opensuse.org/opensuse-updates/2016-09/msg00042.html
1
reference_url http://rhn.redhat.com/errata/RHSA-2016-1480.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:47:35Z/
url http://rhn.redhat.com/errata/RHSA-2016-1480.html
2
reference_url http://rhn.redhat.com/errata/RHSA-2016-1601.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:47:35Z/
url http://rhn.redhat.com/errata/RHSA-2016-1601.html
3
reference_url http://rhn.redhat.com/errata/RHSA-2016-1602.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:47:35Z/
url http://rhn.redhat.com/errata/RHSA-2016-1602.html
4
reference_url http://rhn.redhat.com/errata/RHSA-2016-1603.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:47:35Z/
url http://rhn.redhat.com/errata/RHSA-2016-1603.html
5
reference_url http://rhn.redhat.com/errata/RHSA-2016-1604.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:47:35Z/
url http://rhn.redhat.com/errata/RHSA-2016-1604.html
6
reference_url http://rhn.redhat.com/errata/RHSA-2016-1637.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:47:35Z/
url http://rhn.redhat.com/errata/RHSA-2016-1637.html
7
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5440.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5440.json
8
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-5440
reference_id
reference_type
scores
0
value 0.00854
scoring_system epss
scoring_elements 0.74934
published_at 2026-04-08T12:55:00Z
1
value 0.00854
scoring_system epss
scoring_elements 0.74938
published_at 2026-04-13T12:55:00Z
2
value 0.00854
scoring_system epss
scoring_elements 0.74947
published_at 2026-04-12T12:55:00Z
3
value 0.00854
scoring_system epss
scoring_elements 0.74969
published_at 2026-04-11T12:55:00Z
4
value 0.00854
scoring_system epss
scoring_elements 0.74946
published_at 2026-04-09T12:55:00Z
5
value 0.00854
scoring_system epss
scoring_elements 0.74897
published_at 2026-04-01T12:55:00Z
6
value 0.00854
scoring_system epss
scoring_elements 0.74898
published_at 2026-04-02T12:55:00Z
7
value 0.00854
scoring_system epss
scoring_elements 0.74927
published_at 2026-04-04T12:55:00Z
8
value 0.00854
scoring_system epss
scoring_elements 0.749
published_at 2026-04-07T12:55:00Z
9
value 0.00854
scoring_system epss
scoring_elements 0.74982
published_at 2026-04-18T12:55:00Z
10
value 0.00854
scoring_system epss
scoring_elements 0.74975
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-5440
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3477
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3477
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3521
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3521
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3615
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3615
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5440
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5440
13
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:C
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
14
reference_url https://mariadb.com/kb/en/mariadb/mariadb-10026-release-notes/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:47:35Z/
url https://mariadb.com/kb/en/mariadb/mariadb-10026-release-notes/
15
reference_url https://mariadb.com/kb/en/mariadb/mariadb-10115-release-notes/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:47:35Z/
url https://mariadb.com/kb/en/mariadb/mariadb-10115-release-notes/
16
reference_url https://mariadb.com/kb/en/mariadb/mariadb-5550-release-notes/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:47:35Z/
url https://mariadb.com/kb/en/mariadb/mariadb-5550-release-notes/
17
reference_url http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:47:35Z/
url http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168
18
reference_url http://www.debian.org/security/2016/dsa-3624
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:47:35Z/
url http://www.debian.org/security/2016/dsa-3624
19
reference_url http://www.debian.org/security/2016/dsa-3632
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:47:35Z/
url http://www.debian.org/security/2016/dsa-3632
20
reference_url http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:47:35Z/
url http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
21
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:47:35Z/
url http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
22
reference_url http://www.securityfocus.com/bid/91787
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:47:35Z/
url http://www.securityfocus.com/bid/91787
23
reference_url http://www.securityfocus.com/bid/91953
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:47:35Z/
url http://www.securityfocus.com/bid/91953
24
reference_url http://www.securitytracker.com/id/1036362
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:47:35Z/
url http://www.securitytracker.com/id/1036362
25
reference_url http://www.ubuntu.com/usn/USN-3040-1
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:47:35Z/
url http://www.ubuntu.com/usn/USN-3040-1
26
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1358218
reference_id 1358218
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1358218
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:powerkvm:2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ibm:powerkvm:2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:powerkvm:2.1:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:powerkvm:3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ibm:powerkvm:3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:powerkvm:3.1:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-5440
reference_id CVE-2016-5440
reference_type
scores
0
value 4.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:P
1
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2016-5440
51
reference_url https://access.redhat.com/errata/RHSA-2016:1480
reference_id RHSA-2016:1480
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1480
52
reference_url https://access.redhat.com/errata/RHSA-2016:1601
reference_id RHSA-2016:1601
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1601
53
reference_url https://access.redhat.com/errata/RHSA-2016:1602
reference_id RHSA-2016:1602
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1602
54
reference_url https://access.redhat.com/errata/RHSA-2016:1603
reference_id RHSA-2016:1603
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1603
55
reference_url https://access.redhat.com/errata/RHSA-2016:1604
reference_id RHSA-2016:1604
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1604
56
reference_url https://access.redhat.com/errata/RHSA-2016:1637
reference_id RHSA-2016:1637
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1637
57
reference_url https://usn.ubuntu.com/3040-1/
reference_id USN-3040-1
reference_type
scores
url https://usn.ubuntu.com/3040-1/
fixed_packages
0
url pkg:deb/debian/mariadb-10.0@10.0.30-0%2Bdeb8u2
purl pkg:deb/debian/mariadb-10.0@10.0.30-0%2Bdeb8u2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1gmc-pj6y-rkfx
1
vulnerability VCID-4yz4-vxnh-b3dp
2
vulnerability VCID-5sjj-599v-vybg
3
vulnerability VCID-6g4n-3xfu-hfee
4
vulnerability VCID-6muh-rg1z-pqab
5
vulnerability VCID-bhxk-8byp-eyap
6
vulnerability VCID-ej67-ayfh-sqdt
7
vulnerability VCID-jgff-4jyp-9fgr
8
vulnerability VCID-mde2-1ynu-auh2
9
vulnerability VCID-v4gv-g9n5-ukgc
10
vulnerability VCID-yx79-3g2x-pqex
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.0@10.0.30-0%252Bdeb8u2
aliases CVE-2016-5440
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8sya-wktg-dqa5
13
url VCID-9f48-53dz-13an
vulnerability_id VCID-9f48-53dz-13an
summary
Multiple vulnerabilities have been found in MariaDB, the worst of
    which could lead to privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3318.json
reference_id
reference_type
scores
0
value 4.0
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3318.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-3318
reference_id
reference_type
scores
0
value 0.00052
scoring_system epss
scoring_elements 0.16314
published_at 2026-04-18T12:55:00Z
1
value 0.00052
scoring_system epss
scoring_elements 0.16472
published_at 2026-04-02T12:55:00Z
2
value 0.00052
scoring_system epss
scoring_elements 0.1629
published_at 2026-04-01T12:55:00Z
3
value 0.00052
scoring_system epss
scoring_elements 0.16533
published_at 2026-04-04T12:55:00Z
4
value 0.00052
scoring_system epss
scoring_elements 0.1633
published_at 2026-04-07T12:55:00Z
5
value 0.00052
scoring_system epss
scoring_elements 0.16416
published_at 2026-04-08T12:55:00Z
6
value 0.00052
scoring_system epss
scoring_elements 0.16474
published_at 2026-04-09T12:55:00Z
7
value 0.00052
scoring_system epss
scoring_elements 0.16459
published_at 2026-04-11T12:55:00Z
8
value 0.00052
scoring_system epss
scoring_elements 0.16419
published_at 2026-04-12T12:55:00Z
9
value 0.00052
scoring_system epss
scoring_elements 0.16358
published_at 2026-04-13T12:55:00Z
10
value 0.00052
scoring_system epss
scoring_elements 0.16294
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-3318
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6664
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6664
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3238
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3238
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3243
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3243
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3244
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3244
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3257
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3257
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3258
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3258
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3265
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3265
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3291
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3291
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3312
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3312
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3313
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3313
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3317
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3317
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3318
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3318
14
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 1
scoring_system cvssv2
scoring_elements AV:L/AC:H/Au:S/C:P/I:N/A:N
1
value 4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1414357
reference_id 1414357
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1414357
16
reference_url http://www.securityfocus.com/bid/95588
reference_id 95588
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-08T20:09:30Z/
url http://www.securityfocus.com/bid/95588
17
reference_url http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
reference_id cpujan2017-2881727.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-08T20:09:30Z/
url http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
18
reference_url http://www.debian.org/security/2017/dsa-3767
reference_id dsa-3767
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-08T20:09:30Z/
url http://www.debian.org/security/2017/dsa-3767
19
reference_url http://www.debian.org/security/2017/dsa-3770
reference_id dsa-3770
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-08T20:09:30Z/
url http://www.debian.org/security/2017/dsa-3770
20
reference_url https://security.gentoo.org/glsa/201702-17
reference_id GLSA-201702-17
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-08T20:09:30Z/
url https://security.gentoo.org/glsa/201702-17
21
reference_url https://security.gentoo.org/glsa/201702-18
reference_id GLSA-201702-18
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-08T20:09:30Z/
url https://security.gentoo.org/glsa/201702-18
22
reference_url https://access.redhat.com/errata/RHSA-2017:2192
reference_id RHSA-2017:2192
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-08T20:09:30Z/
url https://access.redhat.com/errata/RHSA-2017:2192
23
reference_url https://access.redhat.com/errata/RHSA-2017:2787
reference_id RHSA-2017:2787
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-08T20:09:30Z/
url https://access.redhat.com/errata/RHSA-2017:2787
24
reference_url https://access.redhat.com/errata/RHSA-2017:2886
reference_id RHSA-2017:2886
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-08T20:09:30Z/
url https://access.redhat.com/errata/RHSA-2017:2886
25
reference_url https://access.redhat.com/errata/RHSA-2018:0279
reference_id RHSA-2018:0279
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-08T20:09:30Z/
url https://access.redhat.com/errata/RHSA-2018:0279
26
reference_url https://access.redhat.com/errata/RHSA-2018:0574
reference_id RHSA-2018:0574
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-08T20:09:30Z/
url https://access.redhat.com/errata/RHSA-2018:0574
27
reference_url https://usn.ubuntu.com/3174-1/
reference_id USN-3174-1
reference_type
scores
url https://usn.ubuntu.com/3174-1/
fixed_packages
0
url pkg:deb/debian/mariadb-10.0@10.0.30-0%2Bdeb8u2
purl pkg:deb/debian/mariadb-10.0@10.0.30-0%2Bdeb8u2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1gmc-pj6y-rkfx
1
vulnerability VCID-4yz4-vxnh-b3dp
2
vulnerability VCID-5sjj-599v-vybg
3
vulnerability VCID-6g4n-3xfu-hfee
4
vulnerability VCID-6muh-rg1z-pqab
5
vulnerability VCID-bhxk-8byp-eyap
6
vulnerability VCID-ej67-ayfh-sqdt
7
vulnerability VCID-jgff-4jyp-9fgr
8
vulnerability VCID-mde2-1ynu-auh2
9
vulnerability VCID-v4gv-g9n5-ukgc
10
vulnerability VCID-yx79-3g2x-pqex
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.0@10.0.30-0%252Bdeb8u2
aliases CVE-2017-3318
risk_score 1.8
exploitability 0.5
weighted_severity 3.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9f48-53dz-13an
14
url VCID-9ff2-43rk-2ydj
vulnerability_id VCID-9ff2-43rk-2ydj
summary security update
references
0
reference_url http://lists.opensuse.org/opensuse-updates/2016-09/msg00042.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:49:14Z/
url http://lists.opensuse.org/opensuse-updates/2016-09/msg00042.html
1
reference_url http://rhn.redhat.com/errata/RHSA-2016-1480.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:49:14Z/
url http://rhn.redhat.com/errata/RHSA-2016-1480.html
2
reference_url http://rhn.redhat.com/errata/RHSA-2016-1601.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:49:14Z/
url http://rhn.redhat.com/errata/RHSA-2016-1601.html
3
reference_url http://rhn.redhat.com/errata/RHSA-2016-1602.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:49:14Z/
url http://rhn.redhat.com/errata/RHSA-2016-1602.html
4
reference_url http://rhn.redhat.com/errata/RHSA-2016-1603.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:49:14Z/
url http://rhn.redhat.com/errata/RHSA-2016-1603.html
5
reference_url http://rhn.redhat.com/errata/RHSA-2016-1604.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:49:14Z/
url http://rhn.redhat.com/errata/RHSA-2016-1604.html
6
reference_url http://rhn.redhat.com/errata/RHSA-2016-1637.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:49:14Z/
url http://rhn.redhat.com/errata/RHSA-2016-1637.html
7
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3521.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3521.json
8
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-3521
reference_id
reference_type
scores
0
value 0.01349
scoring_system epss
scoring_elements 0.80122
published_at 2026-04-18T12:55:00Z
1
value 0.01349
scoring_system epss
scoring_elements 0.80043
published_at 2026-04-01T12:55:00Z
2
value 0.01349
scoring_system epss
scoring_elements 0.80051
published_at 2026-04-02T12:55:00Z
3
value 0.01349
scoring_system epss
scoring_elements 0.80072
published_at 2026-04-04T12:55:00Z
4
value 0.01349
scoring_system epss
scoring_elements 0.80061
published_at 2026-04-07T12:55:00Z
5
value 0.01349
scoring_system epss
scoring_elements 0.80089
published_at 2026-04-08T12:55:00Z
6
value 0.01349
scoring_system epss
scoring_elements 0.80097
published_at 2026-04-09T12:55:00Z
7
value 0.01349
scoring_system epss
scoring_elements 0.80116
published_at 2026-04-11T12:55:00Z
8
value 0.01349
scoring_system epss
scoring_elements 0.80101
published_at 2026-04-12T12:55:00Z
9
value 0.01349
scoring_system epss
scoring_elements 0.80092
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-3521
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3477
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3477
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3521
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3521
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3615
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3615
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5440
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5440
13
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:C
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
14
reference_url https://mariadb.com/kb/en/mariadb/mariadb-10026-release-notes/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:49:14Z/
url https://mariadb.com/kb/en/mariadb/mariadb-10026-release-notes/
15
reference_url https://mariadb.com/kb/en/mariadb/mariadb-10115-release-notes/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:49:14Z/
url https://mariadb.com/kb/en/mariadb/mariadb-10115-release-notes/
16
reference_url https://mariadb.com/kb/en/mariadb/mariadb-5550-release-notes/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:49:14Z/
url https://mariadb.com/kb/en/mariadb/mariadb-5550-release-notes/
17
reference_url http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:49:14Z/
url http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168
18
reference_url http://www.debian.org/security/2016/dsa-3624
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:49:14Z/
url http://www.debian.org/security/2016/dsa-3624
19
reference_url http://www.debian.org/security/2016/dsa-3632
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:49:14Z/
url http://www.debian.org/security/2016/dsa-3632
20
reference_url http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:49:14Z/
url http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
21
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:49:14Z/
url http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
22
reference_url http://www.securityfocus.com/bid/91787
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:49:14Z/
url http://www.securityfocus.com/bid/91787
23
reference_url http://www.securityfocus.com/bid/91932
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:49:14Z/
url http://www.securityfocus.com/bid/91932
24
reference_url http://www.securitytracker.com/id/1036362
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:49:14Z/
url http://www.securitytracker.com/id/1036362
25
reference_url http://www.ubuntu.com/usn/USN-3040-1
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:49:14Z/
url http://www.ubuntu.com/usn/USN-3040-1
26
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1358209
reference_id 1358209
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1358209
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:powerkvm:2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ibm:powerkvm:2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:powerkvm:2.1:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:powerkvm:3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ibm:powerkvm:3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:powerkvm:3.1:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-3521
reference_id CVE-2016-3521
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:C
1
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2016-3521
38
reference_url https://access.redhat.com/errata/RHSA-2016:1480
reference_id RHSA-2016:1480
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1480
39
reference_url https://access.redhat.com/errata/RHSA-2016:1601
reference_id RHSA-2016:1601
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1601
40
reference_url https://access.redhat.com/errata/RHSA-2016:1602
reference_id RHSA-2016:1602
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1602
41
reference_url https://access.redhat.com/errata/RHSA-2016:1603
reference_id RHSA-2016:1603
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1603
42
reference_url https://access.redhat.com/errata/RHSA-2016:1604
reference_id RHSA-2016:1604
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1604
43
reference_url https://access.redhat.com/errata/RHSA-2016:1637
reference_id RHSA-2016:1637
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1637
44
reference_url https://usn.ubuntu.com/3040-1/
reference_id USN-3040-1
reference_type
scores
url https://usn.ubuntu.com/3040-1/
fixed_packages
0
url pkg:deb/debian/mariadb-10.0@10.0.30-0%2Bdeb8u2
purl pkg:deb/debian/mariadb-10.0@10.0.30-0%2Bdeb8u2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1gmc-pj6y-rkfx
1
vulnerability VCID-4yz4-vxnh-b3dp
2
vulnerability VCID-5sjj-599v-vybg
3
vulnerability VCID-6g4n-3xfu-hfee
4
vulnerability VCID-6muh-rg1z-pqab
5
vulnerability VCID-bhxk-8byp-eyap
6
vulnerability VCID-ej67-ayfh-sqdt
7
vulnerability VCID-jgff-4jyp-9fgr
8
vulnerability VCID-mde2-1ynu-auh2
9
vulnerability VCID-v4gv-g9n5-ukgc
10
vulnerability VCID-yx79-3g2x-pqex
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.0@10.0.30-0%252Bdeb8u2
aliases CVE-2016-3521
risk_score 3.0
exploitability 0.5
weighted_severity 6.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9ff2-43rk-2ydj
15
url VCID-9w98-nfg2-muh2
vulnerability_id VCID-9w98-nfg2-muh2
summary
Multiple vulnerabilities have been found in MariaDB, the worst of
    which could lead to privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3238.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3238.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-3238
reference_id
reference_type
scores
0
value 0.02525
scoring_system epss
scoring_elements 0.85455
published_at 2026-04-18T12:55:00Z
1
value 0.02525
scoring_system epss
scoring_elements 0.85385
published_at 2026-04-04T12:55:00Z
2
value 0.02525
scoring_system epss
scoring_elements 0.85387
published_at 2026-04-07T12:55:00Z
3
value 0.02525
scoring_system epss
scoring_elements 0.85409
published_at 2026-04-08T12:55:00Z
4
value 0.02525
scoring_system epss
scoring_elements 0.85417
published_at 2026-04-09T12:55:00Z
5
value 0.02525
scoring_system epss
scoring_elements 0.85432
published_at 2026-04-11T12:55:00Z
6
value 0.02525
scoring_system epss
scoring_elements 0.8543
published_at 2026-04-12T12:55:00Z
7
value 0.02525
scoring_system epss
scoring_elements 0.85427
published_at 2026-04-13T12:55:00Z
8
value 0.02525
scoring_system epss
scoring_elements 0.85451
published_at 2026-04-16T12:55:00Z
9
value 0.02525
scoring_system epss
scoring_elements 0.85366
published_at 2026-04-02T12:55:00Z
10
value 0.02525
scoring_system epss
scoring_elements 0.85353
published_at 2026-04-01T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-3238
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6664
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6664
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3238
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3238
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3243
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3243
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3244
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3244
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3257
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3257
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3258
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3258
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3265
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3265
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3291
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3291
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3312
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3312
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3313
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3313
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3317
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3317
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3318
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3318
14
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:C
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1414338
reference_id 1414338
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1414338
16
reference_url http://www.securityfocus.com/bid/95571
reference_id 95571
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:35Z/
url http://www.securityfocus.com/bid/95571
17
reference_url http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
reference_id cpujan2017-2881727.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:35Z/
url http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
18
reference_url http://www.debian.org/security/2017/dsa-3767
reference_id dsa-3767
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:35Z/
url http://www.debian.org/security/2017/dsa-3767
19
reference_url http://www.debian.org/security/2017/dsa-3770
reference_id dsa-3770
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:35Z/
url http://www.debian.org/security/2017/dsa-3770
20
reference_url https://security.gentoo.org/glsa/201702-17
reference_id GLSA-201702-17
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:35Z/
url https://security.gentoo.org/glsa/201702-17
21
reference_url https://security.gentoo.org/glsa/201702-18
reference_id GLSA-201702-18
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:35Z/
url https://security.gentoo.org/glsa/201702-18
22
reference_url https://access.redhat.com/errata/RHSA-2017:2192
reference_id RHSA-2017:2192
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:35Z/
url https://access.redhat.com/errata/RHSA-2017:2192
23
reference_url https://access.redhat.com/errata/RHSA-2017:2787
reference_id RHSA-2017:2787
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:35Z/
url https://access.redhat.com/errata/RHSA-2017:2787
24
reference_url https://access.redhat.com/errata/RHSA-2017:2886
reference_id RHSA-2017:2886
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:35Z/
url https://access.redhat.com/errata/RHSA-2017:2886
25
reference_url https://access.redhat.com/errata/RHSA-2018:0279
reference_id RHSA-2018:0279
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:35Z/
url https://access.redhat.com/errata/RHSA-2018:0279
26
reference_url https://access.redhat.com/errata/RHSA-2018:0574
reference_id RHSA-2018:0574
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:35Z/
url https://access.redhat.com/errata/RHSA-2018:0574
27
reference_url https://usn.ubuntu.com/3174-1/
reference_id USN-3174-1
reference_type
scores
url https://usn.ubuntu.com/3174-1/
fixed_packages
0
url pkg:deb/debian/mariadb-10.0@10.0.30-0%2Bdeb8u2
purl pkg:deb/debian/mariadb-10.0@10.0.30-0%2Bdeb8u2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1gmc-pj6y-rkfx
1
vulnerability VCID-4yz4-vxnh-b3dp
2
vulnerability VCID-5sjj-599v-vybg
3
vulnerability VCID-6g4n-3xfu-hfee
4
vulnerability VCID-6muh-rg1z-pqab
5
vulnerability VCID-bhxk-8byp-eyap
6
vulnerability VCID-ej67-ayfh-sqdt
7
vulnerability VCID-jgff-4jyp-9fgr
8
vulnerability VCID-mde2-1ynu-auh2
9
vulnerability VCID-v4gv-g9n5-ukgc
10
vulnerability VCID-yx79-3g2x-pqex
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.0@10.0.30-0%252Bdeb8u2
aliases CVE-2017-3238
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9w98-nfg2-muh2
16
url VCID-bhxk-8byp-eyap
vulnerability_id VCID-bhxk-8byp-eyap
summary
Multiple vulnerabilities were found in MySQL, the worst of which
    may allow remote execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3309.json
reference_id
reference_type
scores
0
value 7.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3309.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-3309
reference_id
reference_type
scores
0
value 0.00319
scoring_system epss
scoring_elements 0.54932
published_at 2026-04-16T12:55:00Z
1
value 0.00319
scoring_system epss
scoring_elements 0.54905
published_at 2026-04-04T12:55:00Z
2
value 0.00319
scoring_system epss
scoring_elements 0.54875
published_at 2026-04-07T12:55:00Z
3
value 0.00319
scoring_system epss
scoring_elements 0.54924
published_at 2026-04-08T12:55:00Z
4
value 0.00319
scoring_system epss
scoring_elements 0.54923
published_at 2026-04-09T12:55:00Z
5
value 0.00319
scoring_system epss
scoring_elements 0.54935
published_at 2026-04-18T12:55:00Z
6
value 0.00319
scoring_system epss
scoring_elements 0.54917
published_at 2026-04-12T12:55:00Z
7
value 0.00319
scoring_system epss
scoring_elements 0.54894
published_at 2026-04-13T12:55:00Z
8
value 0.00319
scoring_system epss
scoring_elements 0.54879
published_at 2026-04-02T12:55:00Z
9
value 0.00319
scoring_system epss
scoring_elements 0.54809
published_at 2026-04-01T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-3309
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10286
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10286
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10379
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10379
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10384
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10384
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3302
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3302
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3305
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3305
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3308
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3308
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3309
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3309
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3329
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3329
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3453
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3453
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3456
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3456
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3461
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3461
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3462
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3462
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3463
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3463
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3464
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3464
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3600
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3600
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3636
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3636
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3641
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3641
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3653
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3653
20
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 2.1
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:S/C:N/I:N/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
21
reference_url http://www.debian.org/security/2017/dsa-3834
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:46:17Z/
url http://www.debian.org/security/2017/dsa-3834
22
reference_url http://www.debian.org/security/2017/dsa-3944
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:46:17Z/
url http://www.debian.org/security/2017/dsa-3944
23
reference_url http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:46:17Z/
url http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
24
reference_url http://www.securityfocus.com/bid/97742
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:46:17Z/
url http://www.securityfocus.com/bid/97742
25
reference_url http://www.securitytracker.com/id/1038287
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:46:17Z/
url http://www.securitytracker.com/id/1038287
26
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1443359
reference_id 1443359
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1443359
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-3309
reference_id CVE-2017-3309
reference_type
scores
0
value 4.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:P
1
value 7.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-3309
43
reference_url https://security.gentoo.org/glsa/201802-04
reference_id GLSA-201802-04
reference_type
scores
url https://security.gentoo.org/glsa/201802-04
44
reference_url https://access.redhat.com/errata/RHSA-2017:2192
reference_id RHSA-2017:2192
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:46:17Z/
url https://access.redhat.com/errata/RHSA-2017:2192
45
reference_url https://access.redhat.com/errata/RHSA-2017:2787
reference_id RHSA-2017:2787
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:46:17Z/
url https://access.redhat.com/errata/RHSA-2017:2787
46
reference_url https://access.redhat.com/errata/RHSA-2017:2886
reference_id RHSA-2017:2886
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:46:17Z/
url https://access.redhat.com/errata/RHSA-2017:2886
47
reference_url https://access.redhat.com/errata/RHSA-2018:0279
reference_id RHSA-2018:0279
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:46:17Z/
url https://access.redhat.com/errata/RHSA-2018:0279
48
reference_url https://access.redhat.com/errata/RHSA-2018:0574
reference_id RHSA-2018:0574
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:46:17Z/
url https://access.redhat.com/errata/RHSA-2018:0574
49
reference_url https://usn.ubuntu.com/3269-1/
reference_id USN-3269-1
reference_type
scores
url https://usn.ubuntu.com/3269-1/
50
reference_url https://usn.ubuntu.com/3357-2/
reference_id USN-3357-2
reference_type
scores
url https://usn.ubuntu.com/3357-2/
fixed_packages
0
url pkg:deb/debian/mariadb-10.0@10.0.32-0%2Bdeb8u1
purl pkg:deb/debian/mariadb-10.0@10.0.32-0%2Bdeb8u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.0@10.0.32-0%252Bdeb8u1
aliases CVE-2017-3309
risk_score 3.5
exploitability 0.5
weighted_severity 6.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bhxk-8byp-eyap
17
url VCID-ej67-ayfh-sqdt
vulnerability_id VCID-ej67-ayfh-sqdt
summary
Multiple vulnerabilities were found in MySQL, the worst of which
    may allow remote execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10379.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10379.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-10379
reference_id
reference_type
scores
0
value 0.00326
scoring_system epss
scoring_elements 0.55667
published_at 2026-04-18T12:55:00Z
1
value 0.00326
scoring_system epss
scoring_elements 0.55641
published_at 2026-04-12T12:55:00Z
2
value 0.00326
scoring_system epss
scoring_elements 0.55624
published_at 2026-04-13T12:55:00Z
3
value 0.00326
scoring_system epss
scoring_elements 0.55663
published_at 2026-04-16T12:55:00Z
4
value 0.00351
scoring_system epss
scoring_elements 0.57419
published_at 2026-04-01T12:55:00Z
5
value 0.00458
scoring_system epss
scoring_elements 0.63965
published_at 2026-04-02T12:55:00Z
6
value 0.00458
scoring_system epss
scoring_elements 0.63992
published_at 2026-04-04T12:55:00Z
7
value 0.00458
scoring_system epss
scoring_elements 0.63952
published_at 2026-04-07T12:55:00Z
8
value 0.00458
scoring_system epss
scoring_elements 0.64002
published_at 2026-04-08T12:55:00Z
9
value 0.00458
scoring_system epss
scoring_elements 0.64019
published_at 2026-04-09T12:55:00Z
10
value 0.00458
scoring_system epss
scoring_elements 0.64031
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-10379
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10268
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10268
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10286
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10286
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10378
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10378
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10379
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10379
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10384
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10384
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3308
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3308
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3309
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3309
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3453
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3453
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3456
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3456
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3464
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3464
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3636
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3636
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3641
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3641
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3653
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3653
15
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:C
1
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
16
reference_url https://security.netapp.com/advisory/ntap-20171019-0002/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:42:50Z/
url https://security.netapp.com/advisory/ntap-20171019-0002/
17
reference_url http://www.debian.org/security/2017/dsa-4002
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:42:50Z/
url http://www.debian.org/security/2017/dsa-4002
18
reference_url http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:42:50Z/
url http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
19
reference_url http://www.securityfocus.com/bid/101415
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:42:50Z/
url http://www.securityfocus.com/bid/101415
20
reference_url http://www.securitytracker.com/id/1039597
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:42:50Z/
url http://www.securitytracker.com/id/1039597
21
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1503685
reference_id 1503685
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1503685
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
reference_id cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
reference_id cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_balance:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_balance:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_balance:-:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_performance_manager:-:*:*:*:*:vmware_vsphere:*:*
reference_id cpe:2.3:a:netapp:oncommand_performance_manager:-:*:*:*:*:vmware_vsphere:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_performance_manager:-:*:*:*:*:vmware_vsphere:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vsphere:*:*
reference_id cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vsphere:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vsphere:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:windows:*:*
reference_id cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:windows:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:windows:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openstack:12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:openstack:12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openstack:12:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-10379
reference_id CVE-2017-10379
reference_type
scores
0
value 4.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:P/I:N/A:N
1
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2017-10379
46
reference_url https://security.gentoo.org/glsa/201802-04
reference_id GLSA-201802-04
reference_type
scores
url https://security.gentoo.org/glsa/201802-04
47
reference_url https://access.redhat.com/errata/RHSA-2017:3265
reference_id RHSA-2017:3265
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:42:50Z/
url https://access.redhat.com/errata/RHSA-2017:3265
48
reference_url https://access.redhat.com/errata/RHSA-2017:3442
reference_id RHSA-2017:3442
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:42:50Z/
url https://access.redhat.com/errata/RHSA-2017:3442
49
reference_url https://access.redhat.com/errata/RHSA-2018:0279
reference_id RHSA-2018:0279
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:42:50Z/
url https://access.redhat.com/errata/RHSA-2018:0279
50
reference_url https://access.redhat.com/errata/RHSA-2018:0574
reference_id RHSA-2018:0574
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:42:50Z/
url https://access.redhat.com/errata/RHSA-2018:0574
51
reference_url https://access.redhat.com/errata/RHSA-2018:2439
reference_id RHSA-2018:2439
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:42:50Z/
url https://access.redhat.com/errata/RHSA-2018:2439
52
reference_url https://access.redhat.com/errata/RHSA-2018:2729
reference_id RHSA-2018:2729
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:42:50Z/
url https://access.redhat.com/errata/RHSA-2018:2729
53
reference_url https://usn.ubuntu.com/3459-1/
reference_id USN-3459-1
reference_type
scores
url https://usn.ubuntu.com/3459-1/
54
reference_url https://usn.ubuntu.com/3459-2/
reference_id USN-3459-2
reference_type
scores
url https://usn.ubuntu.com/3459-2/
fixed_packages
0
url pkg:deb/debian/mariadb-10.0@10.0.32-0%2Bdeb8u1
purl pkg:deb/debian/mariadb-10.0@10.0.32-0%2Bdeb8u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.0@10.0.32-0%252Bdeb8u1
aliases CVE-2017-10379
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ej67-ayfh-sqdt
18
url VCID-g1pp-9qqg-1beb
vulnerability_id VCID-g1pp-9qqg-1beb
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-6663.json
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-6663.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-6663
reference_id
reference_type
scores
0
value 0.02334
scoring_system epss
scoring_elements 0.84802
published_at 2026-04-04T12:55:00Z
1
value 0.02334
scoring_system epss
scoring_elements 0.84768
published_at 2026-04-01T12:55:00Z
2
value 0.02334
scoring_system epss
scoring_elements 0.84783
published_at 2026-04-02T12:55:00Z
3
value 0.03137
scoring_system epss
scoring_elements 0.86886
published_at 2026-04-11T12:55:00Z
4
value 0.03137
scoring_system epss
scoring_elements 0.86882
published_at 2026-04-12T12:55:00Z
5
value 0.03137
scoring_system epss
scoring_elements 0.86877
published_at 2026-04-13T12:55:00Z
6
value 0.03137
scoring_system epss
scoring_elements 0.86894
published_at 2026-04-16T12:55:00Z
7
value 0.03137
scoring_system epss
scoring_elements 0.86899
published_at 2026-04-18T12:55:00Z
8
value 0.03137
scoring_system epss
scoring_elements 0.86845
published_at 2026-04-07T12:55:00Z
9
value 0.03137
scoring_system epss
scoring_elements 0.86865
published_at 2026-04-08T12:55:00Z
10
value 0.03137
scoring_system epss
scoring_elements 0.86873
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-6663
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3492
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3492
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5584
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5584
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5624
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5624
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5626
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5626
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5629
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5629
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6663
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6663
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7440
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7440
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8283
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8283
10
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.5
scoring_system cvssv2
scoring_elements AV:L/AC:H/Au:S/C:P/I:P/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1378936
reference_id 1378936
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1378936
12
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/40678.c
reference_id CVE-2016-6663;CVE-2016-5616
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/40678.c
13
reference_url https://legalhackers.com/advisories/MySQL-Maria-Percona-PrivEscRace-CVE-2016-6663-5616-Exploit.html
reference_id CVE-2016-6663;CVE-2016-5616
reference_type exploit
scores
url https://legalhackers.com/advisories/MySQL-Maria-Percona-PrivEscRace-CVE-2016-6663-5616-Exploit.html
14
reference_url https://access.redhat.com/errata/RHSA-2016:2130
reference_id RHSA-2016:2130
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2130
15
reference_url https://access.redhat.com/errata/RHSA-2016:2131
reference_id RHSA-2016:2131
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2131
16
reference_url https://access.redhat.com/errata/RHSA-2016:2595
reference_id RHSA-2016:2595
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2595
17
reference_url https://access.redhat.com/errata/RHSA-2016:2749
reference_id RHSA-2016:2749
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2749
18
reference_url https://access.redhat.com/errata/RHSA-2016:2927
reference_id RHSA-2016:2927
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2927
19
reference_url https://access.redhat.com/errata/RHSA-2016:2928
reference_id RHSA-2016:2928
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2928
20
reference_url https://access.redhat.com/errata/RHSA-2017:0184
reference_id RHSA-2017:0184
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:0184
fixed_packages
0
url pkg:deb/debian/mariadb-10.0@10.0.30-0%2Bdeb8u2
purl pkg:deb/debian/mariadb-10.0@10.0.30-0%2Bdeb8u2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1gmc-pj6y-rkfx
1
vulnerability VCID-4yz4-vxnh-b3dp
2
vulnerability VCID-5sjj-599v-vybg
3
vulnerability VCID-6g4n-3xfu-hfee
4
vulnerability VCID-6muh-rg1z-pqab
5
vulnerability VCID-bhxk-8byp-eyap
6
vulnerability VCID-ej67-ayfh-sqdt
7
vulnerability VCID-jgff-4jyp-9fgr
8
vulnerability VCID-mde2-1ynu-auh2
9
vulnerability VCID-v4gv-g9n5-ukgc
10
vulnerability VCID-yx79-3g2x-pqex
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.0@10.0.30-0%252Bdeb8u2
aliases CVE-2016-6663
risk_score 10.0
exploitability 2.0
weighted_severity 6.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-g1pp-9qqg-1beb
19
url VCID-gp4w-bdxg-6kab
vulnerability_id VCID-gp4w-bdxg-6kab
summary
Multiple vulnerabilities have been found in MariaDB and MySQL, the
    worst of which could lead to the remote execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5629.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5629.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-5629
reference_id
reference_type
scores
0
value 0.00501
scoring_system epss
scoring_elements 0.66038
published_at 2026-04-18T12:55:00Z
1
value 0.00501
scoring_system epss
scoring_elements 0.65954
published_at 2026-04-02T12:55:00Z
2
value 0.00501
scoring_system epss
scoring_elements 0.65984
published_at 2026-04-04T12:55:00Z
3
value 0.00501
scoring_system epss
scoring_elements 0.6595
published_at 2026-04-07T12:55:00Z
4
value 0.00501
scoring_system epss
scoring_elements 0.66001
published_at 2026-04-08T12:55:00Z
5
value 0.00501
scoring_system epss
scoring_elements 0.66013
published_at 2026-04-09T12:55:00Z
6
value 0.00501
scoring_system epss
scoring_elements 0.66032
published_at 2026-04-11T12:55:00Z
7
value 0.00501
scoring_system epss
scoring_elements 0.66019
published_at 2026-04-12T12:55:00Z
8
value 0.00501
scoring_system epss
scoring_elements 0.65989
published_at 2026-04-13T12:55:00Z
9
value 0.00501
scoring_system epss
scoring_elements 0.66024
published_at 2026-04-16T12:55:00Z
10
value 0.00501
scoring_system epss
scoring_elements 0.65913
published_at 2026-04-01T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-5629
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3492
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3492
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5584
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5584
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5624
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5624
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5626
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5626
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5629
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5629
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6663
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6663
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7440
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7440
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8283
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8283
10
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:P
1
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
11
reference_url http://www.securitytracker.com/id/1037050
reference_id 1037050
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:33Z/
url http://www.securitytracker.com/id/1037050
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1386572
reference_id 1386572
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1386572
13
reference_url http://www.securityfocus.com/bid/93668
reference_id 93668
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:33Z/
url http://www.securityfocus.com/bid/93668
14
reference_url https://security.gentoo.org/glsa/201701-01
reference_id GLSA-201701-01
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:33Z/
url https://security.gentoo.org/glsa/201701-01
15
reference_url https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/
reference_id mariadb-10028-release-notes
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:33Z/
url https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/
16
reference_url https://mariadb.com/kb/en/mariadb/mariadb-10118-release-notes/
reference_id mariadb-10118-release-notes
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:33Z/
url https://mariadb.com/kb/en/mariadb/mariadb-10118-release-notes/
17
reference_url https://mariadb.com/kb/en/mariadb/mariadb-5552-release-notes/
reference_id mariadb-5552-release-notes
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:33Z/
url https://mariadb.com/kb/en/mariadb/mariadb-5552-release-notes/
18
reference_url https://access.redhat.com/errata/RHSA-2016:2130
reference_id RHSA-2016:2130
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2130
19
reference_url http://rhn.redhat.com/errata/RHSA-2016-2130.html
reference_id RHSA-2016-2130.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:33Z/
url http://rhn.redhat.com/errata/RHSA-2016-2130.html
20
reference_url https://access.redhat.com/errata/RHSA-2016:2131
reference_id RHSA-2016:2131
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2131
21
reference_url http://rhn.redhat.com/errata/RHSA-2016-2131.html
reference_id RHSA-2016-2131.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:33Z/
url http://rhn.redhat.com/errata/RHSA-2016-2131.html
22
reference_url https://access.redhat.com/errata/RHSA-2016:2595
reference_id RHSA-2016:2595
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2595
23
reference_url http://rhn.redhat.com/errata/RHSA-2016-2595.html
reference_id RHSA-2016-2595.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:33Z/
url http://rhn.redhat.com/errata/RHSA-2016-2595.html
24
reference_url https://access.redhat.com/errata/RHSA-2016:2749
reference_id RHSA-2016:2749
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2749
25
reference_url http://rhn.redhat.com/errata/RHSA-2016-2749.html
reference_id RHSA-2016-2749.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:33Z/
url http://rhn.redhat.com/errata/RHSA-2016-2749.html
26
reference_url https://access.redhat.com/errata/RHSA-2016:2927
reference_id RHSA-2016:2927
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2927
27
reference_url https://access.redhat.com/errata/RHSA-2016:2928
reference_id RHSA-2016:2928
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2928
fixed_packages
0
url pkg:deb/debian/mariadb-10.0@10.0.30-0%2Bdeb8u2
purl pkg:deb/debian/mariadb-10.0@10.0.30-0%2Bdeb8u2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1gmc-pj6y-rkfx
1
vulnerability VCID-4yz4-vxnh-b3dp
2
vulnerability VCID-5sjj-599v-vybg
3
vulnerability VCID-6g4n-3xfu-hfee
4
vulnerability VCID-6muh-rg1z-pqab
5
vulnerability VCID-bhxk-8byp-eyap
6
vulnerability VCID-ej67-ayfh-sqdt
7
vulnerability VCID-jgff-4jyp-9fgr
8
vulnerability VCID-mde2-1ynu-auh2
9
vulnerability VCID-v4gv-g9n5-ukgc
10
vulnerability VCID-yx79-3g2x-pqex
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.0@10.0.30-0%252Bdeb8u2
aliases CVE-2016-5629
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gp4w-bdxg-6kab
20
url VCID-jgff-4jyp-9fgr
vulnerability_id VCID-jgff-4jyp-9fgr
summary
Multiple vulnerabilities were found in MySQL, the worst of which
    may allow remote execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3641.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3641.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-3641
reference_id
reference_type
scores
0
value 0.00187
scoring_system epss
scoring_elements 0.40537
published_at 2026-04-13T12:55:00Z
1
value 0.00187
scoring_system epss
scoring_elements 0.40565
published_at 2026-04-02T12:55:00Z
2
value 0.00187
scoring_system epss
scoring_elements 0.40593
published_at 2026-04-11T12:55:00Z
3
value 0.00187
scoring_system epss
scoring_elements 0.40514
published_at 2026-04-07T12:55:00Z
4
value 0.00187
scoring_system epss
scoring_elements 0.40564
published_at 2026-04-08T12:55:00Z
5
value 0.00187
scoring_system epss
scoring_elements 0.40575
published_at 2026-04-09T12:55:00Z
6
value 0.00187
scoring_system epss
scoring_elements 0.40557
published_at 2026-04-12T12:55:00Z
7
value 0.00187
scoring_system epss
scoring_elements 0.40555
published_at 2026-04-18T12:55:00Z
8
value 0.00187
scoring_system epss
scoring_elements 0.40485
published_at 2026-04-01T12:55:00Z
9
value 0.00187
scoring_system epss
scoring_elements 0.40585
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-3641
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10286
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10286
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10379
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10379
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10384
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10384
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3308
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3308
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3309
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3309
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3453
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3453
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3456
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3456
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3464
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3464
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3635
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3635
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3636
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3636
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3641
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3641
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3648
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3648
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3651
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3651
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3652
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3652
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3653
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3653
17
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:C
1
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
18
reference_url http://www.securitytracker.com/id/1038928
reference_id 1038928
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:48:15Z/
url http://www.securitytracker.com/id/1038928
19
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1472693
reference_id 1472693
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1472693
20
reference_url http://www.securityfocus.com/bid/99767
reference_id 99767
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:48:15Z/
url http://www.securityfocus.com/bid/99767
21
reference_url http://www.debian.org/security/2017/dsa-3922
reference_id dsa-3922
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:48:15Z/
url http://www.debian.org/security/2017/dsa-3922
22
reference_url https://www.debian.org/security/2017/dsa-3955
reference_id dsa-3955
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:48:15Z/
url https://www.debian.org/security/2017/dsa-3955
23
reference_url https://security.gentoo.org/glsa/201802-04
reference_id GLSA-201802-04
reference_type
scores
url https://security.gentoo.org/glsa/201802-04
24
reference_url https://access.redhat.com/errata/RHSA-2017:2787
reference_id RHSA-2017:2787
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:48:15Z/
url https://access.redhat.com/errata/RHSA-2017:2787
25
reference_url https://access.redhat.com/errata/RHSA-2017:2886
reference_id RHSA-2017:2886
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:48:15Z/
url https://access.redhat.com/errata/RHSA-2017:2886
26
reference_url https://access.redhat.com/errata/RHSA-2018:0279
reference_id RHSA-2018:0279
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:48:15Z/
url https://access.redhat.com/errata/RHSA-2018:0279
27
reference_url https://access.redhat.com/errata/RHSA-2018:0574
reference_id RHSA-2018:0574
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:48:15Z/
url https://access.redhat.com/errata/RHSA-2018:0574
28
reference_url https://access.redhat.com/errata/RHSA-2018:2439
reference_id RHSA-2018:2439
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:48:15Z/
url https://access.redhat.com/errata/RHSA-2018:2439
29
reference_url https://access.redhat.com/errata/RHSA-2018:2729
reference_id RHSA-2018:2729
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:48:15Z/
url https://access.redhat.com/errata/RHSA-2018:2729
30
reference_url https://usn.ubuntu.com/3357-1/
reference_id USN-3357-1
reference_type
scores
url https://usn.ubuntu.com/3357-1/
31
reference_url https://usn.ubuntu.com/3357-2/
reference_id USN-3357-2
reference_type
scores
url https://usn.ubuntu.com/3357-2/
fixed_packages
0
url pkg:deb/debian/mariadb-10.0@10.0.32-0%2Bdeb8u1
purl pkg:deb/debian/mariadb-10.0@10.0.32-0%2Bdeb8u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.0@10.0.32-0%252Bdeb8u1
aliases CVE-2017-3641
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jgff-4jyp-9fgr
21
url VCID-mde2-1ynu-auh2
vulnerability_id VCID-mde2-1ynu-auh2
summary
Multiple vulnerabilities were found in MySQL, the worst of which
    may allow remote execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3456.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3456.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-3456
reference_id
reference_type
scores
0
value 0.0018
scoring_system epss
scoring_elements 0.39692
published_at 2026-04-18T12:55:00Z
1
value 0.0018
scoring_system epss
scoring_elements 0.39555
published_at 2026-04-01T12:55:00Z
2
value 0.0018
scoring_system epss
scoring_elements 0.39704
published_at 2026-04-02T12:55:00Z
3
value 0.0018
scoring_system epss
scoring_elements 0.39726
published_at 2026-04-04T12:55:00Z
4
value 0.0018
scoring_system epss
scoring_elements 0.39644
published_at 2026-04-07T12:55:00Z
5
value 0.0018
scoring_system epss
scoring_elements 0.39699
published_at 2026-04-08T12:55:00Z
6
value 0.0018
scoring_system epss
scoring_elements 0.39713
published_at 2026-04-09T12:55:00Z
7
value 0.0018
scoring_system epss
scoring_elements 0.39723
published_at 2026-04-11T12:55:00Z
8
value 0.0018
scoring_system epss
scoring_elements 0.39687
published_at 2026-04-12T12:55:00Z
9
value 0.0018
scoring_system epss
scoring_elements 0.3967
published_at 2026-04-13T12:55:00Z
10
value 0.0018
scoring_system epss
scoring_elements 0.39721
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-3456
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10286
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10286
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10379
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10379
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10384
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10384
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3302
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3302
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3305
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3305
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3308
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3308
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3309
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3309
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3329
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3329
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3453
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3453
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3456
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3456
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3461
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3461
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3462
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3462
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3463
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3463
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3464
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3464
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3600
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3600
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3636
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3636
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3641
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3641
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3653
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3653
20
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 2.1
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:S/C:N/I:N/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
21
reference_url http://www.debian.org/security/2017/dsa-3834
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:46:04Z/
url http://www.debian.org/security/2017/dsa-3834
22
reference_url http://www.debian.org/security/2017/dsa-3944
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:46:04Z/
url http://www.debian.org/security/2017/dsa-3944
23
reference_url http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:46:04Z/
url http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
24
reference_url http://www.securityfocus.com/bid/97831
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:46:04Z/
url http://www.securityfocus.com/bid/97831
25
reference_url http://www.securitytracker.com/id/1038287
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:46:04Z/
url http://www.securitytracker.com/id/1038287
26
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1443369
reference_id 1443369
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1443369
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-3456
reference_id CVE-2017-3456
reference_type
scores
0
value 4.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:P
1
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-3456
43
reference_url https://security.gentoo.org/glsa/201802-04
reference_id GLSA-201802-04
reference_type
scores
url https://security.gentoo.org/glsa/201802-04
44
reference_url https://access.redhat.com/errata/RHSA-2017:2192
reference_id RHSA-2017:2192
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:46:04Z/
url https://access.redhat.com/errata/RHSA-2017:2192
45
reference_url https://access.redhat.com/errata/RHSA-2017:2787
reference_id RHSA-2017:2787
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:46:04Z/
url https://access.redhat.com/errata/RHSA-2017:2787
46
reference_url https://access.redhat.com/errata/RHSA-2017:2886
reference_id RHSA-2017:2886
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:46:04Z/
url https://access.redhat.com/errata/RHSA-2017:2886
47
reference_url https://access.redhat.com/errata/RHSA-2018:0279
reference_id RHSA-2018:0279
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:46:04Z/
url https://access.redhat.com/errata/RHSA-2018:0279
48
reference_url https://access.redhat.com/errata/RHSA-2018:0574
reference_id RHSA-2018:0574
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:46:04Z/
url https://access.redhat.com/errata/RHSA-2018:0574
49
reference_url https://usn.ubuntu.com/3269-1/
reference_id USN-3269-1
reference_type
scores
url https://usn.ubuntu.com/3269-1/
50
reference_url https://usn.ubuntu.com/3357-2/
reference_id USN-3357-2
reference_type
scores
url https://usn.ubuntu.com/3357-2/
fixed_packages
0
url pkg:deb/debian/mariadb-10.0@10.0.32-0%2Bdeb8u1
purl pkg:deb/debian/mariadb-10.0@10.0.32-0%2Bdeb8u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.0@10.0.32-0%252Bdeb8u1
aliases CVE-2017-3456
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mde2-1ynu-auh2
22
url VCID-mfgg-7s54-gqg8
vulnerability_id VCID-mfgg-7s54-gqg8
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5624.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5624.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-5624
reference_id
reference_type
scores
0
value 0.0069
scoring_system epss
scoring_elements 0.71823
published_at 2026-04-18T12:55:00Z
1
value 0.0069
scoring_system epss
scoring_elements 0.71734
published_at 2026-04-01T12:55:00Z
2
value 0.0069
scoring_system epss
scoring_elements 0.7176
published_at 2026-04-04T12:55:00Z
3
value 0.0069
scoring_system epss
scoring_elements 0.71735
published_at 2026-04-07T12:55:00Z
4
value 0.0069
scoring_system epss
scoring_elements 0.71774
published_at 2026-04-08T12:55:00Z
5
value 0.0069
scoring_system epss
scoring_elements 0.71785
published_at 2026-04-09T12:55:00Z
6
value 0.0069
scoring_system epss
scoring_elements 0.71809
published_at 2026-04-11T12:55:00Z
7
value 0.0069
scoring_system epss
scoring_elements 0.71792
published_at 2026-04-12T12:55:00Z
8
value 0.0069
scoring_system epss
scoring_elements 0.71775
published_at 2026-04-13T12:55:00Z
9
value 0.0069
scoring_system epss
scoring_elements 0.71817
published_at 2026-04-16T12:55:00Z
10
value 0.0069
scoring_system epss
scoring_elements 0.71741
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-5624
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3492
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3492
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5584
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5584
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5624
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5624
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5626
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5626
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5629
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5629
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6663
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6663
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7440
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7440
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8283
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8283
10
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:P
1
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
11
reference_url http://www.securitytracker.com/id/1037050
reference_id 1037050
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:38Z/
url http://www.securitytracker.com/id/1037050
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1386566
reference_id 1386566
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1386566
13
reference_url http://www.securityfocus.com/bid/93635
reference_id 93635
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:38Z/
url http://www.securityfocus.com/bid/93635
14
reference_url https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/
reference_id mariadb-10028-release-notes
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:38Z/
url https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/
15
reference_url https://mariadb.com/kb/en/mariadb/mariadb-10118-release-notes/
reference_id mariadb-10118-release-notes
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:38Z/
url https://mariadb.com/kb/en/mariadb/mariadb-10118-release-notes/
16
reference_url https://mariadb.com/kb/en/mariadb/mariadb-5552-release-notes/
reference_id mariadb-5552-release-notes
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:38Z/
url https://mariadb.com/kb/en/mariadb/mariadb-5552-release-notes/
17
reference_url https://access.redhat.com/errata/RHSA-2016:2130
reference_id RHSA-2016:2130
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2130
18
reference_url http://rhn.redhat.com/errata/RHSA-2016-2130.html
reference_id RHSA-2016-2130.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:38Z/
url http://rhn.redhat.com/errata/RHSA-2016-2130.html
19
reference_url https://access.redhat.com/errata/RHSA-2016:2131
reference_id RHSA-2016:2131
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2131
20
reference_url http://rhn.redhat.com/errata/RHSA-2016-2131.html
reference_id RHSA-2016-2131.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:38Z/
url http://rhn.redhat.com/errata/RHSA-2016-2131.html
21
reference_url https://access.redhat.com/errata/RHSA-2016:2595
reference_id RHSA-2016:2595
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2595
22
reference_url http://rhn.redhat.com/errata/RHSA-2016-2595.html
reference_id RHSA-2016-2595.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:38Z/
url http://rhn.redhat.com/errata/RHSA-2016-2595.html
23
reference_url https://access.redhat.com/errata/RHSA-2016:2927
reference_id RHSA-2016:2927
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2927
24
reference_url https://access.redhat.com/errata/RHSA-2016:2928
reference_id RHSA-2016:2928
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2928
fixed_packages
0
url pkg:deb/debian/mariadb-10.0@10.0.30-0%2Bdeb8u2
purl pkg:deb/debian/mariadb-10.0@10.0.30-0%2Bdeb8u2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1gmc-pj6y-rkfx
1
vulnerability VCID-4yz4-vxnh-b3dp
2
vulnerability VCID-5sjj-599v-vybg
3
vulnerability VCID-6g4n-3xfu-hfee
4
vulnerability VCID-6muh-rg1z-pqab
5
vulnerability VCID-bhxk-8byp-eyap
6
vulnerability VCID-ej67-ayfh-sqdt
7
vulnerability VCID-jgff-4jyp-9fgr
8
vulnerability VCID-mde2-1ynu-auh2
9
vulnerability VCID-v4gv-g9n5-ukgc
10
vulnerability VCID-yx79-3g2x-pqex
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.0@10.0.30-0%252Bdeb8u2
aliases CVE-2016-5624
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mfgg-7s54-gqg8
23
url VCID-nkdd-suwp-4ffr
vulnerability_id VCID-nkdd-suwp-4ffr
summary
Multiple vulnerabilities have been found in MariaDB, the worst of
    which could lead to privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3243.json
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3243.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-3243
reference_id
reference_type
scores
0
value 0.05555
scoring_system epss
scoring_elements 0.90293
published_at 2026-04-18T12:55:00Z
1
value 0.05555
scoring_system epss
scoring_elements 0.90233
published_at 2026-04-01T12:55:00Z
2
value 0.05555
scoring_system epss
scoring_elements 0.90236
published_at 2026-04-02T12:55:00Z
3
value 0.05555
scoring_system epss
scoring_elements 0.90249
published_at 2026-04-04T12:55:00Z
4
value 0.05555
scoring_system epss
scoring_elements 0.90253
published_at 2026-04-07T12:55:00Z
5
value 0.05555
scoring_system epss
scoring_elements 0.90269
published_at 2026-04-08T12:55:00Z
6
value 0.05555
scoring_system epss
scoring_elements 0.90275
published_at 2026-04-09T12:55:00Z
7
value 0.05555
scoring_system epss
scoring_elements 0.90284
published_at 2026-04-11T12:55:00Z
8
value 0.05555
scoring_system epss
scoring_elements 0.90283
published_at 2026-04-12T12:55:00Z
9
value 0.05555
scoring_system epss
scoring_elements 0.90277
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-3243
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6664
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6664
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3238
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3238
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3243
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3243
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3244
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3244
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3257
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3257
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3258
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3258
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3265
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3265
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3291
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3291
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3312
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3312
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3313
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3313
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3317
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3317
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3318
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3318
14
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:S/C:N/I:N/A:C
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1414340
reference_id 1414340
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1414340
16
reference_url http://www.securityfocus.com/bid/95538
reference_id 95538
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:27Z/
url http://www.securityfocus.com/bid/95538
17
reference_url http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
reference_id cpujan2017-2881727.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:27Z/
url http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
18
reference_url http://www.debian.org/security/2017/dsa-3767
reference_id dsa-3767
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:27Z/
url http://www.debian.org/security/2017/dsa-3767
19
reference_url http://www.debian.org/security/2017/dsa-3770
reference_id dsa-3770
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:27Z/
url http://www.debian.org/security/2017/dsa-3770
20
reference_url https://security.gentoo.org/glsa/201702-17
reference_id GLSA-201702-17
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:27Z/
url https://security.gentoo.org/glsa/201702-17
21
reference_url https://security.gentoo.org/glsa/201702-18
reference_id GLSA-201702-18
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:27Z/
url https://security.gentoo.org/glsa/201702-18
22
reference_url https://access.redhat.com/errata/RHSA-2017:2192
reference_id RHSA-2017:2192
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:27Z/
url https://access.redhat.com/errata/RHSA-2017:2192
23
reference_url https://access.redhat.com/errata/RHSA-2018:0279
reference_id RHSA-2018:0279
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:27Z/
url https://access.redhat.com/errata/RHSA-2018:0279
24
reference_url https://access.redhat.com/errata/RHSA-2018:0574
reference_id RHSA-2018:0574
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:27Z/
url https://access.redhat.com/errata/RHSA-2018:0574
25
reference_url https://usn.ubuntu.com/3174-1/
reference_id USN-3174-1
reference_type
scores
url https://usn.ubuntu.com/3174-1/
fixed_packages
0
url pkg:deb/debian/mariadb-10.0@10.0.30-0%2Bdeb8u2
purl pkg:deb/debian/mariadb-10.0@10.0.30-0%2Bdeb8u2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1gmc-pj6y-rkfx
1
vulnerability VCID-4yz4-vxnh-b3dp
2
vulnerability VCID-5sjj-599v-vybg
3
vulnerability VCID-6g4n-3xfu-hfee
4
vulnerability VCID-6muh-rg1z-pqab
5
vulnerability VCID-bhxk-8byp-eyap
6
vulnerability VCID-ej67-ayfh-sqdt
7
vulnerability VCID-jgff-4jyp-9fgr
8
vulnerability VCID-mde2-1ynu-auh2
9
vulnerability VCID-v4gv-g9n5-ukgc
10
vulnerability VCID-yx79-3g2x-pqex
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.0@10.0.30-0%252Bdeb8u2
aliases CVE-2017-3243
risk_score 2.0
exploitability 0.5
weighted_severity 4.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-nkdd-suwp-4ffr
24
url VCID-p623-gxyv-g7fs
vulnerability_id VCID-p623-gxyv-g7fs
summary
Multiple vulnerabilities have been found in MariaDB, the worst of
    which could lead to privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3291.json
reference_id
reference_type
scores
0
value 6.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3291.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-3291
reference_id
reference_type
scores
0
value 0.00091
scoring_system epss
scoring_elements 0.25565
published_at 2026-04-18T12:55:00Z
1
value 0.00091
scoring_system epss
scoring_elements 0.25775
published_at 2026-04-04T12:55:00Z
2
value 0.00091
scoring_system epss
scoring_elements 0.25545
published_at 2026-04-07T12:55:00Z
3
value 0.00091
scoring_system epss
scoring_elements 0.25618
published_at 2026-04-08T12:55:00Z
4
value 0.00091
scoring_system epss
scoring_elements 0.25665
published_at 2026-04-09T12:55:00Z
5
value 0.00091
scoring_system epss
scoring_elements 0.25676
published_at 2026-04-11T12:55:00Z
6
value 0.00091
scoring_system epss
scoring_elements 0.25635
published_at 2026-04-12T12:55:00Z
7
value 0.00091
scoring_system epss
scoring_elements 0.25578
published_at 2026-04-13T12:55:00Z
8
value 0.00091
scoring_system epss
scoring_elements 0.2558
published_at 2026-04-16T12:55:00Z
9
value 0.00091
scoring_system epss
scoring_elements 0.25734
published_at 2026-04-02T12:55:00Z
10
value 0.00091
scoring_system epss
scoring_elements 0.25664
published_at 2026-04-01T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-3291
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6664
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6664
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3238
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3238
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3243
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3243
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3244
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3244
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3257
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3257
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3258
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3258
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3265
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3265
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3291
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3291
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3312
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3312
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3313
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3313
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3317
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3317
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3318
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3318
14
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6
scoring_system cvssv2
scoring_elements AV:L/AC:H/Au:S/C:C/I:C/A:C
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1414429
reference_id 1414429
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1414429
16
reference_url http://www.securityfocus.com/bid/95501
reference_id 95501
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:06:04Z/
url http://www.securityfocus.com/bid/95501
17
reference_url http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
reference_id cpujan2017-2881727.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:06:04Z/
url http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
18
reference_url http://www.debian.org/security/2017/dsa-3767
reference_id dsa-3767
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:06:04Z/
url http://www.debian.org/security/2017/dsa-3767
19
reference_url http://www.debian.org/security/2017/dsa-3770
reference_id dsa-3770
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:06:04Z/
url http://www.debian.org/security/2017/dsa-3770
20
reference_url https://security.gentoo.org/glsa/201702-17
reference_id GLSA-201702-17
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:06:04Z/
url https://security.gentoo.org/glsa/201702-17
21
reference_url https://security.gentoo.org/glsa/201702-18
reference_id GLSA-201702-18
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:06:04Z/
url https://security.gentoo.org/glsa/201702-18
22
reference_url https://access.redhat.com/errata/RHSA-2017:2192
reference_id RHSA-2017:2192
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:06:04Z/
url https://access.redhat.com/errata/RHSA-2017:2192
23
reference_url https://access.redhat.com/errata/RHSA-2017:2787
reference_id RHSA-2017:2787
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:06:04Z/
url https://access.redhat.com/errata/RHSA-2017:2787
24
reference_url https://access.redhat.com/errata/RHSA-2017:2886
reference_id RHSA-2017:2886
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:06:04Z/
url https://access.redhat.com/errata/RHSA-2017:2886
25
reference_url https://access.redhat.com/errata/RHSA-2018:0279
reference_id RHSA-2018:0279
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:06:04Z/
url https://access.redhat.com/errata/RHSA-2018:0279
26
reference_url https://access.redhat.com/errata/RHSA-2018:0574
reference_id RHSA-2018:0574
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:06:04Z/
url https://access.redhat.com/errata/RHSA-2018:0574
27
reference_url https://usn.ubuntu.com/3174-1/
reference_id USN-3174-1
reference_type
scores
url https://usn.ubuntu.com/3174-1/
fixed_packages
0
url pkg:deb/debian/mariadb-10.0@10.0.30-0%2Bdeb8u2
purl pkg:deb/debian/mariadb-10.0@10.0.30-0%2Bdeb8u2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1gmc-pj6y-rkfx
1
vulnerability VCID-4yz4-vxnh-b3dp
2
vulnerability VCID-5sjj-599v-vybg
3
vulnerability VCID-6g4n-3xfu-hfee
4
vulnerability VCID-6muh-rg1z-pqab
5
vulnerability VCID-bhxk-8byp-eyap
6
vulnerability VCID-ej67-ayfh-sqdt
7
vulnerability VCID-jgff-4jyp-9fgr
8
vulnerability VCID-mde2-1ynu-auh2
9
vulnerability VCID-v4gv-g9n5-ukgc
10
vulnerability VCID-yx79-3g2x-pqex
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.0@10.0.30-0%252Bdeb8u2
aliases CVE-2017-3291
risk_score 2.9
exploitability 0.5
weighted_severity 5.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-p623-gxyv-g7fs
25
url VCID-pk7e-t26d-aqdm
vulnerability_id VCID-pk7e-t26d-aqdm
summary security update
references
0
reference_url http://lists.opensuse.org/opensuse-updates/2016-09/msg00042.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:28Z/
url http://lists.opensuse.org/opensuse-updates/2016-09/msg00042.html
1
reference_url http://rhn.redhat.com/errata/RHSA-2016-1480.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:28Z/
url http://rhn.redhat.com/errata/RHSA-2016-1480.html
2
reference_url http://rhn.redhat.com/errata/RHSA-2016-1601.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:28Z/
url http://rhn.redhat.com/errata/RHSA-2016-1601.html
3
reference_url http://rhn.redhat.com/errata/RHSA-2016-1602.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:28Z/
url http://rhn.redhat.com/errata/RHSA-2016-1602.html
4
reference_url http://rhn.redhat.com/errata/RHSA-2016-1603.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:28Z/
url http://rhn.redhat.com/errata/RHSA-2016-1603.html
5
reference_url http://rhn.redhat.com/errata/RHSA-2016-1604.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:28Z/
url http://rhn.redhat.com/errata/RHSA-2016-1604.html
6
reference_url http://rhn.redhat.com/errata/RHSA-2016-1637.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:28Z/
url http://rhn.redhat.com/errata/RHSA-2016-1637.html
7
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3477.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3477.json
8
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-3477
reference_id
reference_type
scores
0
value 0.00115
scoring_system epss
scoring_elements 0.30191
published_at 2026-04-01T12:55:00Z
1
value 0.00115
scoring_system epss
scoring_elements 0.30088
published_at 2026-04-18T12:55:00Z
2
value 0.00115
scoring_system epss
scoring_elements 0.3027
published_at 2026-04-04T12:55:00Z
3
value 0.00115
scoring_system epss
scoring_elements 0.30221
published_at 2026-04-02T12:55:00Z
4
value 0.00115
scoring_system epss
scoring_elements 0.30108
published_at 2026-04-16T12:55:00Z
5
value 0.00115
scoring_system epss
scoring_elements 0.30093
published_at 2026-04-13T12:55:00Z
6
value 0.00115
scoring_system epss
scoring_elements 0.30143
published_at 2026-04-12T12:55:00Z
7
value 0.00115
scoring_system epss
scoring_elements 0.30186
published_at 2026-04-11T12:55:00Z
8
value 0.00115
scoring_system epss
scoring_elements 0.30184
published_at 2026-04-09T12:55:00Z
9
value 0.00115
scoring_system epss
scoring_elements 0.30148
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-3477
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3477
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3477
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3521
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3521
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3615
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3615
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5440
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5440
13
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:S/C:C/I:C/A:C
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
14
reference_url https://mariadb.com/kb/en/mariadb/mariadb-10026-release-notes/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:28Z/
url https://mariadb.com/kb/en/mariadb/mariadb-10026-release-notes/
15
reference_url https://mariadb.com/kb/en/mariadb/mariadb-10115-release-notes/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:28Z/
url https://mariadb.com/kb/en/mariadb/mariadb-10115-release-notes/
16
reference_url https://mariadb.com/kb/en/mariadb/mariadb-5550-release-notes/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:28Z/
url https://mariadb.com/kb/en/mariadb/mariadb-5550-release-notes/
17
reference_url http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:28Z/
url http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168
18
reference_url http://www.debian.org/security/2016/dsa-3624
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:28Z/
url http://www.debian.org/security/2016/dsa-3624
19
reference_url http://www.debian.org/security/2016/dsa-3632
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:28Z/
url http://www.debian.org/security/2016/dsa-3632
20
reference_url http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:28Z/
url http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
21
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:28Z/
url http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
22
reference_url http://www.securityfocus.com/bid/91787
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:28Z/
url http://www.securityfocus.com/bid/91787
23
reference_url http://www.securityfocus.com/bid/91902
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:28Z/
url http://www.securityfocus.com/bid/91902
24
reference_url http://www.securitytracker.com/id/1036362
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:28Z/
url http://www.securitytracker.com/id/1036362
25
reference_url http://www.ubuntu.com/usn/USN-3040-1
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:28Z/
url http://www.ubuntu.com/usn/USN-3040-1
26
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1358205
reference_id 1358205
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1358205
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:powerkvm:2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ibm:powerkvm:2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:powerkvm:2.1:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:powerkvm:3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ibm:powerkvm:3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:powerkvm:3.1:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-3477
reference_id CVE-2016-3477
reference_type
scores
0
value 4.1
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:S/C:P/I:P/A:P
1
value 8.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2016-3477
38
reference_url https://access.redhat.com/errata/RHSA-2016:1480
reference_id RHSA-2016:1480
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1480
39
reference_url https://access.redhat.com/errata/RHSA-2016:1601
reference_id RHSA-2016:1601
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1601
40
reference_url https://access.redhat.com/errata/RHSA-2016:1602
reference_id RHSA-2016:1602
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1602
41
reference_url https://access.redhat.com/errata/RHSA-2016:1603
reference_id RHSA-2016:1603
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1603
42
reference_url https://access.redhat.com/errata/RHSA-2016:1604
reference_id RHSA-2016:1604
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1604
43
reference_url https://access.redhat.com/errata/RHSA-2016:1637
reference_id RHSA-2016:1637
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1637
44
reference_url https://usn.ubuntu.com/3040-1/
reference_id USN-3040-1
reference_type
scores
url https://usn.ubuntu.com/3040-1/
fixed_packages
0
url pkg:deb/debian/mariadb-10.0@10.0.30-0%2Bdeb8u2
purl pkg:deb/debian/mariadb-10.0@10.0.30-0%2Bdeb8u2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1gmc-pj6y-rkfx
1
vulnerability VCID-4yz4-vxnh-b3dp
2
vulnerability VCID-5sjj-599v-vybg
3
vulnerability VCID-6g4n-3xfu-hfee
4
vulnerability VCID-6muh-rg1z-pqab
5
vulnerability VCID-bhxk-8byp-eyap
6
vulnerability VCID-ej67-ayfh-sqdt
7
vulnerability VCID-jgff-4jyp-9fgr
8
vulnerability VCID-mde2-1ynu-auh2
9
vulnerability VCID-v4gv-g9n5-ukgc
10
vulnerability VCID-yx79-3g2x-pqex
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.0@10.0.30-0%252Bdeb8u2
aliases CVE-2016-3477
risk_score 3.6
exploitability 0.5
weighted_severity 7.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pk7e-t26d-aqdm
26
url VCID-pv92-6p9x-v7bs
vulnerability_id VCID-pv92-6p9x-v7bs
summary
Multiple vulnerabilities have been found in MariaDB, the worst of
    which could lead to privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3317.json
reference_id
reference_type
scores
0
value 4.0
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:H/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3317.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-3317
reference_id
reference_type
scores
0
value 0.00022
scoring_system epss
scoring_elements 0.05978
published_at 2026-04-18T12:55:00Z
1
value 0.00022
scoring_system epss
scoring_elements 0.05968
published_at 2026-04-04T12:55:00Z
2
value 0.00022
scoring_system epss
scoring_elements 0.05951
published_at 2026-04-07T12:55:00Z
3
value 0.00022
scoring_system epss
scoring_elements 0.0599
published_at 2026-04-08T12:55:00Z
4
value 0.00022
scoring_system epss
scoring_elements 0.06028
published_at 2026-04-09T12:55:00Z
5
value 0.00022
scoring_system epss
scoring_elements 0.06019
published_at 2026-04-11T12:55:00Z
6
value 0.00022
scoring_system epss
scoring_elements 0.0601
published_at 2026-04-12T12:55:00Z
7
value 0.00022
scoring_system epss
scoring_elements 0.06002
published_at 2026-04-13T12:55:00Z
8
value 0.00022
scoring_system epss
scoring_elements 0.05967
published_at 2026-04-16T12:55:00Z
9
value 0.00022
scoring_system epss
scoring_elements 0.05935
published_at 2026-04-02T12:55:00Z
10
value 0.00022
scoring_system epss
scoring_elements 0.05903
published_at 2026-04-01T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-3317
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6664
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6664
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3238
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3238
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3243
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3243
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3244
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3244
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3257
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3257
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3258
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3258
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3265
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3265
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3291
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3291
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3312
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3312
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3313
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3313
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3317
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3317
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3318
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3318
14
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.8
scoring_system cvssv2
scoring_elements AV:L/AC:H/Au:S/C:N/I:N/A:C
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1414355
reference_id 1414355
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1414355
16
reference_url http://www.securityfocus.com/bid/95585
reference_id 95585
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-08T20:09:31Z/
url http://www.securityfocus.com/bid/95585
17
reference_url http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
reference_id cpujan2017-2881727.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-08T20:09:31Z/
url http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
18
reference_url http://www.debian.org/security/2017/dsa-3767
reference_id dsa-3767
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-08T20:09:31Z/
url http://www.debian.org/security/2017/dsa-3767
19
reference_url http://www.debian.org/security/2017/dsa-3770
reference_id dsa-3770
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-08T20:09:31Z/
url http://www.debian.org/security/2017/dsa-3770
20
reference_url https://security.gentoo.org/glsa/201702-17
reference_id GLSA-201702-17
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-08T20:09:31Z/
url https://security.gentoo.org/glsa/201702-17
21
reference_url https://security.gentoo.org/glsa/201702-18
reference_id GLSA-201702-18
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-08T20:09:31Z/
url https://security.gentoo.org/glsa/201702-18
22
reference_url https://access.redhat.com/errata/RHSA-2017:2192
reference_id RHSA-2017:2192
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-08T20:09:31Z/
url https://access.redhat.com/errata/RHSA-2017:2192
23
reference_url https://access.redhat.com/errata/RHSA-2017:2787
reference_id RHSA-2017:2787
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-08T20:09:31Z/
url https://access.redhat.com/errata/RHSA-2017:2787
24
reference_url https://access.redhat.com/errata/RHSA-2017:2886
reference_id RHSA-2017:2886
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-08T20:09:31Z/
url https://access.redhat.com/errata/RHSA-2017:2886
25
reference_url https://access.redhat.com/errata/RHSA-2018:0279
reference_id RHSA-2018:0279
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-08T20:09:31Z/
url https://access.redhat.com/errata/RHSA-2018:0279
26
reference_url https://access.redhat.com/errata/RHSA-2018:0574
reference_id RHSA-2018:0574
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-08T20:09:31Z/
url https://access.redhat.com/errata/RHSA-2018:0574
27
reference_url https://usn.ubuntu.com/3174-1/
reference_id USN-3174-1
reference_type
scores
url https://usn.ubuntu.com/3174-1/
fixed_packages
0
url pkg:deb/debian/mariadb-10.0@10.0.30-0%2Bdeb8u2
purl pkg:deb/debian/mariadb-10.0@10.0.30-0%2Bdeb8u2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1gmc-pj6y-rkfx
1
vulnerability VCID-4yz4-vxnh-b3dp
2
vulnerability VCID-5sjj-599v-vybg
3
vulnerability VCID-6g4n-3xfu-hfee
4
vulnerability VCID-6muh-rg1z-pqab
5
vulnerability VCID-bhxk-8byp-eyap
6
vulnerability VCID-ej67-ayfh-sqdt
7
vulnerability VCID-jgff-4jyp-9fgr
8
vulnerability VCID-mde2-1ynu-auh2
9
vulnerability VCID-v4gv-g9n5-ukgc
10
vulnerability VCID-yx79-3g2x-pqex
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.0@10.0.30-0%252Bdeb8u2
aliases CVE-2017-3317
risk_score 1.8
exploitability 0.5
weighted_severity 3.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pv92-6p9x-v7bs
27
url VCID-r2cz-9kjz-zbgu
vulnerability_id VCID-r2cz-9kjz-zbgu
summary mysql: prepared statement handle use-after-free after disconnect
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3302.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3302.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-3302
reference_id
reference_type
scores
0
value 0.025
scoring_system epss
scoring_elements 0.85359
published_at 2026-04-18T12:55:00Z
1
value 0.025
scoring_system epss
scoring_elements 0.85265
published_at 2026-04-01T12:55:00Z
2
value 0.025
scoring_system epss
scoring_elements 0.85277
published_at 2026-04-02T12:55:00Z
3
value 0.025
scoring_system epss
scoring_elements 0.85298
published_at 2026-04-07T12:55:00Z
4
value 0.025
scoring_system epss
scoring_elements 0.8532
published_at 2026-04-08T12:55:00Z
5
value 0.025
scoring_system epss
scoring_elements 0.85328
published_at 2026-04-09T12:55:00Z
6
value 0.025
scoring_system epss
scoring_elements 0.85342
published_at 2026-04-11T12:55:00Z
7
value 0.025
scoring_system epss
scoring_elements 0.85341
published_at 2026-04-12T12:55:00Z
8
value 0.025
scoring_system epss
scoring_elements 0.85337
published_at 2026-04-13T12:55:00Z
9
value 0.025
scoring_system epss
scoring_elements 0.85357
published_at 2026-04-16T12:55:00Z
10
value 0.025
scoring_system epss
scoring_elements 0.85296
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-3302
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3302
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3302
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3305
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3305
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3308
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3308
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3309
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3309
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3313
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3313
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3329
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3329
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3453
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3453
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3456
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3456
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3461
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3461
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3462
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3462
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3463
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3463
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3464
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3464
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3600
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3600
15
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
16
reference_url http://www.openwall.com/lists/oss-security/2017/02/11/11
reference_id 11
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-08T20:04:48Z/
url http://www.openwall.com/lists/oss-security/2017/02/11/11
17
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1422119
reference_id 1422119
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1422119
18
reference_url http://www.securityfocus.com/bid/96162
reference_id 96162
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-08T20:04:48Z/
url http://www.securityfocus.com/bid/96162
19
reference_url http://www.debian.org/security/2017/dsa-3809
reference_id dsa-3809
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-08T20:04:48Z/
url http://www.debian.org/security/2017/dsa-3809
20
reference_url https://access.redhat.com/errata/RHSA-2017:2192
reference_id RHSA-2017:2192
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-08T20:04:48Z/
url https://access.redhat.com/errata/RHSA-2017:2192
21
reference_url https://access.redhat.com/errata/RHSA-2017:2787
reference_id RHSA-2017:2787
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-08T20:04:48Z/
url https://access.redhat.com/errata/RHSA-2017:2787
22
reference_url https://access.redhat.com/errata/RHSA-2018:0279
reference_id RHSA-2018:0279
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-08T20:04:48Z/
url https://access.redhat.com/errata/RHSA-2018:0279
23
reference_url https://access.redhat.com/errata/RHSA-2018:0574
reference_id RHSA-2018:0574
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-08T20:04:48Z/
url https://access.redhat.com/errata/RHSA-2018:0574
24
reference_url https://usn.ubuntu.com/3269-1/
reference_id USN-3269-1
reference_type
scores
url https://usn.ubuntu.com/3269-1/
25
reference_url https://usn.ubuntu.com/3357-2/
reference_id USN-3357-2
reference_type
scores
url https://usn.ubuntu.com/3357-2/
fixed_packages
0
url pkg:deb/debian/mariadb-10.0@10.0.30-0%2Bdeb8u2
purl pkg:deb/debian/mariadb-10.0@10.0.30-0%2Bdeb8u2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1gmc-pj6y-rkfx
1
vulnerability VCID-4yz4-vxnh-b3dp
2
vulnerability VCID-5sjj-599v-vybg
3
vulnerability VCID-6g4n-3xfu-hfee
4
vulnerability VCID-6muh-rg1z-pqab
5
vulnerability VCID-bhxk-8byp-eyap
6
vulnerability VCID-ej67-ayfh-sqdt
7
vulnerability VCID-jgff-4jyp-9fgr
8
vulnerability VCID-mde2-1ynu-auh2
9
vulnerability VCID-v4gv-g9n5-ukgc
10
vulnerability VCID-yx79-3g2x-pqex
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.0@10.0.30-0%252Bdeb8u2
aliases CVE-2017-3302
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-r2cz-9kjz-zbgu
28
url VCID-rssq-mfc2-ckaf
vulnerability_id VCID-rssq-mfc2-ckaf
summary
Multiple vulnerabilities have been found in MariaDB, the worst of
    which could lead to privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3258.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3258.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-3258
reference_id
reference_type
scores
0
value 0.00312
scoring_system epss
scoring_elements 0.5445
published_at 2026-04-18T12:55:00Z
1
value 0.00312
scoring_system epss
scoring_elements 0.54327
published_at 2026-04-01T12:55:00Z
2
value 0.00312
scoring_system epss
scoring_elements 0.54347
published_at 2026-04-02T12:55:00Z
3
value 0.00312
scoring_system epss
scoring_elements 0.54377
published_at 2026-04-04T12:55:00Z
4
value 0.00312
scoring_system epss
scoring_elements 0.54351
published_at 2026-04-07T12:55:00Z
5
value 0.00312
scoring_system epss
scoring_elements 0.54403
published_at 2026-04-08T12:55:00Z
6
value 0.00312
scoring_system epss
scoring_elements 0.54398
published_at 2026-04-09T12:55:00Z
7
value 0.00312
scoring_system epss
scoring_elements 0.54446
published_at 2026-04-16T12:55:00Z
8
value 0.00312
scoring_system epss
scoring_elements 0.54429
published_at 2026-04-12T12:55:00Z
9
value 0.00312
scoring_system epss
scoring_elements 0.54407
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-3258
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6664
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6664
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3238
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3238
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3243
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3243
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3244
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3244
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3257
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3257
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3258
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3258
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3265
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3265
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3291
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3291
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3312
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3312
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3313
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3313
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3317
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3317
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3318
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3318
14
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:C
1
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1414351
reference_id 1414351
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1414351
16
reference_url http://www.securityfocus.com/bid/95560
reference_id 95560
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:10Z/
url http://www.securityfocus.com/bid/95560
17
reference_url http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
reference_id cpujan2017-2881727.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:10Z/
url http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
18
reference_url http://www.debian.org/security/2017/dsa-3767
reference_id dsa-3767
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:10Z/
url http://www.debian.org/security/2017/dsa-3767
19
reference_url http://www.debian.org/security/2017/dsa-3770
reference_id dsa-3770
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:10Z/
url http://www.debian.org/security/2017/dsa-3770
20
reference_url https://security.gentoo.org/glsa/201702-17
reference_id GLSA-201702-17
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:10Z/
url https://security.gentoo.org/glsa/201702-17
21
reference_url https://security.gentoo.org/glsa/201702-18
reference_id GLSA-201702-18
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:10Z/
url https://security.gentoo.org/glsa/201702-18
22
reference_url https://access.redhat.com/errata/RHSA-2017:2192
reference_id RHSA-2017:2192
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:10Z/
url https://access.redhat.com/errata/RHSA-2017:2192
23
reference_url https://access.redhat.com/errata/RHSA-2017:2787
reference_id RHSA-2017:2787
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:10Z/
url https://access.redhat.com/errata/RHSA-2017:2787
24
reference_url https://access.redhat.com/errata/RHSA-2017:2886
reference_id RHSA-2017:2886
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:10Z/
url https://access.redhat.com/errata/RHSA-2017:2886
25
reference_url https://access.redhat.com/errata/RHSA-2018:0279
reference_id RHSA-2018:0279
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:10Z/
url https://access.redhat.com/errata/RHSA-2018:0279
26
reference_url https://access.redhat.com/errata/RHSA-2018:0574
reference_id RHSA-2018:0574
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:10Z/
url https://access.redhat.com/errata/RHSA-2018:0574
27
reference_url https://usn.ubuntu.com/3174-1/
reference_id USN-3174-1
reference_type
scores
url https://usn.ubuntu.com/3174-1/
fixed_packages
0
url pkg:deb/debian/mariadb-10.0@10.0.30-0%2Bdeb8u2
purl pkg:deb/debian/mariadb-10.0@10.0.30-0%2Bdeb8u2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1gmc-pj6y-rkfx
1
vulnerability VCID-4yz4-vxnh-b3dp
2
vulnerability VCID-5sjj-599v-vybg
3
vulnerability VCID-6g4n-3xfu-hfee
4
vulnerability VCID-6muh-rg1z-pqab
5
vulnerability VCID-bhxk-8byp-eyap
6
vulnerability VCID-ej67-ayfh-sqdt
7
vulnerability VCID-jgff-4jyp-9fgr
8
vulnerability VCID-mde2-1ynu-auh2
9
vulnerability VCID-v4gv-g9n5-ukgc
10
vulnerability VCID-yx79-3g2x-pqex
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.0@10.0.30-0%252Bdeb8u2
aliases CVE-2017-3258
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rssq-mfc2-ckaf
29
url VCID-rted-6vzz-mbcv
vulnerability_id VCID-rted-6vzz-mbcv
summary
Multiple vulnerabilities have been found in MariaDB and MySQL, the
    worst of which could lead to the remote execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3492.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3492.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-3492
reference_id
reference_type
scores
0
value 0.00566
scoring_system epss
scoring_elements 0.68526
published_at 2026-04-18T12:55:00Z
1
value 0.00566
scoring_system epss
scoring_elements 0.68451
published_at 2026-04-04T12:55:00Z
2
value 0.00566
scoring_system epss
scoring_elements 0.68427
published_at 2026-04-07T12:55:00Z
3
value 0.00566
scoring_system epss
scoring_elements 0.68477
published_at 2026-04-08T12:55:00Z
4
value 0.00566
scoring_system epss
scoring_elements 0.68494
published_at 2026-04-09T12:55:00Z
5
value 0.00566
scoring_system epss
scoring_elements 0.6852
published_at 2026-04-11T12:55:00Z
6
value 0.00566
scoring_system epss
scoring_elements 0.68508
published_at 2026-04-12T12:55:00Z
7
value 0.00566
scoring_system epss
scoring_elements 0.68475
published_at 2026-04-13T12:55:00Z
8
value 0.00566
scoring_system epss
scoring_elements 0.68513
published_at 2026-04-16T12:55:00Z
9
value 0.00566
scoring_system epss
scoring_elements 0.68412
published_at 2026-04-01T12:55:00Z
10
value 0.00566
scoring_system epss
scoring_elements 0.68431
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-3492
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3492
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3492
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5584
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5584
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5624
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5624
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5626
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5626
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5629
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5629
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6663
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6663
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7440
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7440
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8283
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8283
10
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
11
reference_url http://www.securitytracker.com/id/1037050
reference_id 1037050
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:50:08Z/
url http://www.securitytracker.com/id/1037050
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1386554
reference_id 1386554
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1386554
13
reference_url http://www.securityfocus.com/bid/93650
reference_id 93650
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:50:08Z/
url http://www.securityfocus.com/bid/93650
14
reference_url https://security.gentoo.org/glsa/201701-01
reference_id GLSA-201701-01
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:50:08Z/
url https://security.gentoo.org/glsa/201701-01
15
reference_url https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/
reference_id mariadb-10028-release-notes
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:50:08Z/
url https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/
16
reference_url https://mariadb.com/kb/en/mariadb/mariadb-10118-release-notes/
reference_id mariadb-10118-release-notes
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:50:08Z/
url https://mariadb.com/kb/en/mariadb/mariadb-10118-release-notes/
17
reference_url https://mariadb.com/kb/en/mariadb/mariadb-5552-release-notes/
reference_id mariadb-5552-release-notes
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:50:08Z/
url https://mariadb.com/kb/en/mariadb/mariadb-5552-release-notes/
18
reference_url https://access.redhat.com/errata/RHSA-2016:2130
reference_id RHSA-2016:2130
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2130
19
reference_url http://rhn.redhat.com/errata/RHSA-2016-2130.html
reference_id RHSA-2016-2130.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:50:08Z/
url http://rhn.redhat.com/errata/RHSA-2016-2130.html
20
reference_url https://access.redhat.com/errata/RHSA-2016:2131
reference_id RHSA-2016:2131
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2131
21
reference_url http://rhn.redhat.com/errata/RHSA-2016-2131.html
reference_id RHSA-2016-2131.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:50:08Z/
url http://rhn.redhat.com/errata/RHSA-2016-2131.html
22
reference_url https://access.redhat.com/errata/RHSA-2016:2595
reference_id RHSA-2016:2595
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2595
23
reference_url http://rhn.redhat.com/errata/RHSA-2016-2595.html
reference_id RHSA-2016-2595.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:50:08Z/
url http://rhn.redhat.com/errata/RHSA-2016-2595.html
24
reference_url https://access.redhat.com/errata/RHSA-2016:2749
reference_id RHSA-2016:2749
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2749
25
reference_url http://rhn.redhat.com/errata/RHSA-2016-2749.html
reference_id RHSA-2016-2749.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:50:08Z/
url http://rhn.redhat.com/errata/RHSA-2016-2749.html
26
reference_url https://access.redhat.com/errata/RHSA-2016:2927
reference_id RHSA-2016:2927
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2927
27
reference_url https://access.redhat.com/errata/RHSA-2016:2928
reference_id RHSA-2016:2928
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2928
fixed_packages
0
url pkg:deb/debian/mariadb-10.0@10.0.30-0%2Bdeb8u2
purl pkg:deb/debian/mariadb-10.0@10.0.30-0%2Bdeb8u2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1gmc-pj6y-rkfx
1
vulnerability VCID-4yz4-vxnh-b3dp
2
vulnerability VCID-5sjj-599v-vybg
3
vulnerability VCID-6g4n-3xfu-hfee
4
vulnerability VCID-6muh-rg1z-pqab
5
vulnerability VCID-bhxk-8byp-eyap
6
vulnerability VCID-ej67-ayfh-sqdt
7
vulnerability VCID-jgff-4jyp-9fgr
8
vulnerability VCID-mde2-1ynu-auh2
9
vulnerability VCID-v4gv-g9n5-ukgc
10
vulnerability VCID-yx79-3g2x-pqex
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.0@10.0.30-0%252Bdeb8u2
aliases CVE-2016-3492
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rted-6vzz-mbcv
30
url VCID-tvdv-3ed5-h3dt
vulnerability_id VCID-tvdv-3ed5-h3dt
summary
Multiple vulnerabilities have been found in MariaDB and MySQL, the
    worst of which could lead to the remote execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5626.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5626.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-5626
reference_id
reference_type
scores
0
value 0.00369
scoring_system epss
scoring_elements 0.58837
published_at 2026-04-16T12:55:00Z
1
value 0.00369
scoring_system epss
scoring_elements 0.58702
published_at 2026-04-01T12:55:00Z
2
value 0.00369
scoring_system epss
scoring_elements 0.58776
published_at 2026-04-02T12:55:00Z
3
value 0.00369
scoring_system epss
scoring_elements 0.58797
published_at 2026-04-04T12:55:00Z
4
value 0.00369
scoring_system epss
scoring_elements 0.58766
published_at 2026-04-07T12:55:00Z
5
value 0.00369
scoring_system epss
scoring_elements 0.58818
published_at 2026-04-08T12:55:00Z
6
value 0.00369
scoring_system epss
scoring_elements 0.58824
published_at 2026-04-12T12:55:00Z
7
value 0.00369
scoring_system epss
scoring_elements 0.58842
published_at 2026-04-18T12:55:00Z
8
value 0.00369
scoring_system epss
scoring_elements 0.58805
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-5626
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3492
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3492
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5584
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5584
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5624
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5624
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5626
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5626
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5629
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5629
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6663
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6663
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7440
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7440
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8283
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8283
10
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
11
reference_url http://www.securitytracker.com/id/1037050
reference_id 1037050
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:36Z/
url http://www.securitytracker.com/id/1037050
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1386568
reference_id 1386568
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1386568
13
reference_url http://www.securityfocus.com/bid/93638
reference_id 93638
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:36Z/
url http://www.securityfocus.com/bid/93638
14
reference_url https://security.gentoo.org/glsa/201701-01
reference_id GLSA-201701-01
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:36Z/
url https://security.gentoo.org/glsa/201701-01
15
reference_url https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/
reference_id mariadb-10028-release-notes
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:36Z/
url https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/
16
reference_url https://mariadb.com/kb/en/mariadb/mariadb-10118-release-notes/
reference_id mariadb-10118-release-notes
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:36Z/
url https://mariadb.com/kb/en/mariadb/mariadb-10118-release-notes/
17
reference_url https://mariadb.com/kb/en/mariadb/mariadb-5552-release-notes/
reference_id mariadb-5552-release-notes
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:36Z/
url https://mariadb.com/kb/en/mariadb/mariadb-5552-release-notes/
18
reference_url https://access.redhat.com/errata/RHSA-2016:2130
reference_id RHSA-2016:2130
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2130
19
reference_url http://rhn.redhat.com/errata/RHSA-2016-2130.html
reference_id RHSA-2016-2130.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:36Z/
url http://rhn.redhat.com/errata/RHSA-2016-2130.html
20
reference_url https://access.redhat.com/errata/RHSA-2016:2131
reference_id RHSA-2016:2131
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2131
21
reference_url http://rhn.redhat.com/errata/RHSA-2016-2131.html
reference_id RHSA-2016-2131.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:36Z/
url http://rhn.redhat.com/errata/RHSA-2016-2131.html
22
reference_url https://access.redhat.com/errata/RHSA-2016:2595
reference_id RHSA-2016:2595
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2595
23
reference_url http://rhn.redhat.com/errata/RHSA-2016-2595.html
reference_id RHSA-2016-2595.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:36Z/
url http://rhn.redhat.com/errata/RHSA-2016-2595.html
24
reference_url https://access.redhat.com/errata/RHSA-2016:2749
reference_id RHSA-2016:2749
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2749
25
reference_url http://rhn.redhat.com/errata/RHSA-2016-2749.html
reference_id RHSA-2016-2749.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:36Z/
url http://rhn.redhat.com/errata/RHSA-2016-2749.html
26
reference_url https://access.redhat.com/errata/RHSA-2016:2927
reference_id RHSA-2016:2927
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2927
27
reference_url https://access.redhat.com/errata/RHSA-2016:2928
reference_id RHSA-2016:2928
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2928
fixed_packages
0
url pkg:deb/debian/mariadb-10.0@10.0.30-0%2Bdeb8u2
purl pkg:deb/debian/mariadb-10.0@10.0.30-0%2Bdeb8u2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1gmc-pj6y-rkfx
1
vulnerability VCID-4yz4-vxnh-b3dp
2
vulnerability VCID-5sjj-599v-vybg
3
vulnerability VCID-6g4n-3xfu-hfee
4
vulnerability VCID-6muh-rg1z-pqab
5
vulnerability VCID-bhxk-8byp-eyap
6
vulnerability VCID-ej67-ayfh-sqdt
7
vulnerability VCID-jgff-4jyp-9fgr
8
vulnerability VCID-mde2-1ynu-auh2
9
vulnerability VCID-v4gv-g9n5-ukgc
10
vulnerability VCID-yx79-3g2x-pqex
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.0@10.0.30-0%252Bdeb8u2
aliases CVE-2016-5626
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tvdv-3ed5-h3dt
31
url VCID-un5y-y9sq-1ufb
vulnerability_id VCID-un5y-y9sq-1ufb
summary
Multiple vulnerabilities have been found in MariaDB, the worst of
    which could lead to privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3244.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3244.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-3244
reference_id
reference_type
scores
0
value 0.00314
scoring_system epss
scoring_elements 0.54598
published_at 2026-04-18T12:55:00Z
1
value 0.00314
scoring_system epss
scoring_elements 0.54572
published_at 2026-04-04T12:55:00Z
2
value 0.00314
scoring_system epss
scoring_elements 0.54541
published_at 2026-04-07T12:55:00Z
3
value 0.00314
scoring_system epss
scoring_elements 0.54592
published_at 2026-04-08T12:55:00Z
4
value 0.00314
scoring_system epss
scoring_elements 0.54587
published_at 2026-04-09T12:55:00Z
5
value 0.00314
scoring_system epss
scoring_elements 0.54599
published_at 2026-04-11T12:55:00Z
6
value 0.00314
scoring_system epss
scoring_elements 0.54581
published_at 2026-04-12T12:55:00Z
7
value 0.00314
scoring_system epss
scoring_elements 0.54559
published_at 2026-04-13T12:55:00Z
8
value 0.00314
scoring_system epss
scoring_elements 0.54596
published_at 2026-04-16T12:55:00Z
9
value 0.00314
scoring_system epss
scoring_elements 0.54548
published_at 2026-04-02T12:55:00Z
10
value 0.00314
scoring_system epss
scoring_elements 0.54473
published_at 2026-04-01T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-3244
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6664
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6664
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3238
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3238
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3243
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3243
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3244
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3244
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3257
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3257
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3258
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3258
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3265
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3265
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3291
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3291
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3312
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3312
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3313
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3313
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3317
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3317
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3318
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3318
14
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:C
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1414342
reference_id 1414342
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1414342
16
reference_url http://www.securityfocus.com/bid/95565
reference_id 95565
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:25Z/
url http://www.securityfocus.com/bid/95565
17
reference_url http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
reference_id cpujan2017-2881727.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:25Z/
url http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
18
reference_url http://www.debian.org/security/2017/dsa-3767
reference_id dsa-3767
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:25Z/
url http://www.debian.org/security/2017/dsa-3767
19
reference_url http://www.debian.org/security/2017/dsa-3770
reference_id dsa-3770
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:25Z/
url http://www.debian.org/security/2017/dsa-3770
20
reference_url https://security.gentoo.org/glsa/201702-17
reference_id GLSA-201702-17
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:25Z/
url https://security.gentoo.org/glsa/201702-17
21
reference_url https://security.gentoo.org/glsa/201702-18
reference_id GLSA-201702-18
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:25Z/
url https://security.gentoo.org/glsa/201702-18
22
reference_url https://access.redhat.com/errata/RHSA-2017:2192
reference_id RHSA-2017:2192
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:25Z/
url https://access.redhat.com/errata/RHSA-2017:2192
23
reference_url https://access.redhat.com/errata/RHSA-2017:2787
reference_id RHSA-2017:2787
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:25Z/
url https://access.redhat.com/errata/RHSA-2017:2787
24
reference_url https://access.redhat.com/errata/RHSA-2017:2886
reference_id RHSA-2017:2886
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:25Z/
url https://access.redhat.com/errata/RHSA-2017:2886
25
reference_url https://access.redhat.com/errata/RHSA-2018:0279
reference_id RHSA-2018:0279
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:25Z/
url https://access.redhat.com/errata/RHSA-2018:0279
26
reference_url https://access.redhat.com/errata/RHSA-2018:0574
reference_id RHSA-2018:0574
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:25Z/
url https://access.redhat.com/errata/RHSA-2018:0574
27
reference_url https://usn.ubuntu.com/3174-1/
reference_id USN-3174-1
reference_type
scores
url https://usn.ubuntu.com/3174-1/
fixed_packages
0
url pkg:deb/debian/mariadb-10.0@10.0.30-0%2Bdeb8u2
purl pkg:deb/debian/mariadb-10.0@10.0.30-0%2Bdeb8u2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1gmc-pj6y-rkfx
1
vulnerability VCID-4yz4-vxnh-b3dp
2
vulnerability VCID-5sjj-599v-vybg
3
vulnerability VCID-6g4n-3xfu-hfee
4
vulnerability VCID-6muh-rg1z-pqab
5
vulnerability VCID-bhxk-8byp-eyap
6
vulnerability VCID-ej67-ayfh-sqdt
7
vulnerability VCID-jgff-4jyp-9fgr
8
vulnerability VCID-mde2-1ynu-auh2
9
vulnerability VCID-v4gv-g9n5-ukgc
10
vulnerability VCID-yx79-3g2x-pqex
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.0@10.0.30-0%252Bdeb8u2
aliases CVE-2017-3244
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-un5y-y9sq-1ufb
32
url VCID-v4gv-g9n5-ukgc
vulnerability_id VCID-v4gv-g9n5-ukgc
summary
Multiple vulnerabilities were found in MySQL, the worst of which
    may allow remote execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3453.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3453.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-3453
reference_id
reference_type
scores
0
value 0.00419
scoring_system epss
scoring_elements 0.61928
published_at 2026-04-18T12:55:00Z
1
value 0.00419
scoring_system epss
scoring_elements 0.61855
published_at 2026-04-04T12:55:00Z
2
value 0.00419
scoring_system epss
scoring_elements 0.61875
published_at 2026-04-08T12:55:00Z
3
value 0.00419
scoring_system epss
scoring_elements 0.6189
published_at 2026-04-09T12:55:00Z
4
value 0.00419
scoring_system epss
scoring_elements 0.61912
published_at 2026-04-11T12:55:00Z
5
value 0.00419
scoring_system epss
scoring_elements 0.619
published_at 2026-04-12T12:55:00Z
6
value 0.00419
scoring_system epss
scoring_elements 0.6188
published_at 2026-04-13T12:55:00Z
7
value 0.00419
scoring_system epss
scoring_elements 0.61923
published_at 2026-04-16T12:55:00Z
8
value 0.00419
scoring_system epss
scoring_elements 0.61825
published_at 2026-04-07T12:55:00Z
9
value 0.00419
scoring_system epss
scoring_elements 0.61751
published_at 2026-04-01T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-3453
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10286
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10286
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10379
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10379
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10384
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10384
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3302
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3302
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3305
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3305
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3308
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3308
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3309
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3309
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3329
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3329
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3453
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3453
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3456
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3456
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3461
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3461
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3462
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3462
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3463
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3463
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3464
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3464
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3600
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3600
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3636
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3636
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3641
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3641
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3653
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3653
20
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 2.1
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:S/C:N/I:N/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
21
reference_url http://www.debian.org/security/2017/dsa-3834
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:46:07Z/
url http://www.debian.org/security/2017/dsa-3834
22
reference_url http://www.debian.org/security/2017/dsa-3944
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:46:07Z/
url http://www.debian.org/security/2017/dsa-3944
23
reference_url http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:46:07Z/
url http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
24
reference_url http://www.securityfocus.com/bid/97776
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:46:07Z/
url http://www.securityfocus.com/bid/97776
25
reference_url http://www.securitytracker.com/id/1038287
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:46:07Z/
url http://www.securitytracker.com/id/1038287
26
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1443365
reference_id 1443365
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1443365
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-3453
reference_id CVE-2017-3453
reference_type
scores
0
value 4.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:P
1
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-3453
42
reference_url https://security.gentoo.org/glsa/201802-04
reference_id GLSA-201802-04
reference_type
scores
url https://security.gentoo.org/glsa/201802-04
43
reference_url https://access.redhat.com/errata/RHSA-2017:2192
reference_id RHSA-2017:2192
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:46:07Z/
url https://access.redhat.com/errata/RHSA-2017:2192
44
reference_url https://access.redhat.com/errata/RHSA-2017:2787
reference_id RHSA-2017:2787
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:46:07Z/
url https://access.redhat.com/errata/RHSA-2017:2787
45
reference_url https://access.redhat.com/errata/RHSA-2017:2886
reference_id RHSA-2017:2886
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:46:07Z/
url https://access.redhat.com/errata/RHSA-2017:2886
46
reference_url https://access.redhat.com/errata/RHSA-2018:0279
reference_id RHSA-2018:0279
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:46:07Z/
url https://access.redhat.com/errata/RHSA-2018:0279
47
reference_url https://access.redhat.com/errata/RHSA-2018:0574
reference_id RHSA-2018:0574
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:46:07Z/
url https://access.redhat.com/errata/RHSA-2018:0574
48
reference_url https://usn.ubuntu.com/3269-1/
reference_id USN-3269-1
reference_type
scores
url https://usn.ubuntu.com/3269-1/
49
reference_url https://usn.ubuntu.com/3357-2/
reference_id USN-3357-2
reference_type
scores
url https://usn.ubuntu.com/3357-2/
fixed_packages
0
url pkg:deb/debian/mariadb-10.0@10.0.32-0%2Bdeb8u1
purl pkg:deb/debian/mariadb-10.0@10.0.32-0%2Bdeb8u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.0@10.0.32-0%252Bdeb8u1
aliases CVE-2017-3453
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-v4gv-g9n5-ukgc
33
url VCID-vh5y-15tw-d7fd
vulnerability_id VCID-vh5y-15tw-d7fd
summary
Multiple vulnerabilities have been found in MariaDB and MySQL, the
    worst of which could lead to the remote execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8283.json
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8283.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-8283
reference_id
reference_type
scores
0
value 0.00361
scoring_system epss
scoring_elements 0.58292
published_at 2026-04-18T12:55:00Z
1
value 0.00361
scoring_system epss
scoring_elements 0.58229
published_at 2026-04-02T12:55:00Z
2
value 0.00361
scoring_system epss
scoring_elements 0.58249
published_at 2026-04-04T12:55:00Z
3
value 0.00361
scoring_system epss
scoring_elements 0.58223
published_at 2026-04-07T12:55:00Z
4
value 0.00361
scoring_system epss
scoring_elements 0.58277
published_at 2026-04-08T12:55:00Z
5
value 0.00361
scoring_system epss
scoring_elements 0.58283
published_at 2026-04-09T12:55:00Z
6
value 0.00361
scoring_system epss
scoring_elements 0.583
published_at 2026-04-11T12:55:00Z
7
value 0.00361
scoring_system epss
scoring_elements 0.58278
published_at 2026-04-12T12:55:00Z
8
value 0.00361
scoring_system epss
scoring_elements 0.58258
published_at 2026-04-13T12:55:00Z
9
value 0.00361
scoring_system epss
scoring_elements 0.5829
published_at 2026-04-16T12:55:00Z
10
value 0.00361
scoring_system epss
scoring_elements 0.58144
published_at 2026-04-01T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-8283
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3492
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3492
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5584
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5584
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5624
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5624
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5626
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5626
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5629
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5629
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6663
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6663
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7440
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7440
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8283
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8283
10
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:P
1
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
11
reference_url http://www.securitytracker.com/id/1037050
reference_id 1037050
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:22Z/
url http://www.securitytracker.com/id/1037050
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1386585
reference_id 1386585
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1386585
13
reference_url http://www.securityfocus.com/bid/93737
reference_id 93737
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:22Z/
url http://www.securityfocus.com/bid/93737
14
reference_url https://security.gentoo.org/glsa/201701-01
reference_id GLSA-201701-01
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:22Z/
url https://security.gentoo.org/glsa/201701-01
15
reference_url https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/
reference_id mariadb-10028-release-notes
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:22Z/
url https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/
16
reference_url https://mariadb.com/kb/en/mariadb/mariadb-10118-release-notes/
reference_id mariadb-10118-release-notes
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:22Z/
url https://mariadb.com/kb/en/mariadb/mariadb-10118-release-notes/
17
reference_url https://mariadb.com/kb/en/mariadb/mariadb-5552-release-notes/
reference_id mariadb-5552-release-notes
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:22Z/
url https://mariadb.com/kb/en/mariadb/mariadb-5552-release-notes/
18
reference_url https://access.redhat.com/errata/RHSA-2016:2130
reference_id RHSA-2016:2130
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2130
19
reference_url http://rhn.redhat.com/errata/RHSA-2016-2130.html
reference_id RHSA-2016-2130.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:22Z/
url http://rhn.redhat.com/errata/RHSA-2016-2130.html
20
reference_url https://access.redhat.com/errata/RHSA-2016:2131
reference_id RHSA-2016:2131
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2131
21
reference_url http://rhn.redhat.com/errata/RHSA-2016-2131.html
reference_id RHSA-2016-2131.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:22Z/
url http://rhn.redhat.com/errata/RHSA-2016-2131.html
22
reference_url https://access.redhat.com/errata/RHSA-2016:2595
reference_id RHSA-2016:2595
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2595
23
reference_url http://rhn.redhat.com/errata/RHSA-2016-2595.html
reference_id RHSA-2016-2595.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:22Z/
url http://rhn.redhat.com/errata/RHSA-2016-2595.html
24
reference_url https://access.redhat.com/errata/RHSA-2016:2749
reference_id RHSA-2016:2749
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2749
25
reference_url http://rhn.redhat.com/errata/RHSA-2016-2749.html
reference_id RHSA-2016-2749.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:22Z/
url http://rhn.redhat.com/errata/RHSA-2016-2749.html
26
reference_url https://access.redhat.com/errata/RHSA-2016:2927
reference_id RHSA-2016:2927
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2927
27
reference_url https://access.redhat.com/errata/RHSA-2016:2928
reference_id RHSA-2016:2928
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2928
fixed_packages
0
url pkg:deb/debian/mariadb-10.0@10.0.30-0%2Bdeb8u2
purl pkg:deb/debian/mariadb-10.0@10.0.30-0%2Bdeb8u2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1gmc-pj6y-rkfx
1
vulnerability VCID-4yz4-vxnh-b3dp
2
vulnerability VCID-5sjj-599v-vybg
3
vulnerability VCID-6g4n-3xfu-hfee
4
vulnerability VCID-6muh-rg1z-pqab
5
vulnerability VCID-bhxk-8byp-eyap
6
vulnerability VCID-ej67-ayfh-sqdt
7
vulnerability VCID-jgff-4jyp-9fgr
8
vulnerability VCID-mde2-1ynu-auh2
9
vulnerability VCID-v4gv-g9n5-ukgc
10
vulnerability VCID-yx79-3g2x-pqex
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.0@10.0.30-0%252Bdeb8u2
aliases CVE-2016-8283
risk_score 1.9
exploitability 0.5
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vh5y-15tw-d7fd
34
url VCID-wrna-cc9g-sqbe
vulnerability_id VCID-wrna-cc9g-sqbe
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could lead to privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3313.json
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3313.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-3313
reference_id
reference_type
scores
0
value 0.00053
scoring_system epss
scoring_elements 0.16564
published_at 2026-04-18T12:55:00Z
1
value 0.00053
scoring_system epss
scoring_elements 0.16579
published_at 2026-04-01T12:55:00Z
2
value 0.00053
scoring_system epss
scoring_elements 0.16758
published_at 2026-04-02T12:55:00Z
3
value 0.00053
scoring_system epss
scoring_elements 0.16603
published_at 2026-04-07T12:55:00Z
4
value 0.00053
scoring_system epss
scoring_elements 0.16688
published_at 2026-04-08T12:55:00Z
5
value 0.00053
scoring_system epss
scoring_elements 0.16742
published_at 2026-04-09T12:55:00Z
6
value 0.00053
scoring_system epss
scoring_elements 0.16722
published_at 2026-04-11T12:55:00Z
7
value 0.00053
scoring_system epss
scoring_elements 0.16679
published_at 2026-04-12T12:55:00Z
8
value 0.00053
scoring_system epss
scoring_elements 0.1662
published_at 2026-04-13T12:55:00Z
9
value 0.00053
scoring_system epss
scoring_elements 0.16556
published_at 2026-04-16T12:55:00Z
10
value 0.00053
scoring_system epss
scoring_elements 0.16818
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-3313
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3238
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3238
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3243
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3243
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3244
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3244
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3258
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3258
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3265
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3265
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3291
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3291
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3302
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3302
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3312
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3312
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3313
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3313
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3317
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3317
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3318
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3318
13
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.8
scoring_system cvssv2
scoring_elements AV:L/AC:H/Au:S/C:C/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
14
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1414353
reference_id 1414353
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1414353
15
reference_url http://www.securityfocus.com/bid/95527
reference_id 95527
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-08T20:09:35Z/
url http://www.securityfocus.com/bid/95527
16
reference_url http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
reference_id cpujan2017-2881727.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-08T20:09:35Z/
url http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
17
reference_url http://www.debian.org/security/2017/dsa-3767
reference_id dsa-3767
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-08T20:09:35Z/
url http://www.debian.org/security/2017/dsa-3767
18
reference_url http://www.debian.org/security/2017/dsa-3809
reference_id dsa-3809
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-08T20:09:35Z/
url http://www.debian.org/security/2017/dsa-3809
19
reference_url https://security.gentoo.org/glsa/201702-17
reference_id GLSA-201702-17
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-08T20:09:35Z/
url https://security.gentoo.org/glsa/201702-17
20
reference_url https://access.redhat.com/errata/RHSA-2017:2192
reference_id RHSA-2017:2192
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-08T20:09:35Z/
url https://access.redhat.com/errata/RHSA-2017:2192
21
reference_url https://access.redhat.com/errata/RHSA-2017:2787
reference_id RHSA-2017:2787
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-08T20:09:35Z/
url https://access.redhat.com/errata/RHSA-2017:2787
22
reference_url https://access.redhat.com/errata/RHSA-2017:2886
reference_id RHSA-2017:2886
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-08T20:09:35Z/
url https://access.redhat.com/errata/RHSA-2017:2886
23
reference_url https://access.redhat.com/errata/RHSA-2018:0279
reference_id RHSA-2018:0279
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-08T20:09:35Z/
url https://access.redhat.com/errata/RHSA-2018:0279
24
reference_url https://access.redhat.com/errata/RHSA-2018:0574
reference_id RHSA-2018:0574
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-08T20:09:35Z/
url https://access.redhat.com/errata/RHSA-2018:0574
25
reference_url https://usn.ubuntu.com/3174-1/
reference_id USN-3174-1
reference_type
scores
url https://usn.ubuntu.com/3174-1/
fixed_packages
0
url pkg:deb/debian/mariadb-10.0@10.0.30-0%2Bdeb8u2
purl pkg:deb/debian/mariadb-10.0@10.0.30-0%2Bdeb8u2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1gmc-pj6y-rkfx
1
vulnerability VCID-4yz4-vxnh-b3dp
2
vulnerability VCID-5sjj-599v-vybg
3
vulnerability VCID-6g4n-3xfu-hfee
4
vulnerability VCID-6muh-rg1z-pqab
5
vulnerability VCID-bhxk-8byp-eyap
6
vulnerability VCID-ej67-ayfh-sqdt
7
vulnerability VCID-jgff-4jyp-9fgr
8
vulnerability VCID-mde2-1ynu-auh2
9
vulnerability VCID-v4gv-g9n5-ukgc
10
vulnerability VCID-yx79-3g2x-pqex
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.0@10.0.30-0%252Bdeb8u2
aliases CVE-2017-3313
risk_score 2.1
exploitability 0.5
weighted_severity 4.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wrna-cc9g-sqbe
35
url VCID-yx79-3g2x-pqex
vulnerability_id VCID-yx79-3g2x-pqex
summary
Multiple vulnerabilities were found in MySQL, the worst of which
    may allow remote execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10384.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10384.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-10384
reference_id
reference_type
scores
0
value 0.0062
scoring_system epss
scoring_elements 0.70088
published_at 2026-04-18T12:55:00Z
1
value 0.0062
scoring_system epss
scoring_elements 0.7005
published_at 2026-04-12T12:55:00Z
2
value 0.0062
scoring_system epss
scoring_elements 0.70036
published_at 2026-04-13T12:55:00Z
3
value 0.0062
scoring_system epss
scoring_elements 0.70079
published_at 2026-04-16T12:55:00Z
4
value 0.00666
scoring_system epss
scoring_elements 0.71187
published_at 2026-04-01T12:55:00Z
5
value 0.00869
scoring_system epss
scoring_elements 0.75139
published_at 2026-04-02T12:55:00Z
6
value 0.00869
scoring_system epss
scoring_elements 0.75169
published_at 2026-04-04T12:55:00Z
7
value 0.00869
scoring_system epss
scoring_elements 0.75146
published_at 2026-04-07T12:55:00Z
8
value 0.00869
scoring_system epss
scoring_elements 0.7518
published_at 2026-04-08T12:55:00Z
9
value 0.00869
scoring_system epss
scoring_elements 0.75192
published_at 2026-04-09T12:55:00Z
10
value 0.00869
scoring_system epss
scoring_elements 0.75214
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-10384
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10268
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10268
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10286
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10286
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10378
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10378
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10379
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10379
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10384
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10384
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3308
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3308
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3309
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3309
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3453
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3453
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3456
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3456
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3464
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3464
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3636
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3636
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3641
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3641
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3653
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3653
15
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:C
1
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
16
reference_url https://security.netapp.com/advisory/ntap-20171019-0002/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:42:34Z/
url https://security.netapp.com/advisory/ntap-20171019-0002/
17
reference_url http://www.debian.org/security/2017/dsa-4002
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:42:34Z/
url http://www.debian.org/security/2017/dsa-4002
18
reference_url http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:42:34Z/
url http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
19
reference_url http://www.securityfocus.com/bid/101406
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:42:34Z/
url http://www.securityfocus.com/bid/101406
20
reference_url http://www.securitytracker.com/id/1039597
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:42:34Z/
url http://www.securitytracker.com/id/1039597
21
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1503686
reference_id 1503686
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1503686
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
reference_id cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
reference_id cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_balance:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_balance:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_balance:-:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_performance_manager:-:*:*:*:*:vmware_vsphere:*:*
reference_id cpe:2.3:a:netapp:oncommand_performance_manager:-:*:*:*:*:vmware_vsphere:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_performance_manager:-:*:*:*:*:vmware_vsphere:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vsphere:*:*
reference_id cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vsphere:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vsphere:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:windows:*:*
reference_id cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:windows:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:windows:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openstack:12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:openstack:12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openstack:12:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-10384
reference_id CVE-2017-10384
reference_type
scores
0
value 4.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:P
1
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-10384
46
reference_url https://security.gentoo.org/glsa/201802-04
reference_id GLSA-201802-04
reference_type
scores
url https://security.gentoo.org/glsa/201802-04
47
reference_url https://access.redhat.com/errata/RHSA-2017:3265
reference_id RHSA-2017:3265
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:42:34Z/
url https://access.redhat.com/errata/RHSA-2017:3265
48
reference_url https://access.redhat.com/errata/RHSA-2017:3442
reference_id RHSA-2017:3442
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:42:34Z/
url https://access.redhat.com/errata/RHSA-2017:3442
49
reference_url https://access.redhat.com/errata/RHSA-2018:0279
reference_id RHSA-2018:0279
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:42:34Z/
url https://access.redhat.com/errata/RHSA-2018:0279
50
reference_url https://access.redhat.com/errata/RHSA-2018:0574
reference_id RHSA-2018:0574
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:42:34Z/
url https://access.redhat.com/errata/RHSA-2018:0574
51
reference_url https://access.redhat.com/errata/RHSA-2018:2439
reference_id RHSA-2018:2439
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:42:34Z/
url https://access.redhat.com/errata/RHSA-2018:2439
52
reference_url https://access.redhat.com/errata/RHSA-2018:2729
reference_id RHSA-2018:2729
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:42:34Z/
url https://access.redhat.com/errata/RHSA-2018:2729
53
reference_url https://usn.ubuntu.com/3459-1/
reference_id USN-3459-1
reference_type
scores
url https://usn.ubuntu.com/3459-1/
54
reference_url https://usn.ubuntu.com/3459-2/
reference_id USN-3459-2
reference_type
scores
url https://usn.ubuntu.com/3459-2/
fixed_packages
0
url pkg:deb/debian/mariadb-10.0@10.0.32-0%2Bdeb8u1
purl pkg:deb/debian/mariadb-10.0@10.0.32-0%2Bdeb8u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.0@10.0.32-0%252Bdeb8u1
aliases CVE-2017-10384
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-yx79-3g2x-pqex
Fixing_vulnerabilities
0
url VCID-1k52-9nbh-1qdj
vulnerability_id VCID-1k52-9nbh-1qdj
summary
Multiple vulnerabilities have been found in MySQL and MariaDB, the
    worst of which could allow remote attackers to cause a Denial of Service
    condition or obtain sensitive information.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2648.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2648.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-2648
reference_id
reference_type
scores
0
value 0.00598
scoring_system epss
scoring_elements 0.69334
published_at 2026-04-01T12:55:00Z
1
value 0.00598
scoring_system epss
scoring_elements 0.69347
published_at 2026-04-02T12:55:00Z
2
value 0.00598
scoring_system epss
scoring_elements 0.69363
published_at 2026-04-04T12:55:00Z
3
value 0.00598
scoring_system epss
scoring_elements 0.69343
published_at 2026-04-07T12:55:00Z
4
value 0.00598
scoring_system epss
scoring_elements 0.69393
published_at 2026-04-08T12:55:00Z
5
value 0.00598
scoring_system epss
scoring_elements 0.69409
published_at 2026-04-09T12:55:00Z
6
value 0.00598
scoring_system epss
scoring_elements 0.69432
published_at 2026-04-11T12:55:00Z
7
value 0.00598
scoring_system epss
scoring_elements 0.69417
published_at 2026-04-12T12:55:00Z
8
value 0.00598
scoring_system epss
scoring_elements 0.69402
published_at 2026-04-13T12:55:00Z
9
value 0.00598
scoring_system epss
scoring_elements 0.69442
published_at 2026-04-16T12:55:00Z
10
value 0.00598
scoring_system epss
scoring_elements 0.69452
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-2648
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0433
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0433
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0441
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0441
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0499
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0499
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0501
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0501
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0505
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0505
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2568
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2568
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2571
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2571
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2573
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2573
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2582
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2582
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2620
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2620
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2643
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2643
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2648
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2648
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3152
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3152
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4737
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4737
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4752
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4752
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4757
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4757
18
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1244775
reference_id 1244775
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1244775
19
reference_url https://security.gentoo.org/glsa/201610-06
reference_id GLSA-201610-06
reference_type
scores
url https://security.gentoo.org/glsa/201610-06
20
reference_url https://access.redhat.com/errata/RHSA-2015:1628
reference_id RHSA-2015:1628
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1628
21
reference_url https://access.redhat.com/errata/RHSA-2015:1629
reference_id RHSA-2015:1629
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1629
22
reference_url https://access.redhat.com/errata/RHSA-2015:1630
reference_id RHSA-2015:1630
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1630
23
reference_url https://access.redhat.com/errata/RHSA-2015:1646
reference_id RHSA-2015:1646
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1646
24
reference_url https://access.redhat.com/errata/RHSA-2015:1647
reference_id RHSA-2015:1647
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1647
25
reference_url https://access.redhat.com/errata/RHSA-2015:1665
reference_id RHSA-2015:1665
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1665
26
reference_url https://usn.ubuntu.com/2674-1/
reference_id USN-2674-1
reference_type
scores
url https://usn.ubuntu.com/2674-1/
fixed_packages
0
url pkg:deb/debian/mariadb-10.0@10.0.25-0%2Bdeb8u1
purl pkg:deb/debian/mariadb-10.0@10.0.25-0%2Bdeb8u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1gmc-pj6y-rkfx
1
vulnerability VCID-2gyq-q761-h3br
2
vulnerability VCID-2rf6-qaey-1ubn
3
vulnerability VCID-45hn-ezks-j7br
4
vulnerability VCID-4cnj-7fur-3qe3
5
vulnerability VCID-4yz4-vxnh-b3dp
6
vulnerability VCID-5sjj-599v-vybg
7
vulnerability VCID-6g4n-3xfu-hfee
8
vulnerability VCID-6muh-rg1z-pqab
9
vulnerability VCID-8djb-knkk-s3c8
10
vulnerability VCID-8krv-jqjg-uqc8
11
vulnerability VCID-8kvb-5u8c-zbc4
12
vulnerability VCID-8sya-wktg-dqa5
13
vulnerability VCID-9f48-53dz-13an
14
vulnerability VCID-9ff2-43rk-2ydj
15
vulnerability VCID-9w98-nfg2-muh2
16
vulnerability VCID-bhxk-8byp-eyap
17
vulnerability VCID-ej67-ayfh-sqdt
18
vulnerability VCID-g1pp-9qqg-1beb
19
vulnerability VCID-gp4w-bdxg-6kab
20
vulnerability VCID-jgff-4jyp-9fgr
21
vulnerability VCID-mde2-1ynu-auh2
22
vulnerability VCID-mfgg-7s54-gqg8
23
vulnerability VCID-nkdd-suwp-4ffr
24
vulnerability VCID-p623-gxyv-g7fs
25
vulnerability VCID-pk7e-t26d-aqdm
26
vulnerability VCID-pv92-6p9x-v7bs
27
vulnerability VCID-r2cz-9kjz-zbgu
28
vulnerability VCID-rssq-mfc2-ckaf
29
vulnerability VCID-rted-6vzz-mbcv
30
vulnerability VCID-tvdv-3ed5-h3dt
31
vulnerability VCID-un5y-y9sq-1ufb
32
vulnerability VCID-v4gv-g9n5-ukgc
33
vulnerability VCID-vh5y-15tw-d7fd
34
vulnerability VCID-wrna-cc9g-sqbe
35
vulnerability VCID-yx79-3g2x-pqex
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.0@10.0.25-0%252Bdeb8u1
aliases CVE-2015-2648
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1k52-9nbh-1qdj
1
url VCID-1xy7-2n6j-jfdq
vulnerability_id VCID-1xy7-2n6j-jfdq
summary
Multiple vulnerabilities have been found in MySQL, allowing
    attackers to execute arbitrary code or cause Denial of Service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0501.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0501.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-0501
reference_id
reference_type
scores
0
value 0.0172
scoring_system epss
scoring_elements 0.82324
published_at 2026-04-01T12:55:00Z
1
value 0.0172
scoring_system epss
scoring_elements 0.82338
published_at 2026-04-02T12:55:00Z
2
value 0.0172
scoring_system epss
scoring_elements 0.82356
published_at 2026-04-04T12:55:00Z
3
value 0.0172
scoring_system epss
scoring_elements 0.8235
published_at 2026-04-07T12:55:00Z
4
value 0.0172
scoring_system epss
scoring_elements 0.82378
published_at 2026-04-08T12:55:00Z
5
value 0.0172
scoring_system epss
scoring_elements 0.82385
published_at 2026-04-09T12:55:00Z
6
value 0.0172
scoring_system epss
scoring_elements 0.82404
published_at 2026-04-11T12:55:00Z
7
value 0.0172
scoring_system epss
scoring_elements 0.824
published_at 2026-04-12T12:55:00Z
8
value 0.0172
scoring_system epss
scoring_elements 0.82395
published_at 2026-04-13T12:55:00Z
9
value 0.0172
scoring_system epss
scoring_elements 0.82429
published_at 2026-04-16T12:55:00Z
10
value 0.0172
scoring_system epss
scoring_elements 0.8243
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-0501
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0433
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0433
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0441
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0441
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0499
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0499
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0501
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0501
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0505
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0505
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2568
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2568
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2571
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2571
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2573
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2573
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2582
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2582
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2643
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2643
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2648
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2648
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3152
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3152
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4752
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4752
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4757
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4757
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1212758
reference_id 1212758
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1212758
17
reference_url https://security.gentoo.org/glsa/201507-19
reference_id GLSA-201507-19
reference_type
scores
url https://security.gentoo.org/glsa/201507-19
18
reference_url https://access.redhat.com/errata/RHSA-2015:1628
reference_id RHSA-2015:1628
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1628
19
reference_url https://access.redhat.com/errata/RHSA-2015:1629
reference_id RHSA-2015:1629
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1629
20
reference_url https://access.redhat.com/errata/RHSA-2015:1646
reference_id RHSA-2015:1646
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1646
21
reference_url https://access.redhat.com/errata/RHSA-2015:1647
reference_id RHSA-2015:1647
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1647
22
reference_url https://access.redhat.com/errata/RHSA-2015:1665
reference_id RHSA-2015:1665
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1665
23
reference_url https://usn.ubuntu.com/2575-1/
reference_id USN-2575-1
reference_type
scores
url https://usn.ubuntu.com/2575-1/
fixed_packages
0
url pkg:deb/debian/mariadb-10.0@10.0.25-0%2Bdeb8u1
purl pkg:deb/debian/mariadb-10.0@10.0.25-0%2Bdeb8u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1gmc-pj6y-rkfx
1
vulnerability VCID-2gyq-q761-h3br
2
vulnerability VCID-2rf6-qaey-1ubn
3
vulnerability VCID-45hn-ezks-j7br
4
vulnerability VCID-4cnj-7fur-3qe3
5
vulnerability VCID-4yz4-vxnh-b3dp
6
vulnerability VCID-5sjj-599v-vybg
7
vulnerability VCID-6g4n-3xfu-hfee
8
vulnerability VCID-6muh-rg1z-pqab
9
vulnerability VCID-8djb-knkk-s3c8
10
vulnerability VCID-8krv-jqjg-uqc8
11
vulnerability VCID-8kvb-5u8c-zbc4
12
vulnerability VCID-8sya-wktg-dqa5
13
vulnerability VCID-9f48-53dz-13an
14
vulnerability VCID-9ff2-43rk-2ydj
15
vulnerability VCID-9w98-nfg2-muh2
16
vulnerability VCID-bhxk-8byp-eyap
17
vulnerability VCID-ej67-ayfh-sqdt
18
vulnerability VCID-g1pp-9qqg-1beb
19
vulnerability VCID-gp4w-bdxg-6kab
20
vulnerability VCID-jgff-4jyp-9fgr
21
vulnerability VCID-mde2-1ynu-auh2
22
vulnerability VCID-mfgg-7s54-gqg8
23
vulnerability VCID-nkdd-suwp-4ffr
24
vulnerability VCID-p623-gxyv-g7fs
25
vulnerability VCID-pk7e-t26d-aqdm
26
vulnerability VCID-pv92-6p9x-v7bs
27
vulnerability VCID-r2cz-9kjz-zbgu
28
vulnerability VCID-rssq-mfc2-ckaf
29
vulnerability VCID-rted-6vzz-mbcv
30
vulnerability VCID-tvdv-3ed5-h3dt
31
vulnerability VCID-un5y-y9sq-1ufb
32
vulnerability VCID-v4gv-g9n5-ukgc
33
vulnerability VCID-vh5y-15tw-d7fd
34
vulnerability VCID-wrna-cc9g-sqbe
35
vulnerability VCID-yx79-3g2x-pqex
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.0@10.0.25-0%252Bdeb8u1
aliases CVE-2015-0501
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1xy7-2n6j-jfdq
2
url VCID-2t35-z6yq-uyg9
vulnerability_id VCID-2t35-z6yq-uyg9
summary
Multiple vulnerabilities have been found in MySQL, allowing
    attackers to execute arbitrary code or cause Denial of Service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2573.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2573.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-2573
reference_id
reference_type
scores
0
value 0.00406
scoring_system epss
scoring_elements 0.60959
published_at 2026-04-01T12:55:00Z
1
value 0.00406
scoring_system epss
scoring_elements 0.61036
published_at 2026-04-02T12:55:00Z
2
value 0.00406
scoring_system epss
scoring_elements 0.61064
published_at 2026-04-04T12:55:00Z
3
value 0.00406
scoring_system epss
scoring_elements 0.6103
published_at 2026-04-07T12:55:00Z
4
value 0.00406
scoring_system epss
scoring_elements 0.61078
published_at 2026-04-08T12:55:00Z
5
value 0.00406
scoring_system epss
scoring_elements 0.61094
published_at 2026-04-09T12:55:00Z
6
value 0.00406
scoring_system epss
scoring_elements 0.61115
published_at 2026-04-11T12:55:00Z
7
value 0.00406
scoring_system epss
scoring_elements 0.61102
published_at 2026-04-12T12:55:00Z
8
value 0.00406
scoring_system epss
scoring_elements 0.61083
published_at 2026-04-13T12:55:00Z
9
value 0.00406
scoring_system epss
scoring_elements 0.61125
published_at 2026-04-16T12:55:00Z
10
value 0.00406
scoring_system epss
scoring_elements 0.61131
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-2573
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0433
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0433
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0441
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0441
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0499
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0499
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0501
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0501
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0505
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0505
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2568
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2568
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2571
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2571
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2573
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2573
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2582
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2582
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2643
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2643
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2648
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2648
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3152
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3152
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4752
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4752
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4757
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4757
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1212783
reference_id 1212783
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1212783
17
reference_url https://security.gentoo.org/glsa/201507-19
reference_id GLSA-201507-19
reference_type
scores
url https://security.gentoo.org/glsa/201507-19
18
reference_url https://access.redhat.com/errata/RHSA-2015:1628
reference_id RHSA-2015:1628
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1628
19
reference_url https://access.redhat.com/errata/RHSA-2015:1629
reference_id RHSA-2015:1629
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1629
20
reference_url https://access.redhat.com/errata/RHSA-2015:1647
reference_id RHSA-2015:1647
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1647
21
reference_url https://access.redhat.com/errata/RHSA-2015:1665
reference_id RHSA-2015:1665
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1665
22
reference_url https://usn.ubuntu.com/2575-1/
reference_id USN-2575-1
reference_type
scores
url https://usn.ubuntu.com/2575-1/
fixed_packages
0
url pkg:deb/debian/mariadb-10.0@10.0.25-0%2Bdeb8u1
purl pkg:deb/debian/mariadb-10.0@10.0.25-0%2Bdeb8u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1gmc-pj6y-rkfx
1
vulnerability VCID-2gyq-q761-h3br
2
vulnerability VCID-2rf6-qaey-1ubn
3
vulnerability VCID-45hn-ezks-j7br
4
vulnerability VCID-4cnj-7fur-3qe3
5
vulnerability VCID-4yz4-vxnh-b3dp
6
vulnerability VCID-5sjj-599v-vybg
7
vulnerability VCID-6g4n-3xfu-hfee
8
vulnerability VCID-6muh-rg1z-pqab
9
vulnerability VCID-8djb-knkk-s3c8
10
vulnerability VCID-8krv-jqjg-uqc8
11
vulnerability VCID-8kvb-5u8c-zbc4
12
vulnerability VCID-8sya-wktg-dqa5
13
vulnerability VCID-9f48-53dz-13an
14
vulnerability VCID-9ff2-43rk-2ydj
15
vulnerability VCID-9w98-nfg2-muh2
16
vulnerability VCID-bhxk-8byp-eyap
17
vulnerability VCID-ej67-ayfh-sqdt
18
vulnerability VCID-g1pp-9qqg-1beb
19
vulnerability VCID-gp4w-bdxg-6kab
20
vulnerability VCID-jgff-4jyp-9fgr
21
vulnerability VCID-mde2-1ynu-auh2
22
vulnerability VCID-mfgg-7s54-gqg8
23
vulnerability VCID-nkdd-suwp-4ffr
24
vulnerability VCID-p623-gxyv-g7fs
25
vulnerability VCID-pk7e-t26d-aqdm
26
vulnerability VCID-pv92-6p9x-v7bs
27
vulnerability VCID-r2cz-9kjz-zbgu
28
vulnerability VCID-rssq-mfc2-ckaf
29
vulnerability VCID-rted-6vzz-mbcv
30
vulnerability VCID-tvdv-3ed5-h3dt
31
vulnerability VCID-un5y-y9sq-1ufb
32
vulnerability VCID-v4gv-g9n5-ukgc
33
vulnerability VCID-vh5y-15tw-d7fd
34
vulnerability VCID-wrna-cc9g-sqbe
35
vulnerability VCID-yx79-3g2x-pqex
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.0@10.0.25-0%252Bdeb8u1
aliases CVE-2015-2573
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2t35-z6yq-uyg9
3
url VCID-2vp1-j324-dkat
vulnerability_id VCID-2vp1-j324-dkat
summary security update
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:58:48Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:58:48Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:58:48Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:58:48Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:58:48Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:58:48Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html
6
reference_url http://rhn.redhat.com/errata/RHSA-2016-0705.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:58:48Z/
url http://rhn.redhat.com/errata/RHSA-2016-0705.html
7
reference_url http://rhn.redhat.com/errata/RHSA-2016-1480.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:58:48Z/
url http://rhn.redhat.com/errata/RHSA-2016-1480.html
8
reference_url http://rhn.redhat.com/errata/RHSA-2016-1481.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:58:48Z/
url http://rhn.redhat.com/errata/RHSA-2016-1481.html
9
reference_url http://rhn.redhat.com/errata/RHSA-2016-1602.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:58:48Z/
url http://rhn.redhat.com/errata/RHSA-2016-1602.html
10
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0666.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0666.json
11
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-0666
reference_id
reference_type
scores
0
value 0.00243
scoring_system epss
scoring_elements 0.47464
published_at 2026-04-07T12:55:00Z
1
value 0.00243
scoring_system epss
scoring_elements 0.47494
published_at 2026-04-02T12:55:00Z
2
value 0.00243
scoring_system epss
scoring_elements 0.47515
published_at 2026-04-09T12:55:00Z
3
value 0.00243
scoring_system epss
scoring_elements 0.47518
published_at 2026-04-08T12:55:00Z
4
value 0.00243
scoring_system epss
scoring_elements 0.47537
published_at 2026-04-11T12:55:00Z
5
value 0.00243
scoring_system epss
scoring_elements 0.47513
published_at 2026-04-12T12:55:00Z
6
value 0.00243
scoring_system epss
scoring_elements 0.47521
published_at 2026-04-13T12:55:00Z
7
value 0.00243
scoring_system epss
scoring_elements 0.4758
published_at 2026-04-16T12:55:00Z
8
value 0.00243
scoring_system epss
scoring_elements 0.47573
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-0666
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0640
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0640
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0641
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0641
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0642
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0642
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0643
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0643
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0644
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0644
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0646
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0646
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0647
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0647
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0648
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0648
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0649
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0649
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0650
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0650
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0655
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0655
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0666
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0666
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0668
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0668
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2047
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2047
26
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.6
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:S/C:N/I:N/A:C
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
27
reference_url https://mariadb.com/kb/en/mariadb/mariadb-10025-release-notes/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:58:48Z/
url https://mariadb.com/kb/en/mariadb/mariadb-10025-release-notes/
28
reference_url https://mariadb.com/kb/en/mariadb/mariadb-10114-release-notes/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:58:48Z/
url https://mariadb.com/kb/en/mariadb/mariadb-10114-release-notes/
29
reference_url https://mariadb.com/kb/en/mariadb/mariadb-5549-release-notes/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:58:48Z/
url https://mariadb.com/kb/en/mariadb/mariadb-5549-release-notes/
30
reference_url http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:58:48Z/
url http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168
31
reference_url http://www.debian.org/security/2016/dsa-3557
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:58:48Z/
url http://www.debian.org/security/2016/dsa-3557
32
reference_url http://www.debian.org/security/2016/dsa-3595
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:58:48Z/
url http://www.debian.org/security/2016/dsa-3595
33
reference_url http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:58:48Z/
url http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
34
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:58:48Z/
url http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
35
reference_url http://www.securityfocus.com/bid/86509
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:58:48Z/
url http://www.securityfocus.com/bid/86509
36
reference_url http://www.securitytracker.com/id/1035606
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:58:48Z/
url http://www.securitytracker.com/id/1035606
37
reference_url http://www.ubuntu.com/usn/USN-2953-1
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:58:48Z/
url http://www.ubuntu.com/usn/USN-2953-1
38
reference_url http://www.ubuntu.com/usn/USN-2954-1
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:58:48Z/
url http://www.ubuntu.com/usn/USN-2954-1
39
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1329270
reference_id 1329270
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1329270
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:powerkvm:2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ibm:powerkvm:2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:powerkvm:2.1:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:powerkvm:3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ibm:powerkvm:3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:powerkvm:3.1:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-0666
reference_id CVE-2016-0666
reference_type
scores
0
value 3.5
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:S/C:N/I:N/A:P
1
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2016-0666
50
reference_url https://access.redhat.com/errata/RHSA-2016:0705
reference_id RHSA-2016:0705
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0705
51
reference_url https://access.redhat.com/errata/RHSA-2016:1132
reference_id RHSA-2016:1132
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:58:48Z/
url https://access.redhat.com/errata/RHSA-2016:1132
52
reference_url https://access.redhat.com/errata/RHSA-2016:1480
reference_id RHSA-2016:1480
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1480
53
reference_url https://access.redhat.com/errata/RHSA-2016:1481
reference_id RHSA-2016:1481
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1481
54
reference_url https://access.redhat.com/errata/RHSA-2016:1602
reference_id RHSA-2016:1602
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1602
55
reference_url https://usn.ubuntu.com/2953-1/
reference_id USN-2953-1
reference_type
scores
url https://usn.ubuntu.com/2953-1/
56
reference_url https://usn.ubuntu.com/2954-1/
reference_id USN-2954-1
reference_type
scores
url https://usn.ubuntu.com/2954-1/
fixed_packages
0
url pkg:deb/debian/mariadb-10.0@10.0.25-0%2Bdeb8u1
purl pkg:deb/debian/mariadb-10.0@10.0.25-0%2Bdeb8u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1gmc-pj6y-rkfx
1
vulnerability VCID-2gyq-q761-h3br
2
vulnerability VCID-2rf6-qaey-1ubn
3
vulnerability VCID-45hn-ezks-j7br
4
vulnerability VCID-4cnj-7fur-3qe3
5
vulnerability VCID-4yz4-vxnh-b3dp
6
vulnerability VCID-5sjj-599v-vybg
7
vulnerability VCID-6g4n-3xfu-hfee
8
vulnerability VCID-6muh-rg1z-pqab
9
vulnerability VCID-8djb-knkk-s3c8
10
vulnerability VCID-8krv-jqjg-uqc8
11
vulnerability VCID-8kvb-5u8c-zbc4
12
vulnerability VCID-8sya-wktg-dqa5
13
vulnerability VCID-9f48-53dz-13an
14
vulnerability VCID-9ff2-43rk-2ydj
15
vulnerability VCID-9w98-nfg2-muh2
16
vulnerability VCID-bhxk-8byp-eyap
17
vulnerability VCID-ej67-ayfh-sqdt
18
vulnerability VCID-g1pp-9qqg-1beb
19
vulnerability VCID-gp4w-bdxg-6kab
20
vulnerability VCID-jgff-4jyp-9fgr
21
vulnerability VCID-mde2-1ynu-auh2
22
vulnerability VCID-mfgg-7s54-gqg8
23
vulnerability VCID-nkdd-suwp-4ffr
24
vulnerability VCID-p623-gxyv-g7fs
25
vulnerability VCID-pk7e-t26d-aqdm
26
vulnerability VCID-pv92-6p9x-v7bs
27
vulnerability VCID-r2cz-9kjz-zbgu
28
vulnerability VCID-rssq-mfc2-ckaf
29
vulnerability VCID-rted-6vzz-mbcv
30
vulnerability VCID-tvdv-3ed5-h3dt
31
vulnerability VCID-un5y-y9sq-1ufb
32
vulnerability VCID-v4gv-g9n5-ukgc
33
vulnerability VCID-vh5y-15tw-d7fd
34
vulnerability VCID-wrna-cc9g-sqbe
35
vulnerability VCID-yx79-3g2x-pqex
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.0@10.0.25-0%252Bdeb8u1
aliases CVE-2016-0666
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2vp1-j324-dkat
4
url VCID-31ay-j78r-5ybm
vulnerability_id VCID-31ay-j78r-5ybm
summary
Multiple vulnerabilities have been found in MySQL, allowing
    attackers to execute arbitrary code or cause Denial of Service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2568.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2568.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-2568
reference_id
reference_type
scores
0
value 0.03957
scoring_system epss
scoring_elements 0.88306
published_at 2026-04-01T12:55:00Z
1
value 0.03957
scoring_system epss
scoring_elements 0.88314
published_at 2026-04-02T12:55:00Z
2
value 0.03957
scoring_system epss
scoring_elements 0.88328
published_at 2026-04-04T12:55:00Z
3
value 0.03957
scoring_system epss
scoring_elements 0.88333
published_at 2026-04-07T12:55:00Z
4
value 0.03957
scoring_system epss
scoring_elements 0.88352
published_at 2026-04-08T12:55:00Z
5
value 0.03957
scoring_system epss
scoring_elements 0.88359
published_at 2026-04-09T12:55:00Z
6
value 0.03957
scoring_system epss
scoring_elements 0.88369
published_at 2026-04-11T12:55:00Z
7
value 0.03957
scoring_system epss
scoring_elements 0.88361
published_at 2026-04-13T12:55:00Z
8
value 0.03957
scoring_system epss
scoring_elements 0.88376
published_at 2026-04-16T12:55:00Z
9
value 0.03957
scoring_system epss
scoring_elements 0.88373
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-2568
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0433
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0433
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0441
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0441
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0499
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0499
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0501
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0501
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0505
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0505
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2568
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2568
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2571
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2571
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2573
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2573
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2582
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2582
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2643
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2643
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2648
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2648
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3152
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3152
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4752
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4752
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4757
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4757
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1212763
reference_id 1212763
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1212763
17
reference_url https://security.gentoo.org/glsa/201507-19
reference_id GLSA-201507-19
reference_type
scores
url https://security.gentoo.org/glsa/201507-19
18
reference_url https://access.redhat.com/errata/RHSA-2015:1628
reference_id RHSA-2015:1628
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1628
19
reference_url https://access.redhat.com/errata/RHSA-2015:1629
reference_id RHSA-2015:1629
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1629
20
reference_url https://access.redhat.com/errata/RHSA-2015:1647
reference_id RHSA-2015:1647
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1647
21
reference_url https://access.redhat.com/errata/RHSA-2015:1665
reference_id RHSA-2015:1665
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1665
22
reference_url https://usn.ubuntu.com/2575-1/
reference_id USN-2575-1
reference_type
scores
url https://usn.ubuntu.com/2575-1/
fixed_packages
0
url pkg:deb/debian/mariadb-10.0@10.0.25-0%2Bdeb8u1
purl pkg:deb/debian/mariadb-10.0@10.0.25-0%2Bdeb8u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1gmc-pj6y-rkfx
1
vulnerability VCID-2gyq-q761-h3br
2
vulnerability VCID-2rf6-qaey-1ubn
3
vulnerability VCID-45hn-ezks-j7br
4
vulnerability VCID-4cnj-7fur-3qe3
5
vulnerability VCID-4yz4-vxnh-b3dp
6
vulnerability VCID-5sjj-599v-vybg
7
vulnerability VCID-6g4n-3xfu-hfee
8
vulnerability VCID-6muh-rg1z-pqab
9
vulnerability VCID-8djb-knkk-s3c8
10
vulnerability VCID-8krv-jqjg-uqc8
11
vulnerability VCID-8kvb-5u8c-zbc4
12
vulnerability VCID-8sya-wktg-dqa5
13
vulnerability VCID-9f48-53dz-13an
14
vulnerability VCID-9ff2-43rk-2ydj
15
vulnerability VCID-9w98-nfg2-muh2
16
vulnerability VCID-bhxk-8byp-eyap
17
vulnerability VCID-ej67-ayfh-sqdt
18
vulnerability VCID-g1pp-9qqg-1beb
19
vulnerability VCID-gp4w-bdxg-6kab
20
vulnerability VCID-jgff-4jyp-9fgr
21
vulnerability VCID-mde2-1ynu-auh2
22
vulnerability VCID-mfgg-7s54-gqg8
23
vulnerability VCID-nkdd-suwp-4ffr
24
vulnerability VCID-p623-gxyv-g7fs
25
vulnerability VCID-pk7e-t26d-aqdm
26
vulnerability VCID-pv92-6p9x-v7bs
27
vulnerability VCID-r2cz-9kjz-zbgu
28
vulnerability VCID-rssq-mfc2-ckaf
29
vulnerability VCID-rted-6vzz-mbcv
30
vulnerability VCID-tvdv-3ed5-h3dt
31
vulnerability VCID-un5y-y9sq-1ufb
32
vulnerability VCID-v4gv-g9n5-ukgc
33
vulnerability VCID-vh5y-15tw-d7fd
34
vulnerability VCID-wrna-cc9g-sqbe
35
vulnerability VCID-yx79-3g2x-pqex
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.0@10.0.25-0%252Bdeb8u1
aliases CVE-2015-2568
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-31ay-j78r-5ybm
5
url VCID-34h2-5ygu-6fdc
vulnerability_id VCID-34h2-5ygu-6fdc
summary
Multiple vulnerabilities have been found in MySQL and MariaDB, the
    worst of which could allow remote attackers to cause a Denial of Service
    condition or obtain sensitive information.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4752.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4752.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-4752
reference_id
reference_type
scores
0
value 0.00598
scoring_system epss
scoring_elements 0.69334
published_at 2026-04-01T12:55:00Z
1
value 0.00598
scoring_system epss
scoring_elements 0.69347
published_at 2026-04-02T12:55:00Z
2
value 0.00598
scoring_system epss
scoring_elements 0.69363
published_at 2026-04-04T12:55:00Z
3
value 0.00598
scoring_system epss
scoring_elements 0.69343
published_at 2026-04-07T12:55:00Z
4
value 0.00598
scoring_system epss
scoring_elements 0.69393
published_at 2026-04-08T12:55:00Z
5
value 0.00598
scoring_system epss
scoring_elements 0.69409
published_at 2026-04-09T12:55:00Z
6
value 0.00598
scoring_system epss
scoring_elements 0.69432
published_at 2026-04-11T12:55:00Z
7
value 0.00598
scoring_system epss
scoring_elements 0.69417
published_at 2026-04-12T12:55:00Z
8
value 0.00598
scoring_system epss
scoring_elements 0.69402
published_at 2026-04-13T12:55:00Z
9
value 0.00598
scoring_system epss
scoring_elements 0.69442
published_at 2026-04-16T12:55:00Z
10
value 0.00598
scoring_system epss
scoring_elements 0.69452
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-4752
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0433
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0433
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0441
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0441
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0499
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0499
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0501
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0501
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0505
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0505
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2568
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2568
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2571
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2571
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2573
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2573
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2582
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2582
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2620
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2620
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2643
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2643
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2648
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2648
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3152
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3152
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4737
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4737
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4752
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4752
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4757
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4757
18
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1244779
reference_id 1244779
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1244779
19
reference_url https://security.gentoo.org/glsa/201610-06
reference_id GLSA-201610-06
reference_type
scores
url https://security.gentoo.org/glsa/201610-06
20
reference_url https://access.redhat.com/errata/RHSA-2015:1628
reference_id RHSA-2015:1628
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1628
21
reference_url https://access.redhat.com/errata/RHSA-2015:1629
reference_id RHSA-2015:1629
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1629
22
reference_url https://access.redhat.com/errata/RHSA-2015:1630
reference_id RHSA-2015:1630
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1630
23
reference_url https://access.redhat.com/errata/RHSA-2015:1646
reference_id RHSA-2015:1646
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1646
24
reference_url https://access.redhat.com/errata/RHSA-2015:1647
reference_id RHSA-2015:1647
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1647
25
reference_url https://access.redhat.com/errata/RHSA-2015:1665
reference_id RHSA-2015:1665
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1665
26
reference_url https://usn.ubuntu.com/2674-1/
reference_id USN-2674-1
reference_type
scores
url https://usn.ubuntu.com/2674-1/
fixed_packages
0
url pkg:deb/debian/mariadb-10.0@10.0.25-0%2Bdeb8u1
purl pkg:deb/debian/mariadb-10.0@10.0.25-0%2Bdeb8u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1gmc-pj6y-rkfx
1
vulnerability VCID-2gyq-q761-h3br
2
vulnerability VCID-2rf6-qaey-1ubn
3
vulnerability VCID-45hn-ezks-j7br
4
vulnerability VCID-4cnj-7fur-3qe3
5
vulnerability VCID-4yz4-vxnh-b3dp
6
vulnerability VCID-5sjj-599v-vybg
7
vulnerability VCID-6g4n-3xfu-hfee
8
vulnerability VCID-6muh-rg1z-pqab
9
vulnerability VCID-8djb-knkk-s3c8
10
vulnerability VCID-8krv-jqjg-uqc8
11
vulnerability VCID-8kvb-5u8c-zbc4
12
vulnerability VCID-8sya-wktg-dqa5
13
vulnerability VCID-9f48-53dz-13an
14
vulnerability VCID-9ff2-43rk-2ydj
15
vulnerability VCID-9w98-nfg2-muh2
16
vulnerability VCID-bhxk-8byp-eyap
17
vulnerability VCID-ej67-ayfh-sqdt
18
vulnerability VCID-g1pp-9qqg-1beb
19
vulnerability VCID-gp4w-bdxg-6kab
20
vulnerability VCID-jgff-4jyp-9fgr
21
vulnerability VCID-mde2-1ynu-auh2
22
vulnerability VCID-mfgg-7s54-gqg8
23
vulnerability VCID-nkdd-suwp-4ffr
24
vulnerability VCID-p623-gxyv-g7fs
25
vulnerability VCID-pk7e-t26d-aqdm
26
vulnerability VCID-pv92-6p9x-v7bs
27
vulnerability VCID-r2cz-9kjz-zbgu
28
vulnerability VCID-rssq-mfc2-ckaf
29
vulnerability VCID-rted-6vzz-mbcv
30
vulnerability VCID-tvdv-3ed5-h3dt
31
vulnerability VCID-un5y-y9sq-1ufb
32
vulnerability VCID-v4gv-g9n5-ukgc
33
vulnerability VCID-vh5y-15tw-d7fd
34
vulnerability VCID-wrna-cc9g-sqbe
35
vulnerability VCID-yx79-3g2x-pqex
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.0@10.0.25-0%252Bdeb8u1
aliases CVE-2015-4752
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-34h2-5ygu-6fdc
6
url VCID-3fnd-29cd-2bhu
vulnerability_id VCID-3fnd-29cd-2bhu
summary security update
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:58:44Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:58:44Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:58:44Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:58:44Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:58:44Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html
5
reference_url http://rhn.redhat.com/errata/RHSA-2016-0705.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:58:44Z/
url http://rhn.redhat.com/errata/RHSA-2016-0705.html
6
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0668.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0668.json
7
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-0668
reference_id
reference_type
scores
0
value 0.00357
scoring_system epss
scoring_elements 0.58028
published_at 2026-04-18T12:55:00Z
1
value 0.00357
scoring_system epss
scoring_elements 0.57972
published_at 2026-04-02T12:55:00Z
2
value 0.00357
scoring_system epss
scoring_elements 0.57991
published_at 2026-04-04T12:55:00Z
3
value 0.00357
scoring_system epss
scoring_elements 0.57967
published_at 2026-04-07T12:55:00Z
4
value 0.00357
scoring_system epss
scoring_elements 0.58023
published_at 2026-04-08T12:55:00Z
5
value 0.00357
scoring_system epss
scoring_elements 0.58025
published_at 2026-04-09T12:55:00Z
6
value 0.00357
scoring_system epss
scoring_elements 0.58042
published_at 2026-04-11T12:55:00Z
7
value 0.00357
scoring_system epss
scoring_elements 0.5802
published_at 2026-04-12T12:55:00Z
8
value 0.00357
scoring_system epss
scoring_elements 0.58
published_at 2026-04-13T12:55:00Z
9
value 0.00357
scoring_system epss
scoring_elements 0.5803
published_at 2026-04-16T12:55:00Z
10
value 0.00357
scoring_system epss
scoring_elements 0.57888
published_at 2026-04-01T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-0668
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0640
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0640
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0641
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0641
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0643
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0643
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0644
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0644
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0646
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0646
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0647
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0647
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0648
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0648
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0649
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0649
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0650
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0650
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0655
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0655
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0666
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0666
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0668
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0668
20
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv2
scoring_elements AV:L/AC:H/Au:M/C:N/I:N/A:C
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
21
reference_url https://mariadb.com/kb/en/mariadb/mariadb-10024-release-notes/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:58:44Z/
url https://mariadb.com/kb/en/mariadb/mariadb-10024-release-notes/
22
reference_url https://mariadb.com/kb/en/mariadb/mariadb-10112-release-notes/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:58:44Z/
url https://mariadb.com/kb/en/mariadb/mariadb-10112-release-notes/
23
reference_url http://www.debian.org/security/2016/dsa-3595
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:58:44Z/
url http://www.debian.org/security/2016/dsa-3595
24
reference_url http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:58:44Z/
url http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
25
reference_url http://www.securityfocus.com/bid/86467
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:58:44Z/
url http://www.securityfocus.com/bid/86467
26
reference_url http://www.securitytracker.com/id/1035606
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:58:44Z/
url http://www.securitytracker.com/id/1035606
27
reference_url http://www.ubuntu.com/usn/USN-2953-1
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:58:44Z/
url http://www.ubuntu.com/usn/USN-2953-1
28
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1329273
reference_id 1329273
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1329273
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:12:-:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_desktop:12:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:12:-:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:12:sp1:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_desktop:12:sp1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:12:sp1:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:12:-:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:12:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:12:-:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:12:sp1:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:12:sp1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:12:sp1:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:-:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:-:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:sp1:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:sp1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:sp1:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_workstation_extension:12:-:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_workstation_extension:12:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_workstation_extension:12:-:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_workstation_extension:12:sp1:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_workstation_extension:12:sp1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_workstation_extension:12:sp1:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-0668
reference_id CVE-2016-0668
reference_type
scores
0
value 1.7
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:M/C:N/I:N/A:P
1
value 4.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2016-0668
46
reference_url https://access.redhat.com/errata/RHSA-2016:0705
reference_id RHSA-2016:0705
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0705
47
reference_url https://access.redhat.com/errata/RHSA-2016:1132
reference_id RHSA-2016:1132
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:58:44Z/
url https://access.redhat.com/errata/RHSA-2016:1132
48
reference_url https://usn.ubuntu.com/2953-1/
reference_id USN-2953-1
reference_type
scores
url https://usn.ubuntu.com/2953-1/
fixed_packages
0
url pkg:deb/debian/mariadb-10.0@10.0.25-0%2Bdeb8u1
purl pkg:deb/debian/mariadb-10.0@10.0.25-0%2Bdeb8u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1gmc-pj6y-rkfx
1
vulnerability VCID-2gyq-q761-h3br
2
vulnerability VCID-2rf6-qaey-1ubn
3
vulnerability VCID-45hn-ezks-j7br
4
vulnerability VCID-4cnj-7fur-3qe3
5
vulnerability VCID-4yz4-vxnh-b3dp
6
vulnerability VCID-5sjj-599v-vybg
7
vulnerability VCID-6g4n-3xfu-hfee
8
vulnerability VCID-6muh-rg1z-pqab
9
vulnerability VCID-8djb-knkk-s3c8
10
vulnerability VCID-8krv-jqjg-uqc8
11
vulnerability VCID-8kvb-5u8c-zbc4
12
vulnerability VCID-8sya-wktg-dqa5
13
vulnerability VCID-9f48-53dz-13an
14
vulnerability VCID-9ff2-43rk-2ydj
15
vulnerability VCID-9w98-nfg2-muh2
16
vulnerability VCID-bhxk-8byp-eyap
17
vulnerability VCID-ej67-ayfh-sqdt
18
vulnerability VCID-g1pp-9qqg-1beb
19
vulnerability VCID-gp4w-bdxg-6kab
20
vulnerability VCID-jgff-4jyp-9fgr
21
vulnerability VCID-mde2-1ynu-auh2
22
vulnerability VCID-mfgg-7s54-gqg8
23
vulnerability VCID-nkdd-suwp-4ffr
24
vulnerability VCID-p623-gxyv-g7fs
25
vulnerability VCID-pk7e-t26d-aqdm
26
vulnerability VCID-pv92-6p9x-v7bs
27
vulnerability VCID-r2cz-9kjz-zbgu
28
vulnerability VCID-rssq-mfc2-ckaf
29
vulnerability VCID-rted-6vzz-mbcv
30
vulnerability VCID-tvdv-3ed5-h3dt
31
vulnerability VCID-un5y-y9sq-1ufb
32
vulnerability VCID-v4gv-g9n5-ukgc
33
vulnerability VCID-vh5y-15tw-d7fd
34
vulnerability VCID-wrna-cc9g-sqbe
35
vulnerability VCID-yx79-3g2x-pqex
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.0@10.0.25-0%252Bdeb8u1
aliases CVE-2016-0668
risk_score 1.9
exploitability 0.5
weighted_severity 3.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3fnd-29cd-2bhu
7
url VCID-3qjy-4cen-7qev
vulnerability_id VCID-3qjy-4cen-7qev
summary security update
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00015.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00015.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00016.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00016.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html
6
reference_url http://rhn.redhat.com/errata/RHSA-2016-0534.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0534.html
7
reference_url http://rhn.redhat.com/errata/RHSA-2016-0705.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0705.html
8
reference_url http://rhn.redhat.com/errata/RHSA-2016-1480.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-1480.html
9
reference_url http://rhn.redhat.com/errata/RHSA-2016-1481.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-1481.html
10
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0606.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0606.json
11
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-0606
reference_id
reference_type
scores
0
value 0.00166
scoring_system epss
scoring_elements 0.37781
published_at 2026-04-18T12:55:00Z
1
value 0.00166
scoring_system epss
scoring_elements 0.37801
published_at 2026-04-16T12:55:00Z
2
value 0.00166
scoring_system epss
scoring_elements 0.3765
published_at 2026-04-01T12:55:00Z
3
value 0.00166
scoring_system epss
scoring_elements 0.37832
published_at 2026-04-02T12:55:00Z
4
value 0.00166
scoring_system epss
scoring_elements 0.37857
published_at 2026-04-04T12:55:00Z
5
value 0.00166
scoring_system epss
scoring_elements 0.37736
published_at 2026-04-07T12:55:00Z
6
value 0.00166
scoring_system epss
scoring_elements 0.37786
published_at 2026-04-08T12:55:00Z
7
value 0.00166
scoring_system epss
scoring_elements 0.37799
published_at 2026-04-09T12:55:00Z
8
value 0.00166
scoring_system epss
scoring_elements 0.37813
published_at 2026-04-11T12:55:00Z
9
value 0.00166
scoring_system epss
scoring_elements 0.37778
published_at 2026-04-12T12:55:00Z
10
value 0.00166
scoring_system epss
scoring_elements 0.37753
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-0606
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0505
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0505
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0546
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0546
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0596
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0596
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0597
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0597
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0598
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0598
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0600
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0600
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0606
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0606
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0608
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0608
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0609
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0609
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0616
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0616
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2047
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2047
23
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.5
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:S/C:N/I:P/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
24
reference_url https://mariadb.com/kb/en/mariadb/mariadb-10110-release-notes/
reference_id
reference_type
scores
url https://mariadb.com/kb/en/mariadb/mariadb-10110-release-notes/
25
reference_url https://mariadb.com/kb/en/mariadb/mariadb-5547-release-notes/
reference_id
reference_type
scores
url https://mariadb.com/kb/en/mariadb/mariadb-5547-release-notes/
26
reference_url https://mariadb.com/kb/en/mdb-10023-rn/
reference_id
reference_type
scores
url https://mariadb.com/kb/en/mdb-10023-rn/
27
reference_url http://www.debian.org/security/2016/dsa-3453
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3453
28
reference_url http://www.debian.org/security/2016/dsa-3459
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3459
29
reference_url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
30
reference_url http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
31
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
32
reference_url http://www.securitytracker.com/id/1034708
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1034708
33
reference_url http://www.ubuntu.com/usn/USN-2881-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2881-1
34
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1301504
reference_id 1301504
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1301504
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node_eus:7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_hpc_node_eus:7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node_eus:7.2:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-0606
reference_id CVE-2016-0606
reference_type
scores
0
value 3.5
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:S/C:N/I:P/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2016-0606
56
reference_url https://access.redhat.com/errata/RHSA-2016:0534
reference_id RHSA-2016:0534
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0534
57
reference_url https://access.redhat.com/errata/RHSA-2016:0705
reference_id RHSA-2016:0705
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0705
58
reference_url https://access.redhat.com/errata/RHSA-2016:1132
reference_id RHSA-2016:1132
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1132
59
reference_url https://access.redhat.com/errata/RHSA-2016:1480
reference_id RHSA-2016:1480
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1480
60
reference_url https://access.redhat.com/errata/RHSA-2016:1481
reference_id RHSA-2016:1481
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1481
61
reference_url https://usn.ubuntu.com/2881-1/
reference_id USN-2881-1
reference_type
scores
url https://usn.ubuntu.com/2881-1/
fixed_packages
0
url pkg:deb/debian/mariadb-10.0@10.0.25-0%2Bdeb8u1
purl pkg:deb/debian/mariadb-10.0@10.0.25-0%2Bdeb8u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1gmc-pj6y-rkfx
1
vulnerability VCID-2gyq-q761-h3br
2
vulnerability VCID-2rf6-qaey-1ubn
3
vulnerability VCID-45hn-ezks-j7br
4
vulnerability VCID-4cnj-7fur-3qe3
5
vulnerability VCID-4yz4-vxnh-b3dp
6
vulnerability VCID-5sjj-599v-vybg
7
vulnerability VCID-6g4n-3xfu-hfee
8
vulnerability VCID-6muh-rg1z-pqab
9
vulnerability VCID-8djb-knkk-s3c8
10
vulnerability VCID-8krv-jqjg-uqc8
11
vulnerability VCID-8kvb-5u8c-zbc4
12
vulnerability VCID-8sya-wktg-dqa5
13
vulnerability VCID-9f48-53dz-13an
14
vulnerability VCID-9ff2-43rk-2ydj
15
vulnerability VCID-9w98-nfg2-muh2
16
vulnerability VCID-bhxk-8byp-eyap
17
vulnerability VCID-ej67-ayfh-sqdt
18
vulnerability VCID-g1pp-9qqg-1beb
19
vulnerability VCID-gp4w-bdxg-6kab
20
vulnerability VCID-jgff-4jyp-9fgr
21
vulnerability VCID-mde2-1ynu-auh2
22
vulnerability VCID-mfgg-7s54-gqg8
23
vulnerability VCID-nkdd-suwp-4ffr
24
vulnerability VCID-p623-gxyv-g7fs
25
vulnerability VCID-pk7e-t26d-aqdm
26
vulnerability VCID-pv92-6p9x-v7bs
27
vulnerability VCID-r2cz-9kjz-zbgu
28
vulnerability VCID-rssq-mfc2-ckaf
29
vulnerability VCID-rted-6vzz-mbcv
30
vulnerability VCID-tvdv-3ed5-h3dt
31
vulnerability VCID-un5y-y9sq-1ufb
32
vulnerability VCID-v4gv-g9n5-ukgc
33
vulnerability VCID-vh5y-15tw-d7fd
34
vulnerability VCID-wrna-cc9g-sqbe
35
vulnerability VCID-yx79-3g2x-pqex
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.0@10.0.25-0%252Bdeb8u1
aliases CVE-2016-0606
risk_score 1.6
exploitability 0.5
weighted_severity 3.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3qjy-4cen-7qev
8
url VCID-55fg-6c2c-6bg8
vulnerability_id VCID-55fg-6c2c-6bg8
summary security update
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00015.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00015.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00016.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00016.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html
6
reference_url http://rhn.redhat.com/errata/RHSA-2016-0534.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0534.html
7
reference_url http://rhn.redhat.com/errata/RHSA-2016-0705.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0705.html
8
reference_url http://rhn.redhat.com/errata/RHSA-2016-1480.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-1480.html
9
reference_url http://rhn.redhat.com/errata/RHSA-2016-1481.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-1481.html
10
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0600.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0600.json
11
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-0600
reference_id
reference_type
scores
0
value 0.00338
scoring_system epss
scoring_elements 0.56668
published_at 2026-04-18T12:55:00Z
1
value 0.00338
scoring_system epss
scoring_elements 0.56638
published_at 2026-04-13T12:55:00Z
2
value 0.00338
scoring_system epss
scoring_elements 0.56522
published_at 2026-04-01T12:55:00Z
3
value 0.00338
scoring_system epss
scoring_elements 0.56618
published_at 2026-04-07T12:55:00Z
4
value 0.00338
scoring_system epss
scoring_elements 0.56639
published_at 2026-04-04T12:55:00Z
5
value 0.00338
scoring_system epss
scoring_elements 0.56669
published_at 2026-04-16T12:55:00Z
6
value 0.00338
scoring_system epss
scoring_elements 0.56675
published_at 2026-04-09T12:55:00Z
7
value 0.00338
scoring_system epss
scoring_elements 0.56683
published_at 2026-04-11T12:55:00Z
8
value 0.00338
scoring_system epss
scoring_elements 0.56658
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-0600
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0505
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0505
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0546
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0546
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0596
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0596
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0597
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0597
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0598
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0598
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0600
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0600
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0606
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0606
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0608
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0608
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0609
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0609
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0616
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0616
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2047
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2047
23
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.5
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:S/C:N/I:N/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
24
reference_url https://mariadb.com/kb/en/mariadb/mariadb-10110-release-notes/
reference_id
reference_type
scores
url https://mariadb.com/kb/en/mariadb/mariadb-10110-release-notes/
25
reference_url https://mariadb.com/kb/en/mariadb/mariadb-5547-release-notes/
reference_id
reference_type
scores
url https://mariadb.com/kb/en/mariadb/mariadb-5547-release-notes/
26
reference_url https://mariadb.com/kb/en/mdb-10023-rn/
reference_id
reference_type
scores
url https://mariadb.com/kb/en/mdb-10023-rn/
27
reference_url http://www.debian.org/security/2016/dsa-3453
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3453
28
reference_url http://www.debian.org/security/2016/dsa-3459
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3459
29
reference_url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
30
reference_url http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
31
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
32
reference_url http://www.securityfocus.com/bid/81188
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/81188
33
reference_url http://www.securitytracker.com/id/1034708
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1034708
34
reference_url http://www.ubuntu.com/usn/USN-2881-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2881-1
35
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1301501
reference_id 1301501
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1301501
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node_eus:7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_hpc_node_eus:7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node_eus:7.2:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-0600
reference_id CVE-2016-0600
reference_type
scores
0
value 3.5
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:S/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2016-0600
57
reference_url https://access.redhat.com/errata/RHSA-2016:0534
reference_id RHSA-2016:0534
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0534
58
reference_url https://access.redhat.com/errata/RHSA-2016:0705
reference_id RHSA-2016:0705
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0705
59
reference_url https://access.redhat.com/errata/RHSA-2016:1132
reference_id RHSA-2016:1132
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1132
60
reference_url https://access.redhat.com/errata/RHSA-2016:1480
reference_id RHSA-2016:1480
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1480
61
reference_url https://access.redhat.com/errata/RHSA-2016:1481
reference_id RHSA-2016:1481
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1481
62
reference_url https://usn.ubuntu.com/2881-1/
reference_id USN-2881-1
reference_type
scores
url https://usn.ubuntu.com/2881-1/
fixed_packages
0
url pkg:deb/debian/mariadb-10.0@10.0.25-0%2Bdeb8u1
purl pkg:deb/debian/mariadb-10.0@10.0.25-0%2Bdeb8u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1gmc-pj6y-rkfx
1
vulnerability VCID-2gyq-q761-h3br
2
vulnerability VCID-2rf6-qaey-1ubn
3
vulnerability VCID-45hn-ezks-j7br
4
vulnerability VCID-4cnj-7fur-3qe3
5
vulnerability VCID-4yz4-vxnh-b3dp
6
vulnerability VCID-5sjj-599v-vybg
7
vulnerability VCID-6g4n-3xfu-hfee
8
vulnerability VCID-6muh-rg1z-pqab
9
vulnerability VCID-8djb-knkk-s3c8
10
vulnerability VCID-8krv-jqjg-uqc8
11
vulnerability VCID-8kvb-5u8c-zbc4
12
vulnerability VCID-8sya-wktg-dqa5
13
vulnerability VCID-9f48-53dz-13an
14
vulnerability VCID-9ff2-43rk-2ydj
15
vulnerability VCID-9w98-nfg2-muh2
16
vulnerability VCID-bhxk-8byp-eyap
17
vulnerability VCID-ej67-ayfh-sqdt
18
vulnerability VCID-g1pp-9qqg-1beb
19
vulnerability VCID-gp4w-bdxg-6kab
20
vulnerability VCID-jgff-4jyp-9fgr
21
vulnerability VCID-mde2-1ynu-auh2
22
vulnerability VCID-mfgg-7s54-gqg8
23
vulnerability VCID-nkdd-suwp-4ffr
24
vulnerability VCID-p623-gxyv-g7fs
25
vulnerability VCID-pk7e-t26d-aqdm
26
vulnerability VCID-pv92-6p9x-v7bs
27
vulnerability VCID-r2cz-9kjz-zbgu
28
vulnerability VCID-rssq-mfc2-ckaf
29
vulnerability VCID-rted-6vzz-mbcv
30
vulnerability VCID-tvdv-3ed5-h3dt
31
vulnerability VCID-un5y-y9sq-1ufb
32
vulnerability VCID-v4gv-g9n5-ukgc
33
vulnerability VCID-vh5y-15tw-d7fd
34
vulnerability VCID-wrna-cc9g-sqbe
35
vulnerability VCID-yx79-3g2x-pqex
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.0@10.0.25-0%252Bdeb8u1
aliases CVE-2016-0600
risk_score 1.6
exploitability 0.5
weighted_severity 3.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-55fg-6c2c-6bg8
9
url VCID-5yzf-3vz6-9yhu
vulnerability_id VCID-5yzf-3vz6-9yhu
summary security update
references
0
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177539.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177539.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00010.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00010.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00011.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00011.html
3
reference_url http://lists.opensuse.org/opensuse-updates/2016-02/msg00039.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2016-02/msg00039.html
4
reference_url http://rhn.redhat.com/errata/RHSA-2016-0534.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0534.html
5
reference_url http://rhn.redhat.com/errata/RHSA-2016-0705.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0705.html
6
reference_url http://rhn.redhat.com/errata/RHSA-2016-1480.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-1480.html
7
reference_url http://rhn.redhat.com/errata/RHSA-2016-1481.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-1481.html
8
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4861.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4861.json
9
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-4861
reference_id
reference_type
scores
0
value 0.00392
scoring_system epss
scoring_elements 0.60251
published_at 2026-04-18T12:55:00Z
1
value 0.00392
scoring_system epss
scoring_elements 0.60078
published_at 2026-04-01T12:55:00Z
2
value 0.00392
scoring_system epss
scoring_elements 0.60156
published_at 2026-04-02T12:55:00Z
3
value 0.00392
scoring_system epss
scoring_elements 0.60181
published_at 2026-04-04T12:55:00Z
4
value 0.00392
scoring_system epss
scoring_elements 0.6015
published_at 2026-04-07T12:55:00Z
5
value 0.00392
scoring_system epss
scoring_elements 0.602
published_at 2026-04-08T12:55:00Z
6
value 0.00392
scoring_system epss
scoring_elements 0.60214
published_at 2026-04-09T12:55:00Z
7
value 0.00392
scoring_system epss
scoring_elements 0.60235
published_at 2026-04-11T12:55:00Z
8
value 0.00392
scoring_system epss
scoring_elements 0.60222
published_at 2026-04-12T12:55:00Z
9
value 0.00392
scoring_system epss
scoring_elements 0.60204
published_at 2026-04-13T12:55:00Z
10
value 0.00392
scoring_system epss
scoring_elements 0.60244
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-4861
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4792
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4792
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4802
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4802
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4815
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4815
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4816
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4816
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4819
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4819
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4826
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4826
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4830
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4830
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4836
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4836
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4858
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4858
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4861
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4861
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4870
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4870
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4879
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4879
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4895
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4895
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4913
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4913
24
reference_url https://www.suse.com/support/update/announcement/2016/suse-su-20160296-1.html
reference_id
reference_type
scores
url https://www.suse.com/support/update/announcement/2016/suse-su-20160296-1.html
25
reference_url http://www.debian.org/security/2015/dsa-3377
reference_id
reference_type
scores
url http://www.debian.org/security/2015/dsa-3377
26
reference_url http://www.debian.org/security/2015/dsa-3385
reference_id
reference_type
scores
url http://www.debian.org/security/2015/dsa-3385
27
reference_url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
28
reference_url http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
29
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
30
reference_url http://www.securityfocus.com/bid/77137
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/77137
31
reference_url http://www.securitytracker.com/id/1033894
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1033894
32
reference_url http://www.ubuntu.com/usn/USN-2781-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2781-1
33
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1274776
reference_id 1274776
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1274776
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-4861
reference_id CVE-2015-4861
reference_type
scores
0
value 3.5
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:S/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2015-4861
67
reference_url https://access.redhat.com/errata/RHSA-2016:0534
reference_id RHSA-2016:0534
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0534
68
reference_url https://access.redhat.com/errata/RHSA-2016:0705
reference_id RHSA-2016:0705
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0705
69
reference_url https://access.redhat.com/errata/RHSA-2016:1132
reference_id RHSA-2016:1132
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1132
70
reference_url https://access.redhat.com/errata/RHSA-2016:1480
reference_id RHSA-2016:1480
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1480
71
reference_url https://access.redhat.com/errata/RHSA-2016:1481
reference_id RHSA-2016:1481
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1481
72
reference_url https://usn.ubuntu.com/2781-1/
reference_id USN-2781-1
reference_type
scores
url https://usn.ubuntu.com/2781-1/
fixed_packages
0
url pkg:deb/debian/mariadb-10.0@10.0.25-0%2Bdeb8u1
purl pkg:deb/debian/mariadb-10.0@10.0.25-0%2Bdeb8u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1gmc-pj6y-rkfx
1
vulnerability VCID-2gyq-q761-h3br
2
vulnerability VCID-2rf6-qaey-1ubn
3
vulnerability VCID-45hn-ezks-j7br
4
vulnerability VCID-4cnj-7fur-3qe3
5
vulnerability VCID-4yz4-vxnh-b3dp
6
vulnerability VCID-5sjj-599v-vybg
7
vulnerability VCID-6g4n-3xfu-hfee
8
vulnerability VCID-6muh-rg1z-pqab
9
vulnerability VCID-8djb-knkk-s3c8
10
vulnerability VCID-8krv-jqjg-uqc8
11
vulnerability VCID-8kvb-5u8c-zbc4
12
vulnerability VCID-8sya-wktg-dqa5
13
vulnerability VCID-9f48-53dz-13an
14
vulnerability VCID-9ff2-43rk-2ydj
15
vulnerability VCID-9w98-nfg2-muh2
16
vulnerability VCID-bhxk-8byp-eyap
17
vulnerability VCID-ej67-ayfh-sqdt
18
vulnerability VCID-g1pp-9qqg-1beb
19
vulnerability VCID-gp4w-bdxg-6kab
20
vulnerability VCID-jgff-4jyp-9fgr
21
vulnerability VCID-mde2-1ynu-auh2
22
vulnerability VCID-mfgg-7s54-gqg8
23
vulnerability VCID-nkdd-suwp-4ffr
24
vulnerability VCID-p623-gxyv-g7fs
25
vulnerability VCID-pk7e-t26d-aqdm
26
vulnerability VCID-pv92-6p9x-v7bs
27
vulnerability VCID-r2cz-9kjz-zbgu
28
vulnerability VCID-rssq-mfc2-ckaf
29
vulnerability VCID-rted-6vzz-mbcv
30
vulnerability VCID-tvdv-3ed5-h3dt
31
vulnerability VCID-un5y-y9sq-1ufb
32
vulnerability VCID-v4gv-g9n5-ukgc
33
vulnerability VCID-vh5y-15tw-d7fd
34
vulnerability VCID-wrna-cc9g-sqbe
35
vulnerability VCID-yx79-3g2x-pqex
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.0@10.0.25-0%252Bdeb8u1
aliases CVE-2015-4861
risk_score 1.6
exploitability 0.5
weighted_severity 3.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5yzf-3vz6-9yhu
10
url VCID-7qj2-atsh-pub4
vulnerability_id VCID-7qj2-atsh-pub4
summary security update
references
0
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177539.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177539.html
1
reference_url http://rhn.redhat.com/errata/RHSA-2015-1628.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-1628.html
2
reference_url http://rhn.redhat.com/errata/RHSA-2016-0534.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0534.html
3
reference_url http://rhn.redhat.com/errata/RHSA-2016-1481.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-1481.html
4
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4879.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4879.json
5
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-4879
reference_id
reference_type
scores
0
value 0.00327
scoring_system epss
scoring_elements 0.55733
published_at 2026-04-18T12:55:00Z
1
value 0.00327
scoring_system epss
scoring_elements 0.5555
published_at 2026-04-01T12:55:00Z
2
value 0.00327
scoring_system epss
scoring_elements 0.55662
published_at 2026-04-02T12:55:00Z
3
value 0.00327
scoring_system epss
scoring_elements 0.55686
published_at 2026-04-04T12:55:00Z
4
value 0.00327
scoring_system epss
scoring_elements 0.55664
published_at 2026-04-07T12:55:00Z
5
value 0.00327
scoring_system epss
scoring_elements 0.55715
published_at 2026-04-08T12:55:00Z
6
value 0.00327
scoring_system epss
scoring_elements 0.55718
published_at 2026-04-09T12:55:00Z
7
value 0.00327
scoring_system epss
scoring_elements 0.55727
published_at 2026-04-11T12:55:00Z
8
value 0.00327
scoring_system epss
scoring_elements 0.55707
published_at 2026-04-12T12:55:00Z
9
value 0.00327
scoring_system epss
scoring_elements 0.5569
published_at 2026-04-13T12:55:00Z
10
value 0.00327
scoring_system epss
scoring_elements 0.55729
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-4879
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4792
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4792
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4802
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4802
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4815
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4815
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4816
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4816
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4819
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4819
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4826
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4826
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4830
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4830
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4836
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4836
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4858
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4858
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4861
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4861
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4870
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4870
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4879
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4879
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4895
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4895
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4913
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4913
20
reference_url http://www.debian.org/security/2015/dsa-3377
reference_id
reference_type
scores
url http://www.debian.org/security/2015/dsa-3377
21
reference_url http://www.debian.org/security/2015/dsa-3385
reference_id
reference_type
scores
url http://www.debian.org/security/2015/dsa-3385
22
reference_url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
23
reference_url http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
24
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
25
reference_url http://www.securityfocus.com/bid/77140
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/77140
26
reference_url http://www.securitytracker.com/id/1033894
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1033894
27
reference_url http://www.ubuntu.com/usn/USN-2781-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2781-1
28
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1274783
reference_id 1274783
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1274783
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:-:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:linux:7:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:-:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-4879
reference_id CVE-2015-4879
reference_type
scores
0
value 4.6
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:S/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2015-4879
59
reference_url https://access.redhat.com/errata/RHSA-2015:1628
reference_id RHSA-2015:1628
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1628
60
reference_url https://access.redhat.com/errata/RHSA-2015:1629
reference_id RHSA-2015:1629
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1629
61
reference_url https://access.redhat.com/errata/RHSA-2015:1630
reference_id RHSA-2015:1630
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1630
62
reference_url https://access.redhat.com/errata/RHSA-2016:0534
reference_id RHSA-2016:0534
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0534
63
reference_url https://access.redhat.com/errata/RHSA-2016:1132
reference_id RHSA-2016:1132
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1132
64
reference_url https://access.redhat.com/errata/RHSA-2016:1481
reference_id RHSA-2016:1481
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1481
65
reference_url https://usn.ubuntu.com/2781-1/
reference_id USN-2781-1
reference_type
scores
url https://usn.ubuntu.com/2781-1/
fixed_packages
0
url pkg:deb/debian/mariadb-10.0@10.0.25-0%2Bdeb8u1
purl pkg:deb/debian/mariadb-10.0@10.0.25-0%2Bdeb8u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1gmc-pj6y-rkfx
1
vulnerability VCID-2gyq-q761-h3br
2
vulnerability VCID-2rf6-qaey-1ubn
3
vulnerability VCID-45hn-ezks-j7br
4
vulnerability VCID-4cnj-7fur-3qe3
5
vulnerability VCID-4yz4-vxnh-b3dp
6
vulnerability VCID-5sjj-599v-vybg
7
vulnerability VCID-6g4n-3xfu-hfee
8
vulnerability VCID-6muh-rg1z-pqab
9
vulnerability VCID-8djb-knkk-s3c8
10
vulnerability VCID-8krv-jqjg-uqc8
11
vulnerability VCID-8kvb-5u8c-zbc4
12
vulnerability VCID-8sya-wktg-dqa5
13
vulnerability VCID-9f48-53dz-13an
14
vulnerability VCID-9ff2-43rk-2ydj
15
vulnerability VCID-9w98-nfg2-muh2
16
vulnerability VCID-bhxk-8byp-eyap
17
vulnerability VCID-ej67-ayfh-sqdt
18
vulnerability VCID-g1pp-9qqg-1beb
19
vulnerability VCID-gp4w-bdxg-6kab
20
vulnerability VCID-jgff-4jyp-9fgr
21
vulnerability VCID-mde2-1ynu-auh2
22
vulnerability VCID-mfgg-7s54-gqg8
23
vulnerability VCID-nkdd-suwp-4ffr
24
vulnerability VCID-p623-gxyv-g7fs
25
vulnerability VCID-pk7e-t26d-aqdm
26
vulnerability VCID-pv92-6p9x-v7bs
27
vulnerability VCID-r2cz-9kjz-zbgu
28
vulnerability VCID-rssq-mfc2-ckaf
29
vulnerability VCID-rted-6vzz-mbcv
30
vulnerability VCID-tvdv-3ed5-h3dt
31
vulnerability VCID-un5y-y9sq-1ufb
32
vulnerability VCID-v4gv-g9n5-ukgc
33
vulnerability VCID-vh5y-15tw-d7fd
34
vulnerability VCID-wrna-cc9g-sqbe
35
vulnerability VCID-yx79-3g2x-pqex
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.0@10.0.25-0%252Bdeb8u1
aliases CVE-2015-4879
risk_score 2.0
exploitability 0.5
weighted_severity 4.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7qj2-atsh-pub4
11
url VCID-7tj3-dfxj-bke7
vulnerability_id VCID-7tj3-dfxj-bke7
summary security update
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:17Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:17Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:17Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:17Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:17Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:17Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html
6
reference_url http://rhn.redhat.com/errata/RHSA-2016-0705.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:17Z/
url http://rhn.redhat.com/errata/RHSA-2016-0705.html
7
reference_url http://rhn.redhat.com/errata/RHSA-2016-1480.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:17Z/
url http://rhn.redhat.com/errata/RHSA-2016-1480.html
8
reference_url http://rhn.redhat.com/errata/RHSA-2016-1481.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:17Z/
url http://rhn.redhat.com/errata/RHSA-2016-1481.html
9
reference_url http://rhn.redhat.com/errata/RHSA-2016-1602.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:17Z/
url http://rhn.redhat.com/errata/RHSA-2016-1602.html
10
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0647.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0647.json
11
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-0647
reference_id
reference_type
scores
0
value 0.00243
scoring_system epss
scoring_elements 0.47464
published_at 2026-04-07T12:55:00Z
1
value 0.00243
scoring_system epss
scoring_elements 0.47494
published_at 2026-04-02T12:55:00Z
2
value 0.00243
scoring_system epss
scoring_elements 0.47515
published_at 2026-04-09T12:55:00Z
3
value 0.00243
scoring_system epss
scoring_elements 0.47518
published_at 2026-04-08T12:55:00Z
4
value 0.00243
scoring_system epss
scoring_elements 0.47537
published_at 2026-04-11T12:55:00Z
5
value 0.00243
scoring_system epss
scoring_elements 0.47513
published_at 2026-04-12T12:55:00Z
6
value 0.00243
scoring_system epss
scoring_elements 0.47521
published_at 2026-04-13T12:55:00Z
7
value 0.00243
scoring_system epss
scoring_elements 0.4758
published_at 2026-04-16T12:55:00Z
8
value 0.00243
scoring_system epss
scoring_elements 0.47573
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-0647
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0640
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0640
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0641
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0641
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0642
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0642
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0643
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0643
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0644
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0644
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0646
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0646
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0647
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0647
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0648
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0648
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0649
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0649
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0650
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0650
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0655
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0655
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0666
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0666
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0668
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0668
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2047
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2047
26
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:N/I:C/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
27
reference_url https://mariadb.com/kb/en/mariadb/mariadb-10025-release-notes/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:17Z/
url https://mariadb.com/kb/en/mariadb/mariadb-10025-release-notes/
28
reference_url https://mariadb.com/kb/en/mariadb/mariadb-10114-release-notes/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:17Z/
url https://mariadb.com/kb/en/mariadb/mariadb-10114-release-notes/
29
reference_url https://mariadb.com/kb/en/mariadb/mariadb-5549-release-notes/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:17Z/
url https://mariadb.com/kb/en/mariadb/mariadb-5549-release-notes/
30
reference_url http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:17Z/
url http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168
31
reference_url http://www.debian.org/security/2016/dsa-3557
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:17Z/
url http://www.debian.org/security/2016/dsa-3557
32
reference_url http://www.debian.org/security/2016/dsa-3595
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:17Z/
url http://www.debian.org/security/2016/dsa-3595
33
reference_url http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:17Z/
url http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
34
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:17Z/
url http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
35
reference_url http://www.securityfocus.com/bid/86495
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:17Z/
url http://www.securityfocus.com/bid/86495
36
reference_url http://www.securitytracker.com/id/1035606
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:17Z/
url http://www.securitytracker.com/id/1035606
37
reference_url http://www.ubuntu.com/usn/USN-2953-1
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:17Z/
url http://www.ubuntu.com/usn/USN-2953-1
38
reference_url http://www.ubuntu.com/usn/USN-2954-1
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:17Z/
url http://www.ubuntu.com/usn/USN-2954-1
39
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1329249
reference_id 1329249
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1329249
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:powerkvm:2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ibm:powerkvm:2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:powerkvm:2.1:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:powerkvm:3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ibm:powerkvm:3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:powerkvm:3.1:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-0647
reference_id CVE-2016-0647
reference_type
scores
0
value 4.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:P
1
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2016-0647
50
reference_url https://access.redhat.com/errata/RHSA-2016:0705
reference_id RHSA-2016:0705
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0705
51
reference_url https://access.redhat.com/errata/RHSA-2016:1132
reference_id RHSA-2016:1132
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:17Z/
url https://access.redhat.com/errata/RHSA-2016:1132
52
reference_url https://access.redhat.com/errata/RHSA-2016:1480
reference_id RHSA-2016:1480
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1480
53
reference_url https://access.redhat.com/errata/RHSA-2016:1481
reference_id RHSA-2016:1481
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1481
54
reference_url https://access.redhat.com/errata/RHSA-2016:1602
reference_id RHSA-2016:1602
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1602
55
reference_url https://usn.ubuntu.com/2953-1/
reference_id USN-2953-1
reference_type
scores
url https://usn.ubuntu.com/2953-1/
56
reference_url https://usn.ubuntu.com/2954-1/
reference_id USN-2954-1
reference_type
scores
url https://usn.ubuntu.com/2954-1/
fixed_packages
0
url pkg:deb/debian/mariadb-10.0@10.0.25-0%2Bdeb8u1
purl pkg:deb/debian/mariadb-10.0@10.0.25-0%2Bdeb8u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1gmc-pj6y-rkfx
1
vulnerability VCID-2gyq-q761-h3br
2
vulnerability VCID-2rf6-qaey-1ubn
3
vulnerability VCID-45hn-ezks-j7br
4
vulnerability VCID-4cnj-7fur-3qe3
5
vulnerability VCID-4yz4-vxnh-b3dp
6
vulnerability VCID-5sjj-599v-vybg
7
vulnerability VCID-6g4n-3xfu-hfee
8
vulnerability VCID-6muh-rg1z-pqab
9
vulnerability VCID-8djb-knkk-s3c8
10
vulnerability VCID-8krv-jqjg-uqc8
11
vulnerability VCID-8kvb-5u8c-zbc4
12
vulnerability VCID-8sya-wktg-dqa5
13
vulnerability VCID-9f48-53dz-13an
14
vulnerability VCID-9ff2-43rk-2ydj
15
vulnerability VCID-9w98-nfg2-muh2
16
vulnerability VCID-bhxk-8byp-eyap
17
vulnerability VCID-ej67-ayfh-sqdt
18
vulnerability VCID-g1pp-9qqg-1beb
19
vulnerability VCID-gp4w-bdxg-6kab
20
vulnerability VCID-jgff-4jyp-9fgr
21
vulnerability VCID-mde2-1ynu-auh2
22
vulnerability VCID-mfgg-7s54-gqg8
23
vulnerability VCID-nkdd-suwp-4ffr
24
vulnerability VCID-p623-gxyv-g7fs
25
vulnerability VCID-pk7e-t26d-aqdm
26
vulnerability VCID-pv92-6p9x-v7bs
27
vulnerability VCID-r2cz-9kjz-zbgu
28
vulnerability VCID-rssq-mfc2-ckaf
29
vulnerability VCID-rted-6vzz-mbcv
30
vulnerability VCID-tvdv-3ed5-h3dt
31
vulnerability VCID-un5y-y9sq-1ufb
32
vulnerability VCID-v4gv-g9n5-ukgc
33
vulnerability VCID-vh5y-15tw-d7fd
34
vulnerability VCID-wrna-cc9g-sqbe
35
vulnerability VCID-yx79-3g2x-pqex
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.0@10.0.25-0%252Bdeb8u1
aliases CVE-2016-0647
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7tj3-dfxj-bke7
12
url VCID-7w3v-5s98-a7ec
vulnerability_id VCID-7w3v-5s98-a7ec
summary security update
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html
6
reference_url http://rhn.redhat.com/errata/RHSA-2016-0534.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0534.html
7
reference_url http://rhn.redhat.com/errata/RHSA-2016-0705.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0705.html
8
reference_url http://rhn.redhat.com/errata/RHSA-2016-1480.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-1480.html
9
reference_url http://rhn.redhat.com/errata/RHSA-2016-1481.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-1481.html
10
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2047.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2047.json
11
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-2047
reference_id
reference_type
scores
0
value 0.01749
scoring_system epss
scoring_elements 0.82585
published_at 2026-04-18T12:55:00Z
1
value 0.01749
scoring_system epss
scoring_elements 0.82554
published_at 2026-04-12T12:55:00Z
2
value 0.01749
scoring_system epss
scoring_elements 0.82549
published_at 2026-04-13T12:55:00Z
3
value 0.01749
scoring_system epss
scoring_elements 0.82477
published_at 2026-04-01T12:55:00Z
4
value 0.01749
scoring_system epss
scoring_elements 0.82492
published_at 2026-04-02T12:55:00Z
5
value 0.01749
scoring_system epss
scoring_elements 0.8251
published_at 2026-04-04T12:55:00Z
6
value 0.01749
scoring_system epss
scoring_elements 0.82506
published_at 2026-04-07T12:55:00Z
7
value 0.01749
scoring_system epss
scoring_elements 0.82532
published_at 2026-04-08T12:55:00Z
8
value 0.01749
scoring_system epss
scoring_elements 0.8254
published_at 2026-04-09T12:55:00Z
9
value 0.01749
scoring_system epss
scoring_elements 0.82558
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-2047
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0505
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0505
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0546
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0546
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0596
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0596
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0597
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0597
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0598
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0598
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0600
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0600
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0606
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0606
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0608
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0608
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0609
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0609
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0616
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0616
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0640
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0640
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0641
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0641
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0642
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0642
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0643
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0643
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0644
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0644
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0646
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0646
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0647
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0647
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0648
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0648
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0649
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0649
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0650
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0650
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0666
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0666
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2047
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2047
34
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:S/C:P/I:P/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
35
reference_url https://mariadb.atlassian.net/browse/MDEV-9212
reference_id
reference_type
scores
url https://mariadb.atlassian.net/browse/MDEV-9212
36
reference_url https://mariadb.com/kb/en/mariadb/mariadb-10110-release-notes/
reference_id
reference_type
scores
url https://mariadb.com/kb/en/mariadb/mariadb-10110-release-notes/
37
reference_url https://mariadb.com/kb/en/mariadb/mariadb-5547-release-notes/
reference_id
reference_type
scores
url https://mariadb.com/kb/en/mariadb/mariadb-5547-release-notes/
38
reference_url https://mariadb.com/kb/en/mdb-10023-rn/
reference_id
reference_type
scores
url https://mariadb.com/kb/en/mdb-10023-rn/
39
reference_url http://www.debian.org/security/2016/dsa-3453
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3453
40
reference_url http://www.debian.org/security/2016/dsa-3557
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3557
41
reference_url http://www.openwall.com/lists/oss-security/2016/01/26/3
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2016/01/26/3
42
reference_url http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
43
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
44
reference_url http://www.securityfocus.com/bid/81810
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/81810
45
reference_url http://www.securitytracker.com/id/1035606
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1035606
46
reference_url http://www.ubuntu.com/usn/USN-2953-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2953-1
47
reference_url http://www.ubuntu.com/usn/USN-2954-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2954-1
48
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1301874
reference_id 1301874
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1301874
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-2047
reference_id CVE-2016-2047
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:P/A:N
1
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2016-2047
62
reference_url https://access.redhat.com/errata/RHSA-2016:0534
reference_id RHSA-2016:0534
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0534
63
reference_url https://access.redhat.com/errata/RHSA-2016:0705
reference_id RHSA-2016:0705
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0705
64
reference_url https://access.redhat.com/errata/RHSA-2016:1132
reference_id RHSA-2016:1132
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1132
65
reference_url https://access.redhat.com/errata/RHSA-2016:1480
reference_id RHSA-2016:1480
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1480
66
reference_url https://access.redhat.com/errata/RHSA-2016:1481
reference_id RHSA-2016:1481
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1481
67
reference_url https://usn.ubuntu.com/2953-1/
reference_id USN-2953-1
reference_type
scores
url https://usn.ubuntu.com/2953-1/
68
reference_url https://usn.ubuntu.com/2954-1/
reference_id USN-2954-1
reference_type
scores
url https://usn.ubuntu.com/2954-1/
fixed_packages
0
url pkg:deb/debian/mariadb-10.0@10.0.25-0%2Bdeb8u1
purl pkg:deb/debian/mariadb-10.0@10.0.25-0%2Bdeb8u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1gmc-pj6y-rkfx
1
vulnerability VCID-2gyq-q761-h3br
2
vulnerability VCID-2rf6-qaey-1ubn
3
vulnerability VCID-45hn-ezks-j7br
4
vulnerability VCID-4cnj-7fur-3qe3
5
vulnerability VCID-4yz4-vxnh-b3dp
6
vulnerability VCID-5sjj-599v-vybg
7
vulnerability VCID-6g4n-3xfu-hfee
8
vulnerability VCID-6muh-rg1z-pqab
9
vulnerability VCID-8djb-knkk-s3c8
10
vulnerability VCID-8krv-jqjg-uqc8
11
vulnerability VCID-8kvb-5u8c-zbc4
12
vulnerability VCID-8sya-wktg-dqa5
13
vulnerability VCID-9f48-53dz-13an
14
vulnerability VCID-9ff2-43rk-2ydj
15
vulnerability VCID-9w98-nfg2-muh2
16
vulnerability VCID-bhxk-8byp-eyap
17
vulnerability VCID-ej67-ayfh-sqdt
18
vulnerability VCID-g1pp-9qqg-1beb
19
vulnerability VCID-gp4w-bdxg-6kab
20
vulnerability VCID-jgff-4jyp-9fgr
21
vulnerability VCID-mde2-1ynu-auh2
22
vulnerability VCID-mfgg-7s54-gqg8
23
vulnerability VCID-nkdd-suwp-4ffr
24
vulnerability VCID-p623-gxyv-g7fs
25
vulnerability VCID-pk7e-t26d-aqdm
26
vulnerability VCID-pv92-6p9x-v7bs
27
vulnerability VCID-r2cz-9kjz-zbgu
28
vulnerability VCID-rssq-mfc2-ckaf
29
vulnerability VCID-rted-6vzz-mbcv
30
vulnerability VCID-tvdv-3ed5-h3dt
31
vulnerability VCID-un5y-y9sq-1ufb
32
vulnerability VCID-v4gv-g9n5-ukgc
33
vulnerability VCID-vh5y-15tw-d7fd
34
vulnerability VCID-wrna-cc9g-sqbe
35
vulnerability VCID-yx79-3g2x-pqex
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.0@10.0.25-0%252Bdeb8u1
aliases CVE-2016-2047
risk_score 2.6
exploitability 0.5
weighted_severity 5.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7w3v-5s98-a7ec
13
url VCID-8c58-rvng-7fga
vulnerability_id VCID-8c58-rvng-7fga
summary
Multiple vulnerabilities have been found in MySQL, allowing
    attackers to execute arbitrary code or cause Denial of Service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0499.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0499.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-0499
reference_id
reference_type
scores
0
value 0.00329
scoring_system epss
scoring_elements 0.55807
published_at 2026-04-01T12:55:00Z
1
value 0.00329
scoring_system epss
scoring_elements 0.55918
published_at 2026-04-07T12:55:00Z
2
value 0.00329
scoring_system epss
scoring_elements 0.5594
published_at 2026-04-04T12:55:00Z
3
value 0.00329
scoring_system epss
scoring_elements 0.55969
published_at 2026-04-08T12:55:00Z
4
value 0.00329
scoring_system epss
scoring_elements 0.55971
published_at 2026-04-09T12:55:00Z
5
value 0.00329
scoring_system epss
scoring_elements 0.55981
published_at 2026-04-11T12:55:00Z
6
value 0.00329
scoring_system epss
scoring_elements 0.55961
published_at 2026-04-12T12:55:00Z
7
value 0.00329
scoring_system epss
scoring_elements 0.55943
published_at 2026-04-13T12:55:00Z
8
value 0.00329
scoring_system epss
scoring_elements 0.55979
published_at 2026-04-16T12:55:00Z
9
value 0.00329
scoring_system epss
scoring_elements 0.55982
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-0499
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0433
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0433
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0441
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0441
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0499
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0499
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0501
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0501
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0505
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0505
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2568
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2568
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2571
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2571
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2573
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2573
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2582
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2582
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2643
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2643
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2648
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2648
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3152
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3152
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4752
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4752
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4757
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4757
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1212768
reference_id 1212768
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1212768
17
reference_url https://security.gentoo.org/glsa/201507-19
reference_id GLSA-201507-19
reference_type
scores
url https://security.gentoo.org/glsa/201507-19
18
reference_url https://access.redhat.com/errata/RHSA-2015:1628
reference_id RHSA-2015:1628
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1628
19
reference_url https://access.redhat.com/errata/RHSA-2015:1629
reference_id RHSA-2015:1629
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1629
20
reference_url https://access.redhat.com/errata/RHSA-2015:1646
reference_id RHSA-2015:1646
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1646
21
reference_url https://access.redhat.com/errata/RHSA-2015:1647
reference_id RHSA-2015:1647
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1647
22
reference_url https://access.redhat.com/errata/RHSA-2015:1665
reference_id RHSA-2015:1665
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1665
23
reference_url https://usn.ubuntu.com/2575-1/
reference_id USN-2575-1
reference_type
scores
url https://usn.ubuntu.com/2575-1/
fixed_packages
0
url pkg:deb/debian/mariadb-10.0@10.0.25-0%2Bdeb8u1
purl pkg:deb/debian/mariadb-10.0@10.0.25-0%2Bdeb8u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1gmc-pj6y-rkfx
1
vulnerability VCID-2gyq-q761-h3br
2
vulnerability VCID-2rf6-qaey-1ubn
3
vulnerability VCID-45hn-ezks-j7br
4
vulnerability VCID-4cnj-7fur-3qe3
5
vulnerability VCID-4yz4-vxnh-b3dp
6
vulnerability VCID-5sjj-599v-vybg
7
vulnerability VCID-6g4n-3xfu-hfee
8
vulnerability VCID-6muh-rg1z-pqab
9
vulnerability VCID-8djb-knkk-s3c8
10
vulnerability VCID-8krv-jqjg-uqc8
11
vulnerability VCID-8kvb-5u8c-zbc4
12
vulnerability VCID-8sya-wktg-dqa5
13
vulnerability VCID-9f48-53dz-13an
14
vulnerability VCID-9ff2-43rk-2ydj
15
vulnerability VCID-9w98-nfg2-muh2
16
vulnerability VCID-bhxk-8byp-eyap
17
vulnerability VCID-ej67-ayfh-sqdt
18
vulnerability VCID-g1pp-9qqg-1beb
19
vulnerability VCID-gp4w-bdxg-6kab
20
vulnerability VCID-jgff-4jyp-9fgr
21
vulnerability VCID-mde2-1ynu-auh2
22
vulnerability VCID-mfgg-7s54-gqg8
23
vulnerability VCID-nkdd-suwp-4ffr
24
vulnerability VCID-p623-gxyv-g7fs
25
vulnerability VCID-pk7e-t26d-aqdm
26
vulnerability VCID-pv92-6p9x-v7bs
27
vulnerability VCID-r2cz-9kjz-zbgu
28
vulnerability VCID-rssq-mfc2-ckaf
29
vulnerability VCID-rted-6vzz-mbcv
30
vulnerability VCID-tvdv-3ed5-h3dt
31
vulnerability VCID-un5y-y9sq-1ufb
32
vulnerability VCID-v4gv-g9n5-ukgc
33
vulnerability VCID-vh5y-15tw-d7fd
34
vulnerability VCID-wrna-cc9g-sqbe
35
vulnerability VCID-yx79-3g2x-pqex
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.0@10.0.25-0%252Bdeb8u1
aliases CVE-2015-0499
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8c58-rvng-7fga
14
url VCID-9591-6344-yuga
vulnerability_id VCID-9591-6344-yuga
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4792.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4792.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-4792
reference_id
reference_type
scores
0
value 0.00906
scoring_system epss
scoring_elements 0.75688
published_at 2026-04-01T12:55:00Z
1
value 0.00906
scoring_system epss
scoring_elements 0.7569
published_at 2026-04-02T12:55:00Z
2
value 0.00906
scoring_system epss
scoring_elements 0.75721
published_at 2026-04-04T12:55:00Z
3
value 0.00906
scoring_system epss
scoring_elements 0.757
published_at 2026-04-07T12:55:00Z
4
value 0.00906
scoring_system epss
scoring_elements 0.75734
published_at 2026-04-08T12:55:00Z
5
value 0.00906
scoring_system epss
scoring_elements 0.75745
published_at 2026-04-13T12:55:00Z
6
value 0.00906
scoring_system epss
scoring_elements 0.75769
published_at 2026-04-11T12:55:00Z
7
value 0.00906
scoring_system epss
scoring_elements 0.75751
published_at 2026-04-12T12:55:00Z
8
value 0.00906
scoring_system epss
scoring_elements 0.75782
published_at 2026-04-16T12:55:00Z
9
value 0.00906
scoring_system epss
scoring_elements 0.75785
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-4792
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4792
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4792
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4802
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4802
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4815
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4815
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4816
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4816
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4819
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4819
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4826
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4826
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4830
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4830
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4836
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4836
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4858
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4858
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4861
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4861
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4870
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4870
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4879
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4879
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4895
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4895
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4913
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4913
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1274752
reference_id 1274752
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1274752
17
reference_url https://access.redhat.com/errata/RHSA-2016:0534
reference_id RHSA-2016:0534
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0534
18
reference_url https://access.redhat.com/errata/RHSA-2016:0705
reference_id RHSA-2016:0705
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0705
19
reference_url https://access.redhat.com/errata/RHSA-2016:1132
reference_id RHSA-2016:1132
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1132
20
reference_url https://access.redhat.com/errata/RHSA-2016:1480
reference_id RHSA-2016:1480
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1480
21
reference_url https://access.redhat.com/errata/RHSA-2016:1481
reference_id RHSA-2016:1481
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1481
22
reference_url https://usn.ubuntu.com/2781-1/
reference_id USN-2781-1
reference_type
scores
url https://usn.ubuntu.com/2781-1/
fixed_packages
0
url pkg:deb/debian/mariadb-10.0@10.0.25-0%2Bdeb8u1
purl pkg:deb/debian/mariadb-10.0@10.0.25-0%2Bdeb8u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1gmc-pj6y-rkfx
1
vulnerability VCID-2gyq-q761-h3br
2
vulnerability VCID-2rf6-qaey-1ubn
3
vulnerability VCID-45hn-ezks-j7br
4
vulnerability VCID-4cnj-7fur-3qe3
5
vulnerability VCID-4yz4-vxnh-b3dp
6
vulnerability VCID-5sjj-599v-vybg
7
vulnerability VCID-6g4n-3xfu-hfee
8
vulnerability VCID-6muh-rg1z-pqab
9
vulnerability VCID-8djb-knkk-s3c8
10
vulnerability VCID-8krv-jqjg-uqc8
11
vulnerability VCID-8kvb-5u8c-zbc4
12
vulnerability VCID-8sya-wktg-dqa5
13
vulnerability VCID-9f48-53dz-13an
14
vulnerability VCID-9ff2-43rk-2ydj
15
vulnerability VCID-9w98-nfg2-muh2
16
vulnerability VCID-bhxk-8byp-eyap
17
vulnerability VCID-ej67-ayfh-sqdt
18
vulnerability VCID-g1pp-9qqg-1beb
19
vulnerability VCID-gp4w-bdxg-6kab
20
vulnerability VCID-jgff-4jyp-9fgr
21
vulnerability VCID-mde2-1ynu-auh2
22
vulnerability VCID-mfgg-7s54-gqg8
23
vulnerability VCID-nkdd-suwp-4ffr
24
vulnerability VCID-p623-gxyv-g7fs
25
vulnerability VCID-pk7e-t26d-aqdm
26
vulnerability VCID-pv92-6p9x-v7bs
27
vulnerability VCID-r2cz-9kjz-zbgu
28
vulnerability VCID-rssq-mfc2-ckaf
29
vulnerability VCID-rted-6vzz-mbcv
30
vulnerability VCID-tvdv-3ed5-h3dt
31
vulnerability VCID-un5y-y9sq-1ufb
32
vulnerability VCID-v4gv-g9n5-ukgc
33
vulnerability VCID-vh5y-15tw-d7fd
34
vulnerability VCID-wrna-cc9g-sqbe
35
vulnerability VCID-yx79-3g2x-pqex
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.0@10.0.25-0%252Bdeb8u1
aliases CVE-2015-4792
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9591-6344-yuga
15
url VCID-9qd9-48p8-nyey
vulnerability_id VCID-9qd9-48p8-nyey
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4819.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4819.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-4819
reference_id
reference_type
scores
0
value 0.00089
scoring_system epss
scoring_elements 0.25406
published_at 2026-04-01T12:55:00Z
1
value 0.00089
scoring_system epss
scoring_elements 0.2547
published_at 2026-04-02T12:55:00Z
2
value 0.00089
scoring_system epss
scoring_elements 0.25506
published_at 2026-04-04T12:55:00Z
3
value 0.00089
scoring_system epss
scoring_elements 0.25278
published_at 2026-04-07T12:55:00Z
4
value 0.00089
scoring_system epss
scoring_elements 0.25346
published_at 2026-04-08T12:55:00Z
5
value 0.00089
scoring_system epss
scoring_elements 0.2539
published_at 2026-04-09T12:55:00Z
6
value 0.00089
scoring_system epss
scoring_elements 0.25402
published_at 2026-04-11T12:55:00Z
7
value 0.00089
scoring_system epss
scoring_elements 0.2536
published_at 2026-04-12T12:55:00Z
8
value 0.00089
scoring_system epss
scoring_elements 0.25307
published_at 2026-04-13T12:55:00Z
9
value 0.00089
scoring_system epss
scoring_elements 0.25314
published_at 2026-04-16T12:55:00Z
10
value 0.00089
scoring_system epss
scoring_elements 0.25305
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-4819
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4792
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4792
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4802
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4802
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4815
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4815
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4816
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4816
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4819
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4819
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4826
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4826
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4830
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4830
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4836
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4836
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4858
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4858
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4861
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4861
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4870
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4870
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4879
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4879
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4895
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4895
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4913
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4913
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1274764
reference_id 1274764
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1274764
17
reference_url https://access.redhat.com/errata/RHSA-2015:1628
reference_id RHSA-2015:1628
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1628
18
reference_url https://access.redhat.com/errata/RHSA-2015:1629
reference_id RHSA-2015:1629
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1629
19
reference_url https://access.redhat.com/errata/RHSA-2015:1630
reference_id RHSA-2015:1630
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1630
20
reference_url https://access.redhat.com/errata/RHSA-2016:0534
reference_id RHSA-2016:0534
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0534
21
reference_url https://access.redhat.com/errata/RHSA-2016:1132
reference_id RHSA-2016:1132
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1132
22
reference_url https://access.redhat.com/errata/RHSA-2016:1481
reference_id RHSA-2016:1481
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1481
23
reference_url https://usn.ubuntu.com/2781-1/
reference_id USN-2781-1
reference_type
scores
url https://usn.ubuntu.com/2781-1/
fixed_packages
0
url pkg:deb/debian/mariadb-10.0@10.0.25-0%2Bdeb8u1
purl pkg:deb/debian/mariadb-10.0@10.0.25-0%2Bdeb8u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1gmc-pj6y-rkfx
1
vulnerability VCID-2gyq-q761-h3br
2
vulnerability VCID-2rf6-qaey-1ubn
3
vulnerability VCID-45hn-ezks-j7br
4
vulnerability VCID-4cnj-7fur-3qe3
5
vulnerability VCID-4yz4-vxnh-b3dp
6
vulnerability VCID-5sjj-599v-vybg
7
vulnerability VCID-6g4n-3xfu-hfee
8
vulnerability VCID-6muh-rg1z-pqab
9
vulnerability VCID-8djb-knkk-s3c8
10
vulnerability VCID-8krv-jqjg-uqc8
11
vulnerability VCID-8kvb-5u8c-zbc4
12
vulnerability VCID-8sya-wktg-dqa5
13
vulnerability VCID-9f48-53dz-13an
14
vulnerability VCID-9ff2-43rk-2ydj
15
vulnerability VCID-9w98-nfg2-muh2
16
vulnerability VCID-bhxk-8byp-eyap
17
vulnerability VCID-ej67-ayfh-sqdt
18
vulnerability VCID-g1pp-9qqg-1beb
19
vulnerability VCID-gp4w-bdxg-6kab
20
vulnerability VCID-jgff-4jyp-9fgr
21
vulnerability VCID-mde2-1ynu-auh2
22
vulnerability VCID-mfgg-7s54-gqg8
23
vulnerability VCID-nkdd-suwp-4ffr
24
vulnerability VCID-p623-gxyv-g7fs
25
vulnerability VCID-pk7e-t26d-aqdm
26
vulnerability VCID-pv92-6p9x-v7bs
27
vulnerability VCID-r2cz-9kjz-zbgu
28
vulnerability VCID-rssq-mfc2-ckaf
29
vulnerability VCID-rted-6vzz-mbcv
30
vulnerability VCID-tvdv-3ed5-h3dt
31
vulnerability VCID-un5y-y9sq-1ufb
32
vulnerability VCID-v4gv-g9n5-ukgc
33
vulnerability VCID-vh5y-15tw-d7fd
34
vulnerability VCID-wrna-cc9g-sqbe
35
vulnerability VCID-yx79-3g2x-pqex
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.0@10.0.25-0%252Bdeb8u1
aliases CVE-2015-4819
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9qd9-48p8-nyey
16
url VCID-a3hx-qz7x-7ybk
vulnerability_id VCID-a3hx-qz7x-7ybk
summary security update
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:13Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:13Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:13Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:13Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:13Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:13Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html
6
reference_url http://rhn.redhat.com/errata/RHSA-2016-0705.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:13Z/
url http://rhn.redhat.com/errata/RHSA-2016-0705.html
7
reference_url http://rhn.redhat.com/errata/RHSA-2016-1480.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:13Z/
url http://rhn.redhat.com/errata/RHSA-2016-1480.html
8
reference_url http://rhn.redhat.com/errata/RHSA-2016-1481.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:13Z/
url http://rhn.redhat.com/errata/RHSA-2016-1481.html
9
reference_url http://rhn.redhat.com/errata/RHSA-2016-1602.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:13Z/
url http://rhn.redhat.com/errata/RHSA-2016-1602.html
10
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0649.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0649.json
11
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-0649
reference_id
reference_type
scores
0
value 0.00214
scoring_system epss
scoring_elements 0.43877
published_at 2026-04-01T12:55:00Z
1
value 0.00214
scoring_system epss
scoring_elements 0.43921
published_at 2026-04-02T12:55:00Z
2
value 0.00214
scoring_system epss
scoring_elements 0.43944
published_at 2026-04-11T12:55:00Z
3
value 0.00214
scoring_system epss
scoring_elements 0.43874
published_at 2026-04-07T12:55:00Z
4
value 0.00214
scoring_system epss
scoring_elements 0.43924
published_at 2026-04-08T12:55:00Z
5
value 0.00214
scoring_system epss
scoring_elements 0.43926
published_at 2026-04-09T12:55:00Z
6
value 0.00214
scoring_system epss
scoring_elements 0.43911
published_at 2026-04-12T12:55:00Z
7
value 0.00214
scoring_system epss
scoring_elements 0.43895
published_at 2026-04-13T12:55:00Z
8
value 0.00214
scoring_system epss
scoring_elements 0.43957
published_at 2026-04-16T12:55:00Z
9
value 0.00214
scoring_system epss
scoring_elements 0.43948
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-0649
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0640
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0640
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0641
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0641
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0642
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0642
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0643
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0643
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0644
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0644
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0646
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0646
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0647
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0647
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0648
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0648
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0649
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0649
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0650
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0650
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0655
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0655
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0666
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0666
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0668
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0668
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2047
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2047
26
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.6
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:S/C:N/I:N/A:C
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
27
reference_url https://mariadb.com/kb/en/mariadb/mariadb-10024-release-notes/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:13Z/
url https://mariadb.com/kb/en/mariadb/mariadb-10024-release-notes/
28
reference_url https://mariadb.com/kb/en/mariadb/mariadb-10112-release-notes/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:13Z/
url https://mariadb.com/kb/en/mariadb/mariadb-10112-release-notes/
29
reference_url https://mariadb.com/kb/en/mariadb/mariadb-5548-release-notes/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:13Z/
url https://mariadb.com/kb/en/mariadb/mariadb-5548-release-notes/
30
reference_url http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:13Z/
url http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168
31
reference_url http://www.debian.org/security/2016/dsa-3557
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:13Z/
url http://www.debian.org/security/2016/dsa-3557
32
reference_url http://www.debian.org/security/2016/dsa-3595
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:13Z/
url http://www.debian.org/security/2016/dsa-3595
33
reference_url http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:13Z/
url http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
34
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:13Z/
url http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
35
reference_url http://www.securityfocus.com/bid/86498
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:13Z/
url http://www.securityfocus.com/bid/86498
36
reference_url http://www.securitytracker.com/id/1035606
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:13Z/
url http://www.securitytracker.com/id/1035606
37
reference_url http://www.ubuntu.com/usn/USN-2953-1
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:13Z/
url http://www.ubuntu.com/usn/USN-2953-1
38
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1329252
reference_id 1329252
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1329252
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:powerkvm:2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ibm:powerkvm:2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:powerkvm:2.1:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:powerkvm:3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ibm:powerkvm:3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:powerkvm:3.1:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-0649
reference_id CVE-2016-0649
reference_type
scores
0
value 4.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:P
1
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2016-0649
49
reference_url https://access.redhat.com/errata/RHSA-2016:0705
reference_id RHSA-2016:0705
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0705
50
reference_url https://access.redhat.com/errata/RHSA-2016:1132
reference_id RHSA-2016:1132
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:13Z/
url https://access.redhat.com/errata/RHSA-2016:1132
51
reference_url https://access.redhat.com/errata/RHSA-2016:1480
reference_id RHSA-2016:1480
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1480
52
reference_url https://access.redhat.com/errata/RHSA-2016:1481
reference_id RHSA-2016:1481
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1481
53
reference_url https://access.redhat.com/errata/RHSA-2016:1602
reference_id RHSA-2016:1602
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1602
54
reference_url https://usn.ubuntu.com/2953-1/
reference_id USN-2953-1
reference_type
scores
url https://usn.ubuntu.com/2953-1/
fixed_packages
0
url pkg:deb/debian/mariadb-10.0@10.0.25-0%2Bdeb8u1
purl pkg:deb/debian/mariadb-10.0@10.0.25-0%2Bdeb8u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1gmc-pj6y-rkfx
1
vulnerability VCID-2gyq-q761-h3br
2
vulnerability VCID-2rf6-qaey-1ubn
3
vulnerability VCID-45hn-ezks-j7br
4
vulnerability VCID-4cnj-7fur-3qe3
5
vulnerability VCID-4yz4-vxnh-b3dp
6
vulnerability VCID-5sjj-599v-vybg
7
vulnerability VCID-6g4n-3xfu-hfee
8
vulnerability VCID-6muh-rg1z-pqab
9
vulnerability VCID-8djb-knkk-s3c8
10
vulnerability VCID-8krv-jqjg-uqc8
11
vulnerability VCID-8kvb-5u8c-zbc4
12
vulnerability VCID-8sya-wktg-dqa5
13
vulnerability VCID-9f48-53dz-13an
14
vulnerability VCID-9ff2-43rk-2ydj
15
vulnerability VCID-9w98-nfg2-muh2
16
vulnerability VCID-bhxk-8byp-eyap
17
vulnerability VCID-ej67-ayfh-sqdt
18
vulnerability VCID-g1pp-9qqg-1beb
19
vulnerability VCID-gp4w-bdxg-6kab
20
vulnerability VCID-jgff-4jyp-9fgr
21
vulnerability VCID-mde2-1ynu-auh2
22
vulnerability VCID-mfgg-7s54-gqg8
23
vulnerability VCID-nkdd-suwp-4ffr
24
vulnerability VCID-p623-gxyv-g7fs
25
vulnerability VCID-pk7e-t26d-aqdm
26
vulnerability VCID-pv92-6p9x-v7bs
27
vulnerability VCID-r2cz-9kjz-zbgu
28
vulnerability VCID-rssq-mfc2-ckaf
29
vulnerability VCID-rted-6vzz-mbcv
30
vulnerability VCID-tvdv-3ed5-h3dt
31
vulnerability VCID-un5y-y9sq-1ufb
32
vulnerability VCID-v4gv-g9n5-ukgc
33
vulnerability VCID-vh5y-15tw-d7fd
34
vulnerability VCID-wrna-cc9g-sqbe
35
vulnerability VCID-yx79-3g2x-pqex
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.0@10.0.25-0%252Bdeb8u1
aliases CVE-2016-0649
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-a3hx-qz7x-7ybk
17
url VCID-bfnh-7k45-nkg2
vulnerability_id VCID-bfnh-7k45-nkg2
summary security update
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:19Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:19Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:19Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:19Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:19Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:19Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html
6
reference_url http://rhn.redhat.com/errata/RHSA-2016-0705.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:19Z/
url http://rhn.redhat.com/errata/RHSA-2016-0705.html
7
reference_url http://rhn.redhat.com/errata/RHSA-2016-1480.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:19Z/
url http://rhn.redhat.com/errata/RHSA-2016-1480.html
8
reference_url http://rhn.redhat.com/errata/RHSA-2016-1481.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:19Z/
url http://rhn.redhat.com/errata/RHSA-2016-1481.html
9
reference_url http://rhn.redhat.com/errata/RHSA-2016-1602.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:19Z/
url http://rhn.redhat.com/errata/RHSA-2016-1602.html
10
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0646.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0646.json
11
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-0646
reference_id
reference_type
scores
0
value 0.00214
scoring_system epss
scoring_elements 0.43877
published_at 2026-04-01T12:55:00Z
1
value 0.00214
scoring_system epss
scoring_elements 0.43921
published_at 2026-04-02T12:55:00Z
2
value 0.00214
scoring_system epss
scoring_elements 0.43944
published_at 2026-04-11T12:55:00Z
3
value 0.00214
scoring_system epss
scoring_elements 0.43874
published_at 2026-04-07T12:55:00Z
4
value 0.00214
scoring_system epss
scoring_elements 0.43924
published_at 2026-04-08T12:55:00Z
5
value 0.00214
scoring_system epss
scoring_elements 0.43926
published_at 2026-04-09T12:55:00Z
6
value 0.00214
scoring_system epss
scoring_elements 0.43911
published_at 2026-04-12T12:55:00Z
7
value 0.00214
scoring_system epss
scoring_elements 0.43895
published_at 2026-04-13T12:55:00Z
8
value 0.00214
scoring_system epss
scoring_elements 0.43957
published_at 2026-04-16T12:55:00Z
9
value 0.00214
scoring_system epss
scoring_elements 0.43948
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-0646
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0640
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0640
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0641
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0641
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0642
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0642
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0643
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0643
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0644
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0644
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0646
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0646
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0647
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0647
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0648
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0648
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0649
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0649
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0650
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0650
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0655
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0655
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0666
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0666
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0668
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0668
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2047
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2047
26
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.6
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:S/C:N/I:N/A:C
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
27
reference_url https://mariadb.com/kb/en/mariadb/mariadb-10024-release-notes/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:19Z/
url https://mariadb.com/kb/en/mariadb/mariadb-10024-release-notes/
28
reference_url https://mariadb.com/kb/en/mariadb/mariadb-10112-release-notes/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:19Z/
url https://mariadb.com/kb/en/mariadb/mariadb-10112-release-notes/
29
reference_url https://mariadb.com/kb/en/mariadb/mariadb-5548-release-notes/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:19Z/
url https://mariadb.com/kb/en/mariadb/mariadb-5548-release-notes/
30
reference_url http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:19Z/
url http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168
31
reference_url http://www.debian.org/security/2016/dsa-3557
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:19Z/
url http://www.debian.org/security/2016/dsa-3557
32
reference_url http://www.debian.org/security/2016/dsa-3595
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:19Z/
url http://www.debian.org/security/2016/dsa-3595
33
reference_url http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:19Z/
url http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
34
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:19Z/
url http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
35
reference_url http://www.securityfocus.com/bid/86436
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:19Z/
url http://www.securityfocus.com/bid/86436
36
reference_url http://www.securitytracker.com/id/1035606
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:19Z/
url http://www.securitytracker.com/id/1035606
37
reference_url http://www.ubuntu.com/usn/USN-2953-1
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:19Z/
url http://www.ubuntu.com/usn/USN-2953-1
38
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1329248
reference_id 1329248
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1329248
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:powerkvm:2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ibm:powerkvm:2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:powerkvm:2.1:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:powerkvm:3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ibm:powerkvm:3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:powerkvm:3.1:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-0646
reference_id CVE-2016-0646
reference_type
scores
0
value 4.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:P
1
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2016-0646
49
reference_url https://access.redhat.com/errata/RHSA-2016:0705
reference_id RHSA-2016:0705
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0705
50
reference_url https://access.redhat.com/errata/RHSA-2016:1132
reference_id RHSA-2016:1132
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:19Z/
url https://access.redhat.com/errata/RHSA-2016:1132
51
reference_url https://access.redhat.com/errata/RHSA-2016:1480
reference_id RHSA-2016:1480
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1480
52
reference_url https://access.redhat.com/errata/RHSA-2016:1481
reference_id RHSA-2016:1481
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1481
53
reference_url https://access.redhat.com/errata/RHSA-2016:1602
reference_id RHSA-2016:1602
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1602
54
reference_url https://usn.ubuntu.com/2953-1/
reference_id USN-2953-1
reference_type
scores
url https://usn.ubuntu.com/2953-1/
fixed_packages
0
url pkg:deb/debian/mariadb-10.0@10.0.25-0%2Bdeb8u1
purl pkg:deb/debian/mariadb-10.0@10.0.25-0%2Bdeb8u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1gmc-pj6y-rkfx
1
vulnerability VCID-2gyq-q761-h3br
2
vulnerability VCID-2rf6-qaey-1ubn
3
vulnerability VCID-45hn-ezks-j7br
4
vulnerability VCID-4cnj-7fur-3qe3
5
vulnerability VCID-4yz4-vxnh-b3dp
6
vulnerability VCID-5sjj-599v-vybg
7
vulnerability VCID-6g4n-3xfu-hfee
8
vulnerability VCID-6muh-rg1z-pqab
9
vulnerability VCID-8djb-knkk-s3c8
10
vulnerability VCID-8krv-jqjg-uqc8
11
vulnerability VCID-8kvb-5u8c-zbc4
12
vulnerability VCID-8sya-wktg-dqa5
13
vulnerability VCID-9f48-53dz-13an
14
vulnerability VCID-9ff2-43rk-2ydj
15
vulnerability VCID-9w98-nfg2-muh2
16
vulnerability VCID-bhxk-8byp-eyap
17
vulnerability VCID-ej67-ayfh-sqdt
18
vulnerability VCID-g1pp-9qqg-1beb
19
vulnerability VCID-gp4w-bdxg-6kab
20
vulnerability VCID-jgff-4jyp-9fgr
21
vulnerability VCID-mde2-1ynu-auh2
22
vulnerability VCID-mfgg-7s54-gqg8
23
vulnerability VCID-nkdd-suwp-4ffr
24
vulnerability VCID-p623-gxyv-g7fs
25
vulnerability VCID-pk7e-t26d-aqdm
26
vulnerability VCID-pv92-6p9x-v7bs
27
vulnerability VCID-r2cz-9kjz-zbgu
28
vulnerability VCID-rssq-mfc2-ckaf
29
vulnerability VCID-rted-6vzz-mbcv
30
vulnerability VCID-tvdv-3ed5-h3dt
31
vulnerability VCID-un5y-y9sq-1ufb
32
vulnerability VCID-v4gv-g9n5-ukgc
33
vulnerability VCID-vh5y-15tw-d7fd
34
vulnerability VCID-wrna-cc9g-sqbe
35
vulnerability VCID-yx79-3g2x-pqex
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.0@10.0.25-0%252Bdeb8u1
aliases CVE-2016-0646
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bfnh-7k45-nkg2
18
url VCID-bjyw-emd1-zbfv
vulnerability_id VCID-bjyw-emd1-zbfv
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4816.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4816.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-4816
reference_id
reference_type
scores
0
value 0.04002
scoring_system epss
scoring_elements 0.88383
published_at 2026-04-01T12:55:00Z
1
value 0.04002
scoring_system epss
scoring_elements 0.88391
published_at 2026-04-02T12:55:00Z
2
value 0.04002
scoring_system epss
scoring_elements 0.884
published_at 2026-04-04T12:55:00Z
3
value 0.04002
scoring_system epss
scoring_elements 0.88404
published_at 2026-04-07T12:55:00Z
4
value 0.04002
scoring_system epss
scoring_elements 0.88423
published_at 2026-04-08T12:55:00Z
5
value 0.04002
scoring_system epss
scoring_elements 0.8843
published_at 2026-04-09T12:55:00Z
6
value 0.04002
scoring_system epss
scoring_elements 0.8844
published_at 2026-04-11T12:55:00Z
7
value 0.04002
scoring_system epss
scoring_elements 0.88433
published_at 2026-04-12T12:55:00Z
8
value 0.04002
scoring_system epss
scoring_elements 0.88432
published_at 2026-04-13T12:55:00Z
9
value 0.04002
scoring_system epss
scoring_elements 0.88447
published_at 2026-04-16T12:55:00Z
10
value 0.04002
scoring_system epss
scoring_elements 0.88444
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-4816
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4792
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4792
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4802
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4802
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4815
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4815
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4816
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4816
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4819
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4819
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4826
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4826
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4830
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4830
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4836
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4836
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4858
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4858
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4861
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4861
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4870
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4870
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4879
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4879
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4895
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4895
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4913
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4913
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1274761
reference_id 1274761
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1274761
17
reference_url https://access.redhat.com/errata/RHSA-2015:1628
reference_id RHSA-2015:1628
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1628
18
reference_url https://access.redhat.com/errata/RHSA-2015:1629
reference_id RHSA-2015:1629
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1629
19
reference_url https://access.redhat.com/errata/RHSA-2016:0534
reference_id RHSA-2016:0534
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0534
20
reference_url https://access.redhat.com/errata/RHSA-2016:1132
reference_id RHSA-2016:1132
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1132
21
reference_url https://access.redhat.com/errata/RHSA-2016:1481
reference_id RHSA-2016:1481
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1481
22
reference_url https://usn.ubuntu.com/2781-1/
reference_id USN-2781-1
reference_type
scores
url https://usn.ubuntu.com/2781-1/
fixed_packages
0
url pkg:deb/debian/mariadb-10.0@10.0.25-0%2Bdeb8u1
purl pkg:deb/debian/mariadb-10.0@10.0.25-0%2Bdeb8u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1gmc-pj6y-rkfx
1
vulnerability VCID-2gyq-q761-h3br
2
vulnerability VCID-2rf6-qaey-1ubn
3
vulnerability VCID-45hn-ezks-j7br
4
vulnerability VCID-4cnj-7fur-3qe3
5
vulnerability VCID-4yz4-vxnh-b3dp
6
vulnerability VCID-5sjj-599v-vybg
7
vulnerability VCID-6g4n-3xfu-hfee
8
vulnerability VCID-6muh-rg1z-pqab
9
vulnerability VCID-8djb-knkk-s3c8
10
vulnerability VCID-8krv-jqjg-uqc8
11
vulnerability VCID-8kvb-5u8c-zbc4
12
vulnerability VCID-8sya-wktg-dqa5
13
vulnerability VCID-9f48-53dz-13an
14
vulnerability VCID-9ff2-43rk-2ydj
15
vulnerability VCID-9w98-nfg2-muh2
16
vulnerability VCID-bhxk-8byp-eyap
17
vulnerability VCID-ej67-ayfh-sqdt
18
vulnerability VCID-g1pp-9qqg-1beb
19
vulnerability VCID-gp4w-bdxg-6kab
20
vulnerability VCID-jgff-4jyp-9fgr
21
vulnerability VCID-mde2-1ynu-auh2
22
vulnerability VCID-mfgg-7s54-gqg8
23
vulnerability VCID-nkdd-suwp-4ffr
24
vulnerability VCID-p623-gxyv-g7fs
25
vulnerability VCID-pk7e-t26d-aqdm
26
vulnerability VCID-pv92-6p9x-v7bs
27
vulnerability VCID-r2cz-9kjz-zbgu
28
vulnerability VCID-rssq-mfc2-ckaf
29
vulnerability VCID-rted-6vzz-mbcv
30
vulnerability VCID-tvdv-3ed5-h3dt
31
vulnerability VCID-un5y-y9sq-1ufb
32
vulnerability VCID-v4gv-g9n5-ukgc
33
vulnerability VCID-vh5y-15tw-d7fd
34
vulnerability VCID-wrna-cc9g-sqbe
35
vulnerability VCID-yx79-3g2x-pqex
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.0@10.0.25-0%252Bdeb8u1
aliases CVE-2015-4816
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bjyw-emd1-zbfv
19
url VCID-ca85-vx8c-huht
vulnerability_id VCID-ca85-vx8c-huht
summary security update
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:11Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:11Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:11Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:11Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:11Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:11Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html
6
reference_url http://rhn.redhat.com/errata/RHSA-2016-0705.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:11Z/
url http://rhn.redhat.com/errata/RHSA-2016-0705.html
7
reference_url http://rhn.redhat.com/errata/RHSA-2016-1480.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:11Z/
url http://rhn.redhat.com/errata/RHSA-2016-1480.html
8
reference_url http://rhn.redhat.com/errata/RHSA-2016-1481.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:11Z/
url http://rhn.redhat.com/errata/RHSA-2016-1481.html
9
reference_url http://rhn.redhat.com/errata/RHSA-2016-1602.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:11Z/
url http://rhn.redhat.com/errata/RHSA-2016-1602.html
10
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0650.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0650.json
11
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-0650
reference_id
reference_type
scores
0
value 0.00214
scoring_system epss
scoring_elements 0.43877
published_at 2026-04-01T12:55:00Z
1
value 0.00214
scoring_system epss
scoring_elements 0.43921
published_at 2026-04-02T12:55:00Z
2
value 0.00214
scoring_system epss
scoring_elements 0.43944
published_at 2026-04-11T12:55:00Z
3
value 0.00214
scoring_system epss
scoring_elements 0.43874
published_at 2026-04-07T12:55:00Z
4
value 0.00214
scoring_system epss
scoring_elements 0.43924
published_at 2026-04-08T12:55:00Z
5
value 0.00214
scoring_system epss
scoring_elements 0.43926
published_at 2026-04-09T12:55:00Z
6
value 0.00214
scoring_system epss
scoring_elements 0.43911
published_at 2026-04-12T12:55:00Z
7
value 0.00214
scoring_system epss
scoring_elements 0.43895
published_at 2026-04-13T12:55:00Z
8
value 0.00214
scoring_system epss
scoring_elements 0.43957
published_at 2026-04-16T12:55:00Z
9
value 0.00214
scoring_system epss
scoring_elements 0.43948
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-0650
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0640
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0640
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0641
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0641
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0642
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0642
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0643
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0643
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0644
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0644
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0646
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0646
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0647
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0647
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0648
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0648
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0649
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0649
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0650
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0650
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0655
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0655
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0666
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0666
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0668
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0668
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2047
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2047
26
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.6
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:S/C:N/I:N/A:C
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
27
reference_url https://mariadb.com/kb/en/mariadb/mariadb-10024-release-notes/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:11Z/
url https://mariadb.com/kb/en/mariadb/mariadb-10024-release-notes/
28
reference_url https://mariadb.com/kb/en/mariadb/mariadb-10112-release-notes/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:11Z/
url https://mariadb.com/kb/en/mariadb/mariadb-10112-release-notes/
29
reference_url https://mariadb.com/kb/en/mariadb/mariadb-5548-release-notes/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:11Z/
url https://mariadb.com/kb/en/mariadb/mariadb-5548-release-notes/
30
reference_url http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:11Z/
url http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168
31
reference_url http://www.debian.org/security/2016/dsa-3557
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:11Z/
url http://www.debian.org/security/2016/dsa-3557
32
reference_url http://www.debian.org/security/2016/dsa-3595
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:11Z/
url http://www.debian.org/security/2016/dsa-3595
33
reference_url http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:11Z/
url http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
34
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:11Z/
url http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
35
reference_url http://www.securityfocus.com/bid/86496
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:11Z/
url http://www.securityfocus.com/bid/86496
36
reference_url http://www.securitytracker.com/id/1035606
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:11Z/
url http://www.securitytracker.com/id/1035606
37
reference_url http://www.ubuntu.com/usn/USN-2953-1
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:11Z/
url http://www.ubuntu.com/usn/USN-2953-1
38
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1329253
reference_id 1329253
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1329253
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:powerkvm:2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ibm:powerkvm:2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:powerkvm:2.1:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:powerkvm:3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ibm:powerkvm:3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:powerkvm:3.1:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-0650
reference_id CVE-2016-0650
reference_type
scores
0
value 4.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:P
1
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2016-0650
49
reference_url https://access.redhat.com/errata/RHSA-2016:0705
reference_id RHSA-2016:0705
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0705
50
reference_url https://access.redhat.com/errata/RHSA-2016:1132
reference_id RHSA-2016:1132
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:11Z/
url https://access.redhat.com/errata/RHSA-2016:1132
51
reference_url https://access.redhat.com/errata/RHSA-2016:1480
reference_id RHSA-2016:1480
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1480
52
reference_url https://access.redhat.com/errata/RHSA-2016:1481
reference_id RHSA-2016:1481
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1481
53
reference_url https://access.redhat.com/errata/RHSA-2016:1602
reference_id RHSA-2016:1602
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1602
54
reference_url https://usn.ubuntu.com/2953-1/
reference_id USN-2953-1
reference_type
scores
url https://usn.ubuntu.com/2953-1/
fixed_packages
0
url pkg:deb/debian/mariadb-10.0@10.0.25-0%2Bdeb8u1
purl pkg:deb/debian/mariadb-10.0@10.0.25-0%2Bdeb8u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1gmc-pj6y-rkfx
1
vulnerability VCID-2gyq-q761-h3br
2
vulnerability VCID-2rf6-qaey-1ubn
3
vulnerability VCID-45hn-ezks-j7br
4
vulnerability VCID-4cnj-7fur-3qe3
5
vulnerability VCID-4yz4-vxnh-b3dp
6
vulnerability VCID-5sjj-599v-vybg
7
vulnerability VCID-6g4n-3xfu-hfee
8
vulnerability VCID-6muh-rg1z-pqab
9
vulnerability VCID-8djb-knkk-s3c8
10
vulnerability VCID-8krv-jqjg-uqc8
11
vulnerability VCID-8kvb-5u8c-zbc4
12
vulnerability VCID-8sya-wktg-dqa5
13
vulnerability VCID-9f48-53dz-13an
14
vulnerability VCID-9ff2-43rk-2ydj
15
vulnerability VCID-9w98-nfg2-muh2
16
vulnerability VCID-bhxk-8byp-eyap
17
vulnerability VCID-ej67-ayfh-sqdt
18
vulnerability VCID-g1pp-9qqg-1beb
19
vulnerability VCID-gp4w-bdxg-6kab
20
vulnerability VCID-jgff-4jyp-9fgr
21
vulnerability VCID-mde2-1ynu-auh2
22
vulnerability VCID-mfgg-7s54-gqg8
23
vulnerability VCID-nkdd-suwp-4ffr
24
vulnerability VCID-p623-gxyv-g7fs
25
vulnerability VCID-pk7e-t26d-aqdm
26
vulnerability VCID-pv92-6p9x-v7bs
27
vulnerability VCID-r2cz-9kjz-zbgu
28
vulnerability VCID-rssq-mfc2-ckaf
29
vulnerability VCID-rted-6vzz-mbcv
30
vulnerability VCID-tvdv-3ed5-h3dt
31
vulnerability VCID-un5y-y9sq-1ufb
32
vulnerability VCID-v4gv-g9n5-ukgc
33
vulnerability VCID-vh5y-15tw-d7fd
34
vulnerability VCID-wrna-cc9g-sqbe
35
vulnerability VCID-yx79-3g2x-pqex
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.0@10.0.25-0%252Bdeb8u1
aliases CVE-2016-0650
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ca85-vx8c-huht
20
url VCID-ceyn-dgzv-5qak
vulnerability_id VCID-ceyn-dgzv-5qak
summary security update
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:02Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:02Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:02Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:02Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:02Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html
5
reference_url http://rhn.redhat.com/errata/RHSA-2016-0705.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:02Z/
url http://rhn.redhat.com/errata/RHSA-2016-0705.html
6
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0655.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0655.json
7
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-0655
reference_id
reference_type
scores
0
value 0.00244
scoring_system epss
scoring_elements 0.47627
published_at 2026-04-01T12:55:00Z
1
value 0.00244
scoring_system epss
scoring_elements 0.47665
published_at 2026-04-02T12:55:00Z
2
value 0.00244
scoring_system epss
scoring_elements 0.47686
published_at 2026-04-09T12:55:00Z
3
value 0.00244
scoring_system epss
scoring_elements 0.47636
published_at 2026-04-07T12:55:00Z
4
value 0.00244
scoring_system epss
scoring_elements 0.47691
published_at 2026-04-08T12:55:00Z
5
value 0.00244
scoring_system epss
scoring_elements 0.4771
published_at 2026-04-11T12:55:00Z
6
value 0.00244
scoring_system epss
scoring_elements 0.47687
published_at 2026-04-12T12:55:00Z
7
value 0.00244
scoring_system epss
scoring_elements 0.47696
published_at 2026-04-13T12:55:00Z
8
value 0.00244
scoring_system epss
scoring_elements 0.47752
published_at 2026-04-16T12:55:00Z
9
value 0.00244
scoring_system epss
scoring_elements 0.47745
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-0655
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0640
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0640
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0641
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0641
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0643
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0643
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0644
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0644
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0646
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0646
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0647
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0647
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0648
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0648
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0649
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0649
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0650
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0650
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0655
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0655
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0666
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0666
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0668
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0668
20
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4
scoring_system cvssv2
scoring_elements AV:L/AC:H/Au:N/C:N/I:N/A:C
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
21
reference_url https://mariadb.com/kb/en/mariadb/mariadb-10025-release-notes/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:02Z/
url https://mariadb.com/kb/en/mariadb/mariadb-10025-release-notes/
22
reference_url https://mariadb.com/kb/en/mariadb/mariadb-10114-release-notes/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:02Z/
url https://mariadb.com/kb/en/mariadb/mariadb-10114-release-notes/
23
reference_url http://www.debian.org/security/2016/dsa-3595
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:02Z/
url http://www.debian.org/security/2016/dsa-3595
24
reference_url http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:02Z/
url http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
25
reference_url http://www.securityfocus.com/bid/86424
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:02Z/
url http://www.securityfocus.com/bid/86424
26
reference_url http://www.securitytracker.com/id/1035606
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:02Z/
url http://www.securitytracker.com/id/1035606
27
reference_url http://www.ubuntu.com/usn/USN-2953-1
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:02Z/
url http://www.ubuntu.com/usn/USN-2953-1
28
reference_url http://www.ubuntu.com/usn/USN-2954-1
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:02Z/
url http://www.ubuntu.com/usn/USN-2954-1
29
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1329259
reference_id 1329259
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1329259
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-0655
reference_id CVE-2016-0655
reference_type
scores
0
value 3.5
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:S/C:N/I:N/A:P
1
value 4.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2016-0655
37
reference_url https://access.redhat.com/errata/RHSA-2016:0705
reference_id RHSA-2016:0705
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0705
38
reference_url https://access.redhat.com/errata/RHSA-2016:1132
reference_id RHSA-2016:1132
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:02Z/
url https://access.redhat.com/errata/RHSA-2016:1132
39
reference_url https://usn.ubuntu.com/2953-1/
reference_id USN-2953-1
reference_type
scores
url https://usn.ubuntu.com/2953-1/
40
reference_url https://usn.ubuntu.com/2954-1/
reference_id USN-2954-1
reference_type
scores
url https://usn.ubuntu.com/2954-1/
fixed_packages
0
url pkg:deb/debian/mariadb-10.0@10.0.25-0%2Bdeb8u1
purl pkg:deb/debian/mariadb-10.0@10.0.25-0%2Bdeb8u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1gmc-pj6y-rkfx
1
vulnerability VCID-2gyq-q761-h3br
2
vulnerability VCID-2rf6-qaey-1ubn
3
vulnerability VCID-45hn-ezks-j7br
4
vulnerability VCID-4cnj-7fur-3qe3
5
vulnerability VCID-4yz4-vxnh-b3dp
6
vulnerability VCID-5sjj-599v-vybg
7
vulnerability VCID-6g4n-3xfu-hfee
8
vulnerability VCID-6muh-rg1z-pqab
9
vulnerability VCID-8djb-knkk-s3c8
10
vulnerability VCID-8krv-jqjg-uqc8
11
vulnerability VCID-8kvb-5u8c-zbc4
12
vulnerability VCID-8sya-wktg-dqa5
13
vulnerability VCID-9f48-53dz-13an
14
vulnerability VCID-9ff2-43rk-2ydj
15
vulnerability VCID-9w98-nfg2-muh2
16
vulnerability VCID-bhxk-8byp-eyap
17
vulnerability VCID-ej67-ayfh-sqdt
18
vulnerability VCID-g1pp-9qqg-1beb
19
vulnerability VCID-gp4w-bdxg-6kab
20
vulnerability VCID-jgff-4jyp-9fgr
21
vulnerability VCID-mde2-1ynu-auh2
22
vulnerability VCID-mfgg-7s54-gqg8
23
vulnerability VCID-nkdd-suwp-4ffr
24
vulnerability VCID-p623-gxyv-g7fs
25
vulnerability VCID-pk7e-t26d-aqdm
26
vulnerability VCID-pv92-6p9x-v7bs
27
vulnerability VCID-r2cz-9kjz-zbgu
28
vulnerability VCID-rssq-mfc2-ckaf
29
vulnerability VCID-rted-6vzz-mbcv
30
vulnerability VCID-tvdv-3ed5-h3dt
31
vulnerability VCID-un5y-y9sq-1ufb
32
vulnerability VCID-v4gv-g9n5-ukgc
33
vulnerability VCID-vh5y-15tw-d7fd
34
vulnerability VCID-wrna-cc9g-sqbe
35
vulnerability VCID-yx79-3g2x-pqex
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.0@10.0.25-0%252Bdeb8u1
aliases CVE-2016-0655
risk_score 2.1
exploitability 0.5
weighted_severity 4.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ceyn-dgzv-5qak
21
url VCID-ctzs-ypzj-t7dg
vulnerability_id VCID-ctzs-ypzj-t7dg
summary security update
references
0
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177539.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177539.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00010.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00010.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00011.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00011.html
3
reference_url http://lists.opensuse.org/opensuse-updates/2016-02/msg00039.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2016-02/msg00039.html
4
reference_url http://rhn.redhat.com/errata/RHSA-2016-0534.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0534.html
5
reference_url http://rhn.redhat.com/errata/RHSA-2016-0705.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0705.html
6
reference_url http://rhn.redhat.com/errata/RHSA-2016-1480.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-1480.html
7
reference_url http://rhn.redhat.com/errata/RHSA-2016-1481.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-1481.html
8
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4826.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4826.json
9
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-4826
reference_id
reference_type
scores
0
value 0.00276
scoring_system epss
scoring_elements 0.51075
published_at 2026-04-18T12:55:00Z
1
value 0.00276
scoring_system epss
scoring_elements 0.50937
published_at 2026-04-01T12:55:00Z
2
value 0.00276
scoring_system epss
scoring_elements 0.5099
published_at 2026-04-02T12:55:00Z
3
value 0.00276
scoring_system epss
scoring_elements 0.51015
published_at 2026-04-04T12:55:00Z
4
value 0.00276
scoring_system epss
scoring_elements 0.50974
published_at 2026-04-07T12:55:00Z
5
value 0.00276
scoring_system epss
scoring_elements 0.51031
published_at 2026-04-13T12:55:00Z
6
value 0.00276
scoring_system epss
scoring_elements 0.51027
published_at 2026-04-09T12:55:00Z
7
value 0.00276
scoring_system epss
scoring_elements 0.5107
published_at 2026-04-11T12:55:00Z
8
value 0.00276
scoring_system epss
scoring_elements 0.51048
published_at 2026-04-12T12:55:00Z
9
value 0.00276
scoring_system epss
scoring_elements 0.51069
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-4826
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4792
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4792
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4802
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4802
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4815
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4815
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4816
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4816
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4819
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4819
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4826
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4826
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4830
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4830
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4836
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4836
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4858
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4858
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4861
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4861
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4870
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4870
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4879
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4879
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4895
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4895
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4913
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4913
24
reference_url https://www.suse.com/support/update/announcement/2016/suse-su-20160296-1.html
reference_id
reference_type
scores
url https://www.suse.com/support/update/announcement/2016/suse-su-20160296-1.html
25
reference_url http://www.debian.org/security/2015/dsa-3377
reference_id
reference_type
scores
url http://www.debian.org/security/2015/dsa-3377
26
reference_url http://www.debian.org/security/2015/dsa-3385
reference_id
reference_type
scores
url http://www.debian.org/security/2015/dsa-3385
27
reference_url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
28
reference_url http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
29
reference_url http://www.securityfocus.com/bid/77237
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/77237
30
reference_url http://www.securitytracker.com/id/1033894
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1033894
31
reference_url http://www.ubuntu.com/usn/USN-2781-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2781-1
32
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1274766
reference_id 1274766
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1274766
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.1:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-4826
reference_id CVE-2015-4826
reference_type
scores
0
value 4.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:P/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2015-4826
64
reference_url https://access.redhat.com/errata/RHSA-2016:0534
reference_id RHSA-2016:0534
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0534
65
reference_url https://access.redhat.com/errata/RHSA-2016:0705
reference_id RHSA-2016:0705
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0705
66
reference_url https://access.redhat.com/errata/RHSA-2016:1132
reference_id RHSA-2016:1132
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1132
67
reference_url https://access.redhat.com/errata/RHSA-2016:1480
reference_id RHSA-2016:1480
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1480
68
reference_url https://access.redhat.com/errata/RHSA-2016:1481
reference_id RHSA-2016:1481
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1481
69
reference_url https://usn.ubuntu.com/2781-1/
reference_id USN-2781-1
reference_type
scores
url https://usn.ubuntu.com/2781-1/
fixed_packages
0
url pkg:deb/debian/mariadb-10.0@10.0.25-0%2Bdeb8u1
purl pkg:deb/debian/mariadb-10.0@10.0.25-0%2Bdeb8u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1gmc-pj6y-rkfx
1
vulnerability VCID-2gyq-q761-h3br
2
vulnerability VCID-2rf6-qaey-1ubn
3
vulnerability VCID-45hn-ezks-j7br
4
vulnerability VCID-4cnj-7fur-3qe3
5
vulnerability VCID-4yz4-vxnh-b3dp
6
vulnerability VCID-5sjj-599v-vybg
7
vulnerability VCID-6g4n-3xfu-hfee
8
vulnerability VCID-6muh-rg1z-pqab
9
vulnerability VCID-8djb-knkk-s3c8
10
vulnerability VCID-8krv-jqjg-uqc8
11
vulnerability VCID-8kvb-5u8c-zbc4
12
vulnerability VCID-8sya-wktg-dqa5
13
vulnerability VCID-9f48-53dz-13an
14
vulnerability VCID-9ff2-43rk-2ydj
15
vulnerability VCID-9w98-nfg2-muh2
16
vulnerability VCID-bhxk-8byp-eyap
17
vulnerability VCID-ej67-ayfh-sqdt
18
vulnerability VCID-g1pp-9qqg-1beb
19
vulnerability VCID-gp4w-bdxg-6kab
20
vulnerability VCID-jgff-4jyp-9fgr
21
vulnerability VCID-mde2-1ynu-auh2
22
vulnerability VCID-mfgg-7s54-gqg8
23
vulnerability VCID-nkdd-suwp-4ffr
24
vulnerability VCID-p623-gxyv-g7fs
25
vulnerability VCID-pk7e-t26d-aqdm
26
vulnerability VCID-pv92-6p9x-v7bs
27
vulnerability VCID-r2cz-9kjz-zbgu
28
vulnerability VCID-rssq-mfc2-ckaf
29
vulnerability VCID-rted-6vzz-mbcv
30
vulnerability VCID-tvdv-3ed5-h3dt
31
vulnerability VCID-un5y-y9sq-1ufb
32
vulnerability VCID-v4gv-g9n5-ukgc
33
vulnerability VCID-vh5y-15tw-d7fd
34
vulnerability VCID-wrna-cc9g-sqbe
35
vulnerability VCID-yx79-3g2x-pqex
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.0@10.0.25-0%252Bdeb8u1
aliases CVE-2015-4826
risk_score 1.8
exploitability 0.5
weighted_severity 3.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ctzs-ypzj-t7dg
22
url VCID-cyqa-e362-yyaf
vulnerability_id VCID-cyqa-e362-yyaf
summary security update
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:24Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:24Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:24Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:24Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:24Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:24Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html
6
reference_url http://rhn.redhat.com/errata/RHSA-2016-0705.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:24Z/
url http://rhn.redhat.com/errata/RHSA-2016-0705.html
7
reference_url http://rhn.redhat.com/errata/RHSA-2016-1480.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:24Z/
url http://rhn.redhat.com/errata/RHSA-2016-1480.html
8
reference_url http://rhn.redhat.com/errata/RHSA-2016-1481.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:24Z/
url http://rhn.redhat.com/errata/RHSA-2016-1481.html
9
reference_url http://rhn.redhat.com/errata/RHSA-2016-1602.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:24Z/
url http://rhn.redhat.com/errata/RHSA-2016-1602.html
10
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0643.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0643.json
11
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-0643
reference_id
reference_type
scores
0
value 0.00267
scoring_system epss
scoring_elements 0.50117
published_at 2026-04-01T12:55:00Z
1
value 0.00267
scoring_system epss
scoring_elements 0.50162
published_at 2026-04-02T12:55:00Z
2
value 0.00267
scoring_system epss
scoring_elements 0.5019
published_at 2026-04-12T12:55:00Z
3
value 0.00267
scoring_system epss
scoring_elements 0.5014
published_at 2026-04-07T12:55:00Z
4
value 0.00267
scoring_system epss
scoring_elements 0.50194
published_at 2026-04-08T12:55:00Z
5
value 0.00267
scoring_system epss
scoring_elements 0.50187
published_at 2026-04-09T12:55:00Z
6
value 0.00267
scoring_system epss
scoring_elements 0.50216
published_at 2026-04-11T12:55:00Z
7
value 0.00267
scoring_system epss
scoring_elements 0.50177
published_at 2026-04-13T12:55:00Z
8
value 0.00267
scoring_system epss
scoring_elements 0.50221
published_at 2026-04-16T12:55:00Z
9
value 0.00267
scoring_system epss
scoring_elements 0.50222
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-0643
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0640
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0640
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0641
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0641
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0642
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0642
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0643
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0643
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0644
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0644
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0646
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0646
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0647
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0647
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0648
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0648
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0649
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0649
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0650
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0650
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0655
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0655
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0666
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0666
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0668
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0668
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2047
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2047
26
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 1.7
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:S/C:P/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
27
reference_url https://mariadb.com/kb/en/mariadb/mariadb-10025-release-notes/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:24Z/
url https://mariadb.com/kb/en/mariadb/mariadb-10025-release-notes/
28
reference_url https://mariadb.com/kb/en/mariadb/mariadb-10114-release-notes/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:24Z/
url https://mariadb.com/kb/en/mariadb/mariadb-10114-release-notes/
29
reference_url https://mariadb.com/kb/en/mariadb/mariadb-5549-release-notes/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:24Z/
url https://mariadb.com/kb/en/mariadb/mariadb-5549-release-notes/
30
reference_url http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:24Z/
url http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168
31
reference_url http://www.debian.org/security/2016/dsa-3557
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:24Z/
url http://www.debian.org/security/2016/dsa-3557
32
reference_url http://www.debian.org/security/2016/dsa-3595
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:24Z/
url http://www.debian.org/security/2016/dsa-3595
33
reference_url http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:24Z/
url http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
34
reference_url http://www.securityfocus.com/bid/86486
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:24Z/
url http://www.securityfocus.com/bid/86486
35
reference_url http://www.securitytracker.com/id/1035606
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:24Z/
url http://www.securitytracker.com/id/1035606
36
reference_url http://www.ubuntu.com/usn/USN-2953-1
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:24Z/
url http://www.ubuntu.com/usn/USN-2953-1
37
reference_url http://www.ubuntu.com/usn/USN-2954-1
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:24Z/
url http://www.ubuntu.com/usn/USN-2954-1
38
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1329245
reference_id 1329245
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1329245
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:powerkvm:2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ibm:powerkvm:2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:powerkvm:2.1:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:powerkvm:3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ibm:powerkvm:3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:powerkvm:3.1:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-0643
reference_id CVE-2016-0643
reference_type
scores
0
value 4.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:P/I:N/A:N
1
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2016-0643
48
reference_url https://access.redhat.com/errata/RHSA-2016:0705
reference_id RHSA-2016:0705
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0705
49
reference_url https://access.redhat.com/errata/RHSA-2016:1132
reference_id RHSA-2016:1132
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:24Z/
url https://access.redhat.com/errata/RHSA-2016:1132
50
reference_url https://access.redhat.com/errata/RHSA-2016:1480
reference_id RHSA-2016:1480
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1480
51
reference_url https://access.redhat.com/errata/RHSA-2016:1481
reference_id RHSA-2016:1481
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1481
52
reference_url https://access.redhat.com/errata/RHSA-2016:1602
reference_id RHSA-2016:1602
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1602
53
reference_url https://usn.ubuntu.com/2953-1/
reference_id USN-2953-1
reference_type
scores
url https://usn.ubuntu.com/2953-1/
54
reference_url https://usn.ubuntu.com/2954-1/
reference_id USN-2954-1
reference_type
scores
url https://usn.ubuntu.com/2954-1/
fixed_packages
0
url pkg:deb/debian/mariadb-10.0@10.0.25-0%2Bdeb8u1
purl pkg:deb/debian/mariadb-10.0@10.0.25-0%2Bdeb8u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1gmc-pj6y-rkfx
1
vulnerability VCID-2gyq-q761-h3br
2
vulnerability VCID-2rf6-qaey-1ubn
3
vulnerability VCID-45hn-ezks-j7br
4
vulnerability VCID-4cnj-7fur-3qe3
5
vulnerability VCID-4yz4-vxnh-b3dp
6
vulnerability VCID-5sjj-599v-vybg
7
vulnerability VCID-6g4n-3xfu-hfee
8
vulnerability VCID-6muh-rg1z-pqab
9
vulnerability VCID-8djb-knkk-s3c8
10
vulnerability VCID-8krv-jqjg-uqc8
11
vulnerability VCID-8kvb-5u8c-zbc4
12
vulnerability VCID-8sya-wktg-dqa5
13
vulnerability VCID-9f48-53dz-13an
14
vulnerability VCID-9ff2-43rk-2ydj
15
vulnerability VCID-9w98-nfg2-muh2
16
vulnerability VCID-bhxk-8byp-eyap
17
vulnerability VCID-ej67-ayfh-sqdt
18
vulnerability VCID-g1pp-9qqg-1beb
19
vulnerability VCID-gp4w-bdxg-6kab
20
vulnerability VCID-jgff-4jyp-9fgr
21
vulnerability VCID-mde2-1ynu-auh2
22
vulnerability VCID-mfgg-7s54-gqg8
23
vulnerability VCID-nkdd-suwp-4ffr
24
vulnerability VCID-p623-gxyv-g7fs
25
vulnerability VCID-pk7e-t26d-aqdm
26
vulnerability VCID-pv92-6p9x-v7bs
27
vulnerability VCID-r2cz-9kjz-zbgu
28
vulnerability VCID-rssq-mfc2-ckaf
29
vulnerability VCID-rted-6vzz-mbcv
30
vulnerability VCID-tvdv-3ed5-h3dt
31
vulnerability VCID-un5y-y9sq-1ufb
32
vulnerability VCID-v4gv-g9n5-ukgc
33
vulnerability VCID-vh5y-15tw-d7fd
34
vulnerability VCID-wrna-cc9g-sqbe
35
vulnerability VCID-yx79-3g2x-pqex
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.0@10.0.25-0%252Bdeb8u1
aliases CVE-2016-0643
risk_score 1.8
exploitability 0.5
weighted_severity 3.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-cyqa-e362-yyaf
23
url VCID-dqg6-2gmj-judy
vulnerability_id VCID-dqg6-2gmj-judy
summary security update
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00015.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00015.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00016.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00016.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html
6
reference_url http://rhn.redhat.com/errata/RHSA-2016-0534.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0534.html
7
reference_url http://rhn.redhat.com/errata/RHSA-2016-0705.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0705.html
8
reference_url http://rhn.redhat.com/errata/RHSA-2016-1480.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-1480.html
9
reference_url http://rhn.redhat.com/errata/RHSA-2016-1481.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-1481.html
10
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0546.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0546.json
11
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-0546
reference_id
reference_type
scores
0
value 0.0018
scoring_system epss
scoring_elements 0.39629
published_at 2026-04-18T12:55:00Z
1
value 0.0018
scoring_system epss
scoring_elements 0.39658
published_at 2026-04-16T12:55:00Z
2
value 0.0018
scoring_system epss
scoring_elements 0.39493
published_at 2026-04-01T12:55:00Z
3
value 0.0018
scoring_system epss
scoring_elements 0.39643
published_at 2026-04-02T12:55:00Z
4
value 0.0018
scoring_system epss
scoring_elements 0.39665
published_at 2026-04-04T12:55:00Z
5
value 0.0018
scoring_system epss
scoring_elements 0.39582
published_at 2026-04-07T12:55:00Z
6
value 0.0018
scoring_system epss
scoring_elements 0.39637
published_at 2026-04-08T12:55:00Z
7
value 0.0018
scoring_system epss
scoring_elements 0.39651
published_at 2026-04-09T12:55:00Z
8
value 0.0018
scoring_system epss
scoring_elements 0.3966
published_at 2026-04-11T12:55:00Z
9
value 0.0018
scoring_system epss
scoring_elements 0.39624
published_at 2026-04-12T12:55:00Z
10
value 0.0018
scoring_system epss
scoring_elements 0.39607
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-0546
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0505
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0505
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0546
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0546
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0596
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0596
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0597
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0597
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0598
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0598
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0600
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0600
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0606
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0606
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0608
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0608
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0609
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0609
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0616
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0616
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2047
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2047
23
reference_url https://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-47.html
reference_id
reference_type
scores
url https://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-47.html
24
reference_url https://dev.mysql.com/doc/relnotes/mysql/5.6/en/news-5-6-28.html
reference_id
reference_type
scores
url https://dev.mysql.com/doc/relnotes/mysql/5.6/en/news-5-6-28.html
25
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.2
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:C/I:C/A:C
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
26
reference_url https://github.com/mysql/mysql-server/commit/0dbd5a8797ed4bd18e8b883988fb62177eb0f73f
reference_id
reference_type
scores
url https://github.com/mysql/mysql-server/commit/0dbd5a8797ed4bd18e8b883988fb62177eb0f73f
27
reference_url https://mariadb.com/kb/en/mariadb/mariadb-10110-release-notes/
reference_id
reference_type
scores
url https://mariadb.com/kb/en/mariadb/mariadb-10110-release-notes/
28
reference_url https://mariadb.com/kb/en/mariadb/mariadb-5547-release-notes/
reference_id
reference_type
scores
url https://mariadb.com/kb/en/mariadb/mariadb-5547-release-notes/
29
reference_url https://mariadb.com/kb/en/mdb-10023-rn/
reference_id
reference_type
scores
url https://mariadb.com/kb/en/mdb-10023-rn/
30
reference_url http://www.debian.org/security/2016/dsa-3453
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3453
31
reference_url http://www.debian.org/security/2016/dsa-3459
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3459
32
reference_url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
33
reference_url http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
34
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
35
reference_url http://www.securityfocus.com/bid/81066
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/81066
36
reference_url http://www.securitytracker.com/id/1034708
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1034708
37
reference_url http://www.ubuntu.com/usn/USN-2881-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2881-1
38
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1301493
reference_id 1301493
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1301493
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node_eus:7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_hpc_node_eus:7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node_eus:7.2:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-0546
reference_id CVE-2016-0546
reference_type
scores
0
value 7.2
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2016-0546
60
reference_url https://access.redhat.com/errata/RHSA-2016:0534
reference_id RHSA-2016:0534
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0534
61
reference_url https://access.redhat.com/errata/RHSA-2016:0705
reference_id RHSA-2016:0705
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0705
62
reference_url https://access.redhat.com/errata/RHSA-2016:1132
reference_id RHSA-2016:1132
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1132
63
reference_url https://access.redhat.com/errata/RHSA-2016:1480
reference_id RHSA-2016:1480
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1480
64
reference_url https://access.redhat.com/errata/RHSA-2016:1481
reference_id RHSA-2016:1481
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1481
65
reference_url https://usn.ubuntu.com/2881-1/
reference_id USN-2881-1
reference_type
scores
url https://usn.ubuntu.com/2881-1/
fixed_packages
0
url pkg:deb/debian/mariadb-10.0@10.0.25-0%2Bdeb8u1
purl pkg:deb/debian/mariadb-10.0@10.0.25-0%2Bdeb8u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1gmc-pj6y-rkfx
1
vulnerability VCID-2gyq-q761-h3br
2
vulnerability VCID-2rf6-qaey-1ubn
3
vulnerability VCID-45hn-ezks-j7br
4
vulnerability VCID-4cnj-7fur-3qe3
5
vulnerability VCID-4yz4-vxnh-b3dp
6
vulnerability VCID-5sjj-599v-vybg
7
vulnerability VCID-6g4n-3xfu-hfee
8
vulnerability VCID-6muh-rg1z-pqab
9
vulnerability VCID-8djb-knkk-s3c8
10
vulnerability VCID-8krv-jqjg-uqc8
11
vulnerability VCID-8kvb-5u8c-zbc4
12
vulnerability VCID-8sya-wktg-dqa5
13
vulnerability VCID-9f48-53dz-13an
14
vulnerability VCID-9ff2-43rk-2ydj
15
vulnerability VCID-9w98-nfg2-muh2
16
vulnerability VCID-bhxk-8byp-eyap
17
vulnerability VCID-ej67-ayfh-sqdt
18
vulnerability VCID-g1pp-9qqg-1beb
19
vulnerability VCID-gp4w-bdxg-6kab
20
vulnerability VCID-jgff-4jyp-9fgr
21
vulnerability VCID-mde2-1ynu-auh2
22
vulnerability VCID-mfgg-7s54-gqg8
23
vulnerability VCID-nkdd-suwp-4ffr
24
vulnerability VCID-p623-gxyv-g7fs
25
vulnerability VCID-pk7e-t26d-aqdm
26
vulnerability VCID-pv92-6p9x-v7bs
27
vulnerability VCID-r2cz-9kjz-zbgu
28
vulnerability VCID-rssq-mfc2-ckaf
29
vulnerability VCID-rted-6vzz-mbcv
30
vulnerability VCID-tvdv-3ed5-h3dt
31
vulnerability VCID-un5y-y9sq-1ufb
32
vulnerability VCID-v4gv-g9n5-ukgc
33
vulnerability VCID-vh5y-15tw-d7fd
34
vulnerability VCID-wrna-cc9g-sqbe
35
vulnerability VCID-yx79-3g2x-pqex
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.0@10.0.25-0%252Bdeb8u1
aliases CVE-2016-0546
risk_score 3.2
exploitability 0.5
weighted_severity 6.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dqg6-2gmj-judy
24
url VCID-dvjd-g5eh-2uh8
vulnerability_id VCID-dvjd-g5eh-2uh8
summary
Multiple vulnerabilities have been found in MySQL and MariaDB, the
    worst of which could allow remote attackers to cause a Denial of Service
    condition or obtain sensitive information.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2582.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2582.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-2582
reference_id
reference_type
scores
0
value 0.00811
scoring_system epss
scoring_elements 0.74185
published_at 2026-04-01T12:55:00Z
1
value 0.00811
scoring_system epss
scoring_elements 0.7419
published_at 2026-04-07T12:55:00Z
2
value 0.00811
scoring_system epss
scoring_elements 0.74217
published_at 2026-04-04T12:55:00Z
3
value 0.00811
scoring_system epss
scoring_elements 0.74223
published_at 2026-04-08T12:55:00Z
4
value 0.00811
scoring_system epss
scoring_elements 0.74238
published_at 2026-04-09T12:55:00Z
5
value 0.00811
scoring_system epss
scoring_elements 0.74259
published_at 2026-04-11T12:55:00Z
6
value 0.00811
scoring_system epss
scoring_elements 0.7424
published_at 2026-04-12T12:55:00Z
7
value 0.00811
scoring_system epss
scoring_elements 0.74233
published_at 2026-04-13T12:55:00Z
8
value 0.00811
scoring_system epss
scoring_elements 0.74271
published_at 2026-04-16T12:55:00Z
9
value 0.00811
scoring_system epss
scoring_elements 0.74281
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-2582
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0433
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0433
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0441
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0441
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0499
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0499
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0501
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0501
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0505
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0505
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2568
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2568
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2571
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2571
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2573
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2573
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2582
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2582
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2620
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2620
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2643
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2643
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2648
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2648
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3152
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3152
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4737
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4737
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4752
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4752
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4757
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4757
18
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1244768
reference_id 1244768
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1244768
19
reference_url https://security.gentoo.org/glsa/201610-06
reference_id GLSA-201610-06
reference_type
scores
url https://security.gentoo.org/glsa/201610-06
20
reference_url https://access.redhat.com/errata/RHSA-2015:1628
reference_id RHSA-2015:1628
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1628
21
reference_url https://access.redhat.com/errata/RHSA-2015:1629
reference_id RHSA-2015:1629
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1629
22
reference_url https://access.redhat.com/errata/RHSA-2015:1630
reference_id RHSA-2015:1630
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1630
23
reference_url https://access.redhat.com/errata/RHSA-2015:1646
reference_id RHSA-2015:1646
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1646
24
reference_url https://access.redhat.com/errata/RHSA-2015:1647
reference_id RHSA-2015:1647
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1647
25
reference_url https://access.redhat.com/errata/RHSA-2015:1665
reference_id RHSA-2015:1665
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1665
26
reference_url https://usn.ubuntu.com/2674-1/
reference_id USN-2674-1
reference_type
scores
url https://usn.ubuntu.com/2674-1/
fixed_packages
0
url pkg:deb/debian/mariadb-10.0@10.0.25-0%2Bdeb8u1
purl pkg:deb/debian/mariadb-10.0@10.0.25-0%2Bdeb8u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1gmc-pj6y-rkfx
1
vulnerability VCID-2gyq-q761-h3br
2
vulnerability VCID-2rf6-qaey-1ubn
3
vulnerability VCID-45hn-ezks-j7br
4
vulnerability VCID-4cnj-7fur-3qe3
5
vulnerability VCID-4yz4-vxnh-b3dp
6
vulnerability VCID-5sjj-599v-vybg
7
vulnerability VCID-6g4n-3xfu-hfee
8
vulnerability VCID-6muh-rg1z-pqab
9
vulnerability VCID-8djb-knkk-s3c8
10
vulnerability VCID-8krv-jqjg-uqc8
11
vulnerability VCID-8kvb-5u8c-zbc4
12
vulnerability VCID-8sya-wktg-dqa5
13
vulnerability VCID-9f48-53dz-13an
14
vulnerability VCID-9ff2-43rk-2ydj
15
vulnerability VCID-9w98-nfg2-muh2
16
vulnerability VCID-bhxk-8byp-eyap
17
vulnerability VCID-ej67-ayfh-sqdt
18
vulnerability VCID-g1pp-9qqg-1beb
19
vulnerability VCID-gp4w-bdxg-6kab
20
vulnerability VCID-jgff-4jyp-9fgr
21
vulnerability VCID-mde2-1ynu-auh2
22
vulnerability VCID-mfgg-7s54-gqg8
23
vulnerability VCID-nkdd-suwp-4ffr
24
vulnerability VCID-p623-gxyv-g7fs
25
vulnerability VCID-pk7e-t26d-aqdm
26
vulnerability VCID-pv92-6p9x-v7bs
27
vulnerability VCID-r2cz-9kjz-zbgu
28
vulnerability VCID-rssq-mfc2-ckaf
29
vulnerability VCID-rted-6vzz-mbcv
30
vulnerability VCID-tvdv-3ed5-h3dt
31
vulnerability VCID-un5y-y9sq-1ufb
32
vulnerability VCID-v4gv-g9n5-ukgc
33
vulnerability VCID-vh5y-15tw-d7fd
34
vulnerability VCID-wrna-cc9g-sqbe
35
vulnerability VCID-yx79-3g2x-pqex
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.0@10.0.25-0%252Bdeb8u1
aliases CVE-2015-2582
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dvjd-g5eh-2uh8
25
url VCID-esfk-umc5-ska4
vulnerability_id VCID-esfk-umc5-ska4
summary security update
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00015.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00015.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00016.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00016.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html
6
reference_url http://rhn.redhat.com/errata/RHSA-2016-0534.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0534.html
7
reference_url http://rhn.redhat.com/errata/RHSA-2016-0705.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0705.html
8
reference_url http://rhn.redhat.com/errata/RHSA-2016-1480.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-1480.html
9
reference_url http://rhn.redhat.com/errata/RHSA-2016-1481.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-1481.html
10
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0609.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0609.json
11
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-0609
reference_id
reference_type
scores
0
value 0.00794
scoring_system epss
scoring_elements 0.74005
published_at 2026-04-18T12:55:00Z
1
value 0.00794
scoring_system epss
scoring_elements 0.73995
published_at 2026-04-16T12:55:00Z
2
value 0.00794
scoring_system epss
scoring_elements 0.73905
published_at 2026-04-01T12:55:00Z
3
value 0.00794
scoring_system epss
scoring_elements 0.73915
published_at 2026-04-02T12:55:00Z
4
value 0.00794
scoring_system epss
scoring_elements 0.73939
published_at 2026-04-04T12:55:00Z
5
value 0.00794
scoring_system epss
scoring_elements 0.73911
published_at 2026-04-07T12:55:00Z
6
value 0.00794
scoring_system epss
scoring_elements 0.73945
published_at 2026-04-08T12:55:00Z
7
value 0.00794
scoring_system epss
scoring_elements 0.73958
published_at 2026-04-09T12:55:00Z
8
value 0.00794
scoring_system epss
scoring_elements 0.73981
published_at 2026-04-11T12:55:00Z
9
value 0.00794
scoring_system epss
scoring_elements 0.73963
published_at 2026-04-12T12:55:00Z
10
value 0.00794
scoring_system epss
scoring_elements 0.73955
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-0609
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0505
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0505
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0546
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0546
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0596
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0596
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0597
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0597
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0598
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0598
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0600
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0600
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0606
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0606
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0608
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0608
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0609
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0609
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0616
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0616
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2047
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2047
23
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 1.7
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:M/C:N/I:N/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
24
reference_url https://mariadb.com/kb/en/mariadb/mariadb-10110-release-notes/
reference_id
reference_type
scores
url https://mariadb.com/kb/en/mariadb/mariadb-10110-release-notes/
25
reference_url https://mariadb.com/kb/en/mariadb/mariadb-5547-release-notes/
reference_id
reference_type
scores
url https://mariadb.com/kb/en/mariadb/mariadb-5547-release-notes/
26
reference_url https://mariadb.com/kb/en/mdb-10023-rn/
reference_id
reference_type
scores
url https://mariadb.com/kb/en/mdb-10023-rn/
27
reference_url http://www.debian.org/security/2016/dsa-3453
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3453
28
reference_url http://www.debian.org/security/2016/dsa-3459
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3459
29
reference_url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
30
reference_url http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
31
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
32
reference_url http://www.securityfocus.com/bid/81258
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/81258
33
reference_url http://www.securitytracker.com/id/1034708
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1034708
34
reference_url http://www.ubuntu.com/usn/USN-2881-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2881-1
35
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1301507
reference_id 1301507
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1301507
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node_eus:7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_hpc_node_eus:7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node_eus:7.2:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-0609
reference_id CVE-2016-0609
reference_type
scores
0
value 1.7
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:M/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2016-0609
57
reference_url https://access.redhat.com/errata/RHSA-2016:0534
reference_id RHSA-2016:0534
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0534
58
reference_url https://access.redhat.com/errata/RHSA-2016:0705
reference_id RHSA-2016:0705
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0705
59
reference_url https://access.redhat.com/errata/RHSA-2016:1132
reference_id RHSA-2016:1132
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1132
60
reference_url https://access.redhat.com/errata/RHSA-2016:1480
reference_id RHSA-2016:1480
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1480
61
reference_url https://access.redhat.com/errata/RHSA-2016:1481
reference_id RHSA-2016:1481
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1481
62
reference_url https://usn.ubuntu.com/2881-1/
reference_id USN-2881-1
reference_type
scores
url https://usn.ubuntu.com/2881-1/
fixed_packages
0
url pkg:deb/debian/mariadb-10.0@10.0.25-0%2Bdeb8u1
purl pkg:deb/debian/mariadb-10.0@10.0.25-0%2Bdeb8u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1gmc-pj6y-rkfx
1
vulnerability VCID-2gyq-q761-h3br
2
vulnerability VCID-2rf6-qaey-1ubn
3
vulnerability VCID-45hn-ezks-j7br
4
vulnerability VCID-4cnj-7fur-3qe3
5
vulnerability VCID-4yz4-vxnh-b3dp
6
vulnerability VCID-5sjj-599v-vybg
7
vulnerability VCID-6g4n-3xfu-hfee
8
vulnerability VCID-6muh-rg1z-pqab
9
vulnerability VCID-8djb-knkk-s3c8
10
vulnerability VCID-8krv-jqjg-uqc8
11
vulnerability VCID-8kvb-5u8c-zbc4
12
vulnerability VCID-8sya-wktg-dqa5
13
vulnerability VCID-9f48-53dz-13an
14
vulnerability VCID-9ff2-43rk-2ydj
15
vulnerability VCID-9w98-nfg2-muh2
16
vulnerability VCID-bhxk-8byp-eyap
17
vulnerability VCID-ej67-ayfh-sqdt
18
vulnerability VCID-g1pp-9qqg-1beb
19
vulnerability VCID-gp4w-bdxg-6kab
20
vulnerability VCID-jgff-4jyp-9fgr
21
vulnerability VCID-mde2-1ynu-auh2
22
vulnerability VCID-mfgg-7s54-gqg8
23
vulnerability VCID-nkdd-suwp-4ffr
24
vulnerability VCID-p623-gxyv-g7fs
25
vulnerability VCID-pk7e-t26d-aqdm
26
vulnerability VCID-pv92-6p9x-v7bs
27
vulnerability VCID-r2cz-9kjz-zbgu
28
vulnerability VCID-rssq-mfc2-ckaf
29
vulnerability VCID-rted-6vzz-mbcv
30
vulnerability VCID-tvdv-3ed5-h3dt
31
vulnerability VCID-un5y-y9sq-1ufb
32
vulnerability VCID-v4gv-g9n5-ukgc
33
vulnerability VCID-vh5y-15tw-d7fd
34
vulnerability VCID-wrna-cc9g-sqbe
35
vulnerability VCID-yx79-3g2x-pqex
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.0@10.0.25-0%252Bdeb8u1
aliases CVE-2016-0609
risk_score 0.8
exploitability 0.5
weighted_severity 1.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-esfk-umc5-ska4
26
url VCID-f9vz-r6zv-t7ev
vulnerability_id VCID-f9vz-r6zv-t7ev
summary security update
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00015.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00015.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00016.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00016.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html
6
reference_url http://rhn.redhat.com/errata/RHSA-2016-0534.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0534.html
7
reference_url http://rhn.redhat.com/errata/RHSA-2016-0705.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0705.html
8
reference_url http://rhn.redhat.com/errata/RHSA-2016-1480.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-1480.html
9
reference_url http://rhn.redhat.com/errata/RHSA-2016-1481.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-1481.html
10
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0596.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0596.json
11
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-0596
reference_id
reference_type
scores
0
value 0.00361
scoring_system epss
scoring_elements 0.58298
published_at 2026-04-18T12:55:00Z
1
value 0.00361
scoring_system epss
scoring_elements 0.58296
published_at 2026-04-16T12:55:00Z
2
value 0.00361
scoring_system epss
scoring_elements 0.58149
published_at 2026-04-01T12:55:00Z
3
value 0.00361
scoring_system epss
scoring_elements 0.58235
published_at 2026-04-02T12:55:00Z
4
value 0.00361
scoring_system epss
scoring_elements 0.58255
published_at 2026-04-04T12:55:00Z
5
value 0.00361
scoring_system epss
scoring_elements 0.58229
published_at 2026-04-07T12:55:00Z
6
value 0.00361
scoring_system epss
scoring_elements 0.58283
published_at 2026-04-08T12:55:00Z
7
value 0.00361
scoring_system epss
scoring_elements 0.58288
published_at 2026-04-09T12:55:00Z
8
value 0.00361
scoring_system epss
scoring_elements 0.58307
published_at 2026-04-11T12:55:00Z
9
value 0.00361
scoring_system epss
scoring_elements 0.58284
published_at 2026-04-12T12:55:00Z
10
value 0.00361
scoring_system epss
scoring_elements 0.58264
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-0596
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0505
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0505
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0546
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0546
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0596
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0596
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0597
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0597
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0598
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0598
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0600
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0600
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0606
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0606
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0608
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0608
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0609
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0609
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0616
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0616
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2047
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2047
23
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
24
reference_url https://mariadb.com/kb/en/mariadb/mariadb-10110-release-notes/
reference_id
reference_type
scores
url https://mariadb.com/kb/en/mariadb/mariadb-10110-release-notes/
25
reference_url https://mariadb.com/kb/en/mariadb/mariadb-5547-release-notes/
reference_id
reference_type
scores
url https://mariadb.com/kb/en/mariadb/mariadb-5547-release-notes/
26
reference_url https://mariadb.com/kb/en/mdb-10023-rn/
reference_id
reference_type
scores
url https://mariadb.com/kb/en/mdb-10023-rn/
27
reference_url http://www.debian.org/security/2016/dsa-3453
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3453
28
reference_url http://www.debian.org/security/2016/dsa-3459
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3459
29
reference_url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
30
reference_url http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
31
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
32
reference_url http://www.securityfocus.com/bid/81130
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/81130
33
reference_url http://www.securitytracker.com/id/1034708
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1034708
34
reference_url http://www.ubuntu.com/usn/USN-2881-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2881-1
35
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1301496
reference_id 1301496
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1301496
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node_eus:7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_hpc_node_eus:7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node_eus:7.2:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-0596
reference_id CVE-2016-0596
reference_type
scores
0
value 4.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2016-0596
57
reference_url https://access.redhat.com/errata/RHSA-2016:0534
reference_id RHSA-2016:0534
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0534
58
reference_url https://access.redhat.com/errata/RHSA-2016:0705
reference_id RHSA-2016:0705
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0705
59
reference_url https://access.redhat.com/errata/RHSA-2016:1132
reference_id RHSA-2016:1132
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1132
60
reference_url https://access.redhat.com/errata/RHSA-2016:1480
reference_id RHSA-2016:1480
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1480
61
reference_url https://access.redhat.com/errata/RHSA-2016:1481
reference_id RHSA-2016:1481
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1481
62
reference_url https://usn.ubuntu.com/2881-1/
reference_id USN-2881-1
reference_type
scores
url https://usn.ubuntu.com/2881-1/
fixed_packages
0
url pkg:deb/debian/mariadb-10.0@10.0.25-0%2Bdeb8u1
purl pkg:deb/debian/mariadb-10.0@10.0.25-0%2Bdeb8u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1gmc-pj6y-rkfx
1
vulnerability VCID-2gyq-q761-h3br
2
vulnerability VCID-2rf6-qaey-1ubn
3
vulnerability VCID-45hn-ezks-j7br
4
vulnerability VCID-4cnj-7fur-3qe3
5
vulnerability VCID-4yz4-vxnh-b3dp
6
vulnerability VCID-5sjj-599v-vybg
7
vulnerability VCID-6g4n-3xfu-hfee
8
vulnerability VCID-6muh-rg1z-pqab
9
vulnerability VCID-8djb-knkk-s3c8
10
vulnerability VCID-8krv-jqjg-uqc8
11
vulnerability VCID-8kvb-5u8c-zbc4
12
vulnerability VCID-8sya-wktg-dqa5
13
vulnerability VCID-9f48-53dz-13an
14
vulnerability VCID-9ff2-43rk-2ydj
15
vulnerability VCID-9w98-nfg2-muh2
16
vulnerability VCID-bhxk-8byp-eyap
17
vulnerability VCID-ej67-ayfh-sqdt
18
vulnerability VCID-g1pp-9qqg-1beb
19
vulnerability VCID-gp4w-bdxg-6kab
20
vulnerability VCID-jgff-4jyp-9fgr
21
vulnerability VCID-mde2-1ynu-auh2
22
vulnerability VCID-mfgg-7s54-gqg8
23
vulnerability VCID-nkdd-suwp-4ffr
24
vulnerability VCID-p623-gxyv-g7fs
25
vulnerability VCID-pk7e-t26d-aqdm
26
vulnerability VCID-pv92-6p9x-v7bs
27
vulnerability VCID-r2cz-9kjz-zbgu
28
vulnerability VCID-rssq-mfc2-ckaf
29
vulnerability VCID-rted-6vzz-mbcv
30
vulnerability VCID-tvdv-3ed5-h3dt
31
vulnerability VCID-un5y-y9sq-1ufb
32
vulnerability VCID-v4gv-g9n5-ukgc
33
vulnerability VCID-vh5y-15tw-d7fd
34
vulnerability VCID-wrna-cc9g-sqbe
35
vulnerability VCID-yx79-3g2x-pqex
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.0@10.0.25-0%252Bdeb8u1
aliases CVE-2016-0596
risk_score 1.8
exploitability 0.5
weighted_severity 3.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-f9vz-r6zv-t7ev
27
url VCID-fnks-p4e9-13es
vulnerability_id VCID-fnks-p4e9-13es
summary security update
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00015.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00015.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00016.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00016.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html
6
reference_url http://rhn.redhat.com/errata/RHSA-2016-0534.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0534.html
7
reference_url http://rhn.redhat.com/errata/RHSA-2016-0705.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0705.html
8
reference_url http://rhn.redhat.com/errata/RHSA-2016-1480.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-1480.html
9
reference_url http://rhn.redhat.com/errata/RHSA-2016-1481.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-1481.html
10
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0505.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0505.json
11
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-0505
reference_id
reference_type
scores
0
value 0.06492
scoring_system epss
scoring_elements 0.91121
published_at 2026-04-18T12:55:00Z
1
value 0.06492
scoring_system epss
scoring_elements 0.91097
published_at 2026-04-13T12:55:00Z
2
value 0.06492
scoring_system epss
scoring_elements 0.91047
published_at 2026-04-01T12:55:00Z
3
value 0.06492
scoring_system epss
scoring_elements 0.91051
published_at 2026-04-02T12:55:00Z
4
value 0.06492
scoring_system epss
scoring_elements 0.91061
published_at 2026-04-04T12:55:00Z
5
value 0.06492
scoring_system epss
scoring_elements 0.91069
published_at 2026-04-07T12:55:00Z
6
value 0.06492
scoring_system epss
scoring_elements 0.91082
published_at 2026-04-08T12:55:00Z
7
value 0.06492
scoring_system epss
scoring_elements 0.91088
published_at 2026-04-09T12:55:00Z
8
value 0.06492
scoring_system epss
scoring_elements 0.91096
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-0505
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0505
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0505
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0546
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0546
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0596
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0596
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0597
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0597
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0598
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0598
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0600
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0600
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0606
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0606
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0608
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0608
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0609
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0609
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0616
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0616
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2047
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2047
23
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:C
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
24
reference_url https://mariadb.com/kb/en/mariadb/mariadb-10110-release-notes/
reference_id
reference_type
scores
url https://mariadb.com/kb/en/mariadb/mariadb-10110-release-notes/
25
reference_url https://mariadb.com/kb/en/mariadb/mariadb-5547-release-notes/
reference_id
reference_type
scores
url https://mariadb.com/kb/en/mariadb/mariadb-5547-release-notes/
26
reference_url https://mariadb.com/kb/en/mdb-10023-rn/
reference_id
reference_type
scores
url https://mariadb.com/kb/en/mdb-10023-rn/
27
reference_url http://www.debian.org/security/2016/dsa-3453
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3453
28
reference_url http://www.debian.org/security/2016/dsa-3459
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3459
29
reference_url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
30
reference_url http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
31
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
32
reference_url http://www.securityfocus.com/bid/81088
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/81088
33
reference_url http://www.securitytracker.com/id/1034708
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1034708
34
reference_url http://www.ubuntu.com/usn/USN-2881-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2881-1
35
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1301492
reference_id 1301492
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1301492
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node_eus:7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_hpc_node_eus:7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node_eus:7.2:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-0505
reference_id CVE-2016-0505
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2016-0505
57
reference_url https://access.redhat.com/errata/RHSA-2016:0534
reference_id RHSA-2016:0534
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0534
58
reference_url https://access.redhat.com/errata/RHSA-2016:0705
reference_id RHSA-2016:0705
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0705
59
reference_url https://access.redhat.com/errata/RHSA-2016:1132
reference_id RHSA-2016:1132
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1132
60
reference_url https://access.redhat.com/errata/RHSA-2016:1480
reference_id RHSA-2016:1480
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1480
61
reference_url https://access.redhat.com/errata/RHSA-2016:1481
reference_id RHSA-2016:1481
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1481
62
reference_url https://usn.ubuntu.com/2881-1/
reference_id USN-2881-1
reference_type
scores
url https://usn.ubuntu.com/2881-1/
fixed_packages
0
url pkg:deb/debian/mariadb-10.0@10.0.25-0%2Bdeb8u1
purl pkg:deb/debian/mariadb-10.0@10.0.25-0%2Bdeb8u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1gmc-pj6y-rkfx
1
vulnerability VCID-2gyq-q761-h3br
2
vulnerability VCID-2rf6-qaey-1ubn
3
vulnerability VCID-45hn-ezks-j7br
4
vulnerability VCID-4cnj-7fur-3qe3
5
vulnerability VCID-4yz4-vxnh-b3dp
6
vulnerability VCID-5sjj-599v-vybg
7
vulnerability VCID-6g4n-3xfu-hfee
8
vulnerability VCID-6muh-rg1z-pqab
9
vulnerability VCID-8djb-knkk-s3c8
10
vulnerability VCID-8krv-jqjg-uqc8
11
vulnerability VCID-8kvb-5u8c-zbc4
12
vulnerability VCID-8sya-wktg-dqa5
13
vulnerability VCID-9f48-53dz-13an
14
vulnerability VCID-9ff2-43rk-2ydj
15
vulnerability VCID-9w98-nfg2-muh2
16
vulnerability VCID-bhxk-8byp-eyap
17
vulnerability VCID-ej67-ayfh-sqdt
18
vulnerability VCID-g1pp-9qqg-1beb
19
vulnerability VCID-gp4w-bdxg-6kab
20
vulnerability VCID-jgff-4jyp-9fgr
21
vulnerability VCID-mde2-1ynu-auh2
22
vulnerability VCID-mfgg-7s54-gqg8
23
vulnerability VCID-nkdd-suwp-4ffr
24
vulnerability VCID-p623-gxyv-g7fs
25
vulnerability VCID-pk7e-t26d-aqdm
26
vulnerability VCID-pv92-6p9x-v7bs
27
vulnerability VCID-r2cz-9kjz-zbgu
28
vulnerability VCID-rssq-mfc2-ckaf
29
vulnerability VCID-rted-6vzz-mbcv
30
vulnerability VCID-tvdv-3ed5-h3dt
31
vulnerability VCID-un5y-y9sq-1ufb
32
vulnerability VCID-v4gv-g9n5-ukgc
33
vulnerability VCID-vh5y-15tw-d7fd
34
vulnerability VCID-wrna-cc9g-sqbe
35
vulnerability VCID-yx79-3g2x-pqex
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.0@10.0.25-0%252Bdeb8u1
aliases CVE-2016-0505
risk_score 3.0
exploitability 0.5
weighted_severity 6.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fnks-p4e9-13es
28
url VCID-fuyw-1y1c-fkfp
vulnerability_id VCID-fuyw-1y1c-fkfp
summary security update
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html
4
reference_url http://rhn.redhat.com/errata/RHSA-2016-0534.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0534.html
5
reference_url http://rhn.redhat.com/errata/RHSA-2016-1480.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-1480.html
6
reference_url http://rhn.redhat.com/errata/RHSA-2016-1481.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-1481.html
7
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0616.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0616.json
8
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-0616
reference_id
reference_type
scores
0
value 0.00472
scoring_system epss
scoring_elements 0.64722
published_at 2026-04-18T12:55:00Z
1
value 0.00472
scoring_system epss
scoring_elements 0.6471
published_at 2026-04-16T12:55:00Z
2
value 0.00472
scoring_system epss
scoring_elements 0.64596
published_at 2026-04-01T12:55:00Z
3
value 0.00472
scoring_system epss
scoring_elements 0.64648
published_at 2026-04-02T12:55:00Z
4
value 0.00472
scoring_system epss
scoring_elements 0.64676
published_at 2026-04-04T12:55:00Z
5
value 0.00472
scoring_system epss
scoring_elements 0.64634
published_at 2026-04-07T12:55:00Z
6
value 0.00472
scoring_system epss
scoring_elements 0.64682
published_at 2026-04-08T12:55:00Z
7
value 0.00472
scoring_system epss
scoring_elements 0.64698
published_at 2026-04-09T12:55:00Z
8
value 0.00472
scoring_system epss
scoring_elements 0.64715
published_at 2026-04-11T12:55:00Z
9
value 0.00472
scoring_system epss
scoring_elements 0.64703
published_at 2026-04-12T12:55:00Z
10
value 0.00472
scoring_system epss
scoring_elements 0.64674
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-0616
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0505
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0505
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0546
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0546
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0596
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0596
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0597
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0597
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0598
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0598
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0600
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0600
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0606
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0606
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0608
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0608
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0609
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0609
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0616
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0616
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2047
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2047
20
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
21
reference_url https://mariadb.com/kb/en/mariadb/mariadb-10110-release-notes/
reference_id
reference_type
scores
url https://mariadb.com/kb/en/mariadb/mariadb-10110-release-notes/
22
reference_url https://mariadb.com/kb/en/mariadb/mariadb-5547-release-notes/
reference_id
reference_type
scores
url https://mariadb.com/kb/en/mariadb/mariadb-5547-release-notes/
23
reference_url https://mariadb.com/kb/en/mdb-10023-rn/
reference_id
reference_type
scores
url https://mariadb.com/kb/en/mdb-10023-rn/
24
reference_url http://www.debian.org/security/2016/dsa-3453
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3453
25
reference_url http://www.debian.org/security/2016/dsa-3459
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3459
26
reference_url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
27
reference_url http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
28
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
29
reference_url http://www.securityfocus.com/bid/81176
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/81176
30
reference_url http://www.securitytracker.com/id/1034708
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1034708
31
reference_url http://www.ubuntu.com/usn/USN-2881-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2881-1
32
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1301510
reference_id 1301510
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1301510
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:10.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.0.0:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:10.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.0.1:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.0.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:10.0.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.0.10:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.0.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:10.0.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.0.11:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.0.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:10.0.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.0.12:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.0.13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:10.0.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.0.13:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.0.14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:10.0.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.0.14:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.0.15:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:10.0.15:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.0.15:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.0.16:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:10.0.16:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.0.16:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.0.17:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:10.0.17:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.0.17:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.0.18:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:10.0.18:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.0.18:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.0.19:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:10.0.19:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.0.19:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:10.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.0.2:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.0.20:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:10.0.20:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.0.20:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.0.21:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:10.0.21:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.0.21:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.0.22:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:10.0.22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.0.22:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:10.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.0.3:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:10.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.0.4:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:10.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.0.5:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:10.0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.0.6:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.0.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:10.0.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.0.7:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.0.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:10.0.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.0.8:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.0.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:10.0.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.0.9:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:10.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.1.0:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:10.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.1.1:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:10.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.1.2:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:10.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.1.3:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.1.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:10.1.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.1.4:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.1.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:10.1.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.1.5:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.1.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:10.1.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.1.6:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.1.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:10.1.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.1.7:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.1.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:10.1.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.1.8:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.1.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:10.1.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.1.9:*:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
71
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
72
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
73
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
74
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
75
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
76
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
77
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*
78
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node_eus:7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_hpc_node_eus:7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node_eus:7.2:*:*:*:*:*:*:*
79
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
80
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
81
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*
82
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
83
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-0616
reference_id CVE-2016-0616
reference_type
scores
0
value 4.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2016-0616
84
reference_url https://access.redhat.com/errata/RHSA-2016:0534
reference_id RHSA-2016:0534
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0534
85
reference_url https://access.redhat.com/errata/RHSA-2016:1132
reference_id RHSA-2016:1132
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1132
86
reference_url https://access.redhat.com/errata/RHSA-2016:1480
reference_id RHSA-2016:1480
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1480
87
reference_url https://access.redhat.com/errata/RHSA-2016:1481
reference_id RHSA-2016:1481
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1481
88
reference_url https://usn.ubuntu.com/2881-1/
reference_id USN-2881-1
reference_type
scores
url https://usn.ubuntu.com/2881-1/
fixed_packages
0
url pkg:deb/debian/mariadb-10.0@10.0.25-0%2Bdeb8u1
purl pkg:deb/debian/mariadb-10.0@10.0.25-0%2Bdeb8u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1gmc-pj6y-rkfx
1
vulnerability VCID-2gyq-q761-h3br
2
vulnerability VCID-2rf6-qaey-1ubn
3
vulnerability VCID-45hn-ezks-j7br
4
vulnerability VCID-4cnj-7fur-3qe3
5
vulnerability VCID-4yz4-vxnh-b3dp
6
vulnerability VCID-5sjj-599v-vybg
7
vulnerability VCID-6g4n-3xfu-hfee
8
vulnerability VCID-6muh-rg1z-pqab
9
vulnerability VCID-8djb-knkk-s3c8
10
vulnerability VCID-8krv-jqjg-uqc8
11
vulnerability VCID-8kvb-5u8c-zbc4
12
vulnerability VCID-8sya-wktg-dqa5
13
vulnerability VCID-9f48-53dz-13an
14
vulnerability VCID-9ff2-43rk-2ydj
15
vulnerability VCID-9w98-nfg2-muh2
16
vulnerability VCID-bhxk-8byp-eyap
17
vulnerability VCID-ej67-ayfh-sqdt
18
vulnerability VCID-g1pp-9qqg-1beb
19
vulnerability VCID-gp4w-bdxg-6kab
20
vulnerability VCID-jgff-4jyp-9fgr
21
vulnerability VCID-mde2-1ynu-auh2
22
vulnerability VCID-mfgg-7s54-gqg8
23
vulnerability VCID-nkdd-suwp-4ffr
24
vulnerability VCID-p623-gxyv-g7fs
25
vulnerability VCID-pk7e-t26d-aqdm
26
vulnerability VCID-pv92-6p9x-v7bs
27
vulnerability VCID-r2cz-9kjz-zbgu
28
vulnerability VCID-rssq-mfc2-ckaf
29
vulnerability VCID-rted-6vzz-mbcv
30
vulnerability VCID-tvdv-3ed5-h3dt
31
vulnerability VCID-un5y-y9sq-1ufb
32
vulnerability VCID-v4gv-g9n5-ukgc
33
vulnerability VCID-vh5y-15tw-d7fd
34
vulnerability VCID-wrna-cc9g-sqbe
35
vulnerability VCID-yx79-3g2x-pqex
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.0@10.0.25-0%252Bdeb8u1
aliases CVE-2016-0616
risk_score 1.8
exploitability 0.5
weighted_severity 3.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fuyw-1y1c-fkfp
29
url VCID-hg16-rg46-4fe3
vulnerability_id VCID-hg16-rg46-4fe3
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4815.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4815.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-4815
reference_id
reference_type
scores
0
value 0.00413
scoring_system epss
scoring_elements 0.61354
published_at 2026-04-01T12:55:00Z
1
value 0.00413
scoring_system epss
scoring_elements 0.61431
published_at 2026-04-02T12:55:00Z
2
value 0.00413
scoring_system epss
scoring_elements 0.61459
published_at 2026-04-04T12:55:00Z
3
value 0.00413
scoring_system epss
scoring_elements 0.61429
published_at 2026-04-07T12:55:00Z
4
value 0.00413
scoring_system epss
scoring_elements 0.61477
published_at 2026-04-08T12:55:00Z
5
value 0.00413
scoring_system epss
scoring_elements 0.61492
published_at 2026-04-09T12:55:00Z
6
value 0.00413
scoring_system epss
scoring_elements 0.61513
published_at 2026-04-11T12:55:00Z
7
value 0.00413
scoring_system epss
scoring_elements 0.615
published_at 2026-04-12T12:55:00Z
8
value 0.00413
scoring_system epss
scoring_elements 0.6148
published_at 2026-04-13T12:55:00Z
9
value 0.00413
scoring_system epss
scoring_elements 0.61519
published_at 2026-04-16T12:55:00Z
10
value 0.00413
scoring_system epss
scoring_elements 0.61523
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-4815
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4792
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4792
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4802
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4802
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4815
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4815
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4816
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4816
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4819
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4819
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4826
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4826
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4830
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4830
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4836
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4836
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4858
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4858
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4861
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4861
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4870
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4870
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4879
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4879
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4895
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4895
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4913
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4913
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1274759
reference_id 1274759
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1274759
17
reference_url https://access.redhat.com/errata/RHSA-2016:0534
reference_id RHSA-2016:0534
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0534
18
reference_url https://access.redhat.com/errata/RHSA-2016:0705
reference_id RHSA-2016:0705
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0705
19
reference_url https://access.redhat.com/errata/RHSA-2016:1132
reference_id RHSA-2016:1132
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1132
20
reference_url https://access.redhat.com/errata/RHSA-2016:1480
reference_id RHSA-2016:1480
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1480
21
reference_url https://access.redhat.com/errata/RHSA-2016:1481
reference_id RHSA-2016:1481
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1481
22
reference_url https://usn.ubuntu.com/2781-1/
reference_id USN-2781-1
reference_type
scores
url https://usn.ubuntu.com/2781-1/
fixed_packages
0
url pkg:deb/debian/mariadb-10.0@10.0.25-0%2Bdeb8u1
purl pkg:deb/debian/mariadb-10.0@10.0.25-0%2Bdeb8u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1gmc-pj6y-rkfx
1
vulnerability VCID-2gyq-q761-h3br
2
vulnerability VCID-2rf6-qaey-1ubn
3
vulnerability VCID-45hn-ezks-j7br
4
vulnerability VCID-4cnj-7fur-3qe3
5
vulnerability VCID-4yz4-vxnh-b3dp
6
vulnerability VCID-5sjj-599v-vybg
7
vulnerability VCID-6g4n-3xfu-hfee
8
vulnerability VCID-6muh-rg1z-pqab
9
vulnerability VCID-8djb-knkk-s3c8
10
vulnerability VCID-8krv-jqjg-uqc8
11
vulnerability VCID-8kvb-5u8c-zbc4
12
vulnerability VCID-8sya-wktg-dqa5
13
vulnerability VCID-9f48-53dz-13an
14
vulnerability VCID-9ff2-43rk-2ydj
15
vulnerability VCID-9w98-nfg2-muh2
16
vulnerability VCID-bhxk-8byp-eyap
17
vulnerability VCID-ej67-ayfh-sqdt
18
vulnerability VCID-g1pp-9qqg-1beb
19
vulnerability VCID-gp4w-bdxg-6kab
20
vulnerability VCID-jgff-4jyp-9fgr
21
vulnerability VCID-mde2-1ynu-auh2
22
vulnerability VCID-mfgg-7s54-gqg8
23
vulnerability VCID-nkdd-suwp-4ffr
24
vulnerability VCID-p623-gxyv-g7fs
25
vulnerability VCID-pk7e-t26d-aqdm
26
vulnerability VCID-pv92-6p9x-v7bs
27
vulnerability VCID-r2cz-9kjz-zbgu
28
vulnerability VCID-rssq-mfc2-ckaf
29
vulnerability VCID-rted-6vzz-mbcv
30
vulnerability VCID-tvdv-3ed5-h3dt
31
vulnerability VCID-un5y-y9sq-1ufb
32
vulnerability VCID-v4gv-g9n5-ukgc
33
vulnerability VCID-vh5y-15tw-d7fd
34
vulnerability VCID-wrna-cc9g-sqbe
35
vulnerability VCID-yx79-3g2x-pqex
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.0@10.0.25-0%252Bdeb8u1
aliases CVE-2015-4815
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hg16-rg46-4fe3
30
url VCID-hpk6-es28-5ueb
vulnerability_id VCID-hpk6-es28-5ueb
summary
Multiple vulnerabilities have been found in MySQL, allowing
    attackers to execute arbitrary code or cause Denial of Service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2571.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2571.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-2571
reference_id
reference_type
scores
0
value 0.00308
scoring_system epss
scoring_elements 0.53886
published_at 2026-04-01T12:55:00Z
1
value 0.00308
scoring_system epss
scoring_elements 0.53904
published_at 2026-04-02T12:55:00Z
2
value 0.00308
scoring_system epss
scoring_elements 0.53932
published_at 2026-04-04T12:55:00Z
3
value 0.00308
scoring_system epss
scoring_elements 0.53906
published_at 2026-04-07T12:55:00Z
4
value 0.00308
scoring_system epss
scoring_elements 0.53958
published_at 2026-04-09T12:55:00Z
5
value 0.00308
scoring_system epss
scoring_elements 0.54004
published_at 2026-04-11T12:55:00Z
6
value 0.00308
scoring_system epss
scoring_elements 0.53987
published_at 2026-04-12T12:55:00Z
7
value 0.00308
scoring_system epss
scoring_elements 0.5397
published_at 2026-04-13T12:55:00Z
8
value 0.00308
scoring_system epss
scoring_elements 0.54008
published_at 2026-04-16T12:55:00Z
9
value 0.00308
scoring_system epss
scoring_elements 0.54013
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-2571
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0433
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0433
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0441
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0441
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0499
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0499
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0501
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0501
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0505
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0505
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2568
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2568
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2571
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2571
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2573
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2573
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2582
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2582
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2643
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2643
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2648
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2648
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3152
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3152
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4752
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4752
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4757
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4757
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1212772
reference_id 1212772
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1212772
17
reference_url https://security.gentoo.org/glsa/201507-19
reference_id GLSA-201507-19
reference_type
scores
url https://security.gentoo.org/glsa/201507-19
18
reference_url https://access.redhat.com/errata/RHSA-2015:1628
reference_id RHSA-2015:1628
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1628
19
reference_url https://access.redhat.com/errata/RHSA-2015:1629
reference_id RHSA-2015:1629
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1629
20
reference_url https://access.redhat.com/errata/RHSA-2015:1646
reference_id RHSA-2015:1646
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1646
21
reference_url https://access.redhat.com/errata/RHSA-2015:1647
reference_id RHSA-2015:1647
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1647
22
reference_url https://access.redhat.com/errata/RHSA-2015:1665
reference_id RHSA-2015:1665
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1665
23
reference_url https://usn.ubuntu.com/2575-1/
reference_id USN-2575-1
reference_type
scores
url https://usn.ubuntu.com/2575-1/
fixed_packages
0
url pkg:deb/debian/mariadb-10.0@10.0.25-0%2Bdeb8u1
purl pkg:deb/debian/mariadb-10.0@10.0.25-0%2Bdeb8u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1gmc-pj6y-rkfx
1
vulnerability VCID-2gyq-q761-h3br
2
vulnerability VCID-2rf6-qaey-1ubn
3
vulnerability VCID-45hn-ezks-j7br
4
vulnerability VCID-4cnj-7fur-3qe3
5
vulnerability VCID-4yz4-vxnh-b3dp
6
vulnerability VCID-5sjj-599v-vybg
7
vulnerability VCID-6g4n-3xfu-hfee
8
vulnerability VCID-6muh-rg1z-pqab
9
vulnerability VCID-8djb-knkk-s3c8
10
vulnerability VCID-8krv-jqjg-uqc8
11
vulnerability VCID-8kvb-5u8c-zbc4
12
vulnerability VCID-8sya-wktg-dqa5
13
vulnerability VCID-9f48-53dz-13an
14
vulnerability VCID-9ff2-43rk-2ydj
15
vulnerability VCID-9w98-nfg2-muh2
16
vulnerability VCID-bhxk-8byp-eyap
17
vulnerability VCID-ej67-ayfh-sqdt
18
vulnerability VCID-g1pp-9qqg-1beb
19
vulnerability VCID-gp4w-bdxg-6kab
20
vulnerability VCID-jgff-4jyp-9fgr
21
vulnerability VCID-mde2-1ynu-auh2
22
vulnerability VCID-mfgg-7s54-gqg8
23
vulnerability VCID-nkdd-suwp-4ffr
24
vulnerability VCID-p623-gxyv-g7fs
25
vulnerability VCID-pk7e-t26d-aqdm
26
vulnerability VCID-pv92-6p9x-v7bs
27
vulnerability VCID-r2cz-9kjz-zbgu
28
vulnerability VCID-rssq-mfc2-ckaf
29
vulnerability VCID-rted-6vzz-mbcv
30
vulnerability VCID-tvdv-3ed5-h3dt
31
vulnerability VCID-un5y-y9sq-1ufb
32
vulnerability VCID-v4gv-g9n5-ukgc
33
vulnerability VCID-vh5y-15tw-d7fd
34
vulnerability VCID-wrna-cc9g-sqbe
35
vulnerability VCID-yx79-3g2x-pqex
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.0@10.0.25-0%252Bdeb8u1
aliases CVE-2015-2571
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hpk6-es28-5ueb
31
url VCID-jqmx-5tfh-qqff
vulnerability_id VCID-jqmx-5tfh-qqff
summary security update
references
0
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177539.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177539.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00010.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00010.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00011.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00011.html
3
reference_url http://lists.opensuse.org/opensuse-updates/2016-02/msg00039.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2016-02/msg00039.html
4
reference_url http://rhn.redhat.com/errata/RHSA-2016-0534.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0534.html
5
reference_url http://rhn.redhat.com/errata/RHSA-2016-0705.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0705.html
6
reference_url http://rhn.redhat.com/errata/RHSA-2016-1480.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-1480.html
7
reference_url http://rhn.redhat.com/errata/RHSA-2016-1481.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-1481.html
8
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4836.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4836.json
9
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-4836
reference_id
reference_type
scores
0
value 0.00861
scoring_system epss
scoring_elements 0.75097
published_at 2026-04-18T12:55:00Z
1
value 0.00861
scoring_system epss
scoring_elements 0.75008
published_at 2026-04-01T12:55:00Z
2
value 0.00861
scoring_system epss
scoring_elements 0.75011
published_at 2026-04-02T12:55:00Z
3
value 0.00861
scoring_system epss
scoring_elements 0.7504
published_at 2026-04-04T12:55:00Z
4
value 0.00861
scoring_system epss
scoring_elements 0.75016
published_at 2026-04-07T12:55:00Z
5
value 0.00861
scoring_system epss
scoring_elements 0.7505
published_at 2026-04-08T12:55:00Z
6
value 0.00861
scoring_system epss
scoring_elements 0.75061
published_at 2026-04-09T12:55:00Z
7
value 0.00861
scoring_system epss
scoring_elements 0.75084
published_at 2026-04-11T12:55:00Z
8
value 0.00861
scoring_system epss
scoring_elements 0.75063
published_at 2026-04-12T12:55:00Z
9
value 0.00861
scoring_system epss
scoring_elements 0.75052
published_at 2026-04-13T12:55:00Z
10
value 0.00861
scoring_system epss
scoring_elements 0.7509
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-4836
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4792
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4792
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4802
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4802
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4815
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4815
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4816
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4816
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4819
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4819
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4826
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4826
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4830
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4830
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4836
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4836
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4858
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4858
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4861
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4861
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4870
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4870
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4879
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4879
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4895
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4895
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4913
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4913
24
reference_url https://www.suse.com/support/update/announcement/2016/suse-su-20160296-1.html
reference_id
reference_type
scores
url https://www.suse.com/support/update/announcement/2016/suse-su-20160296-1.html
25
reference_url http://www.debian.org/security/2015/dsa-3377
reference_id
reference_type
scores
url http://www.debian.org/security/2015/dsa-3377
26
reference_url http://www.debian.org/security/2015/dsa-3385
reference_id
reference_type
scores
url http://www.debian.org/security/2015/dsa-3385
27
reference_url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
28
reference_url http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
29
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
30
reference_url http://www.securityfocus.com/bid/77190
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/77190
31
reference_url http://www.securitytracker.com/id/1033894
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1033894
32
reference_url http://www.ubuntu.com/usn/USN-2781-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2781-1
33
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1274771
reference_id 1274771
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1274771
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:-:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:linux:7:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:-:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-4836
reference_id CVE-2015-4836
reference_type
scores
0
value 2.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:M/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2015-4836
67
reference_url https://access.redhat.com/errata/RHSA-2016:0534
reference_id RHSA-2016:0534
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0534
68
reference_url https://access.redhat.com/errata/RHSA-2016:0705
reference_id RHSA-2016:0705
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0705
69
reference_url https://access.redhat.com/errata/RHSA-2016:1132
reference_id RHSA-2016:1132
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1132
70
reference_url https://access.redhat.com/errata/RHSA-2016:1480
reference_id RHSA-2016:1480
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1480
71
reference_url https://access.redhat.com/errata/RHSA-2016:1481
reference_id RHSA-2016:1481
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1481
72
reference_url https://usn.ubuntu.com/2781-1/
reference_id USN-2781-1
reference_type
scores
url https://usn.ubuntu.com/2781-1/
fixed_packages
0
url pkg:deb/debian/mariadb-10.0@10.0.25-0%2Bdeb8u1
purl pkg:deb/debian/mariadb-10.0@10.0.25-0%2Bdeb8u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1gmc-pj6y-rkfx
1
vulnerability VCID-2gyq-q761-h3br
2
vulnerability VCID-2rf6-qaey-1ubn
3
vulnerability VCID-45hn-ezks-j7br
4
vulnerability VCID-4cnj-7fur-3qe3
5
vulnerability VCID-4yz4-vxnh-b3dp
6
vulnerability VCID-5sjj-599v-vybg
7
vulnerability VCID-6g4n-3xfu-hfee
8
vulnerability VCID-6muh-rg1z-pqab
9
vulnerability VCID-8djb-knkk-s3c8
10
vulnerability VCID-8krv-jqjg-uqc8
11
vulnerability VCID-8kvb-5u8c-zbc4
12
vulnerability VCID-8sya-wktg-dqa5
13
vulnerability VCID-9f48-53dz-13an
14
vulnerability VCID-9ff2-43rk-2ydj
15
vulnerability VCID-9w98-nfg2-muh2
16
vulnerability VCID-bhxk-8byp-eyap
17
vulnerability VCID-ej67-ayfh-sqdt
18
vulnerability VCID-g1pp-9qqg-1beb
19
vulnerability VCID-gp4w-bdxg-6kab
20
vulnerability VCID-jgff-4jyp-9fgr
21
vulnerability VCID-mde2-1ynu-auh2
22
vulnerability VCID-mfgg-7s54-gqg8
23
vulnerability VCID-nkdd-suwp-4ffr
24
vulnerability VCID-p623-gxyv-g7fs
25
vulnerability VCID-pk7e-t26d-aqdm
26
vulnerability VCID-pv92-6p9x-v7bs
27
vulnerability VCID-r2cz-9kjz-zbgu
28
vulnerability VCID-rssq-mfc2-ckaf
29
vulnerability VCID-rted-6vzz-mbcv
30
vulnerability VCID-tvdv-3ed5-h3dt
31
vulnerability VCID-un5y-y9sq-1ufb
32
vulnerability VCID-v4gv-g9n5-ukgc
33
vulnerability VCID-vh5y-15tw-d7fd
34
vulnerability VCID-wrna-cc9g-sqbe
35
vulnerability VCID-yx79-3g2x-pqex
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.0@10.0.25-0%252Bdeb8u1
aliases CVE-2015-4836
risk_score 1.2
exploitability 0.5
weighted_severity 2.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jqmx-5tfh-qqff
32
url VCID-jzjd-n9ga-6yf5
vulnerability_id VCID-jzjd-n9ga-6yf5
summary
Multiple vulnerabilities have been found in MySQL, allowing
    attackers to execute arbitrary code or cause Denial of Service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0441.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0441.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-0441
reference_id
reference_type
scores
0
value 0.00384
scoring_system epss
scoring_elements 0.59573
published_at 2026-04-01T12:55:00Z
1
value 0.00384
scoring_system epss
scoring_elements 0.59646
published_at 2026-04-02T12:55:00Z
2
value 0.00384
scoring_system epss
scoring_elements 0.5967
published_at 2026-04-04T12:55:00Z
3
value 0.00384
scoring_system epss
scoring_elements 0.59641
published_at 2026-04-07T12:55:00Z
4
value 0.00384
scoring_system epss
scoring_elements 0.59692
published_at 2026-04-08T12:55:00Z
5
value 0.00384
scoring_system epss
scoring_elements 0.59705
published_at 2026-04-09T12:55:00Z
6
value 0.00384
scoring_system epss
scoring_elements 0.59725
published_at 2026-04-11T12:55:00Z
7
value 0.00384
scoring_system epss
scoring_elements 0.59708
published_at 2026-04-12T12:55:00Z
8
value 0.00384
scoring_system epss
scoring_elements 0.59689
published_at 2026-04-13T12:55:00Z
9
value 0.00384
scoring_system epss
scoring_elements 0.59722
published_at 2026-04-16T12:55:00Z
10
value 0.00384
scoring_system epss
scoring_elements 0.5973
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-0441
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0433
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0433
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0441
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0441
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0499
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0499
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0501
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0501
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0505
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0505
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2568
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2568
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2571
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2571
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2573
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2573
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2582
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2582
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2643
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2643
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2648
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2648
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3152
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3152
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4752
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4752
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4757
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4757
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1212777
reference_id 1212777
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1212777
17
reference_url https://security.gentoo.org/glsa/201507-19
reference_id GLSA-201507-19
reference_type
scores
url https://security.gentoo.org/glsa/201507-19
18
reference_url https://access.redhat.com/errata/RHSA-2015:1628
reference_id RHSA-2015:1628
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1628
19
reference_url https://access.redhat.com/errata/RHSA-2015:1629
reference_id RHSA-2015:1629
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1629
20
reference_url https://access.redhat.com/errata/RHSA-2015:1647
reference_id RHSA-2015:1647
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1647
21
reference_url https://access.redhat.com/errata/RHSA-2015:1665
reference_id RHSA-2015:1665
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1665
22
reference_url https://usn.ubuntu.com/2575-1/
reference_id USN-2575-1
reference_type
scores
url https://usn.ubuntu.com/2575-1/
fixed_packages
0
url pkg:deb/debian/mariadb-10.0@10.0.25-0%2Bdeb8u1
purl pkg:deb/debian/mariadb-10.0@10.0.25-0%2Bdeb8u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1gmc-pj6y-rkfx
1
vulnerability VCID-2gyq-q761-h3br
2
vulnerability VCID-2rf6-qaey-1ubn
3
vulnerability VCID-45hn-ezks-j7br
4
vulnerability VCID-4cnj-7fur-3qe3
5
vulnerability VCID-4yz4-vxnh-b3dp
6
vulnerability VCID-5sjj-599v-vybg
7
vulnerability VCID-6g4n-3xfu-hfee
8
vulnerability VCID-6muh-rg1z-pqab
9
vulnerability VCID-8djb-knkk-s3c8
10
vulnerability VCID-8krv-jqjg-uqc8
11
vulnerability VCID-8kvb-5u8c-zbc4
12
vulnerability VCID-8sya-wktg-dqa5
13
vulnerability VCID-9f48-53dz-13an
14
vulnerability VCID-9ff2-43rk-2ydj
15
vulnerability VCID-9w98-nfg2-muh2
16
vulnerability VCID-bhxk-8byp-eyap
17
vulnerability VCID-ej67-ayfh-sqdt
18
vulnerability VCID-g1pp-9qqg-1beb
19
vulnerability VCID-gp4w-bdxg-6kab
20
vulnerability VCID-jgff-4jyp-9fgr
21
vulnerability VCID-mde2-1ynu-auh2
22
vulnerability VCID-mfgg-7s54-gqg8
23
vulnerability VCID-nkdd-suwp-4ffr
24
vulnerability VCID-p623-gxyv-g7fs
25
vulnerability VCID-pk7e-t26d-aqdm
26
vulnerability VCID-pv92-6p9x-v7bs
27
vulnerability VCID-r2cz-9kjz-zbgu
28
vulnerability VCID-rssq-mfc2-ckaf
29
vulnerability VCID-rted-6vzz-mbcv
30
vulnerability VCID-tvdv-3ed5-h3dt
31
vulnerability VCID-un5y-y9sq-1ufb
32
vulnerability VCID-v4gv-g9n5-ukgc
33
vulnerability VCID-vh5y-15tw-d7fd
34
vulnerability VCID-wrna-cc9g-sqbe
35
vulnerability VCID-yx79-3g2x-pqex
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.0@10.0.25-0%252Bdeb8u1
aliases CVE-2015-0441
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jzjd-n9ga-6yf5
33
url VCID-kwrj-3fxz-g7c6
vulnerability_id VCID-kwrj-3fxz-g7c6
summary security update
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:22Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:22Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:22Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:22Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:22Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:22Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html
6
reference_url http://rhn.redhat.com/errata/RHSA-2016-0705.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:22Z/
url http://rhn.redhat.com/errata/RHSA-2016-0705.html
7
reference_url http://rhn.redhat.com/errata/RHSA-2016-1480.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:22Z/
url http://rhn.redhat.com/errata/RHSA-2016-1480.html
8
reference_url http://rhn.redhat.com/errata/RHSA-2016-1481.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:22Z/
url http://rhn.redhat.com/errata/RHSA-2016-1481.html
9
reference_url http://rhn.redhat.com/errata/RHSA-2016-1602.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:22Z/
url http://rhn.redhat.com/errata/RHSA-2016-1602.html
10
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0644.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0644.json
11
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-0644
reference_id
reference_type
scores
0
value 0.00214
scoring_system epss
scoring_elements 0.43877
published_at 2026-04-01T12:55:00Z
1
value 0.00214
scoring_system epss
scoring_elements 0.43921
published_at 2026-04-02T12:55:00Z
2
value 0.00214
scoring_system epss
scoring_elements 0.43944
published_at 2026-04-11T12:55:00Z
3
value 0.00214
scoring_system epss
scoring_elements 0.43874
published_at 2026-04-07T12:55:00Z
4
value 0.00214
scoring_system epss
scoring_elements 0.43924
published_at 2026-04-08T12:55:00Z
5
value 0.00214
scoring_system epss
scoring_elements 0.43926
published_at 2026-04-09T12:55:00Z
6
value 0.00214
scoring_system epss
scoring_elements 0.43911
published_at 2026-04-12T12:55:00Z
7
value 0.00214
scoring_system epss
scoring_elements 0.43895
published_at 2026-04-13T12:55:00Z
8
value 0.00214
scoring_system epss
scoring_elements 0.43957
published_at 2026-04-16T12:55:00Z
9
value 0.00214
scoring_system epss
scoring_elements 0.43948
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-0644
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0640
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0640
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0641
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0641
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0642
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0642
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0643
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0643
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0644
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0644
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0646
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0646
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0647
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0647
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0648
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0648
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0649
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0649
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0650
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0650
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0655
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0655
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0666
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0666
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0668
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0668
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2047
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2047
26
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.6
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:S/C:N/I:N/A:C
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
27
reference_url https://mariadb.com/kb/en/mariadb/mariadb-10024-release-notes/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:22Z/
url https://mariadb.com/kb/en/mariadb/mariadb-10024-release-notes/
28
reference_url https://mariadb.com/kb/en/mariadb/mariadb-10112-release-notes/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:22Z/
url https://mariadb.com/kb/en/mariadb/mariadb-10112-release-notes/
29
reference_url https://mariadb.com/kb/en/mariadb/mariadb-5548-release-notes/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:22Z/
url https://mariadb.com/kb/en/mariadb/mariadb-5548-release-notes/
30
reference_url http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:22Z/
url http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168
31
reference_url http://www.debian.org/security/2016/dsa-3557
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:22Z/
url http://www.debian.org/security/2016/dsa-3557
32
reference_url http://www.debian.org/security/2016/dsa-3595
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:22Z/
url http://www.debian.org/security/2016/dsa-3595
33
reference_url http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:22Z/
url http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
34
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:22Z/
url http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
35
reference_url http://www.securityfocus.com/bid/86442
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:22Z/
url http://www.securityfocus.com/bid/86442
36
reference_url http://www.securitytracker.com/id/1035606
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:22Z/
url http://www.securitytracker.com/id/1035606
37
reference_url http://www.ubuntu.com/usn/USN-2953-1
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:22Z/
url http://www.ubuntu.com/usn/USN-2953-1
38
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1329247
reference_id 1329247
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1329247
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:powerkvm:2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ibm:powerkvm:2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:powerkvm:2.1:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:powerkvm:3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ibm:powerkvm:3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:powerkvm:3.1:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-0644
reference_id CVE-2016-0644
reference_type
scores
0
value 4.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:P
1
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2016-0644
49
reference_url https://access.redhat.com/errata/RHSA-2016:0705
reference_id RHSA-2016:0705
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0705
50
reference_url https://access.redhat.com/errata/RHSA-2016:1132
reference_id RHSA-2016:1132
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:22Z/
url https://access.redhat.com/errata/RHSA-2016:1132
51
reference_url https://access.redhat.com/errata/RHSA-2016:1480
reference_id RHSA-2016:1480
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1480
52
reference_url https://access.redhat.com/errata/RHSA-2016:1481
reference_id RHSA-2016:1481
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1481
53
reference_url https://access.redhat.com/errata/RHSA-2016:1602
reference_id RHSA-2016:1602
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1602
54
reference_url https://usn.ubuntu.com/2953-1/
reference_id USN-2953-1
reference_type
scores
url https://usn.ubuntu.com/2953-1/
fixed_packages
0
url pkg:deb/debian/mariadb-10.0@10.0.25-0%2Bdeb8u1
purl pkg:deb/debian/mariadb-10.0@10.0.25-0%2Bdeb8u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1gmc-pj6y-rkfx
1
vulnerability VCID-2gyq-q761-h3br
2
vulnerability VCID-2rf6-qaey-1ubn
3
vulnerability VCID-45hn-ezks-j7br
4
vulnerability VCID-4cnj-7fur-3qe3
5
vulnerability VCID-4yz4-vxnh-b3dp
6
vulnerability VCID-5sjj-599v-vybg
7
vulnerability VCID-6g4n-3xfu-hfee
8
vulnerability VCID-6muh-rg1z-pqab
9
vulnerability VCID-8djb-knkk-s3c8
10
vulnerability VCID-8krv-jqjg-uqc8
11
vulnerability VCID-8kvb-5u8c-zbc4
12
vulnerability VCID-8sya-wktg-dqa5
13
vulnerability VCID-9f48-53dz-13an
14
vulnerability VCID-9ff2-43rk-2ydj
15
vulnerability VCID-9w98-nfg2-muh2
16
vulnerability VCID-bhxk-8byp-eyap
17
vulnerability VCID-ej67-ayfh-sqdt
18
vulnerability VCID-g1pp-9qqg-1beb
19
vulnerability VCID-gp4w-bdxg-6kab
20
vulnerability VCID-jgff-4jyp-9fgr
21
vulnerability VCID-mde2-1ynu-auh2
22
vulnerability VCID-mfgg-7s54-gqg8
23
vulnerability VCID-nkdd-suwp-4ffr
24
vulnerability VCID-p623-gxyv-g7fs
25
vulnerability VCID-pk7e-t26d-aqdm
26
vulnerability VCID-pv92-6p9x-v7bs
27
vulnerability VCID-r2cz-9kjz-zbgu
28
vulnerability VCID-rssq-mfc2-ckaf
29
vulnerability VCID-rted-6vzz-mbcv
30
vulnerability VCID-tvdv-3ed5-h3dt
31
vulnerability VCID-un5y-y9sq-1ufb
32
vulnerability VCID-v4gv-g9n5-ukgc
33
vulnerability VCID-vh5y-15tw-d7fd
34
vulnerability VCID-wrna-cc9g-sqbe
35
vulnerability VCID-yx79-3g2x-pqex
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.0@10.0.25-0%252Bdeb8u1
aliases CVE-2016-0644
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-kwrj-3fxz-g7c6
34
url VCID-nw5h-p35b-2khv
vulnerability_id VCID-nw5h-p35b-2khv
summary security update
references
0
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177539.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177539.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00010.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00010.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00011.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00011.html
3
reference_url http://lists.opensuse.org/opensuse-updates/2016-02/msg00039.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2016-02/msg00039.html
4
reference_url http://rhn.redhat.com/errata/RHSA-2016-0534.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0534.html
5
reference_url http://rhn.redhat.com/errata/RHSA-2016-0705.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0705.html
6
reference_url http://rhn.redhat.com/errata/RHSA-2016-1480.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-1480.html
7
reference_url http://rhn.redhat.com/errata/RHSA-2016-1481.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-1481.html
8
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4830.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4830.json
9
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-4830
reference_id
reference_type
scores
0
value 0.0027
scoring_system epss
scoring_elements 0.50576
published_at 2026-04-18T12:55:00Z
1
value 0.0027
scoring_system epss
scoring_elements 0.50436
published_at 2026-04-01T12:55:00Z
2
value 0.0027
scoring_system epss
scoring_elements 0.50493
published_at 2026-04-02T12:55:00Z
3
value 0.0027
scoring_system epss
scoring_elements 0.5052
published_at 2026-04-04T12:55:00Z
4
value 0.0027
scoring_system epss
scoring_elements 0.50474
published_at 2026-04-07T12:55:00Z
5
value 0.0027
scoring_system epss
scoring_elements 0.50528
published_at 2026-04-13T12:55:00Z
6
value 0.0027
scoring_system epss
scoring_elements 0.50524
published_at 2026-04-09T12:55:00Z
7
value 0.0027
scoring_system epss
scoring_elements 0.50566
published_at 2026-04-11T12:55:00Z
8
value 0.0027
scoring_system epss
scoring_elements 0.50542
published_at 2026-04-12T12:55:00Z
9
value 0.0027
scoring_system epss
scoring_elements 0.50571
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-4830
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4792
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4792
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4802
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4802
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4815
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4815
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4816
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4816
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4819
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4819
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4826
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4826
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4830
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4830
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4836
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4836
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4858
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4858
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4861
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4861
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4870
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4870
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4879
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4879
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4895
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4895
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4913
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4913
24
reference_url https://www.suse.com/support/update/announcement/2016/suse-su-20160296-1.html
reference_id
reference_type
scores
url https://www.suse.com/support/update/announcement/2016/suse-su-20160296-1.html
25
reference_url http://www.debian.org/security/2015/dsa-3377
reference_id
reference_type
scores
url http://www.debian.org/security/2015/dsa-3377
26
reference_url http://www.debian.org/security/2015/dsa-3385
reference_id
reference_type
scores
url http://www.debian.org/security/2015/dsa-3385
27
reference_url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
28
reference_url http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
29
reference_url http://www.securityfocus.com/bid/77228
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/77228
30
reference_url http://www.securitytracker.com/id/1033894
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1033894
31
reference_url http://www.ubuntu.com/usn/USN-2781-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2781-1
32
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1274767
reference_id 1274767
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1274767
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.1:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11:sp3:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_desktop:11:sp3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11:sp3:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:-:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:-:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:-:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:vmware:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:vmware:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:vmware:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp3:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp3:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-4830
reference_id CVE-2015-4830
reference_type
scores
0
value 4.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:P/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2015-4830
68
reference_url https://access.redhat.com/errata/RHSA-2016:0534
reference_id RHSA-2016:0534
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0534
69
reference_url https://access.redhat.com/errata/RHSA-2016:0705
reference_id RHSA-2016:0705
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0705
70
reference_url https://access.redhat.com/errata/RHSA-2016:1132
reference_id RHSA-2016:1132
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1132
71
reference_url https://access.redhat.com/errata/RHSA-2016:1480
reference_id RHSA-2016:1480
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1480
72
reference_url https://access.redhat.com/errata/RHSA-2016:1481
reference_id RHSA-2016:1481
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1481
73
reference_url https://usn.ubuntu.com/2781-1/
reference_id USN-2781-1
reference_type
scores
url https://usn.ubuntu.com/2781-1/
fixed_packages
0
url pkg:deb/debian/mariadb-10.0@10.0.25-0%2Bdeb8u1
purl pkg:deb/debian/mariadb-10.0@10.0.25-0%2Bdeb8u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1gmc-pj6y-rkfx
1
vulnerability VCID-2gyq-q761-h3br
2
vulnerability VCID-2rf6-qaey-1ubn
3
vulnerability VCID-45hn-ezks-j7br
4
vulnerability VCID-4cnj-7fur-3qe3
5
vulnerability VCID-4yz4-vxnh-b3dp
6
vulnerability VCID-5sjj-599v-vybg
7
vulnerability VCID-6g4n-3xfu-hfee
8
vulnerability VCID-6muh-rg1z-pqab
9
vulnerability VCID-8djb-knkk-s3c8
10
vulnerability VCID-8krv-jqjg-uqc8
11
vulnerability VCID-8kvb-5u8c-zbc4
12
vulnerability VCID-8sya-wktg-dqa5
13
vulnerability VCID-9f48-53dz-13an
14
vulnerability VCID-9ff2-43rk-2ydj
15
vulnerability VCID-9w98-nfg2-muh2
16
vulnerability VCID-bhxk-8byp-eyap
17
vulnerability VCID-ej67-ayfh-sqdt
18
vulnerability VCID-g1pp-9qqg-1beb
19
vulnerability VCID-gp4w-bdxg-6kab
20
vulnerability VCID-jgff-4jyp-9fgr
21
vulnerability VCID-mde2-1ynu-auh2
22
vulnerability VCID-mfgg-7s54-gqg8
23
vulnerability VCID-nkdd-suwp-4ffr
24
vulnerability VCID-p623-gxyv-g7fs
25
vulnerability VCID-pk7e-t26d-aqdm
26
vulnerability VCID-pv92-6p9x-v7bs
27
vulnerability VCID-r2cz-9kjz-zbgu
28
vulnerability VCID-rssq-mfc2-ckaf
29
vulnerability VCID-rted-6vzz-mbcv
30
vulnerability VCID-tvdv-3ed5-h3dt
31
vulnerability VCID-un5y-y9sq-1ufb
32
vulnerability VCID-v4gv-g9n5-ukgc
33
vulnerability VCID-vh5y-15tw-d7fd
34
vulnerability VCID-wrna-cc9g-sqbe
35
vulnerability VCID-yx79-3g2x-pqex
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.0@10.0.25-0%252Bdeb8u1
aliases CVE-2015-4830
risk_score 1.8
exploitability 0.5
weighted_severity 3.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-nw5h-p35b-2khv
35
url VCID-nxma-cse5-pke8
vulnerability_id VCID-nxma-cse5-pke8
summary security update
references
0
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177539.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177539.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4895.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4895.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-4895
reference_id
reference_type
scores
0
value 0.00459
scoring_system epss
scoring_elements 0.64136
published_at 2026-04-18T12:55:00Z
1
value 0.00459
scoring_system epss
scoring_elements 0.64005
published_at 2026-04-01T12:55:00Z
2
value 0.00459
scoring_system epss
scoring_elements 0.64063
published_at 2026-04-02T12:55:00Z
3
value 0.00459
scoring_system epss
scoring_elements 0.6409
published_at 2026-04-04T12:55:00Z
4
value 0.00459
scoring_system epss
scoring_elements 0.6405
published_at 2026-04-07T12:55:00Z
5
value 0.00459
scoring_system epss
scoring_elements 0.64101
published_at 2026-04-08T12:55:00Z
6
value 0.00459
scoring_system epss
scoring_elements 0.64117
published_at 2026-04-09T12:55:00Z
7
value 0.00459
scoring_system epss
scoring_elements 0.64129
published_at 2026-04-11T12:55:00Z
8
value 0.00459
scoring_system epss
scoring_elements 0.64118
published_at 2026-04-12T12:55:00Z
9
value 0.00459
scoring_system epss
scoring_elements 0.64089
published_at 2026-04-13T12:55:00Z
10
value 0.00459
scoring_system epss
scoring_elements 0.64125
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-4895
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4792
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4792
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4802
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4802
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4815
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4815
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4816
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4816
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4819
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4819
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4826
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4826
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4830
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4830
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4836
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4836
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4858
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4858
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4861
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4861
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4870
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4870
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4879
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4879
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4895
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4895
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4913
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4913
17
reference_url http://www.debian.org/security/2015/dsa-3385
reference_id
reference_type
scores
url http://www.debian.org/security/2015/dsa-3385
18
reference_url http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
19
reference_url http://www.securityfocus.com/bid/77136
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/77136
20
reference_url http://www.securitytracker.com/id/1033894
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1033894
21
reference_url http://www.ubuntu.com/usn/USN-2781-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2781-1
22
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1274786
reference_id 1274786
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1274786
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-4895
reference_id CVE-2015-4895
reference_type
scores
0
value 3.5
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:S/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2015-4895
32
reference_url https://access.redhat.com/errata/RHSA-2015:1630
reference_id RHSA-2015:1630
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1630
33
reference_url https://access.redhat.com/errata/RHSA-2016:1132
reference_id RHSA-2016:1132
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1132
34
reference_url https://usn.ubuntu.com/2781-1/
reference_id USN-2781-1
reference_type
scores
url https://usn.ubuntu.com/2781-1/
fixed_packages
0
url pkg:deb/debian/mariadb-10.0@10.0.25-0%2Bdeb8u1
purl pkg:deb/debian/mariadb-10.0@10.0.25-0%2Bdeb8u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1gmc-pj6y-rkfx
1
vulnerability VCID-2gyq-q761-h3br
2
vulnerability VCID-2rf6-qaey-1ubn
3
vulnerability VCID-45hn-ezks-j7br
4
vulnerability VCID-4cnj-7fur-3qe3
5
vulnerability VCID-4yz4-vxnh-b3dp
6
vulnerability VCID-5sjj-599v-vybg
7
vulnerability VCID-6g4n-3xfu-hfee
8
vulnerability VCID-6muh-rg1z-pqab
9
vulnerability VCID-8djb-knkk-s3c8
10
vulnerability VCID-8krv-jqjg-uqc8
11
vulnerability VCID-8kvb-5u8c-zbc4
12
vulnerability VCID-8sya-wktg-dqa5
13
vulnerability VCID-9f48-53dz-13an
14
vulnerability VCID-9ff2-43rk-2ydj
15
vulnerability VCID-9w98-nfg2-muh2
16
vulnerability VCID-bhxk-8byp-eyap
17
vulnerability VCID-ej67-ayfh-sqdt
18
vulnerability VCID-g1pp-9qqg-1beb
19
vulnerability VCID-gp4w-bdxg-6kab
20
vulnerability VCID-jgff-4jyp-9fgr
21
vulnerability VCID-mde2-1ynu-auh2
22
vulnerability VCID-mfgg-7s54-gqg8
23
vulnerability VCID-nkdd-suwp-4ffr
24
vulnerability VCID-p623-gxyv-g7fs
25
vulnerability VCID-pk7e-t26d-aqdm
26
vulnerability VCID-pv92-6p9x-v7bs
27
vulnerability VCID-r2cz-9kjz-zbgu
28
vulnerability VCID-rssq-mfc2-ckaf
29
vulnerability VCID-rted-6vzz-mbcv
30
vulnerability VCID-tvdv-3ed5-h3dt
31
vulnerability VCID-un5y-y9sq-1ufb
32
vulnerability VCID-v4gv-g9n5-ukgc
33
vulnerability VCID-vh5y-15tw-d7fd
34
vulnerability VCID-wrna-cc9g-sqbe
35
vulnerability VCID-yx79-3g2x-pqex
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.0@10.0.25-0%252Bdeb8u1
aliases CVE-2015-4895
risk_score 1.6
exploitability 0.5
weighted_severity 3.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-nxma-cse5-pke8
36
url VCID-q1vh-jwcy-87cz
vulnerability_id VCID-q1vh-jwcy-87cz
summary security update
references
0
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177539.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177539.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00010.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00010.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00011.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00011.html
3
reference_url http://lists.opensuse.org/opensuse-updates/2016-02/msg00039.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2016-02/msg00039.html
4
reference_url http://rhn.redhat.com/errata/RHSA-2016-0534.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0534.html
5
reference_url http://rhn.redhat.com/errata/RHSA-2016-0705.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0705.html
6
reference_url http://rhn.redhat.com/errata/RHSA-2016-1480.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-1480.html
7
reference_url http://rhn.redhat.com/errata/RHSA-2016-1481.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-1481.html
8
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4858.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4858.json
9
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-4858
reference_id
reference_type
scores
0
value 0.00419
scoring_system epss
scoring_elements 0.61939
published_at 2026-04-18T12:55:00Z
1
value 0.00419
scoring_system epss
scoring_elements 0.6176
published_at 2026-04-01T12:55:00Z
2
value 0.00419
scoring_system epss
scoring_elements 0.61834
published_at 2026-04-02T12:55:00Z
3
value 0.00419
scoring_system epss
scoring_elements 0.61865
published_at 2026-04-04T12:55:00Z
4
value 0.00419
scoring_system epss
scoring_elements 0.61837
published_at 2026-04-07T12:55:00Z
5
value 0.00419
scoring_system epss
scoring_elements 0.61886
published_at 2026-04-08T12:55:00Z
6
value 0.00419
scoring_system epss
scoring_elements 0.61902
published_at 2026-04-09T12:55:00Z
7
value 0.00419
scoring_system epss
scoring_elements 0.61923
published_at 2026-04-11T12:55:00Z
8
value 0.00419
scoring_system epss
scoring_elements 0.61911
published_at 2026-04-12T12:55:00Z
9
value 0.00419
scoring_system epss
scoring_elements 0.61891
published_at 2026-04-13T12:55:00Z
10
value 0.00419
scoring_system epss
scoring_elements 0.61934
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-4858
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4792
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4792
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4802
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4802
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4815
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4815
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4816
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4816
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4819
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4819
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4826
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4826
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4830
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4830
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4836
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4836
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4858
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4858
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4861
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4861
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4870
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4870
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4879
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4879
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4895
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4895
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4913
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4913
24
reference_url https://www.suse.com/support/update/announcement/2016/suse-su-20160296-1.html
reference_id
reference_type
scores
url https://www.suse.com/support/update/announcement/2016/suse-su-20160296-1.html
25
reference_url http://www.debian.org/security/2015/dsa-3377
reference_id
reference_type
scores
url http://www.debian.org/security/2015/dsa-3377
26
reference_url http://www.debian.org/security/2015/dsa-3385
reference_id
reference_type
scores
url http://www.debian.org/security/2015/dsa-3385
27
reference_url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
28
reference_url http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
29
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
30
reference_url http://www.securityfocus.com/bid/77145
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/77145
31
reference_url http://www.securitytracker.com/id/1033894
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1033894
32
reference_url http://www.ubuntu.com/usn/USN-2781-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2781-1
33
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1274773
reference_id 1274773
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1274773
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:-:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:linux:7:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:-:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.1:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-4858
reference_id CVE-2015-4858
reference_type
scores
0
value 4.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2015-4858
66
reference_url https://access.redhat.com/errata/RHSA-2016:0534
reference_id RHSA-2016:0534
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0534
67
reference_url https://access.redhat.com/errata/RHSA-2016:0705
reference_id RHSA-2016:0705
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0705
68
reference_url https://access.redhat.com/errata/RHSA-2016:1132
reference_id RHSA-2016:1132
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1132
69
reference_url https://access.redhat.com/errata/RHSA-2016:1480
reference_id RHSA-2016:1480
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1480
70
reference_url https://access.redhat.com/errata/RHSA-2016:1481
reference_id RHSA-2016:1481
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1481
71
reference_url https://usn.ubuntu.com/2781-1/
reference_id USN-2781-1
reference_type
scores
url https://usn.ubuntu.com/2781-1/
fixed_packages
0
url pkg:deb/debian/mariadb-10.0@10.0.25-0%2Bdeb8u1
purl pkg:deb/debian/mariadb-10.0@10.0.25-0%2Bdeb8u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1gmc-pj6y-rkfx
1
vulnerability VCID-2gyq-q761-h3br
2
vulnerability VCID-2rf6-qaey-1ubn
3
vulnerability VCID-45hn-ezks-j7br
4
vulnerability VCID-4cnj-7fur-3qe3
5
vulnerability VCID-4yz4-vxnh-b3dp
6
vulnerability VCID-5sjj-599v-vybg
7
vulnerability VCID-6g4n-3xfu-hfee
8
vulnerability VCID-6muh-rg1z-pqab
9
vulnerability VCID-8djb-knkk-s3c8
10
vulnerability VCID-8krv-jqjg-uqc8
11
vulnerability VCID-8kvb-5u8c-zbc4
12
vulnerability VCID-8sya-wktg-dqa5
13
vulnerability VCID-9f48-53dz-13an
14
vulnerability VCID-9ff2-43rk-2ydj
15
vulnerability VCID-9w98-nfg2-muh2
16
vulnerability VCID-bhxk-8byp-eyap
17
vulnerability VCID-ej67-ayfh-sqdt
18
vulnerability VCID-g1pp-9qqg-1beb
19
vulnerability VCID-gp4w-bdxg-6kab
20
vulnerability VCID-jgff-4jyp-9fgr
21
vulnerability VCID-mde2-1ynu-auh2
22
vulnerability VCID-mfgg-7s54-gqg8
23
vulnerability VCID-nkdd-suwp-4ffr
24
vulnerability VCID-p623-gxyv-g7fs
25
vulnerability VCID-pk7e-t26d-aqdm
26
vulnerability VCID-pv92-6p9x-v7bs
27
vulnerability VCID-r2cz-9kjz-zbgu
28
vulnerability VCID-rssq-mfc2-ckaf
29
vulnerability VCID-rted-6vzz-mbcv
30
vulnerability VCID-tvdv-3ed5-h3dt
31
vulnerability VCID-un5y-y9sq-1ufb
32
vulnerability VCID-v4gv-g9n5-ukgc
33
vulnerability VCID-vh5y-15tw-d7fd
34
vulnerability VCID-wrna-cc9g-sqbe
35
vulnerability VCID-yx79-3g2x-pqex
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.0@10.0.25-0%252Bdeb8u1
aliases CVE-2015-4858
risk_score 1.8
exploitability 0.5
weighted_severity 3.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-q1vh-jwcy-87cz
37
url VCID-q4pg-yfsh-zqcu
vulnerability_id VCID-q4pg-yfsh-zqcu
summary
Multiple vulnerabilities have been found in MySQL, allowing
    attackers to execute arbitrary code or cause Denial of Service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0433.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0433.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-0433
reference_id
reference_type
scores
0
value 0.00465
scoring_system epss
scoring_elements 0.64285
published_at 2026-04-01T12:55:00Z
1
value 0.00465
scoring_system epss
scoring_elements 0.64342
published_at 2026-04-02T12:55:00Z
2
value 0.00465
scoring_system epss
scoring_elements 0.64371
published_at 2026-04-04T12:55:00Z
3
value 0.00465
scoring_system epss
scoring_elements 0.6433
published_at 2026-04-07T12:55:00Z
4
value 0.00465
scoring_system epss
scoring_elements 0.64379
published_at 2026-04-08T12:55:00Z
5
value 0.00465
scoring_system epss
scoring_elements 0.64393
published_at 2026-04-09T12:55:00Z
6
value 0.00465
scoring_system epss
scoring_elements 0.64405
published_at 2026-04-11T12:55:00Z
7
value 0.00465
scoring_system epss
scoring_elements 0.64392
published_at 2026-04-12T12:55:00Z
8
value 0.00465
scoring_system epss
scoring_elements 0.64363
published_at 2026-04-13T12:55:00Z
9
value 0.00465
scoring_system epss
scoring_elements 0.64399
published_at 2026-04-16T12:55:00Z
10
value 0.00465
scoring_system epss
scoring_elements 0.64411
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-0433
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0433
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0433
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0441
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0441
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0499
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0499
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0501
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0501
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0505
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0505
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2568
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2568
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2571
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2571
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2573
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2573
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2582
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2582
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2643
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2643
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2648
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2648
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3152
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3152
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4752
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4752
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4757
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4757
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1212776
reference_id 1212776
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1212776
17
reference_url https://security.gentoo.org/glsa/201507-19
reference_id GLSA-201507-19
reference_type
scores
url https://security.gentoo.org/glsa/201507-19
18
reference_url https://access.redhat.com/errata/RHSA-2015:1628
reference_id RHSA-2015:1628
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1628
19
reference_url https://access.redhat.com/errata/RHSA-2015:1629
reference_id RHSA-2015:1629
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1629
20
reference_url https://access.redhat.com/errata/RHSA-2015:1647
reference_id RHSA-2015:1647
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1647
21
reference_url https://access.redhat.com/errata/RHSA-2015:1665
reference_id RHSA-2015:1665
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1665
22
reference_url https://usn.ubuntu.com/2575-1/
reference_id USN-2575-1
reference_type
scores
url https://usn.ubuntu.com/2575-1/
fixed_packages
0
url pkg:deb/debian/mariadb-10.0@10.0.25-0%2Bdeb8u1
purl pkg:deb/debian/mariadb-10.0@10.0.25-0%2Bdeb8u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1gmc-pj6y-rkfx
1
vulnerability VCID-2gyq-q761-h3br
2
vulnerability VCID-2rf6-qaey-1ubn
3
vulnerability VCID-45hn-ezks-j7br
4
vulnerability VCID-4cnj-7fur-3qe3
5
vulnerability VCID-4yz4-vxnh-b3dp
6
vulnerability VCID-5sjj-599v-vybg
7
vulnerability VCID-6g4n-3xfu-hfee
8
vulnerability VCID-6muh-rg1z-pqab
9
vulnerability VCID-8djb-knkk-s3c8
10
vulnerability VCID-8krv-jqjg-uqc8
11
vulnerability VCID-8kvb-5u8c-zbc4
12
vulnerability VCID-8sya-wktg-dqa5
13
vulnerability VCID-9f48-53dz-13an
14
vulnerability VCID-9ff2-43rk-2ydj
15
vulnerability VCID-9w98-nfg2-muh2
16
vulnerability VCID-bhxk-8byp-eyap
17
vulnerability VCID-ej67-ayfh-sqdt
18
vulnerability VCID-g1pp-9qqg-1beb
19
vulnerability VCID-gp4w-bdxg-6kab
20
vulnerability VCID-jgff-4jyp-9fgr
21
vulnerability VCID-mde2-1ynu-auh2
22
vulnerability VCID-mfgg-7s54-gqg8
23
vulnerability VCID-nkdd-suwp-4ffr
24
vulnerability VCID-p623-gxyv-g7fs
25
vulnerability VCID-pk7e-t26d-aqdm
26
vulnerability VCID-pv92-6p9x-v7bs
27
vulnerability VCID-r2cz-9kjz-zbgu
28
vulnerability VCID-rssq-mfc2-ckaf
29
vulnerability VCID-rted-6vzz-mbcv
30
vulnerability VCID-tvdv-3ed5-h3dt
31
vulnerability VCID-un5y-y9sq-1ufb
32
vulnerability VCID-v4gv-g9n5-ukgc
33
vulnerability VCID-vh5y-15tw-d7fd
34
vulnerability VCID-wrna-cc9g-sqbe
35
vulnerability VCID-yx79-3g2x-pqex
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.0@10.0.25-0%252Bdeb8u1
aliases CVE-2015-0433
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-q4pg-yfsh-zqcu
38
url VCID-qvae-5ytw-dbcy
vulnerability_id VCID-qvae-5ytw-dbcy
summary
Multiple vulnerabilities have been found in MySQL and MariaDB, the
    worst of which could allow remote attackers to cause a Denial of Service
    condition or obtain sensitive information.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4757.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4757.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-4757
reference_id
reference_type
scores
0
value 0.04287
scoring_system epss
scoring_elements 0.88799
published_at 2026-04-01T12:55:00Z
1
value 0.04287
scoring_system epss
scoring_elements 0.88807
published_at 2026-04-02T12:55:00Z
2
value 0.04287
scoring_system epss
scoring_elements 0.88823
published_at 2026-04-04T12:55:00Z
3
value 0.04287
scoring_system epss
scoring_elements 0.88826
published_at 2026-04-07T12:55:00Z
4
value 0.04287
scoring_system epss
scoring_elements 0.88843
published_at 2026-04-08T12:55:00Z
5
value 0.04287
scoring_system epss
scoring_elements 0.88849
published_at 2026-04-09T12:55:00Z
6
value 0.04287
scoring_system epss
scoring_elements 0.8886
published_at 2026-04-11T12:55:00Z
7
value 0.04287
scoring_system epss
scoring_elements 0.88856
published_at 2026-04-12T12:55:00Z
8
value 0.04287
scoring_system epss
scoring_elements 0.88855
published_at 2026-04-13T12:55:00Z
9
value 0.04287
scoring_system epss
scoring_elements 0.88869
published_at 2026-04-16T12:55:00Z
10
value 0.04287
scoring_system epss
scoring_elements 0.88867
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-4757
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0433
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0433
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0441
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0441
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0499
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0499
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0501
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0501
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0505
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0505
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2568
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2568
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2571
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2571
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2573
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2573
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2582
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2582
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2643
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2643
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2648
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2648
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3152
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3152
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4752
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4752
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4757
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4757
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1244781
reference_id 1244781
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1244781
17
reference_url https://security.gentoo.org/glsa/201610-06
reference_id GLSA-201610-06
reference_type
scores
url https://security.gentoo.org/glsa/201610-06
18
reference_url https://access.redhat.com/errata/RHSA-2015:1628
reference_id RHSA-2015:1628
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1628
19
reference_url https://access.redhat.com/errata/RHSA-2015:1629
reference_id RHSA-2015:1629
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1629
20
reference_url https://access.redhat.com/errata/RHSA-2015:1630
reference_id RHSA-2015:1630
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1630
21
reference_url https://access.redhat.com/errata/RHSA-2015:1646
reference_id RHSA-2015:1646
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1646
22
reference_url https://access.redhat.com/errata/RHSA-2015:1647
reference_id RHSA-2015:1647
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1647
23
reference_url https://access.redhat.com/errata/RHSA-2015:1665
reference_id RHSA-2015:1665
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1665
24
reference_url https://usn.ubuntu.com/2674-1/
reference_id USN-2674-1
reference_type
scores
url https://usn.ubuntu.com/2674-1/
fixed_packages
0
url pkg:deb/debian/mariadb-10.0@10.0.25-0%2Bdeb8u1
purl pkg:deb/debian/mariadb-10.0@10.0.25-0%2Bdeb8u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1gmc-pj6y-rkfx
1
vulnerability VCID-2gyq-q761-h3br
2
vulnerability VCID-2rf6-qaey-1ubn
3
vulnerability VCID-45hn-ezks-j7br
4
vulnerability VCID-4cnj-7fur-3qe3
5
vulnerability VCID-4yz4-vxnh-b3dp
6
vulnerability VCID-5sjj-599v-vybg
7
vulnerability VCID-6g4n-3xfu-hfee
8
vulnerability VCID-6muh-rg1z-pqab
9
vulnerability VCID-8djb-knkk-s3c8
10
vulnerability VCID-8krv-jqjg-uqc8
11
vulnerability VCID-8kvb-5u8c-zbc4
12
vulnerability VCID-8sya-wktg-dqa5
13
vulnerability VCID-9f48-53dz-13an
14
vulnerability VCID-9ff2-43rk-2ydj
15
vulnerability VCID-9w98-nfg2-muh2
16
vulnerability VCID-bhxk-8byp-eyap
17
vulnerability VCID-ej67-ayfh-sqdt
18
vulnerability VCID-g1pp-9qqg-1beb
19
vulnerability VCID-gp4w-bdxg-6kab
20
vulnerability VCID-jgff-4jyp-9fgr
21
vulnerability VCID-mde2-1ynu-auh2
22
vulnerability VCID-mfgg-7s54-gqg8
23
vulnerability VCID-nkdd-suwp-4ffr
24
vulnerability VCID-p623-gxyv-g7fs
25
vulnerability VCID-pk7e-t26d-aqdm
26
vulnerability VCID-pv92-6p9x-v7bs
27
vulnerability VCID-r2cz-9kjz-zbgu
28
vulnerability VCID-rssq-mfc2-ckaf
29
vulnerability VCID-rted-6vzz-mbcv
30
vulnerability VCID-tvdv-3ed5-h3dt
31
vulnerability VCID-un5y-y9sq-1ufb
32
vulnerability VCID-v4gv-g9n5-ukgc
33
vulnerability VCID-vh5y-15tw-d7fd
34
vulnerability VCID-wrna-cc9g-sqbe
35
vulnerability VCID-yx79-3g2x-pqex
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.0@10.0.25-0%252Bdeb8u1
aliases CVE-2015-4757
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qvae-5ytw-dbcy
39
url VCID-qyb6-7ees-ukcm
vulnerability_id VCID-qyb6-7ees-ukcm
summary security update
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00015.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00015.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00016.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00016.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html
6
reference_url http://rhn.redhat.com/errata/RHSA-2016-0534.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0534.html
7
reference_url http://rhn.redhat.com/errata/RHSA-2016-0705.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0705.html
8
reference_url http://rhn.redhat.com/errata/RHSA-2016-1480.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-1480.html
9
reference_url http://rhn.redhat.com/errata/RHSA-2016-1481.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-1481.html
10
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0608.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0608.json
11
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-0608
reference_id
reference_type
scores
0
value 0.00338
scoring_system epss
scoring_elements 0.56668
published_at 2026-04-18T12:55:00Z
1
value 0.00338
scoring_system epss
scoring_elements 0.56638
published_at 2026-04-13T12:55:00Z
2
value 0.00338
scoring_system epss
scoring_elements 0.56522
published_at 2026-04-01T12:55:00Z
3
value 0.00338
scoring_system epss
scoring_elements 0.56618
published_at 2026-04-07T12:55:00Z
4
value 0.00338
scoring_system epss
scoring_elements 0.56639
published_at 2026-04-04T12:55:00Z
5
value 0.00338
scoring_system epss
scoring_elements 0.56669
published_at 2026-04-16T12:55:00Z
6
value 0.00338
scoring_system epss
scoring_elements 0.56675
published_at 2026-04-09T12:55:00Z
7
value 0.00338
scoring_system epss
scoring_elements 0.56683
published_at 2026-04-11T12:55:00Z
8
value 0.00338
scoring_system epss
scoring_elements 0.56658
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-0608
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0505
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0505
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0546
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0546
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0596
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0596
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0597
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0597
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0598
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0598
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0600
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0600
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0606
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0606
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0608
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0608
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0609
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0609
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0616
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0616
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2047
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2047
23
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.5
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:S/C:N/I:N/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
24
reference_url https://mariadb.com/kb/en/mariadb/mariadb-10110-release-notes/
reference_id
reference_type
scores
url https://mariadb.com/kb/en/mariadb/mariadb-10110-release-notes/
25
reference_url https://mariadb.com/kb/en/mariadb/mariadb-5547-release-notes/
reference_id
reference_type
scores
url https://mariadb.com/kb/en/mariadb/mariadb-5547-release-notes/
26
reference_url https://mariadb.com/kb/en/mdb-10023-rn/
reference_id
reference_type
scores
url https://mariadb.com/kb/en/mdb-10023-rn/
27
reference_url http://www.debian.org/security/2016/dsa-3453
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3453
28
reference_url http://www.debian.org/security/2016/dsa-3459
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3459
29
reference_url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
30
reference_url http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
31
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
32
reference_url http://www.securityfocus.com/bid/81226
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/81226
33
reference_url http://www.securitytracker.com/id/1034708
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1034708
34
reference_url http://www.ubuntu.com/usn/USN-2881-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2881-1
35
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1301506
reference_id 1301506
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1301506
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node_eus:7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_hpc_node_eus:7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node_eus:7.2:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-0608
reference_id CVE-2016-0608
reference_type
scores
0
value 3.5
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:S/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2016-0608
57
reference_url https://access.redhat.com/errata/RHSA-2016:0534
reference_id RHSA-2016:0534
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0534
58
reference_url https://access.redhat.com/errata/RHSA-2016:0705
reference_id RHSA-2016:0705
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0705
59
reference_url https://access.redhat.com/errata/RHSA-2016:1132
reference_id RHSA-2016:1132
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1132
60
reference_url https://access.redhat.com/errata/RHSA-2016:1480
reference_id RHSA-2016:1480
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1480
61
reference_url https://access.redhat.com/errata/RHSA-2016:1481
reference_id RHSA-2016:1481
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1481
62
reference_url https://usn.ubuntu.com/2881-1/
reference_id USN-2881-1
reference_type
scores
url https://usn.ubuntu.com/2881-1/
fixed_packages
0
url pkg:deb/debian/mariadb-10.0@10.0.25-0%2Bdeb8u1
purl pkg:deb/debian/mariadb-10.0@10.0.25-0%2Bdeb8u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1gmc-pj6y-rkfx
1
vulnerability VCID-2gyq-q761-h3br
2
vulnerability VCID-2rf6-qaey-1ubn
3
vulnerability VCID-45hn-ezks-j7br
4
vulnerability VCID-4cnj-7fur-3qe3
5
vulnerability VCID-4yz4-vxnh-b3dp
6
vulnerability VCID-5sjj-599v-vybg
7
vulnerability VCID-6g4n-3xfu-hfee
8
vulnerability VCID-6muh-rg1z-pqab
9
vulnerability VCID-8djb-knkk-s3c8
10
vulnerability VCID-8krv-jqjg-uqc8
11
vulnerability VCID-8kvb-5u8c-zbc4
12
vulnerability VCID-8sya-wktg-dqa5
13
vulnerability VCID-9f48-53dz-13an
14
vulnerability VCID-9ff2-43rk-2ydj
15
vulnerability VCID-9w98-nfg2-muh2
16
vulnerability VCID-bhxk-8byp-eyap
17
vulnerability VCID-ej67-ayfh-sqdt
18
vulnerability VCID-g1pp-9qqg-1beb
19
vulnerability VCID-gp4w-bdxg-6kab
20
vulnerability VCID-jgff-4jyp-9fgr
21
vulnerability VCID-mde2-1ynu-auh2
22
vulnerability VCID-mfgg-7s54-gqg8
23
vulnerability VCID-nkdd-suwp-4ffr
24
vulnerability VCID-p623-gxyv-g7fs
25
vulnerability VCID-pk7e-t26d-aqdm
26
vulnerability VCID-pv92-6p9x-v7bs
27
vulnerability VCID-r2cz-9kjz-zbgu
28
vulnerability VCID-rssq-mfc2-ckaf
29
vulnerability VCID-rted-6vzz-mbcv
30
vulnerability VCID-tvdv-3ed5-h3dt
31
vulnerability VCID-un5y-y9sq-1ufb
32
vulnerability VCID-v4gv-g9n5-ukgc
33
vulnerability VCID-vh5y-15tw-d7fd
34
vulnerability VCID-wrna-cc9g-sqbe
35
vulnerability VCID-yx79-3g2x-pqex
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.0@10.0.25-0%252Bdeb8u1
aliases CVE-2016-0608
risk_score 1.6
exploitability 0.5
weighted_severity 3.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qyb6-7ees-ukcm
40
url VCID-r3kw-ufpz-aqft
vulnerability_id VCID-r3kw-ufpz-aqft
summary
Multiple vulnerabilities have been found in MySQL and MariaDB, the
    worst of which could allow remote attackers to cause a Denial of Service
    condition or obtain sensitive information.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2643.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2643.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-2643
reference_id
reference_type
scores
0
value 0.00598
scoring_system epss
scoring_elements 0.69334
published_at 2026-04-01T12:55:00Z
1
value 0.00598
scoring_system epss
scoring_elements 0.69347
published_at 2026-04-02T12:55:00Z
2
value 0.00598
scoring_system epss
scoring_elements 0.69363
published_at 2026-04-04T12:55:00Z
3
value 0.00598
scoring_system epss
scoring_elements 0.69343
published_at 2026-04-07T12:55:00Z
4
value 0.00598
scoring_system epss
scoring_elements 0.69393
published_at 2026-04-08T12:55:00Z
5
value 0.00598
scoring_system epss
scoring_elements 0.69409
published_at 2026-04-09T12:55:00Z
6
value 0.00598
scoring_system epss
scoring_elements 0.69432
published_at 2026-04-11T12:55:00Z
7
value 0.00598
scoring_system epss
scoring_elements 0.69417
published_at 2026-04-12T12:55:00Z
8
value 0.00598
scoring_system epss
scoring_elements 0.69402
published_at 2026-04-13T12:55:00Z
9
value 0.00598
scoring_system epss
scoring_elements 0.69442
published_at 2026-04-16T12:55:00Z
10
value 0.00598
scoring_system epss
scoring_elements 0.69452
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-2643
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0433
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0433
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0441
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0441
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0499
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0499
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0501
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0501
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0505
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0505
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2568
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2568
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2571
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2571
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2573
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2573
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2582
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2582
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2620
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2620
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2643
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2643
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2648
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2648
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3152
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3152
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4737
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4737
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4752
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4752
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4757
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4757
18
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1244774
reference_id 1244774
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1244774
19
reference_url https://security.gentoo.org/glsa/201610-06
reference_id GLSA-201610-06
reference_type
scores
url https://security.gentoo.org/glsa/201610-06
20
reference_url https://access.redhat.com/errata/RHSA-2015:1628
reference_id RHSA-2015:1628
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1628
21
reference_url https://access.redhat.com/errata/RHSA-2015:1629
reference_id RHSA-2015:1629
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1629
22
reference_url https://access.redhat.com/errata/RHSA-2015:1630
reference_id RHSA-2015:1630
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1630
23
reference_url https://access.redhat.com/errata/RHSA-2015:1646
reference_id RHSA-2015:1646
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1646
24
reference_url https://access.redhat.com/errata/RHSA-2015:1647
reference_id RHSA-2015:1647
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1647
25
reference_url https://access.redhat.com/errata/RHSA-2015:1665
reference_id RHSA-2015:1665
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1665
26
reference_url https://usn.ubuntu.com/2674-1/
reference_id USN-2674-1
reference_type
scores
url https://usn.ubuntu.com/2674-1/
fixed_packages
0
url pkg:deb/debian/mariadb-10.0@10.0.25-0%2Bdeb8u1
purl pkg:deb/debian/mariadb-10.0@10.0.25-0%2Bdeb8u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1gmc-pj6y-rkfx
1
vulnerability VCID-2gyq-q761-h3br
2
vulnerability VCID-2rf6-qaey-1ubn
3
vulnerability VCID-45hn-ezks-j7br
4
vulnerability VCID-4cnj-7fur-3qe3
5
vulnerability VCID-4yz4-vxnh-b3dp
6
vulnerability VCID-5sjj-599v-vybg
7
vulnerability VCID-6g4n-3xfu-hfee
8
vulnerability VCID-6muh-rg1z-pqab
9
vulnerability VCID-8djb-knkk-s3c8
10
vulnerability VCID-8krv-jqjg-uqc8
11
vulnerability VCID-8kvb-5u8c-zbc4
12
vulnerability VCID-8sya-wktg-dqa5
13
vulnerability VCID-9f48-53dz-13an
14
vulnerability VCID-9ff2-43rk-2ydj
15
vulnerability VCID-9w98-nfg2-muh2
16
vulnerability VCID-bhxk-8byp-eyap
17
vulnerability VCID-ej67-ayfh-sqdt
18
vulnerability VCID-g1pp-9qqg-1beb
19
vulnerability VCID-gp4w-bdxg-6kab
20
vulnerability VCID-jgff-4jyp-9fgr
21
vulnerability VCID-mde2-1ynu-auh2
22
vulnerability VCID-mfgg-7s54-gqg8
23
vulnerability VCID-nkdd-suwp-4ffr
24
vulnerability VCID-p623-gxyv-g7fs
25
vulnerability VCID-pk7e-t26d-aqdm
26
vulnerability VCID-pv92-6p9x-v7bs
27
vulnerability VCID-r2cz-9kjz-zbgu
28
vulnerability VCID-rssq-mfc2-ckaf
29
vulnerability VCID-rted-6vzz-mbcv
30
vulnerability VCID-tvdv-3ed5-h3dt
31
vulnerability VCID-un5y-y9sq-1ufb
32
vulnerability VCID-v4gv-g9n5-ukgc
33
vulnerability VCID-vh5y-15tw-d7fd
34
vulnerability VCID-wrna-cc9g-sqbe
35
vulnerability VCID-yx79-3g2x-pqex
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.0@10.0.25-0%252Bdeb8u1
aliases CVE-2015-2643
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-r3kw-ufpz-aqft
41
url VCID-r5m9-kdvc-g3fv
vulnerability_id VCID-r5m9-kdvc-g3fv
summary
Multiple vulnerabilities have been found in MySQL, allowing
    attackers to execute arbitrary code or cause Denial of Service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0505.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0505.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-0505
reference_id
reference_type
scores
0
value 0.00288
scoring_system epss
scoring_elements 0.52118
published_at 2026-04-01T12:55:00Z
1
value 0.00288
scoring_system epss
scoring_elements 0.52162
published_at 2026-04-02T12:55:00Z
2
value 0.00288
scoring_system epss
scoring_elements 0.52189
published_at 2026-04-04T12:55:00Z
3
value 0.00288
scoring_system epss
scoring_elements 0.52154
published_at 2026-04-07T12:55:00Z
4
value 0.00288
scoring_system epss
scoring_elements 0.52207
published_at 2026-04-08T12:55:00Z
5
value 0.00288
scoring_system epss
scoring_elements 0.52203
published_at 2026-04-09T12:55:00Z
6
value 0.00288
scoring_system epss
scoring_elements 0.52254
published_at 2026-04-11T12:55:00Z
7
value 0.00288
scoring_system epss
scoring_elements 0.52238
published_at 2026-04-12T12:55:00Z
8
value 0.00288
scoring_system epss
scoring_elements 0.52224
published_at 2026-04-13T12:55:00Z
9
value 0.00288
scoring_system epss
scoring_elements 0.52261
published_at 2026-04-16T12:55:00Z
10
value 0.00288
scoring_system epss
scoring_elements 0.52265
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-0505
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0433
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0433
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0441
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0441
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0499
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0499
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0501
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0501
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0505
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0505
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2568
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2568
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2571
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2571
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2573
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2573
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2582
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2582
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2643
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2643
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2648
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2648
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3152
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3152
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4752
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4752
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4757
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4757
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1212780
reference_id 1212780
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1212780
17
reference_url https://security.gentoo.org/glsa/201507-19
reference_id GLSA-201507-19
reference_type
scores
url https://security.gentoo.org/glsa/201507-19
18
reference_url https://access.redhat.com/errata/RHSA-2015:1628
reference_id RHSA-2015:1628
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1628
19
reference_url https://access.redhat.com/errata/RHSA-2015:1629
reference_id RHSA-2015:1629
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1629
20
reference_url https://access.redhat.com/errata/RHSA-2015:1646
reference_id RHSA-2015:1646
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1646
21
reference_url https://access.redhat.com/errata/RHSA-2015:1647
reference_id RHSA-2015:1647
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1647
22
reference_url https://access.redhat.com/errata/RHSA-2015:1665
reference_id RHSA-2015:1665
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1665
23
reference_url https://usn.ubuntu.com/2575-1/
reference_id USN-2575-1
reference_type
scores
url https://usn.ubuntu.com/2575-1/
fixed_packages
0
url pkg:deb/debian/mariadb-10.0@10.0.25-0%2Bdeb8u1
purl pkg:deb/debian/mariadb-10.0@10.0.25-0%2Bdeb8u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1gmc-pj6y-rkfx
1
vulnerability VCID-2gyq-q761-h3br
2
vulnerability VCID-2rf6-qaey-1ubn
3
vulnerability VCID-45hn-ezks-j7br
4
vulnerability VCID-4cnj-7fur-3qe3
5
vulnerability VCID-4yz4-vxnh-b3dp
6
vulnerability VCID-5sjj-599v-vybg
7
vulnerability VCID-6g4n-3xfu-hfee
8
vulnerability VCID-6muh-rg1z-pqab
9
vulnerability VCID-8djb-knkk-s3c8
10
vulnerability VCID-8krv-jqjg-uqc8
11
vulnerability VCID-8kvb-5u8c-zbc4
12
vulnerability VCID-8sya-wktg-dqa5
13
vulnerability VCID-9f48-53dz-13an
14
vulnerability VCID-9ff2-43rk-2ydj
15
vulnerability VCID-9w98-nfg2-muh2
16
vulnerability VCID-bhxk-8byp-eyap
17
vulnerability VCID-ej67-ayfh-sqdt
18
vulnerability VCID-g1pp-9qqg-1beb
19
vulnerability VCID-gp4w-bdxg-6kab
20
vulnerability VCID-jgff-4jyp-9fgr
21
vulnerability VCID-mde2-1ynu-auh2
22
vulnerability VCID-mfgg-7s54-gqg8
23
vulnerability VCID-nkdd-suwp-4ffr
24
vulnerability VCID-p623-gxyv-g7fs
25
vulnerability VCID-pk7e-t26d-aqdm
26
vulnerability VCID-pv92-6p9x-v7bs
27
vulnerability VCID-r2cz-9kjz-zbgu
28
vulnerability VCID-rssq-mfc2-ckaf
29
vulnerability VCID-rted-6vzz-mbcv
30
vulnerability VCID-tvdv-3ed5-h3dt
31
vulnerability VCID-un5y-y9sq-1ufb
32
vulnerability VCID-v4gv-g9n5-ukgc
33
vulnerability VCID-vh5y-15tw-d7fd
34
vulnerability VCID-wrna-cc9g-sqbe
35
vulnerability VCID-yx79-3g2x-pqex
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.0@10.0.25-0%252Bdeb8u1
aliases CVE-2015-0505
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-r5m9-kdvc-g3fv
42
url VCID-rfz7-vha1-e7gy
vulnerability_id VCID-rfz7-vha1-e7gy
summary security update
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:29Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:29Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:29Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:29Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:29Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:29Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html
6
reference_url http://rhn.redhat.com/errata/RHSA-2016-0705.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:29Z/
url http://rhn.redhat.com/errata/RHSA-2016-0705.html
7
reference_url http://rhn.redhat.com/errata/RHSA-2016-1480.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:29Z/
url http://rhn.redhat.com/errata/RHSA-2016-1480.html
8
reference_url http://rhn.redhat.com/errata/RHSA-2016-1481.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:29Z/
url http://rhn.redhat.com/errata/RHSA-2016-1481.html
9
reference_url http://rhn.redhat.com/errata/RHSA-2016-1602.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:29Z/
url http://rhn.redhat.com/errata/RHSA-2016-1602.html
10
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0641.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0641.json
11
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-0641
reference_id
reference_type
scores
0
value 0.0025
scoring_system epss
scoring_elements 0.48158
published_at 2026-04-01T12:55:00Z
1
value 0.0025
scoring_system epss
scoring_elements 0.48195
published_at 2026-04-02T12:55:00Z
2
value 0.0025
scoring_system epss
scoring_elements 0.48215
published_at 2026-04-04T12:55:00Z
3
value 0.0025
scoring_system epss
scoring_elements 0.48167
published_at 2026-04-07T12:55:00Z
4
value 0.0025
scoring_system epss
scoring_elements 0.4822
published_at 2026-04-08T12:55:00Z
5
value 0.0025
scoring_system epss
scoring_elements 0.48214
published_at 2026-04-09T12:55:00Z
6
value 0.0025
scoring_system epss
scoring_elements 0.48238
published_at 2026-04-11T12:55:00Z
7
value 0.0025
scoring_system epss
scoring_elements 0.48213
published_at 2026-04-12T12:55:00Z
8
value 0.0025
scoring_system epss
scoring_elements 0.48224
published_at 2026-04-13T12:55:00Z
9
value 0.0025
scoring_system epss
scoring_elements 0.48275
published_at 2026-04-16T12:55:00Z
10
value 0.0025
scoring_system epss
scoring_elements 0.4827
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-0641
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0640
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0640
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0641
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0641
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0642
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0642
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0643
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0643
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0644
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0644
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0646
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0646
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0647
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0647
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0648
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0648
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0649
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0649
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0650
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0650
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0655
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0655
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0666
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0666
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0668
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0668
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2047
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2047
26
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:M/C:P/I:N/A:C
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
27
reference_url https://mariadb.com/kb/en/mariadb/mariadb-10024-release-notes/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:29Z/
url https://mariadb.com/kb/en/mariadb/mariadb-10024-release-notes/
28
reference_url https://mariadb.com/kb/en/mariadb/mariadb-10112-release-notes/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:29Z/
url https://mariadb.com/kb/en/mariadb/mariadb-10112-release-notes/
29
reference_url https://mariadb.com/kb/en/mariadb/mariadb-5548-release-notes/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:29Z/
url https://mariadb.com/kb/en/mariadb/mariadb-5548-release-notes/
30
reference_url http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:29Z/
url http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168
31
reference_url http://www.debian.org/security/2016/dsa-3557
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:29Z/
url http://www.debian.org/security/2016/dsa-3557
32
reference_url http://www.debian.org/security/2016/dsa-3595
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:29Z/
url http://www.debian.org/security/2016/dsa-3595
33
reference_url http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:29Z/
url http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
34
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:29Z/
url http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
35
reference_url http://www.securityfocus.com/bid/86470
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:29Z/
url http://www.securityfocus.com/bid/86470
36
reference_url http://www.securitytracker.com/id/1035606
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:29Z/
url http://www.securitytracker.com/id/1035606
37
reference_url http://www.ubuntu.com/usn/USN-2953-1
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:29Z/
url http://www.ubuntu.com/usn/USN-2953-1
38
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1329241
reference_id 1329241
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1329241
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:powerkvm:2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ibm:powerkvm:2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:powerkvm:2.1:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:powerkvm:3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ibm:powerkvm:3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:powerkvm:3.1:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-0641
reference_id CVE-2016-0641
reference_type
scores
0
value 4.9
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:S/C:P/I:N/A:P
1
value 5.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2016-0641
49
reference_url https://access.redhat.com/errata/RHSA-2016:0705
reference_id RHSA-2016:0705
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0705
50
reference_url https://access.redhat.com/errata/RHSA-2016:1132
reference_id RHSA-2016:1132
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:29Z/
url https://access.redhat.com/errata/RHSA-2016:1132
51
reference_url https://access.redhat.com/errata/RHSA-2016:1480
reference_id RHSA-2016:1480
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1480
52
reference_url https://access.redhat.com/errata/RHSA-2016:1481
reference_id RHSA-2016:1481
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1481
53
reference_url https://access.redhat.com/errata/RHSA-2016:1602
reference_id RHSA-2016:1602
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1602
54
reference_url https://usn.ubuntu.com/2953-1/
reference_id USN-2953-1
reference_type
scores
url https://usn.ubuntu.com/2953-1/
fixed_packages
0
url pkg:deb/debian/mariadb-10.0@10.0.25-0%2Bdeb8u1
purl pkg:deb/debian/mariadb-10.0@10.0.25-0%2Bdeb8u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1gmc-pj6y-rkfx
1
vulnerability VCID-2gyq-q761-h3br
2
vulnerability VCID-2rf6-qaey-1ubn
3
vulnerability VCID-45hn-ezks-j7br
4
vulnerability VCID-4cnj-7fur-3qe3
5
vulnerability VCID-4yz4-vxnh-b3dp
6
vulnerability VCID-5sjj-599v-vybg
7
vulnerability VCID-6g4n-3xfu-hfee
8
vulnerability VCID-6muh-rg1z-pqab
9
vulnerability VCID-8djb-knkk-s3c8
10
vulnerability VCID-8krv-jqjg-uqc8
11
vulnerability VCID-8kvb-5u8c-zbc4
12
vulnerability VCID-8sya-wktg-dqa5
13
vulnerability VCID-9f48-53dz-13an
14
vulnerability VCID-9ff2-43rk-2ydj
15
vulnerability VCID-9w98-nfg2-muh2
16
vulnerability VCID-bhxk-8byp-eyap
17
vulnerability VCID-ej67-ayfh-sqdt
18
vulnerability VCID-g1pp-9qqg-1beb
19
vulnerability VCID-gp4w-bdxg-6kab
20
vulnerability VCID-jgff-4jyp-9fgr
21
vulnerability VCID-mde2-1ynu-auh2
22
vulnerability VCID-mfgg-7s54-gqg8
23
vulnerability VCID-nkdd-suwp-4ffr
24
vulnerability VCID-p623-gxyv-g7fs
25
vulnerability VCID-pk7e-t26d-aqdm
26
vulnerability VCID-pv92-6p9x-v7bs
27
vulnerability VCID-r2cz-9kjz-zbgu
28
vulnerability VCID-rssq-mfc2-ckaf
29
vulnerability VCID-rted-6vzz-mbcv
30
vulnerability VCID-tvdv-3ed5-h3dt
31
vulnerability VCID-un5y-y9sq-1ufb
32
vulnerability VCID-v4gv-g9n5-ukgc
33
vulnerability VCID-vh5y-15tw-d7fd
34
vulnerability VCID-wrna-cc9g-sqbe
35
vulnerability VCID-yx79-3g2x-pqex
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.0@10.0.25-0%252Bdeb8u1
aliases CVE-2016-0641
risk_score 2.3
exploitability 0.5
weighted_severity 4.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rfz7-vha1-e7gy
43
url VCID-s5bz-57vv-b7bz
vulnerability_id VCID-s5bz-57vv-b7bz
summary security update
references
0
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177539.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177539.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00010.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00010.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00011.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00011.html
3
reference_url http://lists.opensuse.org/opensuse-updates/2016-02/msg00039.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2016-02/msg00039.html
4
reference_url http://rhn.redhat.com/errata/RHSA-2016-0534.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0534.html
5
reference_url http://rhn.redhat.com/errata/RHSA-2016-0705.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0705.html
6
reference_url http://rhn.redhat.com/errata/RHSA-2016-1480.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-1480.html
7
reference_url http://rhn.redhat.com/errata/RHSA-2016-1481.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-1481.html
8
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4913.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4913.json
9
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-4913
reference_id
reference_type
scores
0
value 0.00392
scoring_system epss
scoring_elements 0.60251
published_at 2026-04-18T12:55:00Z
1
value 0.00392
scoring_system epss
scoring_elements 0.60078
published_at 2026-04-01T12:55:00Z
2
value 0.00392
scoring_system epss
scoring_elements 0.60156
published_at 2026-04-02T12:55:00Z
3
value 0.00392
scoring_system epss
scoring_elements 0.60181
published_at 2026-04-04T12:55:00Z
4
value 0.00392
scoring_system epss
scoring_elements 0.6015
published_at 2026-04-07T12:55:00Z
5
value 0.00392
scoring_system epss
scoring_elements 0.602
published_at 2026-04-08T12:55:00Z
6
value 0.00392
scoring_system epss
scoring_elements 0.60214
published_at 2026-04-09T12:55:00Z
7
value 0.00392
scoring_system epss
scoring_elements 0.60235
published_at 2026-04-11T12:55:00Z
8
value 0.00392
scoring_system epss
scoring_elements 0.60222
published_at 2026-04-12T12:55:00Z
9
value 0.00392
scoring_system epss
scoring_elements 0.60204
published_at 2026-04-13T12:55:00Z
10
value 0.00392
scoring_system epss
scoring_elements 0.60244
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-4913
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4792
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4792
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4802
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4802
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4815
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4815
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4816
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4816
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4819
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4819
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4826
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4826
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4830
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4830
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4836
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4836
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4858
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4858
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4861
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4861
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4870
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4870
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4879
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4879
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4895
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4895
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4913
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4913
24
reference_url https://www.suse.com/support/update/announcement/2016/suse-su-20160296-1.html
reference_id
reference_type
scores
url https://www.suse.com/support/update/announcement/2016/suse-su-20160296-1.html
25
reference_url http://www.debian.org/security/2015/dsa-3377
reference_id
reference_type
scores
url http://www.debian.org/security/2015/dsa-3377
26
reference_url http://www.debian.org/security/2015/dsa-3385
reference_id
reference_type
scores
url http://www.debian.org/security/2015/dsa-3385
27
reference_url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
28
reference_url http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
29
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
30
reference_url http://www.securityfocus.com/bid/77153
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/77153
31
reference_url http://www.securitytracker.com/id/1033894
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1033894
32
reference_url http://www.ubuntu.com/usn/USN-2781-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2781-1
33
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1274794
reference_id 1274794
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1274794
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-4913
reference_id CVE-2015-4913
reference_type
scores
0
value 3.5
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:S/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2015-4913
67
reference_url https://access.redhat.com/errata/RHSA-2016:0534
reference_id RHSA-2016:0534
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0534
68
reference_url https://access.redhat.com/errata/RHSA-2016:0705
reference_id RHSA-2016:0705
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0705
69
reference_url https://access.redhat.com/errata/RHSA-2016:1132
reference_id RHSA-2016:1132
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1132
70
reference_url https://access.redhat.com/errata/RHSA-2016:1480
reference_id RHSA-2016:1480
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1480
71
reference_url https://access.redhat.com/errata/RHSA-2016:1481
reference_id RHSA-2016:1481
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1481
72
reference_url https://usn.ubuntu.com/2781-1/
reference_id USN-2781-1
reference_type
scores
url https://usn.ubuntu.com/2781-1/
fixed_packages
0
url pkg:deb/debian/mariadb-10.0@10.0.25-0%2Bdeb8u1
purl pkg:deb/debian/mariadb-10.0@10.0.25-0%2Bdeb8u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1gmc-pj6y-rkfx
1
vulnerability VCID-2gyq-q761-h3br
2
vulnerability VCID-2rf6-qaey-1ubn
3
vulnerability VCID-45hn-ezks-j7br
4
vulnerability VCID-4cnj-7fur-3qe3
5
vulnerability VCID-4yz4-vxnh-b3dp
6
vulnerability VCID-5sjj-599v-vybg
7
vulnerability VCID-6g4n-3xfu-hfee
8
vulnerability VCID-6muh-rg1z-pqab
9
vulnerability VCID-8djb-knkk-s3c8
10
vulnerability VCID-8krv-jqjg-uqc8
11
vulnerability VCID-8kvb-5u8c-zbc4
12
vulnerability VCID-8sya-wktg-dqa5
13
vulnerability VCID-9f48-53dz-13an
14
vulnerability VCID-9ff2-43rk-2ydj
15
vulnerability VCID-9w98-nfg2-muh2
16
vulnerability VCID-bhxk-8byp-eyap
17
vulnerability VCID-ej67-ayfh-sqdt
18
vulnerability VCID-g1pp-9qqg-1beb
19
vulnerability VCID-gp4w-bdxg-6kab
20
vulnerability VCID-jgff-4jyp-9fgr
21
vulnerability VCID-mde2-1ynu-auh2
22
vulnerability VCID-mfgg-7s54-gqg8
23
vulnerability VCID-nkdd-suwp-4ffr
24
vulnerability VCID-p623-gxyv-g7fs
25
vulnerability VCID-pk7e-t26d-aqdm
26
vulnerability VCID-pv92-6p9x-v7bs
27
vulnerability VCID-r2cz-9kjz-zbgu
28
vulnerability VCID-rssq-mfc2-ckaf
29
vulnerability VCID-rted-6vzz-mbcv
30
vulnerability VCID-tvdv-3ed5-h3dt
31
vulnerability VCID-un5y-y9sq-1ufb
32
vulnerability VCID-v4gv-g9n5-ukgc
33
vulnerability VCID-vh5y-15tw-d7fd
34
vulnerability VCID-wrna-cc9g-sqbe
35
vulnerability VCID-yx79-3g2x-pqex
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.0@10.0.25-0%252Bdeb8u1
aliases CVE-2015-4913
risk_score 1.6
exploitability 0.5
weighted_severity 3.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-s5bz-57vv-b7bz
44
url VCID-sv7d-4eqj-a3dx
vulnerability_id VCID-sv7d-4eqj-a3dx
summary security update
references
0
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2015-July/161436.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2015-July/161436.html
1
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2015-July/161625.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2015-July/161625.html
2
reference_url http://mysqlblog.fivefarmers.com/2014/04/02/redefining-ssl-option/
reference_id
reference_type
scores
url http://mysqlblog.fivefarmers.com/2014/04/02/redefining-ssl-option/
3
reference_url http://mysqlblog.fivefarmers.com/2015/04/29/ssltls-in-5-6-and-5-5-ocert-advisory/
reference_id
reference_type
scores
url http://mysqlblog.fivefarmers.com/2015/04/29/ssltls-in-5-6-and-5-5-ocert-advisory/
4
reference_url http://packetstormsecurity.com/files/131688/MySQL-SSL-TLS-Downgrade.html
reference_id
reference_type
scores
url http://packetstormsecurity.com/files/131688/MySQL-SSL-TLS-Downgrade.html
5
reference_url http://rhn.redhat.com/errata/RHSA-2015-1646.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-1646.html
6
reference_url http://rhn.redhat.com/errata/RHSA-2015-1647.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-1647.html
7
reference_url http://rhn.redhat.com/errata/RHSA-2015-1665.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-1665.html
8
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3152.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3152.json
9
reference_url https://access.redhat.com/security/cve/cve-2015-3152
reference_id
reference_type
scores
url https://access.redhat.com/security/cve/cve-2015-3152
10
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-3152
reference_id
reference_type
scores
0
value 0.51669
scoring_system epss
scoring_elements 0.97906
published_at 2026-04-18T12:55:00Z
1
value 0.51669
scoring_system epss
scoring_elements 0.97905
published_at 2026-04-16T12:55:00Z
2
value 0.51669
scoring_system epss
scoring_elements 0.97876
published_at 2026-04-01T12:55:00Z
3
value 0.51669
scoring_system epss
scoring_elements 0.97881
published_at 2026-04-02T12:55:00Z
4
value 0.51669
scoring_system epss
scoring_elements 0.97882
published_at 2026-04-04T12:55:00Z
5
value 0.51669
scoring_system epss
scoring_elements 0.97886
published_at 2026-04-07T12:55:00Z
6
value 0.51669
scoring_system epss
scoring_elements 0.9789
published_at 2026-04-08T12:55:00Z
7
value 0.51669
scoring_system epss
scoring_elements 0.97893
published_at 2026-04-09T12:55:00Z
8
value 0.51669
scoring_system epss
scoring_elements 0.97896
published_at 2026-04-11T12:55:00Z
9
value 0.51669
scoring_system epss
scoring_elements 0.97897
published_at 2026-04-12T12:55:00Z
10
value 0.51669
scoring_system epss
scoring_elements 0.97899
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-3152
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0433
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0433
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0441
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0441
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0499
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0499
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0501
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0501
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0505
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0505
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2568
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2568
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2571
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2571
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2573
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2573
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2582
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2582
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2643
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2643
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2648
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2648
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3152
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3152
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4752
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4752
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4757
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4757
25
reference_url https://github.com/mysql/mysql-server/commit/3bd5589e1a5a93f9c224badf983cd65c45215390
reference_id
reference_type
scores
url https://github.com/mysql/mysql-server/commit/3bd5589e1a5a93f9c224badf983cd65c45215390
26
reference_url https://jira.mariadb.org/browse/MDEV-7937
reference_id
reference_type
scores
url https://jira.mariadb.org/browse/MDEV-7937
27
reference_url https://www.duosecurity.com/blog/backronym-mysql-vulnerability
reference_id
reference_type
scores
url https://www.duosecurity.com/blog/backronym-mysql-vulnerability
28
reference_url http://www.debian.org/security/2015/dsa-3311
reference_id
reference_type
scores
url http://www.debian.org/security/2015/dsa-3311
29
reference_url http://www.ocert.org/advisories/ocert-2015-003.html
reference_id
reference_type
scores
url http://www.ocert.org/advisories/ocert-2015-003.html
30
reference_url http://www.securityfocus.com/archive/1/535397/100/1100/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/535397/100/1100/threaded
31
reference_url http://www.securityfocus.com/bid/74398
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/74398
32
reference_url http://www.securitytracker.com/id/1032216
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1032216
33
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1217506
reference_id 1217506
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1217506
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_connector\/c:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql_connector\/c:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_connector\/c:*:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:php:php:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:*:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:21:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:21:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:21:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.1:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-3152
reference_id CVE-2015-3152
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:P/A:N
1
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2015-3152
59
reference_url https://access.redhat.com/errata/RHSA-2015:1646
reference_id RHSA-2015:1646
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1646
60
reference_url https://access.redhat.com/errata/RHSA-2015:1647
reference_id RHSA-2015:1647
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1647
61
reference_url https://access.redhat.com/errata/RHSA-2015:1665
reference_id RHSA-2015:1665
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1665
fixed_packages
0
url pkg:deb/debian/mariadb-10.0@10.0.25-0%2Bdeb8u1
purl pkg:deb/debian/mariadb-10.0@10.0.25-0%2Bdeb8u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1gmc-pj6y-rkfx
1
vulnerability VCID-2gyq-q761-h3br
2
vulnerability VCID-2rf6-qaey-1ubn
3
vulnerability VCID-45hn-ezks-j7br
4
vulnerability VCID-4cnj-7fur-3qe3
5
vulnerability VCID-4yz4-vxnh-b3dp
6
vulnerability VCID-5sjj-599v-vybg
7
vulnerability VCID-6g4n-3xfu-hfee
8
vulnerability VCID-6muh-rg1z-pqab
9
vulnerability VCID-8djb-knkk-s3c8
10
vulnerability VCID-8krv-jqjg-uqc8
11
vulnerability VCID-8kvb-5u8c-zbc4
12
vulnerability VCID-8sya-wktg-dqa5
13
vulnerability VCID-9f48-53dz-13an
14
vulnerability VCID-9ff2-43rk-2ydj
15
vulnerability VCID-9w98-nfg2-muh2
16
vulnerability VCID-bhxk-8byp-eyap
17
vulnerability VCID-ej67-ayfh-sqdt
18
vulnerability VCID-g1pp-9qqg-1beb
19
vulnerability VCID-gp4w-bdxg-6kab
20
vulnerability VCID-jgff-4jyp-9fgr
21
vulnerability VCID-mde2-1ynu-auh2
22
vulnerability VCID-mfgg-7s54-gqg8
23
vulnerability VCID-nkdd-suwp-4ffr
24
vulnerability VCID-p623-gxyv-g7fs
25
vulnerability VCID-pk7e-t26d-aqdm
26
vulnerability VCID-pv92-6p9x-v7bs
27
vulnerability VCID-r2cz-9kjz-zbgu
28
vulnerability VCID-rssq-mfc2-ckaf
29
vulnerability VCID-rted-6vzz-mbcv
30
vulnerability VCID-tvdv-3ed5-h3dt
31
vulnerability VCID-un5y-y9sq-1ufb
32
vulnerability VCID-v4gv-g9n5-ukgc
33
vulnerability VCID-vh5y-15tw-d7fd
34
vulnerability VCID-wrna-cc9g-sqbe
35
vulnerability VCID-yx79-3g2x-pqex
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.0@10.0.25-0%252Bdeb8u1
aliases CVE-2015-3152
risk_score 2.6
exploitability 0.5
weighted_severity 5.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-sv7d-4eqj-a3dx
45
url VCID-tazb-gd49-73b4
vulnerability_id VCID-tazb-gd49-73b4
summary security update
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:15Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:15Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:15Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:15Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:15Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:15Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html
6
reference_url http://rhn.redhat.com/errata/RHSA-2016-0705.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:15Z/
url http://rhn.redhat.com/errata/RHSA-2016-0705.html
7
reference_url http://rhn.redhat.com/errata/RHSA-2016-1480.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:15Z/
url http://rhn.redhat.com/errata/RHSA-2016-1480.html
8
reference_url http://rhn.redhat.com/errata/RHSA-2016-1481.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:15Z/
url http://rhn.redhat.com/errata/RHSA-2016-1481.html
9
reference_url http://rhn.redhat.com/errata/RHSA-2016-1602.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:15Z/
url http://rhn.redhat.com/errata/RHSA-2016-1602.html
10
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0648.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0648.json
11
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-0648
reference_id
reference_type
scores
0
value 0.00243
scoring_system epss
scoring_elements 0.47464
published_at 2026-04-07T12:55:00Z
1
value 0.00243
scoring_system epss
scoring_elements 0.47494
published_at 2026-04-02T12:55:00Z
2
value 0.00243
scoring_system epss
scoring_elements 0.47515
published_at 2026-04-09T12:55:00Z
3
value 0.00243
scoring_system epss
scoring_elements 0.47518
published_at 2026-04-08T12:55:00Z
4
value 0.00243
scoring_system epss
scoring_elements 0.47537
published_at 2026-04-11T12:55:00Z
5
value 0.00243
scoring_system epss
scoring_elements 0.47513
published_at 2026-04-12T12:55:00Z
6
value 0.00243
scoring_system epss
scoring_elements 0.47521
published_at 2026-04-13T12:55:00Z
7
value 0.00243
scoring_system epss
scoring_elements 0.4758
published_at 2026-04-16T12:55:00Z
8
value 0.00243
scoring_system epss
scoring_elements 0.47573
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-0648
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0640
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0640
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0641
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0641
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0642
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0642
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0643
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0643
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0644
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0644
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0646
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0646
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0647
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0647
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0648
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0648
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0649
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0649
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0650
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0650
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0655
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0655
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0666
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0666
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0668
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0668
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2047
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2047
26
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.6
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:S/C:N/I:N/A:C
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
27
reference_url https://mariadb.com/kb/en/mariadb/mariadb-10025-release-notes/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:15Z/
url https://mariadb.com/kb/en/mariadb/mariadb-10025-release-notes/
28
reference_url https://mariadb.com/kb/en/mariadb/mariadb-10114-release-notes/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:15Z/
url https://mariadb.com/kb/en/mariadb/mariadb-10114-release-notes/
29
reference_url https://mariadb.com/kb/en/mariadb/mariadb-5549-release-notes/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:15Z/
url https://mariadb.com/kb/en/mariadb/mariadb-5549-release-notes/
30
reference_url http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:15Z/
url http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168
31
reference_url http://www.debian.org/security/2016/dsa-3557
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:15Z/
url http://www.debian.org/security/2016/dsa-3557
32
reference_url http://www.debian.org/security/2016/dsa-3595
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:15Z/
url http://www.debian.org/security/2016/dsa-3595
33
reference_url http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:15Z/
url http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
34
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:15Z/
url http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
35
reference_url http://www.securityfocus.com/bid/86457
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:15Z/
url http://www.securityfocus.com/bid/86457
36
reference_url http://www.securitytracker.com/id/1035606
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:15Z/
url http://www.securitytracker.com/id/1035606
37
reference_url http://www.ubuntu.com/usn/USN-2953-1
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:15Z/
url http://www.ubuntu.com/usn/USN-2953-1
38
reference_url http://www.ubuntu.com/usn/USN-2954-1
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:15Z/
url http://www.ubuntu.com/usn/USN-2954-1
39
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1329251
reference_id 1329251
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1329251
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:powerkvm:2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ibm:powerkvm:2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:powerkvm:2.1:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:powerkvm:3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ibm:powerkvm:3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:powerkvm:3.1:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-0648
reference_id CVE-2016-0648
reference_type
scores
0
value 4.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:P
1
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2016-0648
50
reference_url https://access.redhat.com/errata/RHSA-2016:0705
reference_id RHSA-2016:0705
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0705
51
reference_url https://access.redhat.com/errata/RHSA-2016:1132
reference_id RHSA-2016:1132
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:15Z/
url https://access.redhat.com/errata/RHSA-2016:1132
52
reference_url https://access.redhat.com/errata/RHSA-2016:1480
reference_id RHSA-2016:1480
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1480
53
reference_url https://access.redhat.com/errata/RHSA-2016:1481
reference_id RHSA-2016:1481
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1481
54
reference_url https://access.redhat.com/errata/RHSA-2016:1602
reference_id RHSA-2016:1602
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1602
55
reference_url https://usn.ubuntu.com/2953-1/
reference_id USN-2953-1
reference_type
scores
url https://usn.ubuntu.com/2953-1/
56
reference_url https://usn.ubuntu.com/2954-1/
reference_id USN-2954-1
reference_type
scores
url https://usn.ubuntu.com/2954-1/
fixed_packages
0
url pkg:deb/debian/mariadb-10.0@10.0.25-0%2Bdeb8u1
purl pkg:deb/debian/mariadb-10.0@10.0.25-0%2Bdeb8u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1gmc-pj6y-rkfx
1
vulnerability VCID-2gyq-q761-h3br
2
vulnerability VCID-2rf6-qaey-1ubn
3
vulnerability VCID-45hn-ezks-j7br
4
vulnerability VCID-4cnj-7fur-3qe3
5
vulnerability VCID-4yz4-vxnh-b3dp
6
vulnerability VCID-5sjj-599v-vybg
7
vulnerability VCID-6g4n-3xfu-hfee
8
vulnerability VCID-6muh-rg1z-pqab
9
vulnerability VCID-8djb-knkk-s3c8
10
vulnerability VCID-8krv-jqjg-uqc8
11
vulnerability VCID-8kvb-5u8c-zbc4
12
vulnerability VCID-8sya-wktg-dqa5
13
vulnerability VCID-9f48-53dz-13an
14
vulnerability VCID-9ff2-43rk-2ydj
15
vulnerability VCID-9w98-nfg2-muh2
16
vulnerability VCID-bhxk-8byp-eyap
17
vulnerability VCID-ej67-ayfh-sqdt
18
vulnerability VCID-g1pp-9qqg-1beb
19
vulnerability VCID-gp4w-bdxg-6kab
20
vulnerability VCID-jgff-4jyp-9fgr
21
vulnerability VCID-mde2-1ynu-auh2
22
vulnerability VCID-mfgg-7s54-gqg8
23
vulnerability VCID-nkdd-suwp-4ffr
24
vulnerability VCID-p623-gxyv-g7fs
25
vulnerability VCID-pk7e-t26d-aqdm
26
vulnerability VCID-pv92-6p9x-v7bs
27
vulnerability VCID-r2cz-9kjz-zbgu
28
vulnerability VCID-rssq-mfc2-ckaf
29
vulnerability VCID-rted-6vzz-mbcv
30
vulnerability VCID-tvdv-3ed5-h3dt
31
vulnerability VCID-un5y-y9sq-1ufb
32
vulnerability VCID-v4gv-g9n5-ukgc
33
vulnerability VCID-vh5y-15tw-d7fd
34
vulnerability VCID-wrna-cc9g-sqbe
35
vulnerability VCID-yx79-3g2x-pqex
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.0@10.0.25-0%252Bdeb8u1
aliases CVE-2016-0648
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tazb-gd49-73b4
46
url VCID-xegm-n9yj-ckhs
vulnerability_id VCID-xegm-n9yj-ckhs
summary security update
references
0
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177539.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177539.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00010.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00010.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00011.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00011.html
3
reference_url http://lists.opensuse.org/opensuse-updates/2016-02/msg00039.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2016-02/msg00039.html
4
reference_url http://packetstormsecurity.com/files/137232/MySQL-Procedure-Analyse-Denial-Of-Service.html
reference_id
reference_type
scores
url http://packetstormsecurity.com/files/137232/MySQL-Procedure-Analyse-Denial-Of-Service.html
5
reference_url http://rhn.redhat.com/errata/RHSA-2016-0534.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0534.html
6
reference_url http://rhn.redhat.com/errata/RHSA-2016-0705.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0705.html
7
reference_url http://rhn.redhat.com/errata/RHSA-2016-1480.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-1480.html
8
reference_url http://rhn.redhat.com/errata/RHSA-2016-1481.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-1481.html
9
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4870.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4870.json
10
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-4870
reference_id
reference_type
scores
0
value 0.2214
scoring_system epss
scoring_elements 0.9581
published_at 2026-04-18T12:55:00Z
1
value 0.2214
scoring_system epss
scoring_elements 0.95759
published_at 2026-04-01T12:55:00Z
2
value 0.2214
scoring_system epss
scoring_elements 0.95768
published_at 2026-04-02T12:55:00Z
3
value 0.2214
scoring_system epss
scoring_elements 0.95775
published_at 2026-04-04T12:55:00Z
4
value 0.2214
scoring_system epss
scoring_elements 0.95778
published_at 2026-04-07T12:55:00Z
5
value 0.2214
scoring_system epss
scoring_elements 0.95786
published_at 2026-04-08T12:55:00Z
6
value 0.2214
scoring_system epss
scoring_elements 0.9579
published_at 2026-04-09T12:55:00Z
7
value 0.2214
scoring_system epss
scoring_elements 0.95793
published_at 2026-04-12T12:55:00Z
8
value 0.2214
scoring_system epss
scoring_elements 0.95795
published_at 2026-04-13T12:55:00Z
9
value 0.2214
scoring_system epss
scoring_elements 0.95805
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-4870
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4792
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4792
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4802
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4802
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4815
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4815
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4816
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4816
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4819
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4819
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4826
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4826
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4830
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4830
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4836
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4836
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4858
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4858
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4861
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4861
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4870
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4870
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4879
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4879
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4895
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4895
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4913
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4913
25
reference_url https://www.exploit-db.com/exploits/39867/
reference_id
reference_type
scores
url https://www.exploit-db.com/exploits/39867/
26
reference_url https://www.suse.com/support/update/announcement/2016/suse-su-20160296-1.html
reference_id
reference_type
scores
url https://www.suse.com/support/update/announcement/2016/suse-su-20160296-1.html
27
reference_url http://www.debian.org/security/2015/dsa-3377
reference_id
reference_type
scores
url http://www.debian.org/security/2015/dsa-3377
28
reference_url http://www.debian.org/security/2015/dsa-3385
reference_id
reference_type
scores
url http://www.debian.org/security/2015/dsa-3385
29
reference_url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
30
reference_url http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
31
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
32
reference_url http://www.securityfocus.com/bid/77208
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/77208
33
reference_url http://www.securitytracker.com/id/1033894
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1033894
34
reference_url http://www.ubuntu.com/usn/USN-2781-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2781-1
35
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1274781
reference_id 1274781
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1274781
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:-:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:linux:7:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:-:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.1:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
67
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/39867.py
reference_id CVE-2015-4870
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/39867.py
68
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-4870
reference_id CVE-2015-4870
reference_type
scores
0
value 4.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2015-4870
69
reference_url https://access.redhat.com/errata/RHSA-2016:0534
reference_id RHSA-2016:0534
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0534
70
reference_url https://access.redhat.com/errata/RHSA-2016:0705
reference_id RHSA-2016:0705
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0705
71
reference_url https://access.redhat.com/errata/RHSA-2016:1132
reference_id RHSA-2016:1132
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1132
72
reference_url https://access.redhat.com/errata/RHSA-2016:1480
reference_id RHSA-2016:1480
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1480
73
reference_url https://access.redhat.com/errata/RHSA-2016:1481
reference_id RHSA-2016:1481
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1481
74
reference_url https://usn.ubuntu.com/2781-1/
reference_id USN-2781-1
reference_type
scores
url https://usn.ubuntu.com/2781-1/
fixed_packages
0
url pkg:deb/debian/mariadb-10.0@10.0.25-0%2Bdeb8u1
purl pkg:deb/debian/mariadb-10.0@10.0.25-0%2Bdeb8u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1gmc-pj6y-rkfx
1
vulnerability VCID-2gyq-q761-h3br
2
vulnerability VCID-2rf6-qaey-1ubn
3
vulnerability VCID-45hn-ezks-j7br
4
vulnerability VCID-4cnj-7fur-3qe3
5
vulnerability VCID-4yz4-vxnh-b3dp
6
vulnerability VCID-5sjj-599v-vybg
7
vulnerability VCID-6g4n-3xfu-hfee
8
vulnerability VCID-6muh-rg1z-pqab
9
vulnerability VCID-8djb-knkk-s3c8
10
vulnerability VCID-8krv-jqjg-uqc8
11
vulnerability VCID-8kvb-5u8c-zbc4
12
vulnerability VCID-8sya-wktg-dqa5
13
vulnerability VCID-9f48-53dz-13an
14
vulnerability VCID-9ff2-43rk-2ydj
15
vulnerability VCID-9w98-nfg2-muh2
16
vulnerability VCID-bhxk-8byp-eyap
17
vulnerability VCID-ej67-ayfh-sqdt
18
vulnerability VCID-g1pp-9qqg-1beb
19
vulnerability VCID-gp4w-bdxg-6kab
20
vulnerability VCID-jgff-4jyp-9fgr
21
vulnerability VCID-mde2-1ynu-auh2
22
vulnerability VCID-mfgg-7s54-gqg8
23
vulnerability VCID-nkdd-suwp-4ffr
24
vulnerability VCID-p623-gxyv-g7fs
25
vulnerability VCID-pk7e-t26d-aqdm
26
vulnerability VCID-pv92-6p9x-v7bs
27
vulnerability VCID-r2cz-9kjz-zbgu
28
vulnerability VCID-rssq-mfc2-ckaf
29
vulnerability VCID-rted-6vzz-mbcv
30
vulnerability VCID-tvdv-3ed5-h3dt
31
vulnerability VCID-un5y-y9sq-1ufb
32
vulnerability VCID-v4gv-g9n5-ukgc
33
vulnerability VCID-vh5y-15tw-d7fd
34
vulnerability VCID-wrna-cc9g-sqbe
35
vulnerability VCID-yx79-3g2x-pqex
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.0@10.0.25-0%252Bdeb8u1
aliases CVE-2015-4870
risk_score 7.2
exploitability 2.0
weighted_severity 3.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xegm-n9yj-ckhs
47
url VCID-xvv1-nxs6-n7ab
vulnerability_id VCID-xvv1-nxs6-n7ab
summary security update
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00015.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00015.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00016.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00016.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html
6
reference_url http://rhn.redhat.com/errata/RHSA-2016-0534.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0534.html
7
reference_url http://rhn.redhat.com/errata/RHSA-2016-0705.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0705.html
8
reference_url http://rhn.redhat.com/errata/RHSA-2016-1480.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-1480.html
9
reference_url http://rhn.redhat.com/errata/RHSA-2016-1481.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-1481.html
10
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0597.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0597.json
11
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-0597
reference_id
reference_type
scores
0
value 0.00361
scoring_system epss
scoring_elements 0.58298
published_at 2026-04-18T12:55:00Z
1
value 0.00361
scoring_system epss
scoring_elements 0.58296
published_at 2026-04-16T12:55:00Z
2
value 0.00361
scoring_system epss
scoring_elements 0.58149
published_at 2026-04-01T12:55:00Z
3
value 0.00361
scoring_system epss
scoring_elements 0.58235
published_at 2026-04-02T12:55:00Z
4
value 0.00361
scoring_system epss
scoring_elements 0.58255
published_at 2026-04-04T12:55:00Z
5
value 0.00361
scoring_system epss
scoring_elements 0.58229
published_at 2026-04-07T12:55:00Z
6
value 0.00361
scoring_system epss
scoring_elements 0.58283
published_at 2026-04-08T12:55:00Z
7
value 0.00361
scoring_system epss
scoring_elements 0.58288
published_at 2026-04-09T12:55:00Z
8
value 0.00361
scoring_system epss
scoring_elements 0.58307
published_at 2026-04-11T12:55:00Z
9
value 0.00361
scoring_system epss
scoring_elements 0.58284
published_at 2026-04-12T12:55:00Z
10
value 0.00361
scoring_system epss
scoring_elements 0.58264
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-0597
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0505
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0505
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0546
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0546
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0596
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0596
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0597
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0597
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0598
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0598
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0600
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0600
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0606
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0606
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0608
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0608
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0609
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0609
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0616
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0616
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2047
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2047
23
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
24
reference_url https://mariadb.com/kb/en/mariadb/mariadb-10110-release-notes/
reference_id
reference_type
scores
url https://mariadb.com/kb/en/mariadb/mariadb-10110-release-notes/
25
reference_url https://mariadb.com/kb/en/mariadb/mariadb-5547-release-notes/
reference_id
reference_type
scores
url https://mariadb.com/kb/en/mariadb/mariadb-5547-release-notes/
26
reference_url https://mariadb.com/kb/en/mdb-10023-rn/
reference_id
reference_type
scores
url https://mariadb.com/kb/en/mdb-10023-rn/
27
reference_url http://www.debian.org/security/2016/dsa-3453
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3453
28
reference_url http://www.debian.org/security/2016/dsa-3459
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3459
29
reference_url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
30
reference_url http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
31
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
32
reference_url http://www.securityfocus.com/bid/81151
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/81151
33
reference_url http://www.securitytracker.com/id/1034708
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1034708
34
reference_url http://www.ubuntu.com/usn/USN-2881-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2881-1
35
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1301497
reference_id 1301497
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1301497
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node_eus:7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_hpc_node_eus:7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node_eus:7.2:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-0597
reference_id CVE-2016-0597
reference_type
scores
0
value 4.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2016-0597
57
reference_url https://access.redhat.com/errata/RHSA-2016:0534
reference_id RHSA-2016:0534
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0534
58
reference_url https://access.redhat.com/errata/RHSA-2016:0705
reference_id RHSA-2016:0705
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0705
59
reference_url https://access.redhat.com/errata/RHSA-2016:1132
reference_id RHSA-2016:1132
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1132
60
reference_url https://access.redhat.com/errata/RHSA-2016:1480
reference_id RHSA-2016:1480
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1480
61
reference_url https://access.redhat.com/errata/RHSA-2016:1481
reference_id RHSA-2016:1481
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1481
62
reference_url https://usn.ubuntu.com/2881-1/
reference_id USN-2881-1
reference_type
scores
url https://usn.ubuntu.com/2881-1/
fixed_packages
0
url pkg:deb/debian/mariadb-10.0@10.0.25-0%2Bdeb8u1
purl pkg:deb/debian/mariadb-10.0@10.0.25-0%2Bdeb8u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1gmc-pj6y-rkfx
1
vulnerability VCID-2gyq-q761-h3br
2
vulnerability VCID-2rf6-qaey-1ubn
3
vulnerability VCID-45hn-ezks-j7br
4
vulnerability VCID-4cnj-7fur-3qe3
5
vulnerability VCID-4yz4-vxnh-b3dp
6
vulnerability VCID-5sjj-599v-vybg
7
vulnerability VCID-6g4n-3xfu-hfee
8
vulnerability VCID-6muh-rg1z-pqab
9
vulnerability VCID-8djb-knkk-s3c8
10
vulnerability VCID-8krv-jqjg-uqc8
11
vulnerability VCID-8kvb-5u8c-zbc4
12
vulnerability VCID-8sya-wktg-dqa5
13
vulnerability VCID-9f48-53dz-13an
14
vulnerability VCID-9ff2-43rk-2ydj
15
vulnerability VCID-9w98-nfg2-muh2
16
vulnerability VCID-bhxk-8byp-eyap
17
vulnerability VCID-ej67-ayfh-sqdt
18
vulnerability VCID-g1pp-9qqg-1beb
19
vulnerability VCID-gp4w-bdxg-6kab
20
vulnerability VCID-jgff-4jyp-9fgr
21
vulnerability VCID-mde2-1ynu-auh2
22
vulnerability VCID-mfgg-7s54-gqg8
23
vulnerability VCID-nkdd-suwp-4ffr
24
vulnerability VCID-p623-gxyv-g7fs
25
vulnerability VCID-pk7e-t26d-aqdm
26
vulnerability VCID-pv92-6p9x-v7bs
27
vulnerability VCID-r2cz-9kjz-zbgu
28
vulnerability VCID-rssq-mfc2-ckaf
29
vulnerability VCID-rted-6vzz-mbcv
30
vulnerability VCID-tvdv-3ed5-h3dt
31
vulnerability VCID-un5y-y9sq-1ufb
32
vulnerability VCID-v4gv-g9n5-ukgc
33
vulnerability VCID-vh5y-15tw-d7fd
34
vulnerability VCID-wrna-cc9g-sqbe
35
vulnerability VCID-yx79-3g2x-pqex
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.0@10.0.25-0%252Bdeb8u1
aliases CVE-2016-0597
risk_score 1.8
exploitability 0.5
weighted_severity 3.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xvv1-nxs6-n7ab
48
url VCID-y6p4-vfkn-q7fc
vulnerability_id VCID-y6p4-vfkn-q7fc
summary security update
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00015.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00015.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00016.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00016.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html
6
reference_url http://rhn.redhat.com/errata/RHSA-2016-0534.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0534.html
7
reference_url http://rhn.redhat.com/errata/RHSA-2016-0705.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0705.html
8
reference_url http://rhn.redhat.com/errata/RHSA-2016-1480.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-1480.html
9
reference_url http://rhn.redhat.com/errata/RHSA-2016-1481.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-1481.html
10
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0598.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0598.json
11
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-0598
reference_id
reference_type
scores
0
value 0.00338
scoring_system epss
scoring_elements 0.56668
published_at 2026-04-18T12:55:00Z
1
value 0.00338
scoring_system epss
scoring_elements 0.56638
published_at 2026-04-13T12:55:00Z
2
value 0.00338
scoring_system epss
scoring_elements 0.56522
published_at 2026-04-01T12:55:00Z
3
value 0.00338
scoring_system epss
scoring_elements 0.56618
published_at 2026-04-07T12:55:00Z
4
value 0.00338
scoring_system epss
scoring_elements 0.56639
published_at 2026-04-04T12:55:00Z
5
value 0.00338
scoring_system epss
scoring_elements 0.56669
published_at 2026-04-16T12:55:00Z
6
value 0.00338
scoring_system epss
scoring_elements 0.56675
published_at 2026-04-09T12:55:00Z
7
value 0.00338
scoring_system epss
scoring_elements 0.56683
published_at 2026-04-11T12:55:00Z
8
value 0.00338
scoring_system epss
scoring_elements 0.56658
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-0598
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0505
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0505
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0546
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0546
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0596
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0596
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0597
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0597
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0598
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0598
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0600
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0600
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0606
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0606
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0608
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0608
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0609
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0609
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0616
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0616
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2047
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2047
23
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.5
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:S/C:N/I:N/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
24
reference_url https://mariadb.com/kb/en/mariadb/mariadb-10110-release-notes/
reference_id
reference_type
scores
url https://mariadb.com/kb/en/mariadb/mariadb-10110-release-notes/
25
reference_url https://mariadb.com/kb/en/mariadb/mariadb-5547-release-notes/
reference_id
reference_type
scores
url https://mariadb.com/kb/en/mariadb/mariadb-5547-release-notes/
26
reference_url https://mariadb.com/kb/en/mdb-10023-rn/
reference_id
reference_type
scores
url https://mariadb.com/kb/en/mdb-10023-rn/
27
reference_url http://www.debian.org/security/2016/dsa-3453
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3453
28
reference_url http://www.debian.org/security/2016/dsa-3459
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3459
29
reference_url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
30
reference_url http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
31
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
32
reference_url http://www.securityfocus.com/bid/81182
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/81182
33
reference_url http://www.securitytracker.com/id/1034708
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1034708
34
reference_url http://www.ubuntu.com/usn/USN-2881-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2881-1
35
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1301498
reference_id 1301498
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1301498
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node_eus:7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_hpc_node_eus:7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node_eus:7.2:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-0598
reference_id CVE-2016-0598
reference_type
scores
0
value 3.5
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:S/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2016-0598
57
reference_url https://access.redhat.com/errata/RHSA-2016:0534
reference_id RHSA-2016:0534
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0534
58
reference_url https://access.redhat.com/errata/RHSA-2016:0705
reference_id RHSA-2016:0705
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0705
59
reference_url https://access.redhat.com/errata/RHSA-2016:1132
reference_id RHSA-2016:1132
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1132
60
reference_url https://access.redhat.com/errata/RHSA-2016:1480
reference_id RHSA-2016:1480
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1480
61
reference_url https://access.redhat.com/errata/RHSA-2016:1481
reference_id RHSA-2016:1481
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1481
62
reference_url https://usn.ubuntu.com/2881-1/
reference_id USN-2881-1
reference_type
scores
url https://usn.ubuntu.com/2881-1/
fixed_packages
0
url pkg:deb/debian/mariadb-10.0@10.0.25-0%2Bdeb8u1
purl pkg:deb/debian/mariadb-10.0@10.0.25-0%2Bdeb8u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1gmc-pj6y-rkfx
1
vulnerability VCID-2gyq-q761-h3br
2
vulnerability VCID-2rf6-qaey-1ubn
3
vulnerability VCID-45hn-ezks-j7br
4
vulnerability VCID-4cnj-7fur-3qe3
5
vulnerability VCID-4yz4-vxnh-b3dp
6
vulnerability VCID-5sjj-599v-vybg
7
vulnerability VCID-6g4n-3xfu-hfee
8
vulnerability VCID-6muh-rg1z-pqab
9
vulnerability VCID-8djb-knkk-s3c8
10
vulnerability VCID-8krv-jqjg-uqc8
11
vulnerability VCID-8kvb-5u8c-zbc4
12
vulnerability VCID-8sya-wktg-dqa5
13
vulnerability VCID-9f48-53dz-13an
14
vulnerability VCID-9ff2-43rk-2ydj
15
vulnerability VCID-9w98-nfg2-muh2
16
vulnerability VCID-bhxk-8byp-eyap
17
vulnerability VCID-ej67-ayfh-sqdt
18
vulnerability VCID-g1pp-9qqg-1beb
19
vulnerability VCID-gp4w-bdxg-6kab
20
vulnerability VCID-jgff-4jyp-9fgr
21
vulnerability VCID-mde2-1ynu-auh2
22
vulnerability VCID-mfgg-7s54-gqg8
23
vulnerability VCID-nkdd-suwp-4ffr
24
vulnerability VCID-p623-gxyv-g7fs
25
vulnerability VCID-pk7e-t26d-aqdm
26
vulnerability VCID-pv92-6p9x-v7bs
27
vulnerability VCID-r2cz-9kjz-zbgu
28
vulnerability VCID-rssq-mfc2-ckaf
29
vulnerability VCID-rted-6vzz-mbcv
30
vulnerability VCID-tvdv-3ed5-h3dt
31
vulnerability VCID-un5y-y9sq-1ufb
32
vulnerability VCID-v4gv-g9n5-ukgc
33
vulnerability VCID-vh5y-15tw-d7fd
34
vulnerability VCID-wrna-cc9g-sqbe
35
vulnerability VCID-yx79-3g2x-pqex
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.0@10.0.25-0%252Bdeb8u1
aliases CVE-2016-0598
risk_score 1.6
exploitability 0.5
weighted_severity 3.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-y6p4-vfkn-q7fc
49
url VCID-yzzc-qh9x-pfd6
vulnerability_id VCID-yzzc-qh9x-pfd6
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4802.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4802.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-4802
reference_id
reference_type
scores
0
value 0.00419
scoring_system epss
scoring_elements 0.6176
published_at 2026-04-01T12:55:00Z
1
value 0.00419
scoring_system epss
scoring_elements 0.61834
published_at 2026-04-02T12:55:00Z
2
value 0.00419
scoring_system epss
scoring_elements 0.61865
published_at 2026-04-04T12:55:00Z
3
value 0.00419
scoring_system epss
scoring_elements 0.61837
published_at 2026-04-07T12:55:00Z
4
value 0.00419
scoring_system epss
scoring_elements 0.61886
published_at 2026-04-08T12:55:00Z
5
value 0.00419
scoring_system epss
scoring_elements 0.61902
published_at 2026-04-09T12:55:00Z
6
value 0.00419
scoring_system epss
scoring_elements 0.61923
published_at 2026-04-11T12:55:00Z
7
value 0.00419
scoring_system epss
scoring_elements 0.61911
published_at 2026-04-12T12:55:00Z
8
value 0.00419
scoring_system epss
scoring_elements 0.61891
published_at 2026-04-13T12:55:00Z
9
value 0.00419
scoring_system epss
scoring_elements 0.61934
published_at 2026-04-16T12:55:00Z
10
value 0.00419
scoring_system epss
scoring_elements 0.61939
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-4802
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4792
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4792
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4802
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4802
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4815
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4815
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4816
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4816
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4819
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4819
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4826
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4826
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4830
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4830
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4836
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4836
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4858
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4858
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4861
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4861
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4870
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4870
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4879
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4879
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4895
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4895
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4913
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4913
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1274756
reference_id 1274756
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1274756
17
reference_url https://access.redhat.com/errata/RHSA-2016:0534
reference_id RHSA-2016:0534
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0534
18
reference_url https://access.redhat.com/errata/RHSA-2016:0705
reference_id RHSA-2016:0705
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0705
19
reference_url https://access.redhat.com/errata/RHSA-2016:1132
reference_id RHSA-2016:1132
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1132
20
reference_url https://access.redhat.com/errata/RHSA-2016:1480
reference_id RHSA-2016:1480
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1480
21
reference_url https://access.redhat.com/errata/RHSA-2016:1481
reference_id RHSA-2016:1481
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1481
22
reference_url https://usn.ubuntu.com/2781-1/
reference_id USN-2781-1
reference_type
scores
url https://usn.ubuntu.com/2781-1/
fixed_packages
0
url pkg:deb/debian/mariadb-10.0@10.0.25-0%2Bdeb8u1
purl pkg:deb/debian/mariadb-10.0@10.0.25-0%2Bdeb8u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1gmc-pj6y-rkfx
1
vulnerability VCID-2gyq-q761-h3br
2
vulnerability VCID-2rf6-qaey-1ubn
3
vulnerability VCID-45hn-ezks-j7br
4
vulnerability VCID-4cnj-7fur-3qe3
5
vulnerability VCID-4yz4-vxnh-b3dp
6
vulnerability VCID-5sjj-599v-vybg
7
vulnerability VCID-6g4n-3xfu-hfee
8
vulnerability VCID-6muh-rg1z-pqab
9
vulnerability VCID-8djb-knkk-s3c8
10
vulnerability VCID-8krv-jqjg-uqc8
11
vulnerability VCID-8kvb-5u8c-zbc4
12
vulnerability VCID-8sya-wktg-dqa5
13
vulnerability VCID-9f48-53dz-13an
14
vulnerability VCID-9ff2-43rk-2ydj
15
vulnerability VCID-9w98-nfg2-muh2
16
vulnerability VCID-bhxk-8byp-eyap
17
vulnerability VCID-ej67-ayfh-sqdt
18
vulnerability VCID-g1pp-9qqg-1beb
19
vulnerability VCID-gp4w-bdxg-6kab
20
vulnerability VCID-jgff-4jyp-9fgr
21
vulnerability VCID-mde2-1ynu-auh2
22
vulnerability VCID-mfgg-7s54-gqg8
23
vulnerability VCID-nkdd-suwp-4ffr
24
vulnerability VCID-p623-gxyv-g7fs
25
vulnerability VCID-pk7e-t26d-aqdm
26
vulnerability VCID-pv92-6p9x-v7bs
27
vulnerability VCID-r2cz-9kjz-zbgu
28
vulnerability VCID-rssq-mfc2-ckaf
29
vulnerability VCID-rted-6vzz-mbcv
30
vulnerability VCID-tvdv-3ed5-h3dt
31
vulnerability VCID-un5y-y9sq-1ufb
32
vulnerability VCID-v4gv-g9n5-ukgc
33
vulnerability VCID-vh5y-15tw-d7fd
34
vulnerability VCID-wrna-cc9g-sqbe
35
vulnerability VCID-yx79-3g2x-pqex
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.0@10.0.25-0%252Bdeb8u1
aliases CVE-2015-4802
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-yzzc-qh9x-pfd6
50
url VCID-zb4s-9rj3-ebea
vulnerability_id VCID-zb4s-9rj3-ebea
summary security update
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:31Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:31Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:31Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:31Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:31Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:31Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html
6
reference_url http://rhn.redhat.com/errata/RHSA-2016-0705.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:31Z/
url http://rhn.redhat.com/errata/RHSA-2016-0705.html
7
reference_url http://rhn.redhat.com/errata/RHSA-2016-1480.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:31Z/
url http://rhn.redhat.com/errata/RHSA-2016-1480.html
8
reference_url http://rhn.redhat.com/errata/RHSA-2016-1481.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:31Z/
url http://rhn.redhat.com/errata/RHSA-2016-1481.html
9
reference_url http://rhn.redhat.com/errata/RHSA-2016-1602.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:31Z/
url http://rhn.redhat.com/errata/RHSA-2016-1602.html
10
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0640.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0640.json
11
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-0640
reference_id
reference_type
scores
0
value 0.00225
scoring_system epss
scoring_elements 0.45224
published_at 2026-04-01T12:55:00Z
1
value 0.00225
scoring_system epss
scoring_elements 0.45304
published_at 2026-04-02T12:55:00Z
2
value 0.00225
scoring_system epss
scoring_elements 0.45326
published_at 2026-04-04T12:55:00Z
3
value 0.00225
scoring_system epss
scoring_elements 0.45268
published_at 2026-04-07T12:55:00Z
4
value 0.00225
scoring_system epss
scoring_elements 0.45324
published_at 2026-04-08T12:55:00Z
5
value 0.00225
scoring_system epss
scoring_elements 0.45323
published_at 2026-04-09T12:55:00Z
6
value 0.00225
scoring_system epss
scoring_elements 0.45345
published_at 2026-04-11T12:55:00Z
7
value 0.00225
scoring_system epss
scoring_elements 0.45313
published_at 2026-04-12T12:55:00Z
8
value 0.00225
scoring_system epss
scoring_elements 0.45315
published_at 2026-04-13T12:55:00Z
9
value 0.00225
scoring_system epss
scoring_elements 0.45366
published_at 2026-04-16T12:55:00Z
10
value 0.00225
scoring_system epss
scoring_elements 0.4536
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-0640
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0640
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0640
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0641
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0641
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0642
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0642
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0643
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0643
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0644
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0644
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0646
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0646
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0647
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0647
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0648
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0648
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0649
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0649
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0650
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0650
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0655
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0655
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0666
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0666
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0668
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0668
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2047
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2047
26
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.2
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:S/C:N/I:P/A:C
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
27
reference_url https://mariadb.com/kb/en/mariadb/mariadb-10024-release-notes/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:31Z/
url https://mariadb.com/kb/en/mariadb/mariadb-10024-release-notes/
28
reference_url https://mariadb.com/kb/en/mariadb/mariadb-10112-release-notes/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:31Z/
url https://mariadb.com/kb/en/mariadb/mariadb-10112-release-notes/
29
reference_url https://mariadb.com/kb/en/mariadb/mariadb-5548-release-notes/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:31Z/
url https://mariadb.com/kb/en/mariadb/mariadb-5548-release-notes/
30
reference_url http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:31Z/
url http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168
31
reference_url http://www.debian.org/security/2016/dsa-3557
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:31Z/
url http://www.debian.org/security/2016/dsa-3557
32
reference_url http://www.debian.org/security/2016/dsa-3595
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:31Z/
url http://www.debian.org/security/2016/dsa-3595
33
reference_url http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:31Z/
url http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
34
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:31Z/
url http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
35
reference_url http://www.securityfocus.com/bid/86427
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:31Z/
url http://www.securityfocus.com/bid/86427
36
reference_url http://www.securitytracker.com/id/1035606
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:31Z/
url http://www.securitytracker.com/id/1035606
37
reference_url http://www.ubuntu.com/usn/USN-2953-1
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:31Z/
url http://www.ubuntu.com/usn/USN-2953-1
38
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1329239
reference_id 1329239
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1329239
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:powerkvm:2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ibm:powerkvm:2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:powerkvm:2.1:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:powerkvm:3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ibm:powerkvm:3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:powerkvm:3.1:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-0640
reference_id CVE-2016-0640
reference_type
scores
0
value 4.9
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:S/C:N/I:P/A:P
1
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2016-0640
49
reference_url https://access.redhat.com/errata/RHSA-2016:0705
reference_id RHSA-2016:0705
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0705
50
reference_url https://access.redhat.com/errata/RHSA-2016:1132
reference_id RHSA-2016:1132
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:31Z/
url https://access.redhat.com/errata/RHSA-2016:1132
51
reference_url https://access.redhat.com/errata/RHSA-2016:1480
reference_id RHSA-2016:1480
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1480
52
reference_url https://access.redhat.com/errata/RHSA-2016:1481
reference_id RHSA-2016:1481
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1481
53
reference_url https://access.redhat.com/errata/RHSA-2016:1602
reference_id RHSA-2016:1602
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1602
54
reference_url https://usn.ubuntu.com/2953-1/
reference_id USN-2953-1
reference_type
scores
url https://usn.ubuntu.com/2953-1/
fixed_packages
0
url pkg:deb/debian/mariadb-10.0@10.0.25-0%2Bdeb8u1
purl pkg:deb/debian/mariadb-10.0@10.0.25-0%2Bdeb8u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1gmc-pj6y-rkfx
1
vulnerability VCID-2gyq-q761-h3br
2
vulnerability VCID-2rf6-qaey-1ubn
3
vulnerability VCID-45hn-ezks-j7br
4
vulnerability VCID-4cnj-7fur-3qe3
5
vulnerability VCID-4yz4-vxnh-b3dp
6
vulnerability VCID-5sjj-599v-vybg
7
vulnerability VCID-6g4n-3xfu-hfee
8
vulnerability VCID-6muh-rg1z-pqab
9
vulnerability VCID-8djb-knkk-s3c8
10
vulnerability VCID-8krv-jqjg-uqc8
11
vulnerability VCID-8kvb-5u8c-zbc4
12
vulnerability VCID-8sya-wktg-dqa5
13
vulnerability VCID-9f48-53dz-13an
14
vulnerability VCID-9ff2-43rk-2ydj
15
vulnerability VCID-9w98-nfg2-muh2
16
vulnerability VCID-bhxk-8byp-eyap
17
vulnerability VCID-ej67-ayfh-sqdt
18
vulnerability VCID-g1pp-9qqg-1beb
19
vulnerability VCID-gp4w-bdxg-6kab
20
vulnerability VCID-jgff-4jyp-9fgr
21
vulnerability VCID-mde2-1ynu-auh2
22
vulnerability VCID-mfgg-7s54-gqg8
23
vulnerability VCID-nkdd-suwp-4ffr
24
vulnerability VCID-p623-gxyv-g7fs
25
vulnerability VCID-pk7e-t26d-aqdm
26
vulnerability VCID-pv92-6p9x-v7bs
27
vulnerability VCID-r2cz-9kjz-zbgu
28
vulnerability VCID-rssq-mfc2-ckaf
29
vulnerability VCID-rted-6vzz-mbcv
30
vulnerability VCID-tvdv-3ed5-h3dt
31
vulnerability VCID-un5y-y9sq-1ufb
32
vulnerability VCID-v4gv-g9n5-ukgc
33
vulnerability VCID-vh5y-15tw-d7fd
34
vulnerability VCID-wrna-cc9g-sqbe
35
vulnerability VCID-yx79-3g2x-pqex
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.0@10.0.25-0%252Bdeb8u1
aliases CVE-2016-0640
risk_score 2.8
exploitability 0.5
weighted_severity 5.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zb4s-9rj3-ebea
Risk_score10.0
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.0@10.0.25-0%252Bdeb8u1