Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/mariadb-10.0@10.0.30-0%2Bdeb8u2
Typedeb
Namespacedebian
Namemariadb-10.0
Version10.0.30-0+deb8u2
Qualifiers
Subpath
Is_vulnerabletrue
Next_non_vulnerable_version10.0.32-0+deb8u1
Latest_non_vulnerable_version10.0.32-0+deb8u1
Affected_by_vulnerabilities
0
url VCID-1gmc-pj6y-rkfx
vulnerability_id VCID-1gmc-pj6y-rkfx
summary
Multiple vulnerabilities were found in MySQL, the worst of which
    may allow remote execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3636.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3636.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-3636
reference_id
reference_type
scores
0
value 0.00075
scoring_system epss
scoring_elements 0.22481
published_at 2026-04-21T12:55:00Z
1
value 0.00075
scoring_system epss
scoring_elements 0.22458
published_at 2026-04-01T12:55:00Z
2
value 0.00075
scoring_system epss
scoring_elements 0.22632
published_at 2026-04-02T12:55:00Z
3
value 0.00075
scoring_system epss
scoring_elements 0.22465
published_at 2026-04-07T12:55:00Z
4
value 0.00075
scoring_system epss
scoring_elements 0.22547
published_at 2026-04-08T12:55:00Z
5
value 0.00075
scoring_system epss
scoring_elements 0.22601
published_at 2026-04-09T12:55:00Z
6
value 0.00075
scoring_system epss
scoring_elements 0.22617
published_at 2026-04-11T12:55:00Z
7
value 0.00075
scoring_system epss
scoring_elements 0.22576
published_at 2026-04-12T12:55:00Z
8
value 0.00075
scoring_system epss
scoring_elements 0.22522
published_at 2026-04-13T12:55:00Z
9
value 0.00075
scoring_system epss
scoring_elements 0.22536
published_at 2026-04-16T12:55:00Z
10
value 0.00075
scoring_system epss
scoring_elements 0.22531
published_at 2026-04-18T12:55:00Z
11
value 0.00075
scoring_system epss
scoring_elements 0.22675
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-3636
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10286
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10286
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10379
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10379
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10384
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10384
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3308
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3308
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3309
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3309
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3453
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3453
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3456
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3456
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3464
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3464
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3635
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3635
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3636
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3636
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3641
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3641
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3648
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3648
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3651
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3651
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3652
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3652
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3653
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3653
17
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:S/C:P/I:P/A:P
1
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
18
reference_url http://www.securitytracker.com/id/1038928
reference_id 1038928
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:48:23Z/
url http://www.securitytracker.com/id/1038928
19
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1472686
reference_id 1472686
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1472686
20
reference_url http://www.securityfocus.com/bid/99736
reference_id 99736
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:48:23Z/
url http://www.securityfocus.com/bid/99736
21
reference_url http://www.debian.org/security/2017/dsa-3922
reference_id dsa-3922
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:48:23Z/
url http://www.debian.org/security/2017/dsa-3922
22
reference_url https://www.debian.org/security/2017/dsa-3955
reference_id dsa-3955
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:48:23Z/
url https://www.debian.org/security/2017/dsa-3955
23
reference_url https://security.gentoo.org/glsa/201802-04
reference_id GLSA-201802-04
reference_type
scores
url https://security.gentoo.org/glsa/201802-04
24
reference_url https://access.redhat.com/errata/RHSA-2017:2787
reference_id RHSA-2017:2787
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:48:23Z/
url https://access.redhat.com/errata/RHSA-2017:2787
25
reference_url https://access.redhat.com/errata/RHSA-2018:0279
reference_id RHSA-2018:0279
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:48:23Z/
url https://access.redhat.com/errata/RHSA-2018:0279
26
reference_url https://access.redhat.com/errata/RHSA-2018:0574
reference_id RHSA-2018:0574
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:48:23Z/
url https://access.redhat.com/errata/RHSA-2018:0574
27
reference_url https://access.redhat.com/errata/RHSA-2018:2439
reference_id RHSA-2018:2439
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:48:23Z/
url https://access.redhat.com/errata/RHSA-2018:2439
28
reference_url https://access.redhat.com/errata/RHSA-2018:2729
reference_id RHSA-2018:2729
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:48:23Z/
url https://access.redhat.com/errata/RHSA-2018:2729
29
reference_url https://usn.ubuntu.com/3357-1/
reference_id USN-3357-1
reference_type
scores
url https://usn.ubuntu.com/3357-1/
30
reference_url https://usn.ubuntu.com/3357-2/
reference_id USN-3357-2
reference_type
scores
url https://usn.ubuntu.com/3357-2/
fixed_packages
0
url pkg:deb/debian/mariadb-10.0@10.0.32-0%2Bdeb8u1
purl pkg:deb/debian/mariadb-10.0@10.0.32-0%2Bdeb8u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.0@10.0.32-0%252Bdeb8u1
aliases CVE-2017-3636
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1gmc-pj6y-rkfx
1
url VCID-4yz4-vxnh-b3dp
vulnerability_id VCID-4yz4-vxnh-b3dp
summary
Multiple vulnerabilities were found in MySQL, the worst of which
    may allow remote execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3464.json
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3464.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-3464
reference_id
reference_type
scores
0
value 0.00217
scoring_system epss
scoring_elements 0.44235
published_at 2026-04-21T12:55:00Z
1
value 0.00217
scoring_system epss
scoring_elements 0.44216
published_at 2026-04-07T12:55:00Z
2
value 0.00217
scoring_system epss
scoring_elements 0.44268
published_at 2026-04-08T12:55:00Z
3
value 0.00217
scoring_system epss
scoring_elements 0.44272
published_at 2026-04-09T12:55:00Z
4
value 0.00217
scoring_system epss
scoring_elements 0.4429
published_at 2026-04-11T12:55:00Z
5
value 0.00217
scoring_system epss
scoring_elements 0.44258
published_at 2026-04-13T12:55:00Z
6
value 0.00217
scoring_system epss
scoring_elements 0.44316
published_at 2026-04-16T12:55:00Z
7
value 0.00217
scoring_system epss
scoring_elements 0.44307
published_at 2026-04-18T12:55:00Z
8
value 0.00217
scoring_system epss
scoring_elements 0.4426
published_at 2026-04-02T12:55:00Z
9
value 0.00217
scoring_system epss
scoring_elements 0.44193
published_at 2026-04-01T12:55:00Z
10
value 0.00217
scoring_system epss
scoring_elements 0.44283
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-3464
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10286
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10286
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10379
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10379
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10384
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10384
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3302
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3302
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3305
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3305
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3308
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3308
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3309
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3309
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3329
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3329
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3453
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3453
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3456
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3456
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3461
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3461
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3462
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3462
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3463
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3463
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3464
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3464
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3600
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3600
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3636
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3636
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3641
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3641
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3653
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3653
20
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 2.1
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:S/C:N/I:P/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
21
reference_url http://www.debian.org/security/2017/dsa-3834
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:55Z/
url http://www.debian.org/security/2017/dsa-3834
22
reference_url http://www.debian.org/security/2017/dsa-3944
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:55Z/
url http://www.debian.org/security/2017/dsa-3944
23
reference_url http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:55Z/
url http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
24
reference_url http://www.securityfocus.com/bid/97818
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:55Z/
url http://www.securityfocus.com/bid/97818
25
reference_url http://www.securitytracker.com/id/1038287
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:55Z/
url http://www.securitytracker.com/id/1038287
26
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1443379
reference_id 1443379
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1443379
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-3464
reference_id CVE-2017-3464
reference_type
scores
0
value 4.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:P/A:N
1
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2017-3464
40
reference_url https://security.gentoo.org/glsa/201802-04
reference_id GLSA-201802-04
reference_type
scores
url https://security.gentoo.org/glsa/201802-04
41
reference_url https://access.redhat.com/errata/RHSA-2017:2192
reference_id RHSA-2017:2192
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:55Z/
url https://access.redhat.com/errata/RHSA-2017:2192
42
reference_url https://access.redhat.com/errata/RHSA-2017:2787
reference_id RHSA-2017:2787
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:55Z/
url https://access.redhat.com/errata/RHSA-2017:2787
43
reference_url https://access.redhat.com/errata/RHSA-2017:2886
reference_id RHSA-2017:2886
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:55Z/
url https://access.redhat.com/errata/RHSA-2017:2886
44
reference_url https://access.redhat.com/errata/RHSA-2018:0279
reference_id RHSA-2018:0279
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:55Z/
url https://access.redhat.com/errata/RHSA-2018:0279
45
reference_url https://access.redhat.com/errata/RHSA-2018:0574
reference_id RHSA-2018:0574
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:55Z/
url https://access.redhat.com/errata/RHSA-2018:0574
46
reference_url https://usn.ubuntu.com/3269-1/
reference_id USN-3269-1
reference_type
scores
url https://usn.ubuntu.com/3269-1/
47
reference_url https://usn.ubuntu.com/3357-2/
reference_id USN-3357-2
reference_type
scores
url https://usn.ubuntu.com/3357-2/
fixed_packages
0
url pkg:deb/debian/mariadb-10.0@10.0.32-0%2Bdeb8u1
purl pkg:deb/debian/mariadb-10.0@10.0.32-0%2Bdeb8u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.0@10.0.32-0%252Bdeb8u1
aliases CVE-2017-3464
risk_score 1.9
exploitability 0.5
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4yz4-vxnh-b3dp
2
url VCID-5sjj-599v-vybg
vulnerability_id VCID-5sjj-599v-vybg
summary
Multiple vulnerabilities were found in MySQL, the worst of which
    may allow remote execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3653.json
reference_id
reference_type
scores
0
value 3.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3653.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-3653
reference_id
reference_type
scores
0
value 0.0027
scoring_system epss
scoring_elements 0.50516
published_at 2026-04-21T12:55:00Z
1
value 0.0027
scoring_system epss
scoring_elements 0.50399
published_at 2026-04-01T12:55:00Z
2
value 0.0027
scoring_system epss
scoring_elements 0.50454
published_at 2026-04-02T12:55:00Z
3
value 0.0027
scoring_system epss
scoring_elements 0.50436
published_at 2026-04-07T12:55:00Z
4
value 0.0027
scoring_system epss
scoring_elements 0.5049
published_at 2026-04-08T12:55:00Z
5
value 0.0027
scoring_system epss
scoring_elements 0.50487
published_at 2026-04-09T12:55:00Z
6
value 0.0027
scoring_system epss
scoring_elements 0.5053
published_at 2026-04-11T12:55:00Z
7
value 0.0027
scoring_system epss
scoring_elements 0.50507
published_at 2026-04-12T12:55:00Z
8
value 0.0027
scoring_system epss
scoring_elements 0.50492
published_at 2026-04-13T12:55:00Z
9
value 0.0027
scoring_system epss
scoring_elements 0.50534
published_at 2026-04-16T12:55:00Z
10
value 0.0027
scoring_system epss
scoring_elements 0.5054
published_at 2026-04-18T12:55:00Z
11
value 0.0027
scoring_system epss
scoring_elements 0.50483
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-3653
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10286
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10286
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10379
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10379
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10384
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10384
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3308
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3308
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3309
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3309
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3453
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3453
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3456
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3456
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3464
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3464
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3635
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3635
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3636
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3636
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3641
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3641
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3648
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3648
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3651
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3651
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3652
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3652
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3653
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3653
17
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 2.1
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:S/C:N/I:P/A:N
1
value 3.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
18
reference_url http://www.securitytracker.com/id/1038928
reference_id 1038928
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:47:41Z/
url http://www.securitytracker.com/id/1038928
19
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1472711
reference_id 1472711
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1472711
20
reference_url http://www.securityfocus.com/bid/99810
reference_id 99810
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:47:41Z/
url http://www.securityfocus.com/bid/99810
21
reference_url http://www.debian.org/security/2017/dsa-3922
reference_id dsa-3922
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:47:41Z/
url http://www.debian.org/security/2017/dsa-3922
22
reference_url https://www.debian.org/security/2017/dsa-3955
reference_id dsa-3955
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:47:41Z/
url https://www.debian.org/security/2017/dsa-3955
23
reference_url https://security.gentoo.org/glsa/201802-04
reference_id GLSA-201802-04
reference_type
scores
url https://security.gentoo.org/glsa/201802-04
24
reference_url https://access.redhat.com/errata/RHSA-2017:2787
reference_id RHSA-2017:2787
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:47:41Z/
url https://access.redhat.com/errata/RHSA-2017:2787
25
reference_url https://access.redhat.com/errata/RHSA-2017:2886
reference_id RHSA-2017:2886
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:47:41Z/
url https://access.redhat.com/errata/RHSA-2017:2886
26
reference_url https://access.redhat.com/errata/RHSA-2018:0279
reference_id RHSA-2018:0279
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:47:41Z/
url https://access.redhat.com/errata/RHSA-2018:0279
27
reference_url https://access.redhat.com/errata/RHSA-2018:0574
reference_id RHSA-2018:0574
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:47:41Z/
url https://access.redhat.com/errata/RHSA-2018:0574
28
reference_url https://access.redhat.com/errata/RHSA-2018:2439
reference_id RHSA-2018:2439
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:47:41Z/
url https://access.redhat.com/errata/RHSA-2018:2439
29
reference_url https://access.redhat.com/errata/RHSA-2018:2729
reference_id RHSA-2018:2729
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:47:41Z/
url https://access.redhat.com/errata/RHSA-2018:2729
30
reference_url https://usn.ubuntu.com/3357-1/
reference_id USN-3357-1
reference_type
scores
url https://usn.ubuntu.com/3357-1/
31
reference_url https://usn.ubuntu.com/3357-2/
reference_id USN-3357-2
reference_type
scores
url https://usn.ubuntu.com/3357-2/
fixed_packages
0
url pkg:deb/debian/mariadb-10.0@10.0.32-0%2Bdeb8u1
purl pkg:deb/debian/mariadb-10.0@10.0.32-0%2Bdeb8u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.0@10.0.32-0%252Bdeb8u1
aliases CVE-2017-3653
risk_score 1.4
exploitability 0.5
weighted_severity 2.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5sjj-599v-vybg
3
url VCID-6g4n-3xfu-hfee
vulnerability_id VCID-6g4n-3xfu-hfee
summary
Multiple vulnerabilities were found in MySQL, the worst of which
    may allow remote execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3308.json
reference_id
reference_type
scores
0
value 7.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3308.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-3308
reference_id
reference_type
scores
0
value 0.00321
scoring_system epss
scoring_elements 0.55141
published_at 2026-04-21T12:55:00Z
1
value 0.00321
scoring_system epss
scoring_elements 0.54995
published_at 2026-04-01T12:55:00Z
2
value 0.00321
scoring_system epss
scoring_elements 0.55096
published_at 2026-04-02T12:55:00Z
3
value 0.00321
scoring_system epss
scoring_elements 0.55095
published_at 2026-04-07T12:55:00Z
4
value 0.00321
scoring_system epss
scoring_elements 0.55146
published_at 2026-04-08T12:55:00Z
5
value 0.00321
scoring_system epss
scoring_elements 0.55145
published_at 2026-04-09T12:55:00Z
6
value 0.00321
scoring_system epss
scoring_elements 0.55157
published_at 2026-04-11T12:55:00Z
7
value 0.00321
scoring_system epss
scoring_elements 0.55137
published_at 2026-04-12T12:55:00Z
8
value 0.00321
scoring_system epss
scoring_elements 0.55119
published_at 2026-04-13T12:55:00Z
9
value 0.00321
scoring_system epss
scoring_elements 0.55158
published_at 2026-04-16T12:55:00Z
10
value 0.00321
scoring_system epss
scoring_elements 0.55162
published_at 2026-04-18T12:55:00Z
11
value 0.00321
scoring_system epss
scoring_elements 0.5512
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-3308
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10286
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10286
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10379
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10379
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10384
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10384
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3302
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3302
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3305
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3305
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3308
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3308
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3309
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3309
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3329
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3329
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3453
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3453
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3456
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3456
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3461
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3461
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3462
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3462
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3463
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3463
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3464
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3464
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3600
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3600
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3636
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3636
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3641
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3641
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3653
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3653
20
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 2.1
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:S/C:N/I:N/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
21
reference_url http://www.debian.org/security/2017/dsa-3834
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:46:18Z/
url http://www.debian.org/security/2017/dsa-3834
22
reference_url http://www.debian.org/security/2017/dsa-3944
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:46:18Z/
url http://www.debian.org/security/2017/dsa-3944
23
reference_url http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:46:18Z/
url http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
24
reference_url http://www.securityfocus.com/bid/97725
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:46:18Z/
url http://www.securityfocus.com/bid/97725
25
reference_url http://www.securitytracker.com/id/1038287
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:46:18Z/
url http://www.securitytracker.com/id/1038287
26
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1443358
reference_id 1443358
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1443358
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-3308
reference_id CVE-2017-3308
reference_type
scores
0
value 4.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:P
1
value 7.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-3308
43
reference_url https://security.gentoo.org/glsa/201802-04
reference_id GLSA-201802-04
reference_type
scores
url https://security.gentoo.org/glsa/201802-04
44
reference_url https://access.redhat.com/errata/RHSA-2017:2192
reference_id RHSA-2017:2192
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:46:18Z/
url https://access.redhat.com/errata/RHSA-2017:2192
45
reference_url https://access.redhat.com/errata/RHSA-2017:2787
reference_id RHSA-2017:2787
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:46:18Z/
url https://access.redhat.com/errata/RHSA-2017:2787
46
reference_url https://access.redhat.com/errata/RHSA-2017:2886
reference_id RHSA-2017:2886
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:46:18Z/
url https://access.redhat.com/errata/RHSA-2017:2886
47
reference_url https://access.redhat.com/errata/RHSA-2018:0279
reference_id RHSA-2018:0279
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:46:18Z/
url https://access.redhat.com/errata/RHSA-2018:0279
48
reference_url https://access.redhat.com/errata/RHSA-2018:0574
reference_id RHSA-2018:0574
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:46:18Z/
url https://access.redhat.com/errata/RHSA-2018:0574
49
reference_url https://usn.ubuntu.com/3269-1/
reference_id USN-3269-1
reference_type
scores
url https://usn.ubuntu.com/3269-1/
50
reference_url https://usn.ubuntu.com/3357-2/
reference_id USN-3357-2
reference_type
scores
url https://usn.ubuntu.com/3357-2/
fixed_packages
0
url pkg:deb/debian/mariadb-10.0@10.0.32-0%2Bdeb8u1
purl pkg:deb/debian/mariadb-10.0@10.0.32-0%2Bdeb8u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.0@10.0.32-0%252Bdeb8u1
aliases CVE-2017-3308
risk_score 3.5
exploitability 0.5
weighted_severity 6.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6g4n-3xfu-hfee
4
url VCID-6muh-rg1z-pqab
vulnerability_id VCID-6muh-rg1z-pqab
summary
Multiple vulnerabilities were found in MySQL, the worst of which
    may allow remote execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10286.json
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10286.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-10286
reference_id
reference_type
scores
0
value 0.00326
scoring_system epss
scoring_elements 0.55582
published_at 2026-04-13T12:55:00Z
1
value 0.00326
scoring_system epss
scoring_elements 0.55599
published_at 2026-04-12T12:55:00Z
2
value 0.00326
scoring_system epss
scoring_elements 0.55602
published_at 2026-04-21T12:55:00Z
3
value 0.00326
scoring_system epss
scoring_elements 0.55623
published_at 2026-04-18T12:55:00Z
4
value 0.00326
scoring_system epss
scoring_elements 0.5562
published_at 2026-04-16T12:55:00Z
5
value 0.00514
scoring_system epss
scoring_elements 0.66573
published_at 2026-04-04T12:55:00Z
6
value 0.00514
scoring_system epss
scoring_elements 0.66548
published_at 2026-04-02T12:55:00Z
7
value 0.00514
scoring_system epss
scoring_elements 0.66546
published_at 2026-04-07T12:55:00Z
8
value 0.00514
scoring_system epss
scoring_elements 0.66593
published_at 2026-04-08T12:55:00Z
9
value 0.00514
scoring_system epss
scoring_elements 0.66607
published_at 2026-04-09T12:55:00Z
10
value 0.00514
scoring_system epss
scoring_elements 0.66626
published_at 2026-04-11T12:55:00Z
11
value 0.00534
scoring_system epss
scoring_elements 0.67342
published_at 2026-04-01T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-10286
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10286
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10286
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10379
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10379
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10384
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10384
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3308
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3308
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3309
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3309
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3453
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3453
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3456
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3456
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3464
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3464
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3636
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3636
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3641
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3641
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3653
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3653
13
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.6
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:M/C:N/I:N/A:C
1
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
14
reference_url https://security.netapp.com/advisory/ntap-20171019-0002/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:45:47Z/
url https://security.netapp.com/advisory/ntap-20171019-0002/
15
reference_url http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:45:47Z/
url http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
16
reference_url http://www.securityfocus.com/bid/101397
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:45:47Z/
url http://www.securityfocus.com/bid/101397
17
reference_url http://www.securitytracker.com/id/1039597
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:45:47Z/
url http://www.securitytracker.com/id/1039597
18
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1503669
reference_id 1503669
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1503669
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
reference_id cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
reference_id cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_balance:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_balance:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_balance:-:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_performance_manager:-:*:*:*:*:vmware_vsphere:*:*
reference_id cpe:2.3:a:netapp:oncommand_performance_manager:-:*:*:*:*:vmware_vsphere:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_performance_manager:-:*:*:*:*:vmware_vsphere:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vsphere:*:*
reference_id cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vsphere:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vsphere:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:windows:*:*
reference_id cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:windows:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:windows:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-10286
reference_id CVE-2017-10286
reference_type
scores
0
value 3.5
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:S/C:N/I:N/A:P
1
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-10286
31
reference_url https://security.gentoo.org/glsa/201802-04
reference_id GLSA-201802-04
reference_type
scores
url https://security.gentoo.org/glsa/201802-04
32
reference_url https://access.redhat.com/errata/RHSA-2017:3265
reference_id RHSA-2017:3265
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:45:47Z/
url https://access.redhat.com/errata/RHSA-2017:3265
33
reference_url https://access.redhat.com/errata/RHSA-2017:3442
reference_id RHSA-2017:3442
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:45:47Z/
url https://access.redhat.com/errata/RHSA-2017:3442
34
reference_url https://access.redhat.com/errata/RHSA-2018:0279
reference_id RHSA-2018:0279
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:45:47Z/
url https://access.redhat.com/errata/RHSA-2018:0279
35
reference_url https://access.redhat.com/errata/RHSA-2018:0574
reference_id RHSA-2018:0574
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:45:47Z/
url https://access.redhat.com/errata/RHSA-2018:0574
36
reference_url https://usn.ubuntu.com/3459-1/
reference_id USN-3459-1
reference_type
scores
url https://usn.ubuntu.com/3459-1/
fixed_packages
0
url pkg:deb/debian/mariadb-10.0@10.0.32-0%2Bdeb8u1
purl pkg:deb/debian/mariadb-10.0@10.0.32-0%2Bdeb8u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.0@10.0.32-0%252Bdeb8u1
aliases CVE-2017-10286
risk_score 2.0
exploitability 0.5
weighted_severity 4.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6muh-rg1z-pqab
5
url VCID-bhxk-8byp-eyap
vulnerability_id VCID-bhxk-8byp-eyap
summary
Multiple vulnerabilities were found in MySQL, the worst of which
    may allow remote execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3309.json
reference_id
reference_type
scores
0
value 7.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3309.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-3309
reference_id
reference_type
scores
0
value 0.00319
scoring_system epss
scoring_elements 0.54915
published_at 2026-04-21T12:55:00Z
1
value 0.00319
scoring_system epss
scoring_elements 0.54875
published_at 2026-04-07T12:55:00Z
2
value 0.00319
scoring_system epss
scoring_elements 0.54924
published_at 2026-04-08T12:55:00Z
3
value 0.00319
scoring_system epss
scoring_elements 0.54923
published_at 2026-04-09T12:55:00Z
4
value 0.00319
scoring_system epss
scoring_elements 0.54935
published_at 2026-04-18T12:55:00Z
5
value 0.00319
scoring_system epss
scoring_elements 0.54917
published_at 2026-04-12T12:55:00Z
6
value 0.00319
scoring_system epss
scoring_elements 0.54894
published_at 2026-04-13T12:55:00Z
7
value 0.00319
scoring_system epss
scoring_elements 0.54932
published_at 2026-04-16T12:55:00Z
8
value 0.00319
scoring_system epss
scoring_elements 0.54879
published_at 2026-04-02T12:55:00Z
9
value 0.00319
scoring_system epss
scoring_elements 0.54809
published_at 2026-04-01T12:55:00Z
10
value 0.00319
scoring_system epss
scoring_elements 0.54905
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-3309
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10286
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10286
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10379
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10379
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10384
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10384
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3302
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3302
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3305
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3305
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3308
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3308
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3309
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3309
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3329
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3329
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3453
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3453
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3456
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3456
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3461
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3461
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3462
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3462
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3463
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3463
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3464
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3464
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3600
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3600
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3636
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3636
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3641
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3641
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3653
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3653
20
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 2.1
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:S/C:N/I:N/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
21
reference_url http://www.debian.org/security/2017/dsa-3834
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:46:17Z/
url http://www.debian.org/security/2017/dsa-3834
22
reference_url http://www.debian.org/security/2017/dsa-3944
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:46:17Z/
url http://www.debian.org/security/2017/dsa-3944
23
reference_url http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:46:17Z/
url http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
24
reference_url http://www.securityfocus.com/bid/97742
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:46:17Z/
url http://www.securityfocus.com/bid/97742
25
reference_url http://www.securitytracker.com/id/1038287
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:46:17Z/
url http://www.securitytracker.com/id/1038287
26
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1443359
reference_id 1443359
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1443359
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-3309
reference_id CVE-2017-3309
reference_type
scores
0
value 4.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:P
1
value 7.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-3309
43
reference_url https://security.gentoo.org/glsa/201802-04
reference_id GLSA-201802-04
reference_type
scores
url https://security.gentoo.org/glsa/201802-04
44
reference_url https://access.redhat.com/errata/RHSA-2017:2192
reference_id RHSA-2017:2192
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:46:17Z/
url https://access.redhat.com/errata/RHSA-2017:2192
45
reference_url https://access.redhat.com/errata/RHSA-2017:2787
reference_id RHSA-2017:2787
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:46:17Z/
url https://access.redhat.com/errata/RHSA-2017:2787
46
reference_url https://access.redhat.com/errata/RHSA-2017:2886
reference_id RHSA-2017:2886
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:46:17Z/
url https://access.redhat.com/errata/RHSA-2017:2886
47
reference_url https://access.redhat.com/errata/RHSA-2018:0279
reference_id RHSA-2018:0279
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:46:17Z/
url https://access.redhat.com/errata/RHSA-2018:0279
48
reference_url https://access.redhat.com/errata/RHSA-2018:0574
reference_id RHSA-2018:0574
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:46:17Z/
url https://access.redhat.com/errata/RHSA-2018:0574
49
reference_url https://usn.ubuntu.com/3269-1/
reference_id USN-3269-1
reference_type
scores
url https://usn.ubuntu.com/3269-1/
50
reference_url https://usn.ubuntu.com/3357-2/
reference_id USN-3357-2
reference_type
scores
url https://usn.ubuntu.com/3357-2/
fixed_packages
0
url pkg:deb/debian/mariadb-10.0@10.0.32-0%2Bdeb8u1
purl pkg:deb/debian/mariadb-10.0@10.0.32-0%2Bdeb8u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.0@10.0.32-0%252Bdeb8u1
aliases CVE-2017-3309
risk_score 3.5
exploitability 0.5
weighted_severity 6.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bhxk-8byp-eyap
6
url VCID-ej67-ayfh-sqdt
vulnerability_id VCID-ej67-ayfh-sqdt
summary
Multiple vulnerabilities were found in MySQL, the worst of which
    may allow remote execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10379.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10379.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-10379
reference_id
reference_type
scores
0
value 0.00326
scoring_system epss
scoring_elements 0.55624
published_at 2026-04-13T12:55:00Z
1
value 0.00326
scoring_system epss
scoring_elements 0.55646
published_at 2026-04-21T12:55:00Z
2
value 0.00326
scoring_system epss
scoring_elements 0.55667
published_at 2026-04-18T12:55:00Z
3
value 0.00326
scoring_system epss
scoring_elements 0.55663
published_at 2026-04-16T12:55:00Z
4
value 0.00326
scoring_system epss
scoring_elements 0.55641
published_at 2026-04-12T12:55:00Z
5
value 0.00351
scoring_system epss
scoring_elements 0.57419
published_at 2026-04-01T12:55:00Z
6
value 0.00458
scoring_system epss
scoring_elements 0.64019
published_at 2026-04-09T12:55:00Z
7
value 0.00458
scoring_system epss
scoring_elements 0.64002
published_at 2026-04-08T12:55:00Z
8
value 0.00458
scoring_system epss
scoring_elements 0.64031
published_at 2026-04-11T12:55:00Z
9
value 0.00458
scoring_system epss
scoring_elements 0.63992
published_at 2026-04-04T12:55:00Z
10
value 0.00458
scoring_system epss
scoring_elements 0.63952
published_at 2026-04-07T12:55:00Z
11
value 0.00458
scoring_system epss
scoring_elements 0.63965
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-10379
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10268
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10268
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10286
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10286
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10378
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10378
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10379
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10379
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10384
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10384
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3308
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3308
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3309
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3309
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3453
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3453
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3456
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3456
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3464
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3464
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3636
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3636
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3641
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3641
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3653
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3653
15
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:C
1
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
16
reference_url https://security.netapp.com/advisory/ntap-20171019-0002/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:42:50Z/
url https://security.netapp.com/advisory/ntap-20171019-0002/
17
reference_url http://www.debian.org/security/2017/dsa-4002
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:42:50Z/
url http://www.debian.org/security/2017/dsa-4002
18
reference_url http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:42:50Z/
url http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
19
reference_url http://www.securityfocus.com/bid/101415
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:42:50Z/
url http://www.securityfocus.com/bid/101415
20
reference_url http://www.securitytracker.com/id/1039597
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:42:50Z/
url http://www.securitytracker.com/id/1039597
21
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1503685
reference_id 1503685
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1503685
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
reference_id cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
reference_id cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_balance:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_balance:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_balance:-:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_performance_manager:-:*:*:*:*:vmware_vsphere:*:*
reference_id cpe:2.3:a:netapp:oncommand_performance_manager:-:*:*:*:*:vmware_vsphere:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_performance_manager:-:*:*:*:*:vmware_vsphere:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vsphere:*:*
reference_id cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vsphere:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vsphere:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:windows:*:*
reference_id cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:windows:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:windows:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openstack:12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:openstack:12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openstack:12:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-10379
reference_id CVE-2017-10379
reference_type
scores
0
value 4.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:P/I:N/A:N
1
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2017-10379
46
reference_url https://security.gentoo.org/glsa/201802-04
reference_id GLSA-201802-04
reference_type
scores
url https://security.gentoo.org/glsa/201802-04
47
reference_url https://access.redhat.com/errata/RHSA-2017:3265
reference_id RHSA-2017:3265
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:42:50Z/
url https://access.redhat.com/errata/RHSA-2017:3265
48
reference_url https://access.redhat.com/errata/RHSA-2017:3442
reference_id RHSA-2017:3442
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:42:50Z/
url https://access.redhat.com/errata/RHSA-2017:3442
49
reference_url https://access.redhat.com/errata/RHSA-2018:0279
reference_id RHSA-2018:0279
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:42:50Z/
url https://access.redhat.com/errata/RHSA-2018:0279
50
reference_url https://access.redhat.com/errata/RHSA-2018:0574
reference_id RHSA-2018:0574
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:42:50Z/
url https://access.redhat.com/errata/RHSA-2018:0574
51
reference_url https://access.redhat.com/errata/RHSA-2018:2439
reference_id RHSA-2018:2439
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:42:50Z/
url https://access.redhat.com/errata/RHSA-2018:2439
52
reference_url https://access.redhat.com/errata/RHSA-2018:2729
reference_id RHSA-2018:2729
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:42:50Z/
url https://access.redhat.com/errata/RHSA-2018:2729
53
reference_url https://usn.ubuntu.com/3459-1/
reference_id USN-3459-1
reference_type
scores
url https://usn.ubuntu.com/3459-1/
54
reference_url https://usn.ubuntu.com/3459-2/
reference_id USN-3459-2
reference_type
scores
url https://usn.ubuntu.com/3459-2/
fixed_packages
0
url pkg:deb/debian/mariadb-10.0@10.0.32-0%2Bdeb8u1
purl pkg:deb/debian/mariadb-10.0@10.0.32-0%2Bdeb8u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.0@10.0.32-0%252Bdeb8u1
aliases CVE-2017-10379
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ej67-ayfh-sqdt
7
url VCID-jgff-4jyp-9fgr
vulnerability_id VCID-jgff-4jyp-9fgr
summary
Multiple vulnerabilities were found in MySQL, the worst of which
    may allow remote execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3641.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3641.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-3641
reference_id
reference_type
scores
0
value 0.00187
scoring_system epss
scoring_elements 0.40537
published_at 2026-04-13T12:55:00Z
1
value 0.00187
scoring_system epss
scoring_elements 0.40565
published_at 2026-04-02T12:55:00Z
2
value 0.00187
scoring_system epss
scoring_elements 0.40514
published_at 2026-04-07T12:55:00Z
3
value 0.00187
scoring_system epss
scoring_elements 0.40564
published_at 2026-04-08T12:55:00Z
4
value 0.00187
scoring_system epss
scoring_elements 0.40575
published_at 2026-04-09T12:55:00Z
5
value 0.00187
scoring_system epss
scoring_elements 0.40557
published_at 2026-04-12T12:55:00Z
6
value 0.00187
scoring_system epss
scoring_elements 0.40585
published_at 2026-04-16T12:55:00Z
7
value 0.00187
scoring_system epss
scoring_elements 0.40477
published_at 2026-04-21T12:55:00Z
8
value 0.00187
scoring_system epss
scoring_elements 0.40485
published_at 2026-04-01T12:55:00Z
9
value 0.00187
scoring_system epss
scoring_elements 0.40555
published_at 2026-04-18T12:55:00Z
10
value 0.00187
scoring_system epss
scoring_elements 0.40593
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-3641
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10286
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10286
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10379
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10379
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10384
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10384
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3308
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3308
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3309
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3309
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3453
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3453
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3456
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3456
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3464
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3464
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3635
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3635
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3636
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3636
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3641
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3641
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3648
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3648
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3651
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3651
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3652
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3652
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3653
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3653
17
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:C
1
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
18
reference_url http://www.securitytracker.com/id/1038928
reference_id 1038928
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:48:15Z/
url http://www.securitytracker.com/id/1038928
19
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1472693
reference_id 1472693
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1472693
20
reference_url http://www.securityfocus.com/bid/99767
reference_id 99767
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:48:15Z/
url http://www.securityfocus.com/bid/99767
21
reference_url http://www.debian.org/security/2017/dsa-3922
reference_id dsa-3922
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:48:15Z/
url http://www.debian.org/security/2017/dsa-3922
22
reference_url https://www.debian.org/security/2017/dsa-3955
reference_id dsa-3955
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:48:15Z/
url https://www.debian.org/security/2017/dsa-3955
23
reference_url https://security.gentoo.org/glsa/201802-04
reference_id GLSA-201802-04
reference_type
scores
url https://security.gentoo.org/glsa/201802-04
24
reference_url https://access.redhat.com/errata/RHSA-2017:2787
reference_id RHSA-2017:2787
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:48:15Z/
url https://access.redhat.com/errata/RHSA-2017:2787
25
reference_url https://access.redhat.com/errata/RHSA-2017:2886
reference_id RHSA-2017:2886
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:48:15Z/
url https://access.redhat.com/errata/RHSA-2017:2886
26
reference_url https://access.redhat.com/errata/RHSA-2018:0279
reference_id RHSA-2018:0279
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:48:15Z/
url https://access.redhat.com/errata/RHSA-2018:0279
27
reference_url https://access.redhat.com/errata/RHSA-2018:0574
reference_id RHSA-2018:0574
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:48:15Z/
url https://access.redhat.com/errata/RHSA-2018:0574
28
reference_url https://access.redhat.com/errata/RHSA-2018:2439
reference_id RHSA-2018:2439
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:48:15Z/
url https://access.redhat.com/errata/RHSA-2018:2439
29
reference_url https://access.redhat.com/errata/RHSA-2018:2729
reference_id RHSA-2018:2729
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:48:15Z/
url https://access.redhat.com/errata/RHSA-2018:2729
30
reference_url https://usn.ubuntu.com/3357-1/
reference_id USN-3357-1
reference_type
scores
url https://usn.ubuntu.com/3357-1/
31
reference_url https://usn.ubuntu.com/3357-2/
reference_id USN-3357-2
reference_type
scores
url https://usn.ubuntu.com/3357-2/
fixed_packages
0
url pkg:deb/debian/mariadb-10.0@10.0.32-0%2Bdeb8u1
purl pkg:deb/debian/mariadb-10.0@10.0.32-0%2Bdeb8u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.0@10.0.32-0%252Bdeb8u1
aliases CVE-2017-3641
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jgff-4jyp-9fgr
8
url VCID-mde2-1ynu-auh2
vulnerability_id VCID-mde2-1ynu-auh2
summary
Multiple vulnerabilities were found in MySQL, the worst of which
    may allow remote execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3456.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3456.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-3456
reference_id
reference_type
scores
0
value 0.0018
scoring_system epss
scoring_elements 0.39608
published_at 2026-04-21T12:55:00Z
1
value 0.0018
scoring_system epss
scoring_elements 0.39699
published_at 2026-04-08T12:55:00Z
2
value 0.0018
scoring_system epss
scoring_elements 0.39713
published_at 2026-04-09T12:55:00Z
3
value 0.0018
scoring_system epss
scoring_elements 0.39723
published_at 2026-04-11T12:55:00Z
4
value 0.0018
scoring_system epss
scoring_elements 0.39687
published_at 2026-04-12T12:55:00Z
5
value 0.0018
scoring_system epss
scoring_elements 0.3967
published_at 2026-04-13T12:55:00Z
6
value 0.0018
scoring_system epss
scoring_elements 0.39721
published_at 2026-04-16T12:55:00Z
7
value 0.0018
scoring_system epss
scoring_elements 0.39692
published_at 2026-04-18T12:55:00Z
8
value 0.0018
scoring_system epss
scoring_elements 0.39704
published_at 2026-04-02T12:55:00Z
9
value 0.0018
scoring_system epss
scoring_elements 0.39555
published_at 2026-04-01T12:55:00Z
10
value 0.0018
scoring_system epss
scoring_elements 0.39726
published_at 2026-04-04T12:55:00Z
11
value 0.0018
scoring_system epss
scoring_elements 0.39644
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-3456
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10286
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10286
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10379
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10379
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10384
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10384
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3302
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3302
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3305
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3305
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3308
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3308
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3309
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3309
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3329
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3329
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3453
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3453
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3456
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3456
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3461
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3461
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3462
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3462
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3463
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3463
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3464
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3464
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3600
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3600
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3636
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3636
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3641
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3641
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3653
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3653
20
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 2.1
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:S/C:N/I:N/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
21
reference_url http://www.debian.org/security/2017/dsa-3834
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:46:04Z/
url http://www.debian.org/security/2017/dsa-3834
22
reference_url http://www.debian.org/security/2017/dsa-3944
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:46:04Z/
url http://www.debian.org/security/2017/dsa-3944
23
reference_url http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:46:04Z/
url http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
24
reference_url http://www.securityfocus.com/bid/97831
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:46:04Z/
url http://www.securityfocus.com/bid/97831
25
reference_url http://www.securitytracker.com/id/1038287
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:46:04Z/
url http://www.securitytracker.com/id/1038287
26
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1443369
reference_id 1443369
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1443369
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-3456
reference_id CVE-2017-3456
reference_type
scores
0
value 4.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:P
1
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-3456
43
reference_url https://security.gentoo.org/glsa/201802-04
reference_id GLSA-201802-04
reference_type
scores
url https://security.gentoo.org/glsa/201802-04
44
reference_url https://access.redhat.com/errata/RHSA-2017:2192
reference_id RHSA-2017:2192
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:46:04Z/
url https://access.redhat.com/errata/RHSA-2017:2192
45
reference_url https://access.redhat.com/errata/RHSA-2017:2787
reference_id RHSA-2017:2787
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:46:04Z/
url https://access.redhat.com/errata/RHSA-2017:2787
46
reference_url https://access.redhat.com/errata/RHSA-2017:2886
reference_id RHSA-2017:2886
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:46:04Z/
url https://access.redhat.com/errata/RHSA-2017:2886
47
reference_url https://access.redhat.com/errata/RHSA-2018:0279
reference_id RHSA-2018:0279
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:46:04Z/
url https://access.redhat.com/errata/RHSA-2018:0279
48
reference_url https://access.redhat.com/errata/RHSA-2018:0574
reference_id RHSA-2018:0574
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:46:04Z/
url https://access.redhat.com/errata/RHSA-2018:0574
49
reference_url https://usn.ubuntu.com/3269-1/
reference_id USN-3269-1
reference_type
scores
url https://usn.ubuntu.com/3269-1/
50
reference_url https://usn.ubuntu.com/3357-2/
reference_id USN-3357-2
reference_type
scores
url https://usn.ubuntu.com/3357-2/
fixed_packages
0
url pkg:deb/debian/mariadb-10.0@10.0.32-0%2Bdeb8u1
purl pkg:deb/debian/mariadb-10.0@10.0.32-0%2Bdeb8u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.0@10.0.32-0%252Bdeb8u1
aliases CVE-2017-3456
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mde2-1ynu-auh2
9
url VCID-v4gv-g9n5-ukgc
vulnerability_id VCID-v4gv-g9n5-ukgc
summary
Multiple vulnerabilities were found in MySQL, the worst of which
    may allow remote execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3453.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3453.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-3453
reference_id
reference_type
scores
0
value 0.00419
scoring_system epss
scoring_elements 0.61911
published_at 2026-04-21T12:55:00Z
1
value 0.00419
scoring_system epss
scoring_elements 0.61875
published_at 2026-04-08T12:55:00Z
2
value 0.00419
scoring_system epss
scoring_elements 0.6189
published_at 2026-04-09T12:55:00Z
3
value 0.00419
scoring_system epss
scoring_elements 0.61912
published_at 2026-04-11T12:55:00Z
4
value 0.00419
scoring_system epss
scoring_elements 0.619
published_at 2026-04-12T12:55:00Z
5
value 0.00419
scoring_system epss
scoring_elements 0.6188
published_at 2026-04-13T12:55:00Z
6
value 0.00419
scoring_system epss
scoring_elements 0.61923
published_at 2026-04-16T12:55:00Z
7
value 0.00419
scoring_system epss
scoring_elements 0.61928
published_at 2026-04-18T12:55:00Z
8
value 0.00419
scoring_system epss
scoring_elements 0.61825
published_at 2026-04-07T12:55:00Z
9
value 0.00419
scoring_system epss
scoring_elements 0.61751
published_at 2026-04-01T12:55:00Z
10
value 0.00419
scoring_system epss
scoring_elements 0.61855
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-3453
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10286
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10286
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10379
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10379
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10384
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10384
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3302
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3302
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3305
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3305
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3308
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3308
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3309
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3309
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3329
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3329
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3453
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3453
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3456
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3456
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3461
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3461
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3462
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3462
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3463
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3463
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3464
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3464
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3600
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3600
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3636
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3636
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3641
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3641
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3653
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3653
20
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 2.1
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:S/C:N/I:N/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
21
reference_url http://www.debian.org/security/2017/dsa-3834
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:46:07Z/
url http://www.debian.org/security/2017/dsa-3834
22
reference_url http://www.debian.org/security/2017/dsa-3944
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:46:07Z/
url http://www.debian.org/security/2017/dsa-3944
23
reference_url http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:46:07Z/
url http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
24
reference_url http://www.securityfocus.com/bid/97776
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:46:07Z/
url http://www.securityfocus.com/bid/97776
25
reference_url http://www.securitytracker.com/id/1038287
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:46:07Z/
url http://www.securitytracker.com/id/1038287
26
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1443365
reference_id 1443365
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1443365
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-3453
reference_id CVE-2017-3453
reference_type
scores
0
value 4.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:P
1
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-3453
42
reference_url https://security.gentoo.org/glsa/201802-04
reference_id GLSA-201802-04
reference_type
scores
url https://security.gentoo.org/glsa/201802-04
43
reference_url https://access.redhat.com/errata/RHSA-2017:2192
reference_id RHSA-2017:2192
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:46:07Z/
url https://access.redhat.com/errata/RHSA-2017:2192
44
reference_url https://access.redhat.com/errata/RHSA-2017:2787
reference_id RHSA-2017:2787
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:46:07Z/
url https://access.redhat.com/errata/RHSA-2017:2787
45
reference_url https://access.redhat.com/errata/RHSA-2017:2886
reference_id RHSA-2017:2886
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:46:07Z/
url https://access.redhat.com/errata/RHSA-2017:2886
46
reference_url https://access.redhat.com/errata/RHSA-2018:0279
reference_id RHSA-2018:0279
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:46:07Z/
url https://access.redhat.com/errata/RHSA-2018:0279
47
reference_url https://access.redhat.com/errata/RHSA-2018:0574
reference_id RHSA-2018:0574
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:46:07Z/
url https://access.redhat.com/errata/RHSA-2018:0574
48
reference_url https://usn.ubuntu.com/3269-1/
reference_id USN-3269-1
reference_type
scores
url https://usn.ubuntu.com/3269-1/
49
reference_url https://usn.ubuntu.com/3357-2/
reference_id USN-3357-2
reference_type
scores
url https://usn.ubuntu.com/3357-2/
fixed_packages
0
url pkg:deb/debian/mariadb-10.0@10.0.32-0%2Bdeb8u1
purl pkg:deb/debian/mariadb-10.0@10.0.32-0%2Bdeb8u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.0@10.0.32-0%252Bdeb8u1
aliases CVE-2017-3453
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-v4gv-g9n5-ukgc
10
url VCID-yx79-3g2x-pqex
vulnerability_id VCID-yx79-3g2x-pqex
summary
Multiple vulnerabilities were found in MySQL, the worst of which
    may allow remote execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10384.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10384.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-10384
reference_id
reference_type
scores
0
value 0.0062
scoring_system epss
scoring_elements 0.70069
published_at 2026-04-21T12:55:00Z
1
value 0.0062
scoring_system epss
scoring_elements 0.7005
published_at 2026-04-12T12:55:00Z
2
value 0.0062
scoring_system epss
scoring_elements 0.70036
published_at 2026-04-13T12:55:00Z
3
value 0.0062
scoring_system epss
scoring_elements 0.70079
published_at 2026-04-16T12:55:00Z
4
value 0.0062
scoring_system epss
scoring_elements 0.70088
published_at 2026-04-18T12:55:00Z
5
value 0.00666
scoring_system epss
scoring_elements 0.71187
published_at 2026-04-01T12:55:00Z
6
value 0.00869
scoring_system epss
scoring_elements 0.75139
published_at 2026-04-02T12:55:00Z
7
value 0.00869
scoring_system epss
scoring_elements 0.75146
published_at 2026-04-07T12:55:00Z
8
value 0.00869
scoring_system epss
scoring_elements 0.7518
published_at 2026-04-08T12:55:00Z
9
value 0.00869
scoring_system epss
scoring_elements 0.75214
published_at 2026-04-11T12:55:00Z
10
value 0.00869
scoring_system epss
scoring_elements 0.75192
published_at 2026-04-09T12:55:00Z
11
value 0.00869
scoring_system epss
scoring_elements 0.75169
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-10384
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10268
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10268
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10286
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10286
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10378
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10378
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10379
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10379
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10384
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10384
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3308
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3308
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3309
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3309
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3453
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3453
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3456
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3456
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3464
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3464
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3636
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3636
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3641
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3641
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3653
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3653
15
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:C
1
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
16
reference_url https://security.netapp.com/advisory/ntap-20171019-0002/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:42:34Z/
url https://security.netapp.com/advisory/ntap-20171019-0002/
17
reference_url http://www.debian.org/security/2017/dsa-4002
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:42:34Z/
url http://www.debian.org/security/2017/dsa-4002
18
reference_url http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:42:34Z/
url http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
19
reference_url http://www.securityfocus.com/bid/101406
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:42:34Z/
url http://www.securityfocus.com/bid/101406
20
reference_url http://www.securitytracker.com/id/1039597
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:42:34Z/
url http://www.securitytracker.com/id/1039597
21
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1503686
reference_id 1503686
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1503686
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
reference_id cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
reference_id cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_balance:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_balance:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_balance:-:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_performance_manager:-:*:*:*:*:vmware_vsphere:*:*
reference_id cpe:2.3:a:netapp:oncommand_performance_manager:-:*:*:*:*:vmware_vsphere:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_performance_manager:-:*:*:*:*:vmware_vsphere:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vsphere:*:*
reference_id cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vsphere:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vsphere:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:windows:*:*
reference_id cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:windows:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:windows:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openstack:12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:openstack:12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openstack:12:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-10384
reference_id CVE-2017-10384
reference_type
scores
0
value 4.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:P
1
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-10384
46
reference_url https://security.gentoo.org/glsa/201802-04
reference_id GLSA-201802-04
reference_type
scores
url https://security.gentoo.org/glsa/201802-04
47
reference_url https://access.redhat.com/errata/RHSA-2017:3265
reference_id RHSA-2017:3265
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:42:34Z/
url https://access.redhat.com/errata/RHSA-2017:3265
48
reference_url https://access.redhat.com/errata/RHSA-2017:3442
reference_id RHSA-2017:3442
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:42:34Z/
url https://access.redhat.com/errata/RHSA-2017:3442
49
reference_url https://access.redhat.com/errata/RHSA-2018:0279
reference_id RHSA-2018:0279
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:42:34Z/
url https://access.redhat.com/errata/RHSA-2018:0279
50
reference_url https://access.redhat.com/errata/RHSA-2018:0574
reference_id RHSA-2018:0574
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:42:34Z/
url https://access.redhat.com/errata/RHSA-2018:0574
51
reference_url https://access.redhat.com/errata/RHSA-2018:2439
reference_id RHSA-2018:2439
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:42:34Z/
url https://access.redhat.com/errata/RHSA-2018:2439
52
reference_url https://access.redhat.com/errata/RHSA-2018:2729
reference_id RHSA-2018:2729
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:42:34Z/
url https://access.redhat.com/errata/RHSA-2018:2729
53
reference_url https://usn.ubuntu.com/3459-1/
reference_id USN-3459-1
reference_type
scores
url https://usn.ubuntu.com/3459-1/
54
reference_url https://usn.ubuntu.com/3459-2/
reference_id USN-3459-2
reference_type
scores
url https://usn.ubuntu.com/3459-2/
fixed_packages
0
url pkg:deb/debian/mariadb-10.0@10.0.32-0%2Bdeb8u1
purl pkg:deb/debian/mariadb-10.0@10.0.32-0%2Bdeb8u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.0@10.0.32-0%252Bdeb8u1
aliases CVE-2017-10384
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-yx79-3g2x-pqex
Fixing_vulnerabilities
0
url VCID-2gyq-q761-h3br
vulnerability_id VCID-2gyq-q761-h3br
summary
Multiple vulnerabilities have been found in MariaDB, the worst of
    which could lead to privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3312.json
reference_id
reference_type
scores
0
value 6.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3312.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-3312
reference_id
reference_type
scores
0
value 0.00123
scoring_system epss
scoring_elements 0.31366
published_at 2026-04-21T12:55:00Z
1
value 0.00123
scoring_system epss
scoring_elements 0.31555
published_at 2026-04-04T12:55:00Z
2
value 0.00123
scoring_system epss
scoring_elements 0.31373
published_at 2026-04-07T12:55:00Z
3
value 0.00123
scoring_system epss
scoring_elements 0.31426
published_at 2026-04-08T12:55:00Z
4
value 0.00123
scoring_system epss
scoring_elements 0.31457
published_at 2026-04-09T12:55:00Z
5
value 0.00123
scoring_system epss
scoring_elements 0.3146
published_at 2026-04-11T12:55:00Z
6
value 0.00123
scoring_system epss
scoring_elements 0.31417
published_at 2026-04-12T12:55:00Z
7
value 0.00123
scoring_system epss
scoring_elements 0.31381
published_at 2026-04-13T12:55:00Z
8
value 0.00123
scoring_system epss
scoring_elements 0.31415
published_at 2026-04-16T12:55:00Z
9
value 0.00123
scoring_system epss
scoring_elements 0.31395
published_at 2026-04-18T12:55:00Z
10
value 0.00123
scoring_system epss
scoring_elements 0.31513
published_at 2026-04-02T12:55:00Z
11
value 0.00123
scoring_system epss
scoring_elements 0.31376
published_at 2026-04-01T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-3312
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6664
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6664
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3238
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3238
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3243
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3243
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3244
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3244
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3257
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3257
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3258
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3258
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3265
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3265
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3291
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3291
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3312
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3312
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3313
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3313
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3317
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3317
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3318
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3318
14
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.2
scoring_system cvssv2
scoring_elements AV:L/AC:H/Au:N/C:C/I:C/A:C
1
value 6.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1414133
reference_id 1414133
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1414133
16
reference_url http://www.securityfocus.com/bid/95491
reference_id 95491
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:06:01Z/
url http://www.securityfocus.com/bid/95491
17
reference_url http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
reference_id cpujan2017-2881727.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:06:01Z/
url http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
18
reference_url http://www.debian.org/security/2017/dsa-3767
reference_id dsa-3767
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:06:01Z/
url http://www.debian.org/security/2017/dsa-3767
19
reference_url http://www.debian.org/security/2017/dsa-3770
reference_id dsa-3770
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:06:01Z/
url http://www.debian.org/security/2017/dsa-3770
20
reference_url https://security.gentoo.org/glsa/201702-17
reference_id GLSA-201702-17
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:06:01Z/
url https://security.gentoo.org/glsa/201702-17
21
reference_url https://security.gentoo.org/glsa/201702-18
reference_id GLSA-201702-18
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:06:01Z/
url https://security.gentoo.org/glsa/201702-18
22
reference_url https://access.redhat.com/errata/RHSA-2017:2192
reference_id RHSA-2017:2192
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:06:01Z/
url https://access.redhat.com/errata/RHSA-2017:2192
23
reference_url https://access.redhat.com/errata/RHSA-2017:2787
reference_id RHSA-2017:2787
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:06:01Z/
url https://access.redhat.com/errata/RHSA-2017:2787
24
reference_url https://access.redhat.com/errata/RHSA-2017:2886
reference_id RHSA-2017:2886
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:06:01Z/
url https://access.redhat.com/errata/RHSA-2017:2886
25
reference_url https://access.redhat.com/errata/RHSA-2018:0279
reference_id RHSA-2018:0279
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:06:01Z/
url https://access.redhat.com/errata/RHSA-2018:0279
26
reference_url https://access.redhat.com/errata/RHSA-2018:0574
reference_id RHSA-2018:0574
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:06:01Z/
url https://access.redhat.com/errata/RHSA-2018:0574
27
reference_url https://usn.ubuntu.com/3174-1/
reference_id USN-3174-1
reference_type
scores
url https://usn.ubuntu.com/3174-1/
fixed_packages
0
url pkg:deb/debian/mariadb-10.0@10.0.30-0%2Bdeb8u2
purl pkg:deb/debian/mariadb-10.0@10.0.30-0%2Bdeb8u2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1gmc-pj6y-rkfx
1
vulnerability VCID-4yz4-vxnh-b3dp
2
vulnerability VCID-5sjj-599v-vybg
3
vulnerability VCID-6g4n-3xfu-hfee
4
vulnerability VCID-6muh-rg1z-pqab
5
vulnerability VCID-bhxk-8byp-eyap
6
vulnerability VCID-ej67-ayfh-sqdt
7
vulnerability VCID-jgff-4jyp-9fgr
8
vulnerability VCID-mde2-1ynu-auh2
9
vulnerability VCID-v4gv-g9n5-ukgc
10
vulnerability VCID-yx79-3g2x-pqex
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.0@10.0.30-0%252Bdeb8u2
aliases CVE-2017-3312
risk_score 3.0
exploitability 0.5
weighted_severity 6.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2gyq-q761-h3br
1
url VCID-2rf6-qaey-1ubn
vulnerability_id VCID-2rf6-qaey-1ubn
summary
Multiple vulnerabilities have been found in MariaDB, the worst of
    which could lead to privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3257.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3257.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-3257
reference_id
reference_type
scores
0
value 0.0029
scoring_system epss
scoring_elements 0.52492
published_at 2026-04-21T12:55:00Z
1
value 0.0029
scoring_system epss
scoring_elements 0.52357
published_at 2026-04-01T12:55:00Z
2
value 0.0029
scoring_system epss
scoring_elements 0.52402
published_at 2026-04-02T12:55:00Z
3
value 0.0029
scoring_system epss
scoring_elements 0.52448
published_at 2026-04-08T12:55:00Z
4
value 0.0029
scoring_system epss
scoring_elements 0.52442
published_at 2026-04-09T12:55:00Z
5
value 0.0029
scoring_system epss
scoring_elements 0.52493
published_at 2026-04-11T12:55:00Z
6
value 0.0029
scoring_system epss
scoring_elements 0.52477
published_at 2026-04-12T12:55:00Z
7
value 0.0029
scoring_system epss
scoring_elements 0.5246
published_at 2026-04-13T12:55:00Z
8
value 0.0029
scoring_system epss
scoring_elements 0.52501
published_at 2026-04-16T12:55:00Z
9
value 0.0029
scoring_system epss
scoring_elements 0.52507
published_at 2026-04-18T12:55:00Z
10
value 0.0029
scoring_system epss
scoring_elements 0.5243
published_at 2026-04-04T12:55:00Z
11
value 0.0029
scoring_system epss
scoring_elements 0.52395
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-3257
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6664
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6664
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3238
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3238
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3243
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3243
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3244
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3244
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3257
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3257
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3258
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3258
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3265
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3265
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3291
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3291
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3312
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3312
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3317
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3317
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3318
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3318
13
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:C
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
14
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1414350
reference_id 1414350
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1414350
15
reference_url http://www.securityfocus.com/bid/95589
reference_id 95589
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:12Z/
url http://www.securityfocus.com/bid/95589
16
reference_url http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
reference_id cpujan2017-2881727.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:12Z/
url http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
17
reference_url http://www.debian.org/security/2017/dsa-3770
reference_id dsa-3770
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:12Z/
url http://www.debian.org/security/2017/dsa-3770
18
reference_url https://security.gentoo.org/glsa/201702-17
reference_id GLSA-201702-17
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:12Z/
url https://security.gentoo.org/glsa/201702-17
19
reference_url https://security.gentoo.org/glsa/201702-18
reference_id GLSA-201702-18
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:12Z/
url https://security.gentoo.org/glsa/201702-18
20
reference_url https://access.redhat.com/errata/RHSA-2017:2787
reference_id RHSA-2017:2787
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:12Z/
url https://access.redhat.com/errata/RHSA-2017:2787
21
reference_url https://access.redhat.com/errata/RHSA-2017:2886
reference_id RHSA-2017:2886
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:12Z/
url https://access.redhat.com/errata/RHSA-2017:2886
22
reference_url https://access.redhat.com/errata/RHSA-2018:0279
reference_id RHSA-2018:0279
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:12Z/
url https://access.redhat.com/errata/RHSA-2018:0279
23
reference_url https://access.redhat.com/errata/RHSA-2018:0574
reference_id RHSA-2018:0574
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:12Z/
url https://access.redhat.com/errata/RHSA-2018:0574
fixed_packages
0
url pkg:deb/debian/mariadb-10.0@10.0.30-0%2Bdeb8u2
purl pkg:deb/debian/mariadb-10.0@10.0.30-0%2Bdeb8u2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1gmc-pj6y-rkfx
1
vulnerability VCID-4yz4-vxnh-b3dp
2
vulnerability VCID-5sjj-599v-vybg
3
vulnerability VCID-6g4n-3xfu-hfee
4
vulnerability VCID-6muh-rg1z-pqab
5
vulnerability VCID-bhxk-8byp-eyap
6
vulnerability VCID-ej67-ayfh-sqdt
7
vulnerability VCID-jgff-4jyp-9fgr
8
vulnerability VCID-mde2-1ynu-auh2
9
vulnerability VCID-v4gv-g9n5-ukgc
10
vulnerability VCID-yx79-3g2x-pqex
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.0@10.0.30-0%252Bdeb8u2
aliases CVE-2017-3257
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2rf6-qaey-1ubn
2
url VCID-45hn-ezks-j7br
vulnerability_id VCID-45hn-ezks-j7br
summary security update
references
0
reference_url http://lists.opensuse.org/opensuse-updates/2016-09/msg00042.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:47:47Z/
url http://lists.opensuse.org/opensuse-updates/2016-09/msg00042.html
1
reference_url http://rhn.redhat.com/errata/RHSA-2016-1480.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:47:47Z/
url http://rhn.redhat.com/errata/RHSA-2016-1480.html
2
reference_url http://rhn.redhat.com/errata/RHSA-2016-1601.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:47:47Z/
url http://rhn.redhat.com/errata/RHSA-2016-1601.html
3
reference_url http://rhn.redhat.com/errata/RHSA-2016-1602.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:47:47Z/
url http://rhn.redhat.com/errata/RHSA-2016-1602.html
4
reference_url http://rhn.redhat.com/errata/RHSA-2016-1603.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:47:47Z/
url http://rhn.redhat.com/errata/RHSA-2016-1603.html
5
reference_url http://rhn.redhat.com/errata/RHSA-2016-1604.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:47:47Z/
url http://rhn.redhat.com/errata/RHSA-2016-1604.html
6
reference_url http://rhn.redhat.com/errata/RHSA-2016-1637.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:47:47Z/
url http://rhn.redhat.com/errata/RHSA-2016-1637.html
7
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3615.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3615.json
8
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-3615
reference_id
reference_type
scores
0
value 0.01847
scoring_system epss
scoring_elements 0.83025
published_at 2026-04-21T12:55:00Z
1
value 0.01847
scoring_system epss
scoring_elements 0.82919
published_at 2026-04-01T12:55:00Z
2
value 0.01847
scoring_system epss
scoring_elements 0.82935
published_at 2026-04-02T12:55:00Z
3
value 0.01847
scoring_system epss
scoring_elements 0.82948
published_at 2026-04-04T12:55:00Z
4
value 0.01847
scoring_system epss
scoring_elements 0.82945
published_at 2026-04-07T12:55:00Z
5
value 0.01847
scoring_system epss
scoring_elements 0.8297
published_at 2026-04-08T12:55:00Z
6
value 0.01847
scoring_system epss
scoring_elements 0.82977
published_at 2026-04-09T12:55:00Z
7
value 0.01847
scoring_system epss
scoring_elements 0.82992
published_at 2026-04-11T12:55:00Z
8
value 0.01847
scoring_system epss
scoring_elements 0.82987
published_at 2026-04-12T12:55:00Z
9
value 0.01847
scoring_system epss
scoring_elements 0.82983
published_at 2026-04-13T12:55:00Z
10
value 0.01847
scoring_system epss
scoring_elements 0.83022
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-3615
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3477
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3477
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3521
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3521
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3615
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3615
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5440
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5440
13
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:S/C:N/I:N/A:C
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
14
reference_url https://mariadb.com/kb/en/mariadb/mariadb-10026-release-notes/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:47:47Z/
url https://mariadb.com/kb/en/mariadb/mariadb-10026-release-notes/
15
reference_url https://mariadb.com/kb/en/mariadb/mariadb-10115-release-notes/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:47:47Z/
url https://mariadb.com/kb/en/mariadb/mariadb-10115-release-notes/
16
reference_url https://mariadb.com/kb/en/mariadb/mariadb-5550-release-notes/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:47:47Z/
url https://mariadb.com/kb/en/mariadb/mariadb-5550-release-notes/
17
reference_url http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:47:47Z/
url http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168
18
reference_url http://www.debian.org/security/2016/dsa-3624
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:47:47Z/
url http://www.debian.org/security/2016/dsa-3624
19
reference_url http://www.debian.org/security/2016/dsa-3632
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:47:47Z/
url http://www.debian.org/security/2016/dsa-3632
20
reference_url http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:47:47Z/
url http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
21
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:47:47Z/
url http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
22
reference_url http://www.securityfocus.com/bid/91787
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:47:47Z/
url http://www.securityfocus.com/bid/91787
23
reference_url http://www.securityfocus.com/bid/91960
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:47:47Z/
url http://www.securityfocus.com/bid/91960
24
reference_url http://www.securitytracker.com/id/1036362
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:47:47Z/
url http://www.securitytracker.com/id/1036362
25
reference_url http://www.ubuntu.com/usn/USN-3040-1
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:47:47Z/
url http://www.ubuntu.com/usn/USN-3040-1
26
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1358212
reference_id 1358212
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1358212
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:powerkvm:2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ibm:powerkvm:2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:powerkvm:2.1:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:powerkvm:3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ibm:powerkvm:3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:powerkvm:3.1:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-3615
reference_id CVE-2016-3615
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
1
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2016-3615
38
reference_url https://access.redhat.com/errata/RHSA-2016:1480
reference_id RHSA-2016:1480
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1480
39
reference_url https://access.redhat.com/errata/RHSA-2016:1601
reference_id RHSA-2016:1601
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1601
40
reference_url https://access.redhat.com/errata/RHSA-2016:1602
reference_id RHSA-2016:1602
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1602
41
reference_url https://access.redhat.com/errata/RHSA-2016:1603
reference_id RHSA-2016:1603
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1603
42
reference_url https://access.redhat.com/errata/RHSA-2016:1604
reference_id RHSA-2016:1604
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1604
43
reference_url https://access.redhat.com/errata/RHSA-2016:1637
reference_id RHSA-2016:1637
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1637
44
reference_url https://usn.ubuntu.com/3040-1/
reference_id USN-3040-1
reference_type
scores
url https://usn.ubuntu.com/3040-1/
fixed_packages
0
url pkg:deb/debian/mariadb-10.0@10.0.30-0%2Bdeb8u2
purl pkg:deb/debian/mariadb-10.0@10.0.30-0%2Bdeb8u2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1gmc-pj6y-rkfx
1
vulnerability VCID-4yz4-vxnh-b3dp
2
vulnerability VCID-5sjj-599v-vybg
3
vulnerability VCID-6g4n-3xfu-hfee
4
vulnerability VCID-6muh-rg1z-pqab
5
vulnerability VCID-bhxk-8byp-eyap
6
vulnerability VCID-ej67-ayfh-sqdt
7
vulnerability VCID-jgff-4jyp-9fgr
8
vulnerability VCID-mde2-1ynu-auh2
9
vulnerability VCID-v4gv-g9n5-ukgc
10
vulnerability VCID-yx79-3g2x-pqex
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.0@10.0.30-0%252Bdeb8u2
aliases CVE-2016-3615
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-45hn-ezks-j7br
3
url VCID-4cnj-7fur-3qe3
vulnerability_id VCID-4cnj-7fur-3qe3
summary
Multiple vulnerabilities have been found in MariaDB, the worst of
    which could lead to privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3265.json
reference_id
reference_type
scores
0
value 5.6
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3265.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-3265
reference_id
reference_type
scores
0
value 0.00225
scoring_system epss
scoring_elements 0.45205
published_at 2026-04-21T12:55:00Z
1
value 0.00225
scoring_system epss
scoring_elements 0.45118
published_at 2026-04-01T12:55:00Z
2
value 0.00225
scoring_system epss
scoring_elements 0.452
published_at 2026-04-02T12:55:00Z
3
value 0.00225
scoring_system epss
scoring_elements 0.45222
published_at 2026-04-04T12:55:00Z
4
value 0.00225
scoring_system epss
scoring_elements 0.45164
published_at 2026-04-07T12:55:00Z
5
value 0.00225
scoring_system epss
scoring_elements 0.45218
published_at 2026-04-09T12:55:00Z
6
value 0.00225
scoring_system epss
scoring_elements 0.45239
published_at 2026-04-11T12:55:00Z
7
value 0.00225
scoring_system epss
scoring_elements 0.45207
published_at 2026-04-12T12:55:00Z
8
value 0.00225
scoring_system epss
scoring_elements 0.45209
published_at 2026-04-13T12:55:00Z
9
value 0.00225
scoring_system epss
scoring_elements 0.4526
published_at 2026-04-16T12:55:00Z
10
value 0.00225
scoring_system epss
scoring_elements 0.45254
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-3265
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6664
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6664
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3238
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3238
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3243
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3243
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3244
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3244
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3257
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3257
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3258
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3258
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3265
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3265
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3291
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3291
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3312
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3312
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3313
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3313
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3317
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3317
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3318
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3318
14
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv2
scoring_elements AV:L/AC:H/Au:S/C:C/I:N/A:C
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1414423
reference_id 1414423
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1414423
16
reference_url http://www.securityfocus.com/bid/95520
reference_id 95520
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:05Z/
url http://www.securityfocus.com/bid/95520
17
reference_url http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
reference_id cpujan2017-2881727.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:05Z/
url http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
18
reference_url http://www.debian.org/security/2017/dsa-3767
reference_id dsa-3767
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:05Z/
url http://www.debian.org/security/2017/dsa-3767
19
reference_url http://www.debian.org/security/2017/dsa-3770
reference_id dsa-3770
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:05Z/
url http://www.debian.org/security/2017/dsa-3770
20
reference_url https://security.gentoo.org/glsa/201702-17
reference_id GLSA-201702-17
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:05Z/
url https://security.gentoo.org/glsa/201702-17
21
reference_url https://security.gentoo.org/glsa/201702-18
reference_id GLSA-201702-18
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:05Z/
url https://security.gentoo.org/glsa/201702-18
22
reference_url https://access.redhat.com/errata/RHSA-2017:2192
reference_id RHSA-2017:2192
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:05Z/
url https://access.redhat.com/errata/RHSA-2017:2192
23
reference_url https://access.redhat.com/errata/RHSA-2017:2787
reference_id RHSA-2017:2787
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:05Z/
url https://access.redhat.com/errata/RHSA-2017:2787
24
reference_url https://access.redhat.com/errata/RHSA-2018:0279
reference_id RHSA-2018:0279
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:05Z/
url https://access.redhat.com/errata/RHSA-2018:0279
25
reference_url https://access.redhat.com/errata/RHSA-2018:0574
reference_id RHSA-2018:0574
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:05Z/
url https://access.redhat.com/errata/RHSA-2018:0574
26
reference_url https://usn.ubuntu.com/3174-1/
reference_id USN-3174-1
reference_type
scores
url https://usn.ubuntu.com/3174-1/
fixed_packages
0
url pkg:deb/debian/mariadb-10.0@10.0.30-0%2Bdeb8u2
purl pkg:deb/debian/mariadb-10.0@10.0.30-0%2Bdeb8u2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1gmc-pj6y-rkfx
1
vulnerability VCID-4yz4-vxnh-b3dp
2
vulnerability VCID-5sjj-599v-vybg
3
vulnerability VCID-6g4n-3xfu-hfee
4
vulnerability VCID-6muh-rg1z-pqab
5
vulnerability VCID-bhxk-8byp-eyap
6
vulnerability VCID-ej67-ayfh-sqdt
7
vulnerability VCID-jgff-4jyp-9fgr
8
vulnerability VCID-mde2-1ynu-auh2
9
vulnerability VCID-v4gv-g9n5-ukgc
10
vulnerability VCID-yx79-3g2x-pqex
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.0@10.0.30-0%252Bdeb8u2
aliases CVE-2017-3265
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4cnj-7fur-3qe3
4
url VCID-8djb-knkk-s3c8
vulnerability_id VCID-8djb-knkk-s3c8
summary
Multiple vulnerabilities have been found in MariaDB, the worst of
    which could lead to privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-6664.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-6664.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-6664
reference_id
reference_type
scores
0
value 0.54393
scoring_system epss
scoring_elements 0.98006
published_at 2026-04-01T12:55:00Z
1
value 0.54393
scoring_system epss
scoring_elements 0.9803
published_at 2026-04-21T12:55:00Z
2
value 0.54393
scoring_system epss
scoring_elements 0.98025
published_at 2026-04-13T12:55:00Z
3
value 0.54393
scoring_system epss
scoring_elements 0.98032
published_at 2026-04-18T12:55:00Z
4
value 0.54393
scoring_system epss
scoring_elements 0.98011
published_at 2026-04-02T12:55:00Z
5
value 0.54393
scoring_system epss
scoring_elements 0.98014
published_at 2026-04-04T12:55:00Z
6
value 0.54393
scoring_system epss
scoring_elements 0.98015
published_at 2026-04-07T12:55:00Z
7
value 0.54393
scoring_system epss
scoring_elements 0.9802
published_at 2026-04-09T12:55:00Z
8
value 0.54393
scoring_system epss
scoring_elements 0.98024
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-6664
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6664
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6664
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3238
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3238
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3243
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3243
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3244
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3244
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3257
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3257
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3258
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3258
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3265
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3265
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3291
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3291
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3312
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3312
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3317
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3317
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3318
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3318
13
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:S/C:C/I:C/A:C
1
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
14
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1386564
reference_id 1386564
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1386564
15
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/40679.sh
reference_id CVE-2016-6664;CVE-2016-5617
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/40679.sh
16
reference_url https://legalhackers.com/advisories/MySQL-Maria-Percona-RootPrivEsc-CVE-2016-6664-5617-Exploit.html
reference_id CVE-2016-6664;CVE-2016-5617
reference_type exploit
scores
url https://legalhackers.com/advisories/MySQL-Maria-Percona-RootPrivEsc-CVE-2016-6664-5617-Exploit.html
17
reference_url https://security.gentoo.org/glsa/201702-18
reference_id GLSA-201702-18
reference_type
scores
url https://security.gentoo.org/glsa/201702-18
18
reference_url https://access.redhat.com/errata/RHSA-2016:2130
reference_id RHSA-2016:2130
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2130
19
reference_url https://access.redhat.com/errata/RHSA-2016:2749
reference_id RHSA-2016:2749
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2749
20
reference_url https://access.redhat.com/errata/RHSA-2017:2192
reference_id RHSA-2017:2192
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:2192
21
reference_url https://access.redhat.com/errata/RHSA-2018:0279
reference_id RHSA-2018:0279
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:0279
22
reference_url https://access.redhat.com/errata/RHSA-2018:0574
reference_id RHSA-2018:0574
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:0574
fixed_packages
0
url pkg:deb/debian/mariadb-10.0@10.0.30-0%2Bdeb8u2
purl pkg:deb/debian/mariadb-10.0@10.0.30-0%2Bdeb8u2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1gmc-pj6y-rkfx
1
vulnerability VCID-4yz4-vxnh-b3dp
2
vulnerability VCID-5sjj-599v-vybg
3
vulnerability VCID-6g4n-3xfu-hfee
4
vulnerability VCID-6muh-rg1z-pqab
5
vulnerability VCID-bhxk-8byp-eyap
6
vulnerability VCID-ej67-ayfh-sqdt
7
vulnerability VCID-jgff-4jyp-9fgr
8
vulnerability VCID-mde2-1ynu-auh2
9
vulnerability VCID-v4gv-g9n5-ukgc
10
vulnerability VCID-yx79-3g2x-pqex
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.0@10.0.30-0%252Bdeb8u2
aliases CVE-2016-6664
risk_score 10.0
exploitability 2.0
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8djb-knkk-s3c8
5
url VCID-8krv-jqjg-uqc8
vulnerability_id VCID-8krv-jqjg-uqc8
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7440.json
reference_id
reference_type
scores
0
value 5.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7440.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-7440
reference_id
reference_type
scores
0
value 0.0008
scoring_system epss
scoring_elements 0.23554
published_at 2026-04-01T12:55:00Z
1
value 0.0008
scoring_system epss
scoring_elements 0.23711
published_at 2026-04-02T12:55:00Z
2
value 0.0008
scoring_system epss
scoring_elements 0.23754
published_at 2026-04-04T12:55:00Z
3
value 0.0008
scoring_system epss
scoring_elements 0.23535
published_at 2026-04-07T12:55:00Z
4
value 0.0008
scoring_system epss
scoring_elements 0.23606
published_at 2026-04-08T12:55:00Z
5
value 0.0008
scoring_system epss
scoring_elements 0.23651
published_at 2026-04-09T12:55:00Z
6
value 0.0008
scoring_system epss
scoring_elements 0.23667
published_at 2026-04-11T12:55:00Z
7
value 0.0008
scoring_system epss
scoring_elements 0.23625
published_at 2026-04-12T12:55:00Z
8
value 0.0008
scoring_system epss
scoring_elements 0.23568
published_at 2026-04-13T12:55:00Z
9
value 0.0008
scoring_system epss
scoring_elements 0.2358
published_at 2026-04-16T12:55:00Z
10
value 0.0008
scoring_system epss
scoring_elements 0.23569
published_at 2026-04-18T12:55:00Z
11
value 0.0008
scoring_system epss
scoring_elements 0.2355
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-7440
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3492
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3492
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5584
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5584
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5624
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5624
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5626
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5626
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5629
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5629
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6663
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6663
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7440
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7440
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8283
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8283
10
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4
scoring_system cvssv2
scoring_elements AV:L/AC:H/Au:N/C:C/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1386584
reference_id 1386584
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1386584
12
reference_url https://usn.ubuntu.com/3109-1/
reference_id USN-3109-1
reference_type
scores
url https://usn.ubuntu.com/3109-1/
fixed_packages
0
url pkg:deb/debian/mariadb-10.0@10.0.30-0%2Bdeb8u2
purl pkg:deb/debian/mariadb-10.0@10.0.30-0%2Bdeb8u2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1gmc-pj6y-rkfx
1
vulnerability VCID-4yz4-vxnh-b3dp
2
vulnerability VCID-5sjj-599v-vybg
3
vulnerability VCID-6g4n-3xfu-hfee
4
vulnerability VCID-6muh-rg1z-pqab
5
vulnerability VCID-bhxk-8byp-eyap
6
vulnerability VCID-ej67-ayfh-sqdt
7
vulnerability VCID-jgff-4jyp-9fgr
8
vulnerability VCID-mde2-1ynu-auh2
9
vulnerability VCID-v4gv-g9n5-ukgc
10
vulnerability VCID-yx79-3g2x-pqex
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.0@10.0.30-0%252Bdeb8u2
aliases CVE-2016-7440
risk_score 2.3
exploitability 0.5
weighted_severity 4.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8krv-jqjg-uqc8
6
url VCID-8kvb-5u8c-zbc4
vulnerability_id VCID-8kvb-5u8c-zbc4
summary
Multiple vulnerabilities have been found in MariaDB and MySQL, the
    worst of which could lead to the remote execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5584.json
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5584.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-5584
reference_id
reference_type
scores
0
value 0.00442
scoring_system epss
scoring_elements 0.63214
published_at 2026-04-01T12:55:00Z
1
value 0.00442
scoring_system epss
scoring_elements 0.63324
published_at 2026-04-21T12:55:00Z
2
value 0.00442
scoring_system epss
scoring_elements 0.63302
published_at 2026-04-13T12:55:00Z
3
value 0.00442
scoring_system epss
scoring_elements 0.63268
published_at 2026-04-07T12:55:00Z
4
value 0.00442
scoring_system epss
scoring_elements 0.63319
published_at 2026-04-08T12:55:00Z
5
value 0.00442
scoring_system epss
scoring_elements 0.63337
published_at 2026-04-16T12:55:00Z
6
value 0.00442
scoring_system epss
scoring_elements 0.63355
published_at 2026-04-11T12:55:00Z
7
value 0.00442
scoring_system epss
scoring_elements 0.63338
published_at 2026-04-12T12:55:00Z
8
value 0.00442
scoring_system epss
scoring_elements 0.63345
published_at 2026-04-18T12:55:00Z
9
value 0.00442
scoring_system epss
scoring_elements 0.63273
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-5584
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3492
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3492
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5584
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5584
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5624
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5624
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5626
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5626
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5629
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5629
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6663
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6663
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7440
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7440
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8283
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8283
10
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:S/C:C/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
11
reference_url http://www.securitytracker.com/id/1037050
reference_id 1037050
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:08Z/
url http://www.securitytracker.com/id/1037050
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1386557
reference_id 1386557
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1386557
13
reference_url http://www.securityfocus.com/bid/93735
reference_id 93735
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:08Z/
url http://www.securityfocus.com/bid/93735
14
reference_url http://www.debian.org/security/2016/dsa-3706
reference_id dsa-3706
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:08Z/
url http://www.debian.org/security/2016/dsa-3706
15
reference_url https://security.gentoo.org/glsa/201701-01
reference_id GLSA-201701-01
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:08Z/
url https://security.gentoo.org/glsa/201701-01
16
reference_url https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/
reference_id mariadb-10028-release-notes
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:08Z/
url https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/
17
reference_url https://usn.ubuntu.com/3109-1/
reference_id USN-3109-1
reference_type
scores
url https://usn.ubuntu.com/3109-1/
fixed_packages
0
url pkg:deb/debian/mariadb-10.0@10.0.30-0%2Bdeb8u2
purl pkg:deb/debian/mariadb-10.0@10.0.30-0%2Bdeb8u2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1gmc-pj6y-rkfx
1
vulnerability VCID-4yz4-vxnh-b3dp
2
vulnerability VCID-5sjj-599v-vybg
3
vulnerability VCID-6g4n-3xfu-hfee
4
vulnerability VCID-6muh-rg1z-pqab
5
vulnerability VCID-bhxk-8byp-eyap
6
vulnerability VCID-ej67-ayfh-sqdt
7
vulnerability VCID-jgff-4jyp-9fgr
8
vulnerability VCID-mde2-1ynu-auh2
9
vulnerability VCID-v4gv-g9n5-ukgc
10
vulnerability VCID-yx79-3g2x-pqex
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.0@10.0.30-0%252Bdeb8u2
aliases CVE-2016-5584
risk_score 2.0
exploitability 0.5
weighted_severity 4.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8kvb-5u8c-zbc4
7
url VCID-8sya-wktg-dqa5
vulnerability_id VCID-8sya-wktg-dqa5
summary security update
references
0
reference_url http://lists.opensuse.org/opensuse-updates/2016-09/msg00042.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:47:35Z/
url http://lists.opensuse.org/opensuse-updates/2016-09/msg00042.html
1
reference_url http://rhn.redhat.com/errata/RHSA-2016-1480.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:47:35Z/
url http://rhn.redhat.com/errata/RHSA-2016-1480.html
2
reference_url http://rhn.redhat.com/errata/RHSA-2016-1601.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:47:35Z/
url http://rhn.redhat.com/errata/RHSA-2016-1601.html
3
reference_url http://rhn.redhat.com/errata/RHSA-2016-1602.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:47:35Z/
url http://rhn.redhat.com/errata/RHSA-2016-1602.html
4
reference_url http://rhn.redhat.com/errata/RHSA-2016-1603.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:47:35Z/
url http://rhn.redhat.com/errata/RHSA-2016-1603.html
5
reference_url http://rhn.redhat.com/errata/RHSA-2016-1604.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:47:35Z/
url http://rhn.redhat.com/errata/RHSA-2016-1604.html
6
reference_url http://rhn.redhat.com/errata/RHSA-2016-1637.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:47:35Z/
url http://rhn.redhat.com/errata/RHSA-2016-1637.html
7
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5440.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5440.json
8
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-5440
reference_id
reference_type
scores
0
value 0.00854
scoring_system epss
scoring_elements 0.74934
published_at 2026-04-08T12:55:00Z
1
value 0.00854
scoring_system epss
scoring_elements 0.74938
published_at 2026-04-13T12:55:00Z
2
value 0.00854
scoring_system epss
scoring_elements 0.74947
published_at 2026-04-12T12:55:00Z
3
value 0.00854
scoring_system epss
scoring_elements 0.74969
published_at 2026-04-11T12:55:00Z
4
value 0.00854
scoring_system epss
scoring_elements 0.74897
published_at 2026-04-01T12:55:00Z
5
value 0.00854
scoring_system epss
scoring_elements 0.74898
published_at 2026-04-02T12:55:00Z
6
value 0.00854
scoring_system epss
scoring_elements 0.74927
published_at 2026-04-04T12:55:00Z
7
value 0.00854
scoring_system epss
scoring_elements 0.749
published_at 2026-04-07T12:55:00Z
8
value 0.00854
scoring_system epss
scoring_elements 0.74946
published_at 2026-04-09T12:55:00Z
9
value 0.00854
scoring_system epss
scoring_elements 0.74974
published_at 2026-04-21T12:55:00Z
10
value 0.00854
scoring_system epss
scoring_elements 0.74982
published_at 2026-04-18T12:55:00Z
11
value 0.00854
scoring_system epss
scoring_elements 0.74975
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-5440
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3477
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3477
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3521
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3521
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3615
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3615
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5440
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5440
13
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:C
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
14
reference_url https://mariadb.com/kb/en/mariadb/mariadb-10026-release-notes/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:47:35Z/
url https://mariadb.com/kb/en/mariadb/mariadb-10026-release-notes/
15
reference_url https://mariadb.com/kb/en/mariadb/mariadb-10115-release-notes/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:47:35Z/
url https://mariadb.com/kb/en/mariadb/mariadb-10115-release-notes/
16
reference_url https://mariadb.com/kb/en/mariadb/mariadb-5550-release-notes/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:47:35Z/
url https://mariadb.com/kb/en/mariadb/mariadb-5550-release-notes/
17
reference_url http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:47:35Z/
url http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168
18
reference_url http://www.debian.org/security/2016/dsa-3624
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:47:35Z/
url http://www.debian.org/security/2016/dsa-3624
19
reference_url http://www.debian.org/security/2016/dsa-3632
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:47:35Z/
url http://www.debian.org/security/2016/dsa-3632
20
reference_url http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:47:35Z/
url http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
21
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:47:35Z/
url http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
22
reference_url http://www.securityfocus.com/bid/91787
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:47:35Z/
url http://www.securityfocus.com/bid/91787
23
reference_url http://www.securityfocus.com/bid/91953
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:47:35Z/
url http://www.securityfocus.com/bid/91953
24
reference_url http://www.securitytracker.com/id/1036362
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:47:35Z/
url http://www.securitytracker.com/id/1036362
25
reference_url http://www.ubuntu.com/usn/USN-3040-1
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:47:35Z/
url http://www.ubuntu.com/usn/USN-3040-1
26
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1358218
reference_id 1358218
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1358218
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:powerkvm:2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ibm:powerkvm:2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:powerkvm:2.1:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:powerkvm:3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ibm:powerkvm:3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:powerkvm:3.1:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-5440
reference_id CVE-2016-5440
reference_type
scores
0
value 4.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:P
1
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2016-5440
51
reference_url https://access.redhat.com/errata/RHSA-2016:1480
reference_id RHSA-2016:1480
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1480
52
reference_url https://access.redhat.com/errata/RHSA-2016:1601
reference_id RHSA-2016:1601
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1601
53
reference_url https://access.redhat.com/errata/RHSA-2016:1602
reference_id RHSA-2016:1602
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1602
54
reference_url https://access.redhat.com/errata/RHSA-2016:1603
reference_id RHSA-2016:1603
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1603
55
reference_url https://access.redhat.com/errata/RHSA-2016:1604
reference_id RHSA-2016:1604
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1604
56
reference_url https://access.redhat.com/errata/RHSA-2016:1637
reference_id RHSA-2016:1637
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1637
57
reference_url https://usn.ubuntu.com/3040-1/
reference_id USN-3040-1
reference_type
scores
url https://usn.ubuntu.com/3040-1/
fixed_packages
0
url pkg:deb/debian/mariadb-10.0@10.0.30-0%2Bdeb8u2
purl pkg:deb/debian/mariadb-10.0@10.0.30-0%2Bdeb8u2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1gmc-pj6y-rkfx
1
vulnerability VCID-4yz4-vxnh-b3dp
2
vulnerability VCID-5sjj-599v-vybg
3
vulnerability VCID-6g4n-3xfu-hfee
4
vulnerability VCID-6muh-rg1z-pqab
5
vulnerability VCID-bhxk-8byp-eyap
6
vulnerability VCID-ej67-ayfh-sqdt
7
vulnerability VCID-jgff-4jyp-9fgr
8
vulnerability VCID-mde2-1ynu-auh2
9
vulnerability VCID-v4gv-g9n5-ukgc
10
vulnerability VCID-yx79-3g2x-pqex
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.0@10.0.30-0%252Bdeb8u2
aliases CVE-2016-5440
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8sya-wktg-dqa5
8
url VCID-9f48-53dz-13an
vulnerability_id VCID-9f48-53dz-13an
summary
Multiple vulnerabilities have been found in MariaDB, the worst of
    which could lead to privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3318.json
reference_id
reference_type
scores
0
value 4.0
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3318.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-3318
reference_id
reference_type
scores
0
value 0.00052
scoring_system epss
scoring_elements 0.16349
published_at 2026-04-21T12:55:00Z
1
value 0.00052
scoring_system epss
scoring_elements 0.16472
published_at 2026-04-02T12:55:00Z
2
value 0.00052
scoring_system epss
scoring_elements 0.16533
published_at 2026-04-04T12:55:00Z
3
value 0.00052
scoring_system epss
scoring_elements 0.1633
published_at 2026-04-07T12:55:00Z
4
value 0.00052
scoring_system epss
scoring_elements 0.16416
published_at 2026-04-08T12:55:00Z
5
value 0.00052
scoring_system epss
scoring_elements 0.16474
published_at 2026-04-09T12:55:00Z
6
value 0.00052
scoring_system epss
scoring_elements 0.16459
published_at 2026-04-11T12:55:00Z
7
value 0.00052
scoring_system epss
scoring_elements 0.16419
published_at 2026-04-12T12:55:00Z
8
value 0.00052
scoring_system epss
scoring_elements 0.16358
published_at 2026-04-13T12:55:00Z
9
value 0.00052
scoring_system epss
scoring_elements 0.16294
published_at 2026-04-16T12:55:00Z
10
value 0.00052
scoring_system epss
scoring_elements 0.16314
published_at 2026-04-18T12:55:00Z
11
value 0.00052
scoring_system epss
scoring_elements 0.1629
published_at 2026-04-01T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-3318
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6664
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6664
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3238
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3238
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3243
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3243
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3244
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3244
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3257
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3257
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3258
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3258
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3265
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3265
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3291
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3291
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3312
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3312
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3313
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3313
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3317
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3317
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3318
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3318
14
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 1
scoring_system cvssv2
scoring_elements AV:L/AC:H/Au:S/C:P/I:N/A:N
1
value 4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1414357
reference_id 1414357
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1414357
16
reference_url http://www.securityfocus.com/bid/95588
reference_id 95588
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-08T20:09:30Z/
url http://www.securityfocus.com/bid/95588
17
reference_url http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
reference_id cpujan2017-2881727.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-08T20:09:30Z/
url http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
18
reference_url http://www.debian.org/security/2017/dsa-3767
reference_id dsa-3767
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-08T20:09:30Z/
url http://www.debian.org/security/2017/dsa-3767
19
reference_url http://www.debian.org/security/2017/dsa-3770
reference_id dsa-3770
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-08T20:09:30Z/
url http://www.debian.org/security/2017/dsa-3770
20
reference_url https://security.gentoo.org/glsa/201702-17
reference_id GLSA-201702-17
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-08T20:09:30Z/
url https://security.gentoo.org/glsa/201702-17
21
reference_url https://security.gentoo.org/glsa/201702-18
reference_id GLSA-201702-18
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-08T20:09:30Z/
url https://security.gentoo.org/glsa/201702-18
22
reference_url https://access.redhat.com/errata/RHSA-2017:2192
reference_id RHSA-2017:2192
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-08T20:09:30Z/
url https://access.redhat.com/errata/RHSA-2017:2192
23
reference_url https://access.redhat.com/errata/RHSA-2017:2787
reference_id RHSA-2017:2787
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-08T20:09:30Z/
url https://access.redhat.com/errata/RHSA-2017:2787
24
reference_url https://access.redhat.com/errata/RHSA-2017:2886
reference_id RHSA-2017:2886
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-08T20:09:30Z/
url https://access.redhat.com/errata/RHSA-2017:2886
25
reference_url https://access.redhat.com/errata/RHSA-2018:0279
reference_id RHSA-2018:0279
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-08T20:09:30Z/
url https://access.redhat.com/errata/RHSA-2018:0279
26
reference_url https://access.redhat.com/errata/RHSA-2018:0574
reference_id RHSA-2018:0574
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-08T20:09:30Z/
url https://access.redhat.com/errata/RHSA-2018:0574
27
reference_url https://usn.ubuntu.com/3174-1/
reference_id USN-3174-1
reference_type
scores
url https://usn.ubuntu.com/3174-1/
fixed_packages
0
url pkg:deb/debian/mariadb-10.0@10.0.30-0%2Bdeb8u2
purl pkg:deb/debian/mariadb-10.0@10.0.30-0%2Bdeb8u2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1gmc-pj6y-rkfx
1
vulnerability VCID-4yz4-vxnh-b3dp
2
vulnerability VCID-5sjj-599v-vybg
3
vulnerability VCID-6g4n-3xfu-hfee
4
vulnerability VCID-6muh-rg1z-pqab
5
vulnerability VCID-bhxk-8byp-eyap
6
vulnerability VCID-ej67-ayfh-sqdt
7
vulnerability VCID-jgff-4jyp-9fgr
8
vulnerability VCID-mde2-1ynu-auh2
9
vulnerability VCID-v4gv-g9n5-ukgc
10
vulnerability VCID-yx79-3g2x-pqex
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.0@10.0.30-0%252Bdeb8u2
aliases CVE-2017-3318
risk_score 1.8
exploitability 0.5
weighted_severity 3.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9f48-53dz-13an
9
url VCID-9ff2-43rk-2ydj
vulnerability_id VCID-9ff2-43rk-2ydj
summary security update
references
0
reference_url http://lists.opensuse.org/opensuse-updates/2016-09/msg00042.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:49:14Z/
url http://lists.opensuse.org/opensuse-updates/2016-09/msg00042.html
1
reference_url http://rhn.redhat.com/errata/RHSA-2016-1480.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:49:14Z/
url http://rhn.redhat.com/errata/RHSA-2016-1480.html
2
reference_url http://rhn.redhat.com/errata/RHSA-2016-1601.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:49:14Z/
url http://rhn.redhat.com/errata/RHSA-2016-1601.html
3
reference_url http://rhn.redhat.com/errata/RHSA-2016-1602.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:49:14Z/
url http://rhn.redhat.com/errata/RHSA-2016-1602.html
4
reference_url http://rhn.redhat.com/errata/RHSA-2016-1603.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:49:14Z/
url http://rhn.redhat.com/errata/RHSA-2016-1603.html
5
reference_url http://rhn.redhat.com/errata/RHSA-2016-1604.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:49:14Z/
url http://rhn.redhat.com/errata/RHSA-2016-1604.html
6
reference_url http://rhn.redhat.com/errata/RHSA-2016-1637.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:49:14Z/
url http://rhn.redhat.com/errata/RHSA-2016-1637.html
7
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3521.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3521.json
8
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-3521
reference_id
reference_type
scores
0
value 0.01349
scoring_system epss
scoring_elements 0.80089
published_at 2026-04-08T12:55:00Z
1
value 0.01349
scoring_system epss
scoring_elements 0.80092
published_at 2026-04-13T12:55:00Z
2
value 0.01349
scoring_system epss
scoring_elements 0.80101
published_at 2026-04-12T12:55:00Z
3
value 0.01349
scoring_system epss
scoring_elements 0.80116
published_at 2026-04-11T12:55:00Z
4
value 0.01349
scoring_system epss
scoring_elements 0.80097
published_at 2026-04-09T12:55:00Z
5
value 0.01349
scoring_system epss
scoring_elements 0.80043
published_at 2026-04-01T12:55:00Z
6
value 0.01349
scoring_system epss
scoring_elements 0.80051
published_at 2026-04-02T12:55:00Z
7
value 0.01349
scoring_system epss
scoring_elements 0.80072
published_at 2026-04-04T12:55:00Z
8
value 0.01349
scoring_system epss
scoring_elements 0.80061
published_at 2026-04-07T12:55:00Z
9
value 0.01349
scoring_system epss
scoring_elements 0.80124
published_at 2026-04-21T12:55:00Z
10
value 0.01349
scoring_system epss
scoring_elements 0.80122
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-3521
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3477
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3477
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3521
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3521
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3615
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3615
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5440
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5440
13
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:C
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
14
reference_url https://mariadb.com/kb/en/mariadb/mariadb-10026-release-notes/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:49:14Z/
url https://mariadb.com/kb/en/mariadb/mariadb-10026-release-notes/
15
reference_url https://mariadb.com/kb/en/mariadb/mariadb-10115-release-notes/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:49:14Z/
url https://mariadb.com/kb/en/mariadb/mariadb-10115-release-notes/
16
reference_url https://mariadb.com/kb/en/mariadb/mariadb-5550-release-notes/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:49:14Z/
url https://mariadb.com/kb/en/mariadb/mariadb-5550-release-notes/
17
reference_url http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:49:14Z/
url http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168
18
reference_url http://www.debian.org/security/2016/dsa-3624
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:49:14Z/
url http://www.debian.org/security/2016/dsa-3624
19
reference_url http://www.debian.org/security/2016/dsa-3632
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:49:14Z/
url http://www.debian.org/security/2016/dsa-3632
20
reference_url http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:49:14Z/
url http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
21
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:49:14Z/
url http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
22
reference_url http://www.securityfocus.com/bid/91787
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:49:14Z/
url http://www.securityfocus.com/bid/91787
23
reference_url http://www.securityfocus.com/bid/91932
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:49:14Z/
url http://www.securityfocus.com/bid/91932
24
reference_url http://www.securitytracker.com/id/1036362
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:49:14Z/
url http://www.securitytracker.com/id/1036362
25
reference_url http://www.ubuntu.com/usn/USN-3040-1
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:49:14Z/
url http://www.ubuntu.com/usn/USN-3040-1
26
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1358209
reference_id 1358209
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1358209
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:powerkvm:2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ibm:powerkvm:2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:powerkvm:2.1:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:powerkvm:3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ibm:powerkvm:3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:powerkvm:3.1:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-3521
reference_id CVE-2016-3521
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:C
1
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2016-3521
38
reference_url https://access.redhat.com/errata/RHSA-2016:1480
reference_id RHSA-2016:1480
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1480
39
reference_url https://access.redhat.com/errata/RHSA-2016:1601
reference_id RHSA-2016:1601
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1601
40
reference_url https://access.redhat.com/errata/RHSA-2016:1602
reference_id RHSA-2016:1602
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1602
41
reference_url https://access.redhat.com/errata/RHSA-2016:1603
reference_id RHSA-2016:1603
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1603
42
reference_url https://access.redhat.com/errata/RHSA-2016:1604
reference_id RHSA-2016:1604
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1604
43
reference_url https://access.redhat.com/errata/RHSA-2016:1637
reference_id RHSA-2016:1637
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1637
44
reference_url https://usn.ubuntu.com/3040-1/
reference_id USN-3040-1
reference_type
scores
url https://usn.ubuntu.com/3040-1/
fixed_packages
0
url pkg:deb/debian/mariadb-10.0@10.0.30-0%2Bdeb8u2
purl pkg:deb/debian/mariadb-10.0@10.0.30-0%2Bdeb8u2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1gmc-pj6y-rkfx
1
vulnerability VCID-4yz4-vxnh-b3dp
2
vulnerability VCID-5sjj-599v-vybg
3
vulnerability VCID-6g4n-3xfu-hfee
4
vulnerability VCID-6muh-rg1z-pqab
5
vulnerability VCID-bhxk-8byp-eyap
6
vulnerability VCID-ej67-ayfh-sqdt
7
vulnerability VCID-jgff-4jyp-9fgr
8
vulnerability VCID-mde2-1ynu-auh2
9
vulnerability VCID-v4gv-g9n5-ukgc
10
vulnerability VCID-yx79-3g2x-pqex
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.0@10.0.30-0%252Bdeb8u2
aliases CVE-2016-3521
risk_score 3.0
exploitability 0.5
weighted_severity 6.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9ff2-43rk-2ydj
10
url VCID-9w98-nfg2-muh2
vulnerability_id VCID-9w98-nfg2-muh2
summary
Multiple vulnerabilities have been found in MariaDB, the worst of
    which could lead to privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3238.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3238.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-3238
reference_id
reference_type
scores
0
value 0.02525
scoring_system epss
scoring_elements 0.85452
published_at 2026-04-21T12:55:00Z
1
value 0.02525
scoring_system epss
scoring_elements 0.85353
published_at 2026-04-01T12:55:00Z
2
value 0.02525
scoring_system epss
scoring_elements 0.85366
published_at 2026-04-02T12:55:00Z
3
value 0.02525
scoring_system epss
scoring_elements 0.85387
published_at 2026-04-07T12:55:00Z
4
value 0.02525
scoring_system epss
scoring_elements 0.85409
published_at 2026-04-08T12:55:00Z
5
value 0.02525
scoring_system epss
scoring_elements 0.85417
published_at 2026-04-09T12:55:00Z
6
value 0.02525
scoring_system epss
scoring_elements 0.85432
published_at 2026-04-11T12:55:00Z
7
value 0.02525
scoring_system epss
scoring_elements 0.8543
published_at 2026-04-12T12:55:00Z
8
value 0.02525
scoring_system epss
scoring_elements 0.85427
published_at 2026-04-13T12:55:00Z
9
value 0.02525
scoring_system epss
scoring_elements 0.85451
published_at 2026-04-16T12:55:00Z
10
value 0.02525
scoring_system epss
scoring_elements 0.85455
published_at 2026-04-18T12:55:00Z
11
value 0.02525
scoring_system epss
scoring_elements 0.85385
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-3238
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6664
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6664
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3238
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3238
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3243
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3243
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3244
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3244
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3257
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3257
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3258
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3258
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3265
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3265
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3291
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3291
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3312
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3312
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3313
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3313
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3317
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3317
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3318
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3318
14
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:C
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1414338
reference_id 1414338
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1414338
16
reference_url http://www.securityfocus.com/bid/95571
reference_id 95571
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:35Z/
url http://www.securityfocus.com/bid/95571
17
reference_url http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
reference_id cpujan2017-2881727.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:35Z/
url http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
18
reference_url http://www.debian.org/security/2017/dsa-3767
reference_id dsa-3767
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:35Z/
url http://www.debian.org/security/2017/dsa-3767
19
reference_url http://www.debian.org/security/2017/dsa-3770
reference_id dsa-3770
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:35Z/
url http://www.debian.org/security/2017/dsa-3770
20
reference_url https://security.gentoo.org/glsa/201702-17
reference_id GLSA-201702-17
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:35Z/
url https://security.gentoo.org/glsa/201702-17
21
reference_url https://security.gentoo.org/glsa/201702-18
reference_id GLSA-201702-18
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:35Z/
url https://security.gentoo.org/glsa/201702-18
22
reference_url https://access.redhat.com/errata/RHSA-2017:2192
reference_id RHSA-2017:2192
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:35Z/
url https://access.redhat.com/errata/RHSA-2017:2192
23
reference_url https://access.redhat.com/errata/RHSA-2017:2787
reference_id RHSA-2017:2787
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:35Z/
url https://access.redhat.com/errata/RHSA-2017:2787
24
reference_url https://access.redhat.com/errata/RHSA-2017:2886
reference_id RHSA-2017:2886
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:35Z/
url https://access.redhat.com/errata/RHSA-2017:2886
25
reference_url https://access.redhat.com/errata/RHSA-2018:0279
reference_id RHSA-2018:0279
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:35Z/
url https://access.redhat.com/errata/RHSA-2018:0279
26
reference_url https://access.redhat.com/errata/RHSA-2018:0574
reference_id RHSA-2018:0574
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:35Z/
url https://access.redhat.com/errata/RHSA-2018:0574
27
reference_url https://usn.ubuntu.com/3174-1/
reference_id USN-3174-1
reference_type
scores
url https://usn.ubuntu.com/3174-1/
fixed_packages
0
url pkg:deb/debian/mariadb-10.0@10.0.30-0%2Bdeb8u2
purl pkg:deb/debian/mariadb-10.0@10.0.30-0%2Bdeb8u2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1gmc-pj6y-rkfx
1
vulnerability VCID-4yz4-vxnh-b3dp
2
vulnerability VCID-5sjj-599v-vybg
3
vulnerability VCID-6g4n-3xfu-hfee
4
vulnerability VCID-6muh-rg1z-pqab
5
vulnerability VCID-bhxk-8byp-eyap
6
vulnerability VCID-ej67-ayfh-sqdt
7
vulnerability VCID-jgff-4jyp-9fgr
8
vulnerability VCID-mde2-1ynu-auh2
9
vulnerability VCID-v4gv-g9n5-ukgc
10
vulnerability VCID-yx79-3g2x-pqex
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.0@10.0.30-0%252Bdeb8u2
aliases CVE-2017-3238
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9w98-nfg2-muh2
11
url VCID-g1pp-9qqg-1beb
vulnerability_id VCID-g1pp-9qqg-1beb
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-6663.json
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-6663.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-6663
reference_id
reference_type
scores
0
value 0.02334
scoring_system epss
scoring_elements 0.84802
published_at 2026-04-04T12:55:00Z
1
value 0.02334
scoring_system epss
scoring_elements 0.84768
published_at 2026-04-01T12:55:00Z
2
value 0.02334
scoring_system epss
scoring_elements 0.84783
published_at 2026-04-02T12:55:00Z
3
value 0.03137
scoring_system epss
scoring_elements 0.86886
published_at 2026-04-11T12:55:00Z
4
value 0.03137
scoring_system epss
scoring_elements 0.86882
published_at 2026-04-12T12:55:00Z
5
value 0.03137
scoring_system epss
scoring_elements 0.86877
published_at 2026-04-13T12:55:00Z
6
value 0.03137
scoring_system epss
scoring_elements 0.86894
published_at 2026-04-16T12:55:00Z
7
value 0.03137
scoring_system epss
scoring_elements 0.86899
published_at 2026-04-21T12:55:00Z
8
value 0.03137
scoring_system epss
scoring_elements 0.86845
published_at 2026-04-07T12:55:00Z
9
value 0.03137
scoring_system epss
scoring_elements 0.86865
published_at 2026-04-08T12:55:00Z
10
value 0.03137
scoring_system epss
scoring_elements 0.86873
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-6663
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3492
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3492
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5584
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5584
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5624
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5624
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5626
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5626
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5629
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5629
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6663
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6663
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7440
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7440
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8283
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8283
10
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.5
scoring_system cvssv2
scoring_elements AV:L/AC:H/Au:S/C:P/I:P/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1378936
reference_id 1378936
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1378936
12
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/40678.c
reference_id CVE-2016-6663;CVE-2016-5616
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/40678.c
13
reference_url https://legalhackers.com/advisories/MySQL-Maria-Percona-PrivEscRace-CVE-2016-6663-5616-Exploit.html
reference_id CVE-2016-6663;CVE-2016-5616
reference_type exploit
scores
url https://legalhackers.com/advisories/MySQL-Maria-Percona-PrivEscRace-CVE-2016-6663-5616-Exploit.html
14
reference_url https://access.redhat.com/errata/RHSA-2016:2130
reference_id RHSA-2016:2130
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2130
15
reference_url https://access.redhat.com/errata/RHSA-2016:2131
reference_id RHSA-2016:2131
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2131
16
reference_url https://access.redhat.com/errata/RHSA-2016:2595
reference_id RHSA-2016:2595
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2595
17
reference_url https://access.redhat.com/errata/RHSA-2016:2749
reference_id RHSA-2016:2749
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2749
18
reference_url https://access.redhat.com/errata/RHSA-2016:2927
reference_id RHSA-2016:2927
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2927
19
reference_url https://access.redhat.com/errata/RHSA-2016:2928
reference_id RHSA-2016:2928
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2928
20
reference_url https://access.redhat.com/errata/RHSA-2017:0184
reference_id RHSA-2017:0184
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:0184
fixed_packages
0
url pkg:deb/debian/mariadb-10.0@10.0.30-0%2Bdeb8u2
purl pkg:deb/debian/mariadb-10.0@10.0.30-0%2Bdeb8u2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1gmc-pj6y-rkfx
1
vulnerability VCID-4yz4-vxnh-b3dp
2
vulnerability VCID-5sjj-599v-vybg
3
vulnerability VCID-6g4n-3xfu-hfee
4
vulnerability VCID-6muh-rg1z-pqab
5
vulnerability VCID-bhxk-8byp-eyap
6
vulnerability VCID-ej67-ayfh-sqdt
7
vulnerability VCID-jgff-4jyp-9fgr
8
vulnerability VCID-mde2-1ynu-auh2
9
vulnerability VCID-v4gv-g9n5-ukgc
10
vulnerability VCID-yx79-3g2x-pqex
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.0@10.0.30-0%252Bdeb8u2
aliases CVE-2016-6663
risk_score 10.0
exploitability 2.0
weighted_severity 6.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-g1pp-9qqg-1beb
12
url VCID-gp4w-bdxg-6kab
vulnerability_id VCID-gp4w-bdxg-6kab
summary
Multiple vulnerabilities have been found in MariaDB and MySQL, the
    worst of which could lead to the remote execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5629.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5629.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-5629
reference_id
reference_type
scores
0
value 0.00501
scoring_system epss
scoring_elements 0.66025
published_at 2026-04-21T12:55:00Z
1
value 0.00501
scoring_system epss
scoring_elements 0.65913
published_at 2026-04-01T12:55:00Z
2
value 0.00501
scoring_system epss
scoring_elements 0.65984
published_at 2026-04-04T12:55:00Z
3
value 0.00501
scoring_system epss
scoring_elements 0.6595
published_at 2026-04-07T12:55:00Z
4
value 0.00501
scoring_system epss
scoring_elements 0.66001
published_at 2026-04-08T12:55:00Z
5
value 0.00501
scoring_system epss
scoring_elements 0.66013
published_at 2026-04-09T12:55:00Z
6
value 0.00501
scoring_system epss
scoring_elements 0.66032
published_at 2026-04-11T12:55:00Z
7
value 0.00501
scoring_system epss
scoring_elements 0.66019
published_at 2026-04-12T12:55:00Z
8
value 0.00501
scoring_system epss
scoring_elements 0.65989
published_at 2026-04-13T12:55:00Z
9
value 0.00501
scoring_system epss
scoring_elements 0.66024
published_at 2026-04-16T12:55:00Z
10
value 0.00501
scoring_system epss
scoring_elements 0.66038
published_at 2026-04-18T12:55:00Z
11
value 0.00501
scoring_system epss
scoring_elements 0.65954
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-5629
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3492
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3492
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5584
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5584
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5624
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5624
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5626
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5626
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5629
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5629
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6663
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6663
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7440
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7440
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8283
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8283
10
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:P
1
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
11
reference_url http://www.securitytracker.com/id/1037050
reference_id 1037050
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:33Z/
url http://www.securitytracker.com/id/1037050
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1386572
reference_id 1386572
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1386572
13
reference_url http://www.securityfocus.com/bid/93668
reference_id 93668
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:33Z/
url http://www.securityfocus.com/bid/93668
14
reference_url https://security.gentoo.org/glsa/201701-01
reference_id GLSA-201701-01
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:33Z/
url https://security.gentoo.org/glsa/201701-01
15
reference_url https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/
reference_id mariadb-10028-release-notes
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:33Z/
url https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/
16
reference_url https://mariadb.com/kb/en/mariadb/mariadb-10118-release-notes/
reference_id mariadb-10118-release-notes
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:33Z/
url https://mariadb.com/kb/en/mariadb/mariadb-10118-release-notes/
17
reference_url https://mariadb.com/kb/en/mariadb/mariadb-5552-release-notes/
reference_id mariadb-5552-release-notes
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:33Z/
url https://mariadb.com/kb/en/mariadb/mariadb-5552-release-notes/
18
reference_url https://access.redhat.com/errata/RHSA-2016:2130
reference_id RHSA-2016:2130
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2130
19
reference_url http://rhn.redhat.com/errata/RHSA-2016-2130.html
reference_id RHSA-2016-2130.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:33Z/
url http://rhn.redhat.com/errata/RHSA-2016-2130.html
20
reference_url https://access.redhat.com/errata/RHSA-2016:2131
reference_id RHSA-2016:2131
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2131
21
reference_url http://rhn.redhat.com/errata/RHSA-2016-2131.html
reference_id RHSA-2016-2131.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:33Z/
url http://rhn.redhat.com/errata/RHSA-2016-2131.html
22
reference_url https://access.redhat.com/errata/RHSA-2016:2595
reference_id RHSA-2016:2595
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2595
23
reference_url http://rhn.redhat.com/errata/RHSA-2016-2595.html
reference_id RHSA-2016-2595.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:33Z/
url http://rhn.redhat.com/errata/RHSA-2016-2595.html
24
reference_url https://access.redhat.com/errata/RHSA-2016:2749
reference_id RHSA-2016:2749
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2749
25
reference_url http://rhn.redhat.com/errata/RHSA-2016-2749.html
reference_id RHSA-2016-2749.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:33Z/
url http://rhn.redhat.com/errata/RHSA-2016-2749.html
26
reference_url https://access.redhat.com/errata/RHSA-2016:2927
reference_id RHSA-2016:2927
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2927
27
reference_url https://access.redhat.com/errata/RHSA-2016:2928
reference_id RHSA-2016:2928
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2928
fixed_packages
0
url pkg:deb/debian/mariadb-10.0@10.0.30-0%2Bdeb8u2
purl pkg:deb/debian/mariadb-10.0@10.0.30-0%2Bdeb8u2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1gmc-pj6y-rkfx
1
vulnerability VCID-4yz4-vxnh-b3dp
2
vulnerability VCID-5sjj-599v-vybg
3
vulnerability VCID-6g4n-3xfu-hfee
4
vulnerability VCID-6muh-rg1z-pqab
5
vulnerability VCID-bhxk-8byp-eyap
6
vulnerability VCID-ej67-ayfh-sqdt
7
vulnerability VCID-jgff-4jyp-9fgr
8
vulnerability VCID-mde2-1ynu-auh2
9
vulnerability VCID-v4gv-g9n5-ukgc
10
vulnerability VCID-yx79-3g2x-pqex
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.0@10.0.30-0%252Bdeb8u2
aliases CVE-2016-5629
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gp4w-bdxg-6kab
13
url VCID-mfgg-7s54-gqg8
vulnerability_id VCID-mfgg-7s54-gqg8
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5624.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5624.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-5624
reference_id
reference_type
scores
0
value 0.0069
scoring_system epss
scoring_elements 0.71806
published_at 2026-04-21T12:55:00Z
1
value 0.0069
scoring_system epss
scoring_elements 0.71734
published_at 2026-04-01T12:55:00Z
2
value 0.0069
scoring_system epss
scoring_elements 0.71735
published_at 2026-04-07T12:55:00Z
3
value 0.0069
scoring_system epss
scoring_elements 0.71774
published_at 2026-04-08T12:55:00Z
4
value 0.0069
scoring_system epss
scoring_elements 0.71785
published_at 2026-04-09T12:55:00Z
5
value 0.0069
scoring_system epss
scoring_elements 0.71809
published_at 2026-04-11T12:55:00Z
6
value 0.0069
scoring_system epss
scoring_elements 0.71792
published_at 2026-04-12T12:55:00Z
7
value 0.0069
scoring_system epss
scoring_elements 0.71775
published_at 2026-04-13T12:55:00Z
8
value 0.0069
scoring_system epss
scoring_elements 0.71817
published_at 2026-04-16T12:55:00Z
9
value 0.0069
scoring_system epss
scoring_elements 0.71823
published_at 2026-04-18T12:55:00Z
10
value 0.0069
scoring_system epss
scoring_elements 0.71741
published_at 2026-04-02T12:55:00Z
11
value 0.0069
scoring_system epss
scoring_elements 0.7176
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-5624
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3492
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3492
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5584
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5584
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5624
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5624
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5626
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5626
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5629
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5629
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6663
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6663
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7440
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7440
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8283
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8283
10
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:P
1
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
11
reference_url http://www.securitytracker.com/id/1037050
reference_id 1037050
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:38Z/
url http://www.securitytracker.com/id/1037050
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1386566
reference_id 1386566
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1386566
13
reference_url http://www.securityfocus.com/bid/93635
reference_id 93635
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:38Z/
url http://www.securityfocus.com/bid/93635
14
reference_url https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/
reference_id mariadb-10028-release-notes
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:38Z/
url https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/
15
reference_url https://mariadb.com/kb/en/mariadb/mariadb-10118-release-notes/
reference_id mariadb-10118-release-notes
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:38Z/
url https://mariadb.com/kb/en/mariadb/mariadb-10118-release-notes/
16
reference_url https://mariadb.com/kb/en/mariadb/mariadb-5552-release-notes/
reference_id mariadb-5552-release-notes
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:38Z/
url https://mariadb.com/kb/en/mariadb/mariadb-5552-release-notes/
17
reference_url https://access.redhat.com/errata/RHSA-2016:2130
reference_id RHSA-2016:2130
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2130
18
reference_url http://rhn.redhat.com/errata/RHSA-2016-2130.html
reference_id RHSA-2016-2130.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:38Z/
url http://rhn.redhat.com/errata/RHSA-2016-2130.html
19
reference_url https://access.redhat.com/errata/RHSA-2016:2131
reference_id RHSA-2016:2131
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2131
20
reference_url http://rhn.redhat.com/errata/RHSA-2016-2131.html
reference_id RHSA-2016-2131.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:38Z/
url http://rhn.redhat.com/errata/RHSA-2016-2131.html
21
reference_url https://access.redhat.com/errata/RHSA-2016:2595
reference_id RHSA-2016:2595
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2595
22
reference_url http://rhn.redhat.com/errata/RHSA-2016-2595.html
reference_id RHSA-2016-2595.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:38Z/
url http://rhn.redhat.com/errata/RHSA-2016-2595.html
23
reference_url https://access.redhat.com/errata/RHSA-2016:2927
reference_id RHSA-2016:2927
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2927
24
reference_url https://access.redhat.com/errata/RHSA-2016:2928
reference_id RHSA-2016:2928
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2928
fixed_packages
0
url pkg:deb/debian/mariadb-10.0@10.0.30-0%2Bdeb8u2
purl pkg:deb/debian/mariadb-10.0@10.0.30-0%2Bdeb8u2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1gmc-pj6y-rkfx
1
vulnerability VCID-4yz4-vxnh-b3dp
2
vulnerability VCID-5sjj-599v-vybg
3
vulnerability VCID-6g4n-3xfu-hfee
4
vulnerability VCID-6muh-rg1z-pqab
5
vulnerability VCID-bhxk-8byp-eyap
6
vulnerability VCID-ej67-ayfh-sqdt
7
vulnerability VCID-jgff-4jyp-9fgr
8
vulnerability VCID-mde2-1ynu-auh2
9
vulnerability VCID-v4gv-g9n5-ukgc
10
vulnerability VCID-yx79-3g2x-pqex
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.0@10.0.30-0%252Bdeb8u2
aliases CVE-2016-5624
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mfgg-7s54-gqg8
14
url VCID-nkdd-suwp-4ffr
vulnerability_id VCID-nkdd-suwp-4ffr
summary
Multiple vulnerabilities have been found in MariaDB, the worst of
    which could lead to privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3243.json
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3243.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-3243
reference_id
reference_type
scores
0
value 0.05555
scoring_system epss
scoring_elements 0.9029
published_at 2026-04-21T12:55:00Z
1
value 0.05555
scoring_system epss
scoring_elements 0.90233
published_at 2026-04-01T12:55:00Z
2
value 0.05555
scoring_system epss
scoring_elements 0.90236
published_at 2026-04-02T12:55:00Z
3
value 0.05555
scoring_system epss
scoring_elements 0.90249
published_at 2026-04-04T12:55:00Z
4
value 0.05555
scoring_system epss
scoring_elements 0.90253
published_at 2026-04-07T12:55:00Z
5
value 0.05555
scoring_system epss
scoring_elements 0.90269
published_at 2026-04-08T12:55:00Z
6
value 0.05555
scoring_system epss
scoring_elements 0.90275
published_at 2026-04-09T12:55:00Z
7
value 0.05555
scoring_system epss
scoring_elements 0.90284
published_at 2026-04-11T12:55:00Z
8
value 0.05555
scoring_system epss
scoring_elements 0.90283
published_at 2026-04-12T12:55:00Z
9
value 0.05555
scoring_system epss
scoring_elements 0.90277
published_at 2026-04-13T12:55:00Z
10
value 0.05555
scoring_system epss
scoring_elements 0.90293
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-3243
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6664
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6664
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3238
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3238
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3243
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3243
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3244
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3244
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3257
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3257
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3258
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3258
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3265
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3265
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3291
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3291
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3312
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3312
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3313
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3313
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3317
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3317
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3318
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3318
14
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:S/C:N/I:N/A:C
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1414340
reference_id 1414340
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1414340
16
reference_url http://www.securityfocus.com/bid/95538
reference_id 95538
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:27Z/
url http://www.securityfocus.com/bid/95538
17
reference_url http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
reference_id cpujan2017-2881727.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:27Z/
url http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
18
reference_url http://www.debian.org/security/2017/dsa-3767
reference_id dsa-3767
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:27Z/
url http://www.debian.org/security/2017/dsa-3767
19
reference_url http://www.debian.org/security/2017/dsa-3770
reference_id dsa-3770
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:27Z/
url http://www.debian.org/security/2017/dsa-3770
20
reference_url https://security.gentoo.org/glsa/201702-17
reference_id GLSA-201702-17
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:27Z/
url https://security.gentoo.org/glsa/201702-17
21
reference_url https://security.gentoo.org/glsa/201702-18
reference_id GLSA-201702-18
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:27Z/
url https://security.gentoo.org/glsa/201702-18
22
reference_url https://access.redhat.com/errata/RHSA-2017:2192
reference_id RHSA-2017:2192
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:27Z/
url https://access.redhat.com/errata/RHSA-2017:2192
23
reference_url https://access.redhat.com/errata/RHSA-2018:0279
reference_id RHSA-2018:0279
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:27Z/
url https://access.redhat.com/errata/RHSA-2018:0279
24
reference_url https://access.redhat.com/errata/RHSA-2018:0574
reference_id RHSA-2018:0574
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:27Z/
url https://access.redhat.com/errata/RHSA-2018:0574
25
reference_url https://usn.ubuntu.com/3174-1/
reference_id USN-3174-1
reference_type
scores
url https://usn.ubuntu.com/3174-1/
fixed_packages
0
url pkg:deb/debian/mariadb-10.0@10.0.30-0%2Bdeb8u2
purl pkg:deb/debian/mariadb-10.0@10.0.30-0%2Bdeb8u2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1gmc-pj6y-rkfx
1
vulnerability VCID-4yz4-vxnh-b3dp
2
vulnerability VCID-5sjj-599v-vybg
3
vulnerability VCID-6g4n-3xfu-hfee
4
vulnerability VCID-6muh-rg1z-pqab
5
vulnerability VCID-bhxk-8byp-eyap
6
vulnerability VCID-ej67-ayfh-sqdt
7
vulnerability VCID-jgff-4jyp-9fgr
8
vulnerability VCID-mde2-1ynu-auh2
9
vulnerability VCID-v4gv-g9n5-ukgc
10
vulnerability VCID-yx79-3g2x-pqex
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.0@10.0.30-0%252Bdeb8u2
aliases CVE-2017-3243
risk_score 2.0
exploitability 0.5
weighted_severity 4.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-nkdd-suwp-4ffr
15
url VCID-p623-gxyv-g7fs
vulnerability_id VCID-p623-gxyv-g7fs
summary
Multiple vulnerabilities have been found in MariaDB, the worst of
    which could lead to privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3291.json
reference_id
reference_type
scores
0
value 6.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3291.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-3291
reference_id
reference_type
scores
0
value 0.00091
scoring_system epss
scoring_elements 0.25537
published_at 2026-04-21T12:55:00Z
1
value 0.00091
scoring_system epss
scoring_elements 0.25664
published_at 2026-04-01T12:55:00Z
2
value 0.00091
scoring_system epss
scoring_elements 0.25734
published_at 2026-04-02T12:55:00Z
3
value 0.00091
scoring_system epss
scoring_elements 0.25545
published_at 2026-04-07T12:55:00Z
4
value 0.00091
scoring_system epss
scoring_elements 0.25618
published_at 2026-04-08T12:55:00Z
5
value 0.00091
scoring_system epss
scoring_elements 0.25665
published_at 2026-04-09T12:55:00Z
6
value 0.00091
scoring_system epss
scoring_elements 0.25676
published_at 2026-04-11T12:55:00Z
7
value 0.00091
scoring_system epss
scoring_elements 0.25635
published_at 2026-04-12T12:55:00Z
8
value 0.00091
scoring_system epss
scoring_elements 0.25578
published_at 2026-04-13T12:55:00Z
9
value 0.00091
scoring_system epss
scoring_elements 0.2558
published_at 2026-04-16T12:55:00Z
10
value 0.00091
scoring_system epss
scoring_elements 0.25565
published_at 2026-04-18T12:55:00Z
11
value 0.00091
scoring_system epss
scoring_elements 0.25775
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-3291
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6664
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6664
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3238
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3238
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3243
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3243
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3244
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3244
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3257
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3257
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3258
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3258
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3265
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3265
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3291
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3291
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3312
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3312
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3313
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3313
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3317
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3317
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3318
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3318
14
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6
scoring_system cvssv2
scoring_elements AV:L/AC:H/Au:S/C:C/I:C/A:C
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1414429
reference_id 1414429
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1414429
16
reference_url http://www.securityfocus.com/bid/95501
reference_id 95501
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:06:04Z/
url http://www.securityfocus.com/bid/95501
17
reference_url http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
reference_id cpujan2017-2881727.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:06:04Z/
url http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
18
reference_url http://www.debian.org/security/2017/dsa-3767
reference_id dsa-3767
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:06:04Z/
url http://www.debian.org/security/2017/dsa-3767
19
reference_url http://www.debian.org/security/2017/dsa-3770
reference_id dsa-3770
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:06:04Z/
url http://www.debian.org/security/2017/dsa-3770
20
reference_url https://security.gentoo.org/glsa/201702-17
reference_id GLSA-201702-17
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:06:04Z/
url https://security.gentoo.org/glsa/201702-17
21
reference_url https://security.gentoo.org/glsa/201702-18
reference_id GLSA-201702-18
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:06:04Z/
url https://security.gentoo.org/glsa/201702-18
22
reference_url https://access.redhat.com/errata/RHSA-2017:2192
reference_id RHSA-2017:2192
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:06:04Z/
url https://access.redhat.com/errata/RHSA-2017:2192
23
reference_url https://access.redhat.com/errata/RHSA-2017:2787
reference_id RHSA-2017:2787
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:06:04Z/
url https://access.redhat.com/errata/RHSA-2017:2787
24
reference_url https://access.redhat.com/errata/RHSA-2017:2886
reference_id RHSA-2017:2886
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:06:04Z/
url https://access.redhat.com/errata/RHSA-2017:2886
25
reference_url https://access.redhat.com/errata/RHSA-2018:0279
reference_id RHSA-2018:0279
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:06:04Z/
url https://access.redhat.com/errata/RHSA-2018:0279
26
reference_url https://access.redhat.com/errata/RHSA-2018:0574
reference_id RHSA-2018:0574
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:06:04Z/
url https://access.redhat.com/errata/RHSA-2018:0574
27
reference_url https://usn.ubuntu.com/3174-1/
reference_id USN-3174-1
reference_type
scores
url https://usn.ubuntu.com/3174-1/
fixed_packages
0
url pkg:deb/debian/mariadb-10.0@10.0.30-0%2Bdeb8u2
purl pkg:deb/debian/mariadb-10.0@10.0.30-0%2Bdeb8u2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1gmc-pj6y-rkfx
1
vulnerability VCID-4yz4-vxnh-b3dp
2
vulnerability VCID-5sjj-599v-vybg
3
vulnerability VCID-6g4n-3xfu-hfee
4
vulnerability VCID-6muh-rg1z-pqab
5
vulnerability VCID-bhxk-8byp-eyap
6
vulnerability VCID-ej67-ayfh-sqdt
7
vulnerability VCID-jgff-4jyp-9fgr
8
vulnerability VCID-mde2-1ynu-auh2
9
vulnerability VCID-v4gv-g9n5-ukgc
10
vulnerability VCID-yx79-3g2x-pqex
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.0@10.0.30-0%252Bdeb8u2
aliases CVE-2017-3291
risk_score 2.9
exploitability 0.5
weighted_severity 5.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-p623-gxyv-g7fs
16
url VCID-pk7e-t26d-aqdm
vulnerability_id VCID-pk7e-t26d-aqdm
summary security update
references
0
reference_url http://lists.opensuse.org/opensuse-updates/2016-09/msg00042.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:28Z/
url http://lists.opensuse.org/opensuse-updates/2016-09/msg00042.html
1
reference_url http://rhn.redhat.com/errata/RHSA-2016-1480.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:28Z/
url http://rhn.redhat.com/errata/RHSA-2016-1480.html
2
reference_url http://rhn.redhat.com/errata/RHSA-2016-1601.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:28Z/
url http://rhn.redhat.com/errata/RHSA-2016-1601.html
3
reference_url http://rhn.redhat.com/errata/RHSA-2016-1602.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:28Z/
url http://rhn.redhat.com/errata/RHSA-2016-1602.html
4
reference_url http://rhn.redhat.com/errata/RHSA-2016-1603.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:28Z/
url http://rhn.redhat.com/errata/RHSA-2016-1603.html
5
reference_url http://rhn.redhat.com/errata/RHSA-2016-1604.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:28Z/
url http://rhn.redhat.com/errata/RHSA-2016-1604.html
6
reference_url http://rhn.redhat.com/errata/RHSA-2016-1637.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:28Z/
url http://rhn.redhat.com/errata/RHSA-2016-1637.html
7
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3477.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3477.json
8
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-3477
reference_id
reference_type
scores
0
value 0.00115
scoring_system epss
scoring_elements 0.30042
published_at 2026-04-21T12:55:00Z
1
value 0.00115
scoring_system epss
scoring_elements 0.30191
published_at 2026-04-01T12:55:00Z
2
value 0.00115
scoring_system epss
scoring_elements 0.30221
published_at 2026-04-02T12:55:00Z
3
value 0.00115
scoring_system epss
scoring_elements 0.3027
published_at 2026-04-04T12:55:00Z
4
value 0.00115
scoring_system epss
scoring_elements 0.30088
published_at 2026-04-18T12:55:00Z
5
value 0.00115
scoring_system epss
scoring_elements 0.30148
published_at 2026-04-08T12:55:00Z
6
value 0.00115
scoring_system epss
scoring_elements 0.30184
published_at 2026-04-09T12:55:00Z
7
value 0.00115
scoring_system epss
scoring_elements 0.30186
published_at 2026-04-11T12:55:00Z
8
value 0.00115
scoring_system epss
scoring_elements 0.30143
published_at 2026-04-12T12:55:00Z
9
value 0.00115
scoring_system epss
scoring_elements 0.30093
published_at 2026-04-13T12:55:00Z
10
value 0.00115
scoring_system epss
scoring_elements 0.30108
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-3477
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3477
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3477
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3521
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3521
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3615
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3615
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5440
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5440
13
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:S/C:C/I:C/A:C
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
14
reference_url https://mariadb.com/kb/en/mariadb/mariadb-10026-release-notes/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:28Z/
url https://mariadb.com/kb/en/mariadb/mariadb-10026-release-notes/
15
reference_url https://mariadb.com/kb/en/mariadb/mariadb-10115-release-notes/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:28Z/
url https://mariadb.com/kb/en/mariadb/mariadb-10115-release-notes/
16
reference_url https://mariadb.com/kb/en/mariadb/mariadb-5550-release-notes/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:28Z/
url https://mariadb.com/kb/en/mariadb/mariadb-5550-release-notes/
17
reference_url http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:28Z/
url http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168
18
reference_url http://www.debian.org/security/2016/dsa-3624
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:28Z/
url http://www.debian.org/security/2016/dsa-3624
19
reference_url http://www.debian.org/security/2016/dsa-3632
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:28Z/
url http://www.debian.org/security/2016/dsa-3632
20
reference_url http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:28Z/
url http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
21
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:28Z/
url http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
22
reference_url http://www.securityfocus.com/bid/91787
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:28Z/
url http://www.securityfocus.com/bid/91787
23
reference_url http://www.securityfocus.com/bid/91902
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:28Z/
url http://www.securityfocus.com/bid/91902
24
reference_url http://www.securitytracker.com/id/1036362
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:28Z/
url http://www.securitytracker.com/id/1036362
25
reference_url http://www.ubuntu.com/usn/USN-3040-1
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:28Z/
url http://www.ubuntu.com/usn/USN-3040-1
26
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1358205
reference_id 1358205
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1358205
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:powerkvm:2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ibm:powerkvm:2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:powerkvm:2.1:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:powerkvm:3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ibm:powerkvm:3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:powerkvm:3.1:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-3477
reference_id CVE-2016-3477
reference_type
scores
0
value 4.1
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:S/C:P/I:P/A:P
1
value 8.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2016-3477
38
reference_url https://access.redhat.com/errata/RHSA-2016:1480
reference_id RHSA-2016:1480
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1480
39
reference_url https://access.redhat.com/errata/RHSA-2016:1601
reference_id RHSA-2016:1601
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1601
40
reference_url https://access.redhat.com/errata/RHSA-2016:1602
reference_id RHSA-2016:1602
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1602
41
reference_url https://access.redhat.com/errata/RHSA-2016:1603
reference_id RHSA-2016:1603
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1603
42
reference_url https://access.redhat.com/errata/RHSA-2016:1604
reference_id RHSA-2016:1604
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1604
43
reference_url https://access.redhat.com/errata/RHSA-2016:1637
reference_id RHSA-2016:1637
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1637
44
reference_url https://usn.ubuntu.com/3040-1/
reference_id USN-3040-1
reference_type
scores
url https://usn.ubuntu.com/3040-1/
fixed_packages
0
url pkg:deb/debian/mariadb-10.0@10.0.30-0%2Bdeb8u2
purl pkg:deb/debian/mariadb-10.0@10.0.30-0%2Bdeb8u2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1gmc-pj6y-rkfx
1
vulnerability VCID-4yz4-vxnh-b3dp
2
vulnerability VCID-5sjj-599v-vybg
3
vulnerability VCID-6g4n-3xfu-hfee
4
vulnerability VCID-6muh-rg1z-pqab
5
vulnerability VCID-bhxk-8byp-eyap
6
vulnerability VCID-ej67-ayfh-sqdt
7
vulnerability VCID-jgff-4jyp-9fgr
8
vulnerability VCID-mde2-1ynu-auh2
9
vulnerability VCID-v4gv-g9n5-ukgc
10
vulnerability VCID-yx79-3g2x-pqex
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.0@10.0.30-0%252Bdeb8u2
aliases CVE-2016-3477
risk_score 3.6
exploitability 0.5
weighted_severity 7.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pk7e-t26d-aqdm
17
url VCID-pv92-6p9x-v7bs
vulnerability_id VCID-pv92-6p9x-v7bs
summary
Multiple vulnerabilities have been found in MariaDB, the worst of
    which could lead to privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3317.json
reference_id
reference_type
scores
0
value 4.0
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:H/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3317.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-3317
reference_id
reference_type
scores
0
value 0.00022
scoring_system epss
scoring_elements 0.0613
published_at 2026-04-21T12:55:00Z
1
value 0.00022
scoring_system epss
scoring_elements 0.05903
published_at 2026-04-01T12:55:00Z
2
value 0.00022
scoring_system epss
scoring_elements 0.05935
published_at 2026-04-02T12:55:00Z
3
value 0.00022
scoring_system epss
scoring_elements 0.05951
published_at 2026-04-07T12:55:00Z
4
value 0.00022
scoring_system epss
scoring_elements 0.0599
published_at 2026-04-08T12:55:00Z
5
value 0.00022
scoring_system epss
scoring_elements 0.06028
published_at 2026-04-09T12:55:00Z
6
value 0.00022
scoring_system epss
scoring_elements 0.06019
published_at 2026-04-11T12:55:00Z
7
value 0.00022
scoring_system epss
scoring_elements 0.0601
published_at 2026-04-12T12:55:00Z
8
value 0.00022
scoring_system epss
scoring_elements 0.06002
published_at 2026-04-13T12:55:00Z
9
value 0.00022
scoring_system epss
scoring_elements 0.05967
published_at 2026-04-16T12:55:00Z
10
value 0.00022
scoring_system epss
scoring_elements 0.05978
published_at 2026-04-18T12:55:00Z
11
value 0.00022
scoring_system epss
scoring_elements 0.05968
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-3317
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6664
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6664
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3238
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3238
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3243
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3243
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3244
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3244
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3257
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3257
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3258
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3258
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3265
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3265
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3291
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3291
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3312
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3312
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3313
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3313
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3317
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3317
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3318
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3318
14
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.8
scoring_system cvssv2
scoring_elements AV:L/AC:H/Au:S/C:N/I:N/A:C
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1414355
reference_id 1414355
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1414355
16
reference_url http://www.securityfocus.com/bid/95585
reference_id 95585
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-08T20:09:31Z/
url http://www.securityfocus.com/bid/95585
17
reference_url http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
reference_id cpujan2017-2881727.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-08T20:09:31Z/
url http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
18
reference_url http://www.debian.org/security/2017/dsa-3767
reference_id dsa-3767
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-08T20:09:31Z/
url http://www.debian.org/security/2017/dsa-3767
19
reference_url http://www.debian.org/security/2017/dsa-3770
reference_id dsa-3770
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-08T20:09:31Z/
url http://www.debian.org/security/2017/dsa-3770
20
reference_url https://security.gentoo.org/glsa/201702-17
reference_id GLSA-201702-17
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-08T20:09:31Z/
url https://security.gentoo.org/glsa/201702-17
21
reference_url https://security.gentoo.org/glsa/201702-18
reference_id GLSA-201702-18
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-08T20:09:31Z/
url https://security.gentoo.org/glsa/201702-18
22
reference_url https://access.redhat.com/errata/RHSA-2017:2192
reference_id RHSA-2017:2192
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-08T20:09:31Z/
url https://access.redhat.com/errata/RHSA-2017:2192
23
reference_url https://access.redhat.com/errata/RHSA-2017:2787
reference_id RHSA-2017:2787
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-08T20:09:31Z/
url https://access.redhat.com/errata/RHSA-2017:2787
24
reference_url https://access.redhat.com/errata/RHSA-2017:2886
reference_id RHSA-2017:2886
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-08T20:09:31Z/
url https://access.redhat.com/errata/RHSA-2017:2886
25
reference_url https://access.redhat.com/errata/RHSA-2018:0279
reference_id RHSA-2018:0279
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-08T20:09:31Z/
url https://access.redhat.com/errata/RHSA-2018:0279
26
reference_url https://access.redhat.com/errata/RHSA-2018:0574
reference_id RHSA-2018:0574
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-08T20:09:31Z/
url https://access.redhat.com/errata/RHSA-2018:0574
27
reference_url https://usn.ubuntu.com/3174-1/
reference_id USN-3174-1
reference_type
scores
url https://usn.ubuntu.com/3174-1/
fixed_packages
0
url pkg:deb/debian/mariadb-10.0@10.0.30-0%2Bdeb8u2
purl pkg:deb/debian/mariadb-10.0@10.0.30-0%2Bdeb8u2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1gmc-pj6y-rkfx
1
vulnerability VCID-4yz4-vxnh-b3dp
2
vulnerability VCID-5sjj-599v-vybg
3
vulnerability VCID-6g4n-3xfu-hfee
4
vulnerability VCID-6muh-rg1z-pqab
5
vulnerability VCID-bhxk-8byp-eyap
6
vulnerability VCID-ej67-ayfh-sqdt
7
vulnerability VCID-jgff-4jyp-9fgr
8
vulnerability VCID-mde2-1ynu-auh2
9
vulnerability VCID-v4gv-g9n5-ukgc
10
vulnerability VCID-yx79-3g2x-pqex
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.0@10.0.30-0%252Bdeb8u2
aliases CVE-2017-3317
risk_score 1.8
exploitability 0.5
weighted_severity 3.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pv92-6p9x-v7bs
18
url VCID-r2cz-9kjz-zbgu
vulnerability_id VCID-r2cz-9kjz-zbgu
summary mysql: prepared statement handle use-after-free after disconnect
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3302.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3302.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-3302
reference_id
reference_type
scores
0
value 0.025
scoring_system epss
scoring_elements 0.85359
published_at 2026-04-18T12:55:00Z
1
value 0.025
scoring_system epss
scoring_elements 0.85265
published_at 2026-04-01T12:55:00Z
2
value 0.025
scoring_system epss
scoring_elements 0.85277
published_at 2026-04-02T12:55:00Z
3
value 0.025
scoring_system epss
scoring_elements 0.85298
published_at 2026-04-07T12:55:00Z
4
value 0.025
scoring_system epss
scoring_elements 0.8532
published_at 2026-04-08T12:55:00Z
5
value 0.025
scoring_system epss
scoring_elements 0.85328
published_at 2026-04-09T12:55:00Z
6
value 0.025
scoring_system epss
scoring_elements 0.85342
published_at 2026-04-11T12:55:00Z
7
value 0.025
scoring_system epss
scoring_elements 0.85341
published_at 2026-04-12T12:55:00Z
8
value 0.025
scoring_system epss
scoring_elements 0.85337
published_at 2026-04-13T12:55:00Z
9
value 0.025
scoring_system epss
scoring_elements 0.85357
published_at 2026-04-21T12:55:00Z
10
value 0.025
scoring_system epss
scoring_elements 0.85296
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-3302
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3302
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3302
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3305
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3305
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3308
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3308
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3309
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3309
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3313
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3313
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3329
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3329
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3453
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3453
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3456
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3456
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3461
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3461
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3462
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3462
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3463
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3463
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3464
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3464
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3600
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3600
15
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
16
reference_url http://www.openwall.com/lists/oss-security/2017/02/11/11
reference_id 11
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-08T20:04:48Z/
url http://www.openwall.com/lists/oss-security/2017/02/11/11
17
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1422119
reference_id 1422119
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1422119
18
reference_url http://www.securityfocus.com/bid/96162
reference_id 96162
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-08T20:04:48Z/
url http://www.securityfocus.com/bid/96162
19
reference_url http://www.debian.org/security/2017/dsa-3809
reference_id dsa-3809
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-08T20:04:48Z/
url http://www.debian.org/security/2017/dsa-3809
20
reference_url https://access.redhat.com/errata/RHSA-2017:2192
reference_id RHSA-2017:2192
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-08T20:04:48Z/
url https://access.redhat.com/errata/RHSA-2017:2192
21
reference_url https://access.redhat.com/errata/RHSA-2017:2787
reference_id RHSA-2017:2787
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-08T20:04:48Z/
url https://access.redhat.com/errata/RHSA-2017:2787
22
reference_url https://access.redhat.com/errata/RHSA-2018:0279
reference_id RHSA-2018:0279
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-08T20:04:48Z/
url https://access.redhat.com/errata/RHSA-2018:0279
23
reference_url https://access.redhat.com/errata/RHSA-2018:0574
reference_id RHSA-2018:0574
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-08T20:04:48Z/
url https://access.redhat.com/errata/RHSA-2018:0574
24
reference_url https://usn.ubuntu.com/3269-1/
reference_id USN-3269-1
reference_type
scores
url https://usn.ubuntu.com/3269-1/
25
reference_url https://usn.ubuntu.com/3357-2/
reference_id USN-3357-2
reference_type
scores
url https://usn.ubuntu.com/3357-2/
fixed_packages
0
url pkg:deb/debian/mariadb-10.0@10.0.30-0%2Bdeb8u2
purl pkg:deb/debian/mariadb-10.0@10.0.30-0%2Bdeb8u2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1gmc-pj6y-rkfx
1
vulnerability VCID-4yz4-vxnh-b3dp
2
vulnerability VCID-5sjj-599v-vybg
3
vulnerability VCID-6g4n-3xfu-hfee
4
vulnerability VCID-6muh-rg1z-pqab
5
vulnerability VCID-bhxk-8byp-eyap
6
vulnerability VCID-ej67-ayfh-sqdt
7
vulnerability VCID-jgff-4jyp-9fgr
8
vulnerability VCID-mde2-1ynu-auh2
9
vulnerability VCID-v4gv-g9n5-ukgc
10
vulnerability VCID-yx79-3g2x-pqex
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.0@10.0.30-0%252Bdeb8u2
aliases CVE-2017-3302
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-r2cz-9kjz-zbgu
19
url VCID-rssq-mfc2-ckaf
vulnerability_id VCID-rssq-mfc2-ckaf
summary
Multiple vulnerabilities have been found in MariaDB, the worst of
    which could lead to privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3258.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3258.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-3258
reference_id
reference_type
scores
0
value 0.00312
scoring_system epss
scoring_elements 0.54432
published_at 2026-04-21T12:55:00Z
1
value 0.00312
scoring_system epss
scoring_elements 0.54327
published_at 2026-04-01T12:55:00Z
2
value 0.00312
scoring_system epss
scoring_elements 0.54377
published_at 2026-04-04T12:55:00Z
3
value 0.00312
scoring_system epss
scoring_elements 0.54351
published_at 2026-04-07T12:55:00Z
4
value 0.00312
scoring_system epss
scoring_elements 0.54403
published_at 2026-04-08T12:55:00Z
5
value 0.00312
scoring_system epss
scoring_elements 0.54398
published_at 2026-04-09T12:55:00Z
6
value 0.00312
scoring_system epss
scoring_elements 0.54446
published_at 2026-04-16T12:55:00Z
7
value 0.00312
scoring_system epss
scoring_elements 0.54429
published_at 2026-04-12T12:55:00Z
8
value 0.00312
scoring_system epss
scoring_elements 0.54407
published_at 2026-04-13T12:55:00Z
9
value 0.00312
scoring_system epss
scoring_elements 0.5445
published_at 2026-04-18T12:55:00Z
10
value 0.00312
scoring_system epss
scoring_elements 0.54347
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-3258
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6664
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6664
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3238
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3238
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3243
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3243
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3244
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3244
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3257
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3257
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3258
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3258
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3265
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3265
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3291
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3291
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3312
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3312
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3313
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3313
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3317
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3317
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3318
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3318
14
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:C
1
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1414351
reference_id 1414351
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1414351
16
reference_url http://www.securityfocus.com/bid/95560
reference_id 95560
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:10Z/
url http://www.securityfocus.com/bid/95560
17
reference_url http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
reference_id cpujan2017-2881727.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:10Z/
url http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
18
reference_url http://www.debian.org/security/2017/dsa-3767
reference_id dsa-3767
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:10Z/
url http://www.debian.org/security/2017/dsa-3767
19
reference_url http://www.debian.org/security/2017/dsa-3770
reference_id dsa-3770
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:10Z/
url http://www.debian.org/security/2017/dsa-3770
20
reference_url https://security.gentoo.org/glsa/201702-17
reference_id GLSA-201702-17
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:10Z/
url https://security.gentoo.org/glsa/201702-17
21
reference_url https://security.gentoo.org/glsa/201702-18
reference_id GLSA-201702-18
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:10Z/
url https://security.gentoo.org/glsa/201702-18
22
reference_url https://access.redhat.com/errata/RHSA-2017:2192
reference_id RHSA-2017:2192
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:10Z/
url https://access.redhat.com/errata/RHSA-2017:2192
23
reference_url https://access.redhat.com/errata/RHSA-2017:2787
reference_id RHSA-2017:2787
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:10Z/
url https://access.redhat.com/errata/RHSA-2017:2787
24
reference_url https://access.redhat.com/errata/RHSA-2017:2886
reference_id RHSA-2017:2886
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:10Z/
url https://access.redhat.com/errata/RHSA-2017:2886
25
reference_url https://access.redhat.com/errata/RHSA-2018:0279
reference_id RHSA-2018:0279
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:10Z/
url https://access.redhat.com/errata/RHSA-2018:0279
26
reference_url https://access.redhat.com/errata/RHSA-2018:0574
reference_id RHSA-2018:0574
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:10Z/
url https://access.redhat.com/errata/RHSA-2018:0574
27
reference_url https://usn.ubuntu.com/3174-1/
reference_id USN-3174-1
reference_type
scores
url https://usn.ubuntu.com/3174-1/
fixed_packages
0
url pkg:deb/debian/mariadb-10.0@10.0.30-0%2Bdeb8u2
purl pkg:deb/debian/mariadb-10.0@10.0.30-0%2Bdeb8u2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1gmc-pj6y-rkfx
1
vulnerability VCID-4yz4-vxnh-b3dp
2
vulnerability VCID-5sjj-599v-vybg
3
vulnerability VCID-6g4n-3xfu-hfee
4
vulnerability VCID-6muh-rg1z-pqab
5
vulnerability VCID-bhxk-8byp-eyap
6
vulnerability VCID-ej67-ayfh-sqdt
7
vulnerability VCID-jgff-4jyp-9fgr
8
vulnerability VCID-mde2-1ynu-auh2
9
vulnerability VCID-v4gv-g9n5-ukgc
10
vulnerability VCID-yx79-3g2x-pqex
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.0@10.0.30-0%252Bdeb8u2
aliases CVE-2017-3258
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rssq-mfc2-ckaf
20
url VCID-rted-6vzz-mbcv
vulnerability_id VCID-rted-6vzz-mbcv
summary
Multiple vulnerabilities have been found in MariaDB and MySQL, the
    worst of which could lead to the remote execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3492.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3492.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-3492
reference_id
reference_type
scores
0
value 0.00566
scoring_system epss
scoring_elements 0.68505
published_at 2026-04-21T12:55:00Z
1
value 0.00566
scoring_system epss
scoring_elements 0.68427
published_at 2026-04-07T12:55:00Z
2
value 0.00566
scoring_system epss
scoring_elements 0.68477
published_at 2026-04-08T12:55:00Z
3
value 0.00566
scoring_system epss
scoring_elements 0.68494
published_at 2026-04-09T12:55:00Z
4
value 0.00566
scoring_system epss
scoring_elements 0.6852
published_at 2026-04-11T12:55:00Z
5
value 0.00566
scoring_system epss
scoring_elements 0.68508
published_at 2026-04-12T12:55:00Z
6
value 0.00566
scoring_system epss
scoring_elements 0.68475
published_at 2026-04-13T12:55:00Z
7
value 0.00566
scoring_system epss
scoring_elements 0.68513
published_at 2026-04-16T12:55:00Z
8
value 0.00566
scoring_system epss
scoring_elements 0.68526
published_at 2026-04-18T12:55:00Z
9
value 0.00566
scoring_system epss
scoring_elements 0.68412
published_at 2026-04-01T12:55:00Z
10
value 0.00566
scoring_system epss
scoring_elements 0.68431
published_at 2026-04-02T12:55:00Z
11
value 0.00566
scoring_system epss
scoring_elements 0.68451
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-3492
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3492
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3492
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5584
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5584
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5624
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5624
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5626
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5626
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5629
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5629
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6663
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6663
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7440
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7440
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8283
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8283
10
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
11
reference_url http://www.securitytracker.com/id/1037050
reference_id 1037050
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:50:08Z/
url http://www.securitytracker.com/id/1037050
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1386554
reference_id 1386554
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1386554
13
reference_url http://www.securityfocus.com/bid/93650
reference_id 93650
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:50:08Z/
url http://www.securityfocus.com/bid/93650
14
reference_url https://security.gentoo.org/glsa/201701-01
reference_id GLSA-201701-01
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:50:08Z/
url https://security.gentoo.org/glsa/201701-01
15
reference_url https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/
reference_id mariadb-10028-release-notes
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:50:08Z/
url https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/
16
reference_url https://mariadb.com/kb/en/mariadb/mariadb-10118-release-notes/
reference_id mariadb-10118-release-notes
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:50:08Z/
url https://mariadb.com/kb/en/mariadb/mariadb-10118-release-notes/
17
reference_url https://mariadb.com/kb/en/mariadb/mariadb-5552-release-notes/
reference_id mariadb-5552-release-notes
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:50:08Z/
url https://mariadb.com/kb/en/mariadb/mariadb-5552-release-notes/
18
reference_url https://access.redhat.com/errata/RHSA-2016:2130
reference_id RHSA-2016:2130
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2130
19
reference_url http://rhn.redhat.com/errata/RHSA-2016-2130.html
reference_id RHSA-2016-2130.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:50:08Z/
url http://rhn.redhat.com/errata/RHSA-2016-2130.html
20
reference_url https://access.redhat.com/errata/RHSA-2016:2131
reference_id RHSA-2016:2131
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2131
21
reference_url http://rhn.redhat.com/errata/RHSA-2016-2131.html
reference_id RHSA-2016-2131.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:50:08Z/
url http://rhn.redhat.com/errata/RHSA-2016-2131.html
22
reference_url https://access.redhat.com/errata/RHSA-2016:2595
reference_id RHSA-2016:2595
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2595
23
reference_url http://rhn.redhat.com/errata/RHSA-2016-2595.html
reference_id RHSA-2016-2595.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:50:08Z/
url http://rhn.redhat.com/errata/RHSA-2016-2595.html
24
reference_url https://access.redhat.com/errata/RHSA-2016:2749
reference_id RHSA-2016:2749
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2749
25
reference_url http://rhn.redhat.com/errata/RHSA-2016-2749.html
reference_id RHSA-2016-2749.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:50:08Z/
url http://rhn.redhat.com/errata/RHSA-2016-2749.html
26
reference_url https://access.redhat.com/errata/RHSA-2016:2927
reference_id RHSA-2016:2927
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2927
27
reference_url https://access.redhat.com/errata/RHSA-2016:2928
reference_id RHSA-2016:2928
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2928
fixed_packages
0
url pkg:deb/debian/mariadb-10.0@10.0.30-0%2Bdeb8u2
purl pkg:deb/debian/mariadb-10.0@10.0.30-0%2Bdeb8u2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1gmc-pj6y-rkfx
1
vulnerability VCID-4yz4-vxnh-b3dp
2
vulnerability VCID-5sjj-599v-vybg
3
vulnerability VCID-6g4n-3xfu-hfee
4
vulnerability VCID-6muh-rg1z-pqab
5
vulnerability VCID-bhxk-8byp-eyap
6
vulnerability VCID-ej67-ayfh-sqdt
7
vulnerability VCID-jgff-4jyp-9fgr
8
vulnerability VCID-mde2-1ynu-auh2
9
vulnerability VCID-v4gv-g9n5-ukgc
10
vulnerability VCID-yx79-3g2x-pqex
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.0@10.0.30-0%252Bdeb8u2
aliases CVE-2016-3492
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rted-6vzz-mbcv
21
url VCID-tvdv-3ed5-h3dt
vulnerability_id VCID-tvdv-3ed5-h3dt
summary
Multiple vulnerabilities have been found in MariaDB and MySQL, the
    worst of which could lead to the remote execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5626.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5626.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-5626
reference_id
reference_type
scores
0
value 0.00369
scoring_system epss
scoring_elements 0.58837
published_at 2026-04-16T12:55:00Z
1
value 0.00369
scoring_system epss
scoring_elements 0.58702
published_at 2026-04-01T12:55:00Z
2
value 0.00369
scoring_system epss
scoring_elements 0.58776
published_at 2026-04-02T12:55:00Z
3
value 0.00369
scoring_system epss
scoring_elements 0.58797
published_at 2026-04-04T12:55:00Z
4
value 0.00369
scoring_system epss
scoring_elements 0.58766
published_at 2026-04-07T12:55:00Z
5
value 0.00369
scoring_system epss
scoring_elements 0.58818
published_at 2026-04-21T12:55:00Z
6
value 0.00369
scoring_system epss
scoring_elements 0.58824
published_at 2026-04-12T12:55:00Z
7
value 0.00369
scoring_system epss
scoring_elements 0.58842
published_at 2026-04-18T12:55:00Z
8
value 0.00369
scoring_system epss
scoring_elements 0.58805
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-5626
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3492
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3492
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5584
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5584
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5624
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5624
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5626
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5626
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5629
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5629
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6663
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6663
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7440
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7440
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8283
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8283
10
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
11
reference_url http://www.securitytracker.com/id/1037050
reference_id 1037050
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:36Z/
url http://www.securitytracker.com/id/1037050
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1386568
reference_id 1386568
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1386568
13
reference_url http://www.securityfocus.com/bid/93638
reference_id 93638
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:36Z/
url http://www.securityfocus.com/bid/93638
14
reference_url https://security.gentoo.org/glsa/201701-01
reference_id GLSA-201701-01
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:36Z/
url https://security.gentoo.org/glsa/201701-01
15
reference_url https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/
reference_id mariadb-10028-release-notes
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:36Z/
url https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/
16
reference_url https://mariadb.com/kb/en/mariadb/mariadb-10118-release-notes/
reference_id mariadb-10118-release-notes
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:36Z/
url https://mariadb.com/kb/en/mariadb/mariadb-10118-release-notes/
17
reference_url https://mariadb.com/kb/en/mariadb/mariadb-5552-release-notes/
reference_id mariadb-5552-release-notes
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:36Z/
url https://mariadb.com/kb/en/mariadb/mariadb-5552-release-notes/
18
reference_url https://access.redhat.com/errata/RHSA-2016:2130
reference_id RHSA-2016:2130
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2130
19
reference_url http://rhn.redhat.com/errata/RHSA-2016-2130.html
reference_id RHSA-2016-2130.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:36Z/
url http://rhn.redhat.com/errata/RHSA-2016-2130.html
20
reference_url https://access.redhat.com/errata/RHSA-2016:2131
reference_id RHSA-2016:2131
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2131
21
reference_url http://rhn.redhat.com/errata/RHSA-2016-2131.html
reference_id RHSA-2016-2131.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:36Z/
url http://rhn.redhat.com/errata/RHSA-2016-2131.html
22
reference_url https://access.redhat.com/errata/RHSA-2016:2595
reference_id RHSA-2016:2595
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2595
23
reference_url http://rhn.redhat.com/errata/RHSA-2016-2595.html
reference_id RHSA-2016-2595.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:36Z/
url http://rhn.redhat.com/errata/RHSA-2016-2595.html
24
reference_url https://access.redhat.com/errata/RHSA-2016:2749
reference_id RHSA-2016:2749
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2749
25
reference_url http://rhn.redhat.com/errata/RHSA-2016-2749.html
reference_id RHSA-2016-2749.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:36Z/
url http://rhn.redhat.com/errata/RHSA-2016-2749.html
26
reference_url https://access.redhat.com/errata/RHSA-2016:2927
reference_id RHSA-2016:2927
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2927
27
reference_url https://access.redhat.com/errata/RHSA-2016:2928
reference_id RHSA-2016:2928
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2928
fixed_packages
0
url pkg:deb/debian/mariadb-10.0@10.0.30-0%2Bdeb8u2
purl pkg:deb/debian/mariadb-10.0@10.0.30-0%2Bdeb8u2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1gmc-pj6y-rkfx
1
vulnerability VCID-4yz4-vxnh-b3dp
2
vulnerability VCID-5sjj-599v-vybg
3
vulnerability VCID-6g4n-3xfu-hfee
4
vulnerability VCID-6muh-rg1z-pqab
5
vulnerability VCID-bhxk-8byp-eyap
6
vulnerability VCID-ej67-ayfh-sqdt
7
vulnerability VCID-jgff-4jyp-9fgr
8
vulnerability VCID-mde2-1ynu-auh2
9
vulnerability VCID-v4gv-g9n5-ukgc
10
vulnerability VCID-yx79-3g2x-pqex
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.0@10.0.30-0%252Bdeb8u2
aliases CVE-2016-5626
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tvdv-3ed5-h3dt
22
url VCID-un5y-y9sq-1ufb
vulnerability_id VCID-un5y-y9sq-1ufb
summary
Multiple vulnerabilities have been found in MariaDB, the worst of
    which could lead to privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3244.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3244.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-3244
reference_id
reference_type
scores
0
value 0.00314
scoring_system epss
scoring_elements 0.54576
published_at 2026-04-21T12:55:00Z
1
value 0.00314
scoring_system epss
scoring_elements 0.54473
published_at 2026-04-01T12:55:00Z
2
value 0.00314
scoring_system epss
scoring_elements 0.54548
published_at 2026-04-02T12:55:00Z
3
value 0.00314
scoring_system epss
scoring_elements 0.54541
published_at 2026-04-07T12:55:00Z
4
value 0.00314
scoring_system epss
scoring_elements 0.54592
published_at 2026-04-08T12:55:00Z
5
value 0.00314
scoring_system epss
scoring_elements 0.54587
published_at 2026-04-09T12:55:00Z
6
value 0.00314
scoring_system epss
scoring_elements 0.54599
published_at 2026-04-11T12:55:00Z
7
value 0.00314
scoring_system epss
scoring_elements 0.54581
published_at 2026-04-12T12:55:00Z
8
value 0.00314
scoring_system epss
scoring_elements 0.54559
published_at 2026-04-13T12:55:00Z
9
value 0.00314
scoring_system epss
scoring_elements 0.54596
published_at 2026-04-16T12:55:00Z
10
value 0.00314
scoring_system epss
scoring_elements 0.54598
published_at 2026-04-18T12:55:00Z
11
value 0.00314
scoring_system epss
scoring_elements 0.54572
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-3244
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6664
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6664
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3238
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3238
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3243
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3243
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3244
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3244
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3257
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3257
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3258
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3258
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3265
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3265
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3291
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3291
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3312
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3312
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3313
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3313
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3317
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3317
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3318
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3318
14
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:C
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1414342
reference_id 1414342
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1414342
16
reference_url http://www.securityfocus.com/bid/95565
reference_id 95565
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:25Z/
url http://www.securityfocus.com/bid/95565
17
reference_url http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
reference_id cpujan2017-2881727.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:25Z/
url http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
18
reference_url http://www.debian.org/security/2017/dsa-3767
reference_id dsa-3767
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:25Z/
url http://www.debian.org/security/2017/dsa-3767
19
reference_url http://www.debian.org/security/2017/dsa-3770
reference_id dsa-3770
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:25Z/
url http://www.debian.org/security/2017/dsa-3770
20
reference_url https://security.gentoo.org/glsa/201702-17
reference_id GLSA-201702-17
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:25Z/
url https://security.gentoo.org/glsa/201702-17
21
reference_url https://security.gentoo.org/glsa/201702-18
reference_id GLSA-201702-18
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:25Z/
url https://security.gentoo.org/glsa/201702-18
22
reference_url https://access.redhat.com/errata/RHSA-2017:2192
reference_id RHSA-2017:2192
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:25Z/
url https://access.redhat.com/errata/RHSA-2017:2192
23
reference_url https://access.redhat.com/errata/RHSA-2017:2787
reference_id RHSA-2017:2787
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:25Z/
url https://access.redhat.com/errata/RHSA-2017:2787
24
reference_url https://access.redhat.com/errata/RHSA-2017:2886
reference_id RHSA-2017:2886
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:25Z/
url https://access.redhat.com/errata/RHSA-2017:2886
25
reference_url https://access.redhat.com/errata/RHSA-2018:0279
reference_id RHSA-2018:0279
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:25Z/
url https://access.redhat.com/errata/RHSA-2018:0279
26
reference_url https://access.redhat.com/errata/RHSA-2018:0574
reference_id RHSA-2018:0574
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:25Z/
url https://access.redhat.com/errata/RHSA-2018:0574
27
reference_url https://usn.ubuntu.com/3174-1/
reference_id USN-3174-1
reference_type
scores
url https://usn.ubuntu.com/3174-1/
fixed_packages
0
url pkg:deb/debian/mariadb-10.0@10.0.30-0%2Bdeb8u2
purl pkg:deb/debian/mariadb-10.0@10.0.30-0%2Bdeb8u2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1gmc-pj6y-rkfx
1
vulnerability VCID-4yz4-vxnh-b3dp
2
vulnerability VCID-5sjj-599v-vybg
3
vulnerability VCID-6g4n-3xfu-hfee
4
vulnerability VCID-6muh-rg1z-pqab
5
vulnerability VCID-bhxk-8byp-eyap
6
vulnerability VCID-ej67-ayfh-sqdt
7
vulnerability VCID-jgff-4jyp-9fgr
8
vulnerability VCID-mde2-1ynu-auh2
9
vulnerability VCID-v4gv-g9n5-ukgc
10
vulnerability VCID-yx79-3g2x-pqex
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.0@10.0.30-0%252Bdeb8u2
aliases CVE-2017-3244
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-un5y-y9sq-1ufb
23
url VCID-vh5y-15tw-d7fd
vulnerability_id VCID-vh5y-15tw-d7fd
summary
Multiple vulnerabilities have been found in MariaDB and MySQL, the
    worst of which could lead to the remote execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8283.json
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8283.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-8283
reference_id
reference_type
scores
0
value 0.00361
scoring_system epss
scoring_elements 0.58269
published_at 2026-04-21T12:55:00Z
1
value 0.00361
scoring_system epss
scoring_elements 0.58144
published_at 2026-04-01T12:55:00Z
2
value 0.00361
scoring_system epss
scoring_elements 0.58249
published_at 2026-04-04T12:55:00Z
3
value 0.00361
scoring_system epss
scoring_elements 0.58223
published_at 2026-04-07T12:55:00Z
4
value 0.00361
scoring_system epss
scoring_elements 0.58277
published_at 2026-04-08T12:55:00Z
5
value 0.00361
scoring_system epss
scoring_elements 0.58283
published_at 2026-04-09T12:55:00Z
6
value 0.00361
scoring_system epss
scoring_elements 0.583
published_at 2026-04-11T12:55:00Z
7
value 0.00361
scoring_system epss
scoring_elements 0.58278
published_at 2026-04-12T12:55:00Z
8
value 0.00361
scoring_system epss
scoring_elements 0.58258
published_at 2026-04-13T12:55:00Z
9
value 0.00361
scoring_system epss
scoring_elements 0.5829
published_at 2026-04-16T12:55:00Z
10
value 0.00361
scoring_system epss
scoring_elements 0.58292
published_at 2026-04-18T12:55:00Z
11
value 0.00361
scoring_system epss
scoring_elements 0.58229
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-8283
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3492
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3492
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5584
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5584
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5624
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5624
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5626
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5626
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5629
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5629
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6663
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6663
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7440
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7440
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8283
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8283
10
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:P
1
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
11
reference_url http://www.securitytracker.com/id/1037050
reference_id 1037050
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:22Z/
url http://www.securitytracker.com/id/1037050
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1386585
reference_id 1386585
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1386585
13
reference_url http://www.securityfocus.com/bid/93737
reference_id 93737
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:22Z/
url http://www.securityfocus.com/bid/93737
14
reference_url https://security.gentoo.org/glsa/201701-01
reference_id GLSA-201701-01
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:22Z/
url https://security.gentoo.org/glsa/201701-01
15
reference_url https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/
reference_id mariadb-10028-release-notes
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:22Z/
url https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/
16
reference_url https://mariadb.com/kb/en/mariadb/mariadb-10118-release-notes/
reference_id mariadb-10118-release-notes
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:22Z/
url https://mariadb.com/kb/en/mariadb/mariadb-10118-release-notes/
17
reference_url https://mariadb.com/kb/en/mariadb/mariadb-5552-release-notes/
reference_id mariadb-5552-release-notes
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:22Z/
url https://mariadb.com/kb/en/mariadb/mariadb-5552-release-notes/
18
reference_url https://access.redhat.com/errata/RHSA-2016:2130
reference_id RHSA-2016:2130
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2130
19
reference_url http://rhn.redhat.com/errata/RHSA-2016-2130.html
reference_id RHSA-2016-2130.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:22Z/
url http://rhn.redhat.com/errata/RHSA-2016-2130.html
20
reference_url https://access.redhat.com/errata/RHSA-2016:2131
reference_id RHSA-2016:2131
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2131
21
reference_url http://rhn.redhat.com/errata/RHSA-2016-2131.html
reference_id RHSA-2016-2131.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:22Z/
url http://rhn.redhat.com/errata/RHSA-2016-2131.html
22
reference_url https://access.redhat.com/errata/RHSA-2016:2595
reference_id RHSA-2016:2595
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2595
23
reference_url http://rhn.redhat.com/errata/RHSA-2016-2595.html
reference_id RHSA-2016-2595.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:22Z/
url http://rhn.redhat.com/errata/RHSA-2016-2595.html
24
reference_url https://access.redhat.com/errata/RHSA-2016:2749
reference_id RHSA-2016:2749
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2749
25
reference_url http://rhn.redhat.com/errata/RHSA-2016-2749.html
reference_id RHSA-2016-2749.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:22Z/
url http://rhn.redhat.com/errata/RHSA-2016-2749.html
26
reference_url https://access.redhat.com/errata/RHSA-2016:2927
reference_id RHSA-2016:2927
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2927
27
reference_url https://access.redhat.com/errata/RHSA-2016:2928
reference_id RHSA-2016:2928
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2928
fixed_packages
0
url pkg:deb/debian/mariadb-10.0@10.0.30-0%2Bdeb8u2
purl pkg:deb/debian/mariadb-10.0@10.0.30-0%2Bdeb8u2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1gmc-pj6y-rkfx
1
vulnerability VCID-4yz4-vxnh-b3dp
2
vulnerability VCID-5sjj-599v-vybg
3
vulnerability VCID-6g4n-3xfu-hfee
4
vulnerability VCID-6muh-rg1z-pqab
5
vulnerability VCID-bhxk-8byp-eyap
6
vulnerability VCID-ej67-ayfh-sqdt
7
vulnerability VCID-jgff-4jyp-9fgr
8
vulnerability VCID-mde2-1ynu-auh2
9
vulnerability VCID-v4gv-g9n5-ukgc
10
vulnerability VCID-yx79-3g2x-pqex
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.0@10.0.30-0%252Bdeb8u2
aliases CVE-2016-8283
risk_score 1.9
exploitability 0.5
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vh5y-15tw-d7fd
24
url VCID-wrna-cc9g-sqbe
vulnerability_id VCID-wrna-cc9g-sqbe
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could lead to privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3313.json
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3313.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-3313
reference_id
reference_type
scores
0
value 0.00053
scoring_system epss
scoring_elements 0.16602
published_at 2026-04-21T12:55:00Z
1
value 0.00053
scoring_system epss
scoring_elements 0.16579
published_at 2026-04-01T12:55:00Z
2
value 0.00053
scoring_system epss
scoring_elements 0.16758
published_at 2026-04-02T12:55:00Z
3
value 0.00053
scoring_system epss
scoring_elements 0.16688
published_at 2026-04-08T12:55:00Z
4
value 0.00053
scoring_system epss
scoring_elements 0.16742
published_at 2026-04-09T12:55:00Z
5
value 0.00053
scoring_system epss
scoring_elements 0.16722
published_at 2026-04-11T12:55:00Z
6
value 0.00053
scoring_system epss
scoring_elements 0.16679
published_at 2026-04-12T12:55:00Z
7
value 0.00053
scoring_system epss
scoring_elements 0.1662
published_at 2026-04-13T12:55:00Z
8
value 0.00053
scoring_system epss
scoring_elements 0.16556
published_at 2026-04-16T12:55:00Z
9
value 0.00053
scoring_system epss
scoring_elements 0.16564
published_at 2026-04-18T12:55:00Z
10
value 0.00053
scoring_system epss
scoring_elements 0.16818
published_at 2026-04-04T12:55:00Z
11
value 0.00053
scoring_system epss
scoring_elements 0.16603
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-3313
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3238
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3238
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3243
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3243
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3244
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3244
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3258
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3258
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3265
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3265
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3291
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3291
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3302
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3302
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3312
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3312
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3313
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3313
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3317
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3317
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3318
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3318
13
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.8
scoring_system cvssv2
scoring_elements AV:L/AC:H/Au:S/C:C/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
14
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1414353
reference_id 1414353
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1414353
15
reference_url http://www.securityfocus.com/bid/95527
reference_id 95527
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-08T20:09:35Z/
url http://www.securityfocus.com/bid/95527
16
reference_url http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
reference_id cpujan2017-2881727.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-08T20:09:35Z/
url http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
17
reference_url http://www.debian.org/security/2017/dsa-3767
reference_id dsa-3767
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-08T20:09:35Z/
url http://www.debian.org/security/2017/dsa-3767
18
reference_url http://www.debian.org/security/2017/dsa-3809
reference_id dsa-3809
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-08T20:09:35Z/
url http://www.debian.org/security/2017/dsa-3809
19
reference_url https://security.gentoo.org/glsa/201702-17
reference_id GLSA-201702-17
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-08T20:09:35Z/
url https://security.gentoo.org/glsa/201702-17
20
reference_url https://access.redhat.com/errata/RHSA-2017:2192
reference_id RHSA-2017:2192
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-08T20:09:35Z/
url https://access.redhat.com/errata/RHSA-2017:2192
21
reference_url https://access.redhat.com/errata/RHSA-2017:2787
reference_id RHSA-2017:2787
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-08T20:09:35Z/
url https://access.redhat.com/errata/RHSA-2017:2787
22
reference_url https://access.redhat.com/errata/RHSA-2017:2886
reference_id RHSA-2017:2886
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-08T20:09:35Z/
url https://access.redhat.com/errata/RHSA-2017:2886
23
reference_url https://access.redhat.com/errata/RHSA-2018:0279
reference_id RHSA-2018:0279
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-08T20:09:35Z/
url https://access.redhat.com/errata/RHSA-2018:0279
24
reference_url https://access.redhat.com/errata/RHSA-2018:0574
reference_id RHSA-2018:0574
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-08T20:09:35Z/
url https://access.redhat.com/errata/RHSA-2018:0574
25
reference_url https://usn.ubuntu.com/3174-1/
reference_id USN-3174-1
reference_type
scores
url https://usn.ubuntu.com/3174-1/
fixed_packages
0
url pkg:deb/debian/mariadb-10.0@10.0.30-0%2Bdeb8u2
purl pkg:deb/debian/mariadb-10.0@10.0.30-0%2Bdeb8u2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1gmc-pj6y-rkfx
1
vulnerability VCID-4yz4-vxnh-b3dp
2
vulnerability VCID-5sjj-599v-vybg
3
vulnerability VCID-6g4n-3xfu-hfee
4
vulnerability VCID-6muh-rg1z-pqab
5
vulnerability VCID-bhxk-8byp-eyap
6
vulnerability VCID-ej67-ayfh-sqdt
7
vulnerability VCID-jgff-4jyp-9fgr
8
vulnerability VCID-mde2-1ynu-auh2
9
vulnerability VCID-v4gv-g9n5-ukgc
10
vulnerability VCID-yx79-3g2x-pqex
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.0@10.0.30-0%252Bdeb8u2
aliases CVE-2017-3313
risk_score 2.1
exploitability 0.5
weighted_severity 4.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wrna-cc9g-sqbe
Risk_score3.5
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.0@10.0.30-0%252Bdeb8u2