Lookup for vulnerable packages by Package URL.

Purlpkg:rpm/redhat/rh-mysql57-mysql@5.7.19-6?arch=el6
Typerpm
Namespaceredhat
Namerh-mysql57-mysql
Version5.7.19-6
Qualifiers
arch el6
Subpath
Is_vulnerabletrue
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
0
url VCID-1wku-281z-pkg2
vulnerability_id VCID-1wku-281z-pkg2
summary
Multiple vulnerabilities were found in MySQL, the worst of which
    may allow remote execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3637.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3637.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-3637
reference_id
reference_type
scores
0
value 0.00441
scoring_system epss
scoring_elements 0.63199
published_at 2026-04-02T12:55:00Z
1
value 0.00441
scoring_system epss
scoring_elements 0.63265
published_at 2026-04-16T12:55:00Z
2
value 0.00441
scoring_system epss
scoring_elements 0.63139
published_at 2026-04-01T12:55:00Z
3
value 0.00441
scoring_system epss
scoring_elements 0.6328
published_at 2026-04-11T12:55:00Z
4
value 0.00441
scoring_system epss
scoring_elements 0.63264
published_at 2026-04-12T12:55:00Z
5
value 0.00441
scoring_system epss
scoring_elements 0.63229
published_at 2026-04-13T12:55:00Z
6
value 0.00441
scoring_system epss
scoring_elements 0.63228
published_at 2026-04-04T12:55:00Z
7
value 0.00441
scoring_system epss
scoring_elements 0.63194
published_at 2026-04-07T12:55:00Z
8
value 0.00441
scoring_system epss
scoring_elements 0.63245
published_at 2026-04-08T12:55:00Z
9
value 0.00441
scoring_system epss
scoring_elements 0.63263
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-3637
2
reference_url http://www.securitytracker.com/id/1038928
reference_id 1038928
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:48:20Z/
url http://www.securitytracker.com/id/1038928
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1472687
reference_id 1472687
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1472687
4
reference_url http://www.securityfocus.com/bid/99748
reference_id 99748
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:48:20Z/
url http://www.securityfocus.com/bid/99748
5
reference_url https://security.gentoo.org/glsa/201802-04
reference_id GLSA-201802-04
reference_type
scores
url https://security.gentoo.org/glsa/201802-04
6
reference_url https://access.redhat.com/errata/RHSA-2017:2886
reference_id RHSA-2017:2886
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:48:20Z/
url https://access.redhat.com/errata/RHSA-2017:2886
7
reference_url https://usn.ubuntu.com/3357-1/
reference_id USN-3357-1
reference_type
scores
url https://usn.ubuntu.com/3357-1/
fixed_packages
aliases CVE-2017-3637
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1wku-281z-pkg2
1
url VCID-2gyq-q761-h3br
vulnerability_id VCID-2gyq-q761-h3br
summary
Multiple vulnerabilities have been found in MariaDB, the worst of
    which could lead to privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3312.json
reference_id
reference_type
scores
0
value 6.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3312.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-3312
reference_id
reference_type
scores
0
value 0.00123
scoring_system epss
scoring_elements 0.31415
published_at 2026-04-16T12:55:00Z
1
value 0.00123
scoring_system epss
scoring_elements 0.31376
published_at 2026-04-01T12:55:00Z
2
value 0.00123
scoring_system epss
scoring_elements 0.31513
published_at 2026-04-02T12:55:00Z
3
value 0.00123
scoring_system epss
scoring_elements 0.31555
published_at 2026-04-04T12:55:00Z
4
value 0.00123
scoring_system epss
scoring_elements 0.31373
published_at 2026-04-07T12:55:00Z
5
value 0.00123
scoring_system epss
scoring_elements 0.31426
published_at 2026-04-08T12:55:00Z
6
value 0.00123
scoring_system epss
scoring_elements 0.31457
published_at 2026-04-09T12:55:00Z
7
value 0.00123
scoring_system epss
scoring_elements 0.3146
published_at 2026-04-11T12:55:00Z
8
value 0.00123
scoring_system epss
scoring_elements 0.31417
published_at 2026-04-12T12:55:00Z
9
value 0.00123
scoring_system epss
scoring_elements 0.31381
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-3312
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6664
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6664
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3238
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3238
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3243
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3243
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3244
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3244
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3257
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3257
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3258
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3258
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3265
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3265
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3291
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3291
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3312
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3312
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3313
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3313
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3317
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3317
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3318
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3318
14
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.2
scoring_system cvssv2
scoring_elements AV:L/AC:H/Au:N/C:C/I:C/A:C
1
value 6.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1414133
reference_id 1414133
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1414133
16
reference_url http://www.securityfocus.com/bid/95491
reference_id 95491
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:06:01Z/
url http://www.securityfocus.com/bid/95491
17
reference_url http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
reference_id cpujan2017-2881727.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:06:01Z/
url http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
18
reference_url http://www.debian.org/security/2017/dsa-3767
reference_id dsa-3767
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:06:01Z/
url http://www.debian.org/security/2017/dsa-3767
19
reference_url http://www.debian.org/security/2017/dsa-3770
reference_id dsa-3770
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:06:01Z/
url http://www.debian.org/security/2017/dsa-3770
20
reference_url https://security.gentoo.org/glsa/201702-17
reference_id GLSA-201702-17
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:06:01Z/
url https://security.gentoo.org/glsa/201702-17
21
reference_url https://security.gentoo.org/glsa/201702-18
reference_id GLSA-201702-18
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:06:01Z/
url https://security.gentoo.org/glsa/201702-18
22
reference_url https://access.redhat.com/errata/RHSA-2017:2192
reference_id RHSA-2017:2192
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:06:01Z/
url https://access.redhat.com/errata/RHSA-2017:2192
23
reference_url https://access.redhat.com/errata/RHSA-2017:2787
reference_id RHSA-2017:2787
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:06:01Z/
url https://access.redhat.com/errata/RHSA-2017:2787
24
reference_url https://access.redhat.com/errata/RHSA-2017:2886
reference_id RHSA-2017:2886
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:06:01Z/
url https://access.redhat.com/errata/RHSA-2017:2886
25
reference_url https://access.redhat.com/errata/RHSA-2018:0279
reference_id RHSA-2018:0279
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:06:01Z/
url https://access.redhat.com/errata/RHSA-2018:0279
26
reference_url https://access.redhat.com/errata/RHSA-2018:0574
reference_id RHSA-2018:0574
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:06:01Z/
url https://access.redhat.com/errata/RHSA-2018:0574
27
reference_url https://usn.ubuntu.com/3174-1/
reference_id USN-3174-1
reference_type
scores
url https://usn.ubuntu.com/3174-1/
fixed_packages
aliases CVE-2017-3312
risk_score 3.0
exploitability 0.5
weighted_severity 6.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2gyq-q761-h3br
2
url VCID-2rf6-qaey-1ubn
vulnerability_id VCID-2rf6-qaey-1ubn
summary
Multiple vulnerabilities have been found in MariaDB, the worst of
    which could lead to privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3257.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3257.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-3257
reference_id
reference_type
scores
0
value 0.0029
scoring_system epss
scoring_elements 0.52395
published_at 2026-04-07T12:55:00Z
1
value 0.0029
scoring_system epss
scoring_elements 0.52402
published_at 2026-04-02T12:55:00Z
2
value 0.0029
scoring_system epss
scoring_elements 0.52501
published_at 2026-04-16T12:55:00Z
3
value 0.0029
scoring_system epss
scoring_elements 0.5246
published_at 2026-04-13T12:55:00Z
4
value 0.0029
scoring_system epss
scoring_elements 0.52448
published_at 2026-04-08T12:55:00Z
5
value 0.0029
scoring_system epss
scoring_elements 0.52477
published_at 2026-04-12T12:55:00Z
6
value 0.0029
scoring_system epss
scoring_elements 0.52357
published_at 2026-04-01T12:55:00Z
7
value 0.0029
scoring_system epss
scoring_elements 0.52493
published_at 2026-04-11T12:55:00Z
8
value 0.0029
scoring_system epss
scoring_elements 0.52442
published_at 2026-04-09T12:55:00Z
9
value 0.0029
scoring_system epss
scoring_elements 0.5243
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-3257
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6664
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6664
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3238
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3238
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3243
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3243
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3244
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3244
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3257
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3257
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3258
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3258
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3265
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3265
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3291
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3291
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3312
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3312
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3317
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3317
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3318
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3318
13
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:C
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
14
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1414350
reference_id 1414350
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1414350
15
reference_url http://www.securityfocus.com/bid/95589
reference_id 95589
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:12Z/
url http://www.securityfocus.com/bid/95589
16
reference_url http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
reference_id cpujan2017-2881727.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:12Z/
url http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
17
reference_url http://www.debian.org/security/2017/dsa-3770
reference_id dsa-3770
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:12Z/
url http://www.debian.org/security/2017/dsa-3770
18
reference_url https://security.gentoo.org/glsa/201702-17
reference_id GLSA-201702-17
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:12Z/
url https://security.gentoo.org/glsa/201702-17
19
reference_url https://security.gentoo.org/glsa/201702-18
reference_id GLSA-201702-18
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:12Z/
url https://security.gentoo.org/glsa/201702-18
20
reference_url https://access.redhat.com/errata/RHSA-2017:2787
reference_id RHSA-2017:2787
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:12Z/
url https://access.redhat.com/errata/RHSA-2017:2787
21
reference_url https://access.redhat.com/errata/RHSA-2017:2886
reference_id RHSA-2017:2886
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:12Z/
url https://access.redhat.com/errata/RHSA-2017:2886
22
reference_url https://access.redhat.com/errata/RHSA-2018:0279
reference_id RHSA-2018:0279
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:12Z/
url https://access.redhat.com/errata/RHSA-2018:0279
23
reference_url https://access.redhat.com/errata/RHSA-2018:0574
reference_id RHSA-2018:0574
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:12Z/
url https://access.redhat.com/errata/RHSA-2018:0574
fixed_packages
aliases CVE-2017-3257
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2rf6-qaey-1ubn
3
url VCID-2za2-cnwx-hbbw
vulnerability_id VCID-2za2-cnwx-hbbw
summary
Multiple vulnerabilities were found in MySQL, the worst of which
    may allow remote execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3463.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3463.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-3463
reference_id
reference_type
scores
0
value 0.00543
scoring_system epss
scoring_elements 0.67751
published_at 2026-04-16T12:55:00Z
1
value 0.00543
scoring_system epss
scoring_elements 0.67638
published_at 2026-04-01T12:55:00Z
2
value 0.00543
scoring_system epss
scoring_elements 0.67673
published_at 2026-04-07T12:55:00Z
3
value 0.00543
scoring_system epss
scoring_elements 0.67693
published_at 2026-04-04T12:55:00Z
4
value 0.00543
scoring_system epss
scoring_elements 0.67725
published_at 2026-04-08T12:55:00Z
5
value 0.00543
scoring_system epss
scoring_elements 0.67739
published_at 2026-04-09T12:55:00Z
6
value 0.00543
scoring_system epss
scoring_elements 0.67763
published_at 2026-04-11T12:55:00Z
7
value 0.00543
scoring_system epss
scoring_elements 0.67748
published_at 2026-04-12T12:55:00Z
8
value 0.00543
scoring_system epss
scoring_elements 0.67715
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-3463
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3302
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3302
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3305
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3305
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3308
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3308
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3309
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3309
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3329
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3329
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3453
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3453
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3456
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3456
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3461
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3461
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3462
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3462
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3463
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3463
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3464
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3464
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3600
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3600
14
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 2.1
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:S/C:N/I:N/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
15
reference_url http://www.debian.org/security/2017/dsa-3834
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:56Z/
url http://www.debian.org/security/2017/dsa-3834
16
reference_url http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:56Z/
url http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
17
reference_url http://www.securityfocus.com/bid/97849
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:56Z/
url http://www.securityfocus.com/bid/97849
18
reference_url http://www.securitytracker.com/id/1038287
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:56Z/
url http://www.securitytracker.com/id/1038287
19
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1443378
reference_id 1443378
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1443378
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-3463
reference_id CVE-2017-3463
reference_type
scores
0
value 4.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:P
1
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-3463
23
reference_url https://security.gentoo.org/glsa/201802-04
reference_id GLSA-201802-04
reference_type
scores
url https://security.gentoo.org/glsa/201802-04
24
reference_url https://access.redhat.com/errata/RHSA-2017:2787
reference_id RHSA-2017:2787
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:56Z/
url https://access.redhat.com/errata/RHSA-2017:2787
25
reference_url https://access.redhat.com/errata/RHSA-2017:2886
reference_id RHSA-2017:2886
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:56Z/
url https://access.redhat.com/errata/RHSA-2017:2886
26
reference_url https://usn.ubuntu.com/3269-1/
reference_id USN-3269-1
reference_type
scores
url https://usn.ubuntu.com/3269-1/
27
reference_url https://usn.ubuntu.com/3357-2/
reference_id USN-3357-2
reference_type
scores
url https://usn.ubuntu.com/3357-2/
fixed_packages
aliases CVE-2017-3463
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2za2-cnwx-hbbw
4
url VCID-3mvb-yszd-sqcr
vulnerability_id VCID-3mvb-yszd-sqcr
summary mysql: Server: DML unspecified vulnerability (CPU Jul 2017)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3639.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3639.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-3639
reference_id
reference_type
scores
0
value 0.00349
scoring_system epss
scoring_elements 0.57408
published_at 2026-04-02T12:55:00Z
1
value 0.00349
scoring_system epss
scoring_elements 0.57436
published_at 2026-04-13T12:55:00Z
2
value 0.00349
scoring_system epss
scoring_elements 0.57327
published_at 2026-04-01T12:55:00Z
3
value 0.00349
scoring_system epss
scoring_elements 0.5746
published_at 2026-04-08T12:55:00Z
4
value 0.00349
scoring_system epss
scoring_elements 0.57462
published_at 2026-04-16T12:55:00Z
5
value 0.00349
scoring_system epss
scoring_elements 0.57478
published_at 2026-04-11T12:55:00Z
6
value 0.00349
scoring_system epss
scoring_elements 0.57456
published_at 2026-04-12T12:55:00Z
7
value 0.00349
scoring_system epss
scoring_elements 0.57431
published_at 2026-04-04T12:55:00Z
8
value 0.00349
scoring_system epss
scoring_elements 0.57407
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-3639
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url http://www.securitytracker.com/id/1038928
reference_id 1038928
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:48:18Z/
url http://www.securitytracker.com/id/1038928
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1472689
reference_id 1472689
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1472689
5
reference_url http://www.securityfocus.com/bid/99753
reference_id 99753
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:48:18Z/
url http://www.securityfocus.com/bid/99753
6
reference_url https://access.redhat.com/errata/RHSA-2017:2886
reference_id RHSA-2017:2886
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:48:18Z/
url https://access.redhat.com/errata/RHSA-2017:2886
7
reference_url https://usn.ubuntu.com/3357-1/
reference_id USN-3357-1
reference_type
scores
url https://usn.ubuntu.com/3357-1/
fixed_packages
aliases CVE-2017-3639
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3mvb-yszd-sqcr
5
url VCID-4yz4-vxnh-b3dp
vulnerability_id VCID-4yz4-vxnh-b3dp
summary
Multiple vulnerabilities were found in MySQL, the worst of which
    may allow remote execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3464.json
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3464.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-3464
reference_id
reference_type
scores
0
value 0.00217
scoring_system epss
scoring_elements 0.44316
published_at 2026-04-16T12:55:00Z
1
value 0.00217
scoring_system epss
scoring_elements 0.44193
published_at 2026-04-01T12:55:00Z
2
value 0.00217
scoring_system epss
scoring_elements 0.4426
published_at 2026-04-02T12:55:00Z
3
value 0.00217
scoring_system epss
scoring_elements 0.44283
published_at 2026-04-04T12:55:00Z
4
value 0.00217
scoring_system epss
scoring_elements 0.44216
published_at 2026-04-07T12:55:00Z
5
value 0.00217
scoring_system epss
scoring_elements 0.44268
published_at 2026-04-08T12:55:00Z
6
value 0.00217
scoring_system epss
scoring_elements 0.44272
published_at 2026-04-09T12:55:00Z
7
value 0.00217
scoring_system epss
scoring_elements 0.4429
published_at 2026-04-11T12:55:00Z
8
value 0.00217
scoring_system epss
scoring_elements 0.44258
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-3464
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10286
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10286
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10379
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10379
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10384
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10384
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3302
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3302
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3305
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3305
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3308
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3308
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3309
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3309
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3329
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3329
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3453
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3453
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3456
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3456
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3461
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3461
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3462
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3462
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3463
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3463
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3464
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3464
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3600
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3600
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3636
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3636
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3641
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3641
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3653
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3653
20
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 2.1
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:S/C:N/I:P/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
21
reference_url http://www.debian.org/security/2017/dsa-3834
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:55Z/
url http://www.debian.org/security/2017/dsa-3834
22
reference_url http://www.debian.org/security/2017/dsa-3944
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:55Z/
url http://www.debian.org/security/2017/dsa-3944
23
reference_url http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:55Z/
url http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
24
reference_url http://www.securityfocus.com/bid/97818
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:55Z/
url http://www.securityfocus.com/bid/97818
25
reference_url http://www.securitytracker.com/id/1038287
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:55Z/
url http://www.securitytracker.com/id/1038287
26
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1443379
reference_id 1443379
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1443379
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-3464
reference_id CVE-2017-3464
reference_type
scores
0
value 4.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:P/A:N
1
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2017-3464
40
reference_url https://security.gentoo.org/glsa/201802-04
reference_id GLSA-201802-04
reference_type
scores
url https://security.gentoo.org/glsa/201802-04
41
reference_url https://access.redhat.com/errata/RHSA-2017:2192
reference_id RHSA-2017:2192
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:55Z/
url https://access.redhat.com/errata/RHSA-2017:2192
42
reference_url https://access.redhat.com/errata/RHSA-2017:2787
reference_id RHSA-2017:2787
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:55Z/
url https://access.redhat.com/errata/RHSA-2017:2787
43
reference_url https://access.redhat.com/errata/RHSA-2017:2886
reference_id RHSA-2017:2886
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:55Z/
url https://access.redhat.com/errata/RHSA-2017:2886
44
reference_url https://access.redhat.com/errata/RHSA-2018:0279
reference_id RHSA-2018:0279
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:55Z/
url https://access.redhat.com/errata/RHSA-2018:0279
45
reference_url https://access.redhat.com/errata/RHSA-2018:0574
reference_id RHSA-2018:0574
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:55Z/
url https://access.redhat.com/errata/RHSA-2018:0574
46
reference_url https://usn.ubuntu.com/3269-1/
reference_id USN-3269-1
reference_type
scores
url https://usn.ubuntu.com/3269-1/
47
reference_url https://usn.ubuntu.com/3357-2/
reference_id USN-3357-2
reference_type
scores
url https://usn.ubuntu.com/3357-2/
fixed_packages
aliases CVE-2017-3464
risk_score 1.9
exploitability 0.5
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4yz4-vxnh-b3dp
6
url VCID-5sjj-599v-vybg
vulnerability_id VCID-5sjj-599v-vybg
summary
Multiple vulnerabilities were found in MySQL, the worst of which
    may allow remote execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3653.json
reference_id
reference_type
scores
0
value 3.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3653.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-3653
reference_id
reference_type
scores
0
value 0.0027
scoring_system epss
scoring_elements 0.50454
published_at 2026-04-02T12:55:00Z
1
value 0.0027
scoring_system epss
scoring_elements 0.50483
published_at 2026-04-04T12:55:00Z
2
value 0.0027
scoring_system epss
scoring_elements 0.50436
published_at 2026-04-07T12:55:00Z
3
value 0.0027
scoring_system epss
scoring_elements 0.5049
published_at 2026-04-08T12:55:00Z
4
value 0.0027
scoring_system epss
scoring_elements 0.50487
published_at 2026-04-09T12:55:00Z
5
value 0.0027
scoring_system epss
scoring_elements 0.5053
published_at 2026-04-11T12:55:00Z
6
value 0.0027
scoring_system epss
scoring_elements 0.50507
published_at 2026-04-12T12:55:00Z
7
value 0.0027
scoring_system epss
scoring_elements 0.50492
published_at 2026-04-13T12:55:00Z
8
value 0.0027
scoring_system epss
scoring_elements 0.50534
published_at 2026-04-16T12:55:00Z
9
value 0.0027
scoring_system epss
scoring_elements 0.50399
published_at 2026-04-01T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-3653
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10286
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10286
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10379
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10379
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10384
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10384
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3308
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3308
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3309
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3309
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3453
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3453
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3456
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3456
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3464
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3464
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3635
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3635
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3636
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3636
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3641
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3641
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3648
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3648
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3651
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3651
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3652
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3652
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3653
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3653
17
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 2.1
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:S/C:N/I:P/A:N
1
value 3.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
18
reference_url http://www.securitytracker.com/id/1038928
reference_id 1038928
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:47:41Z/
url http://www.securitytracker.com/id/1038928
19
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1472711
reference_id 1472711
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1472711
20
reference_url http://www.securityfocus.com/bid/99810
reference_id 99810
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:47:41Z/
url http://www.securityfocus.com/bid/99810
21
reference_url http://www.debian.org/security/2017/dsa-3922
reference_id dsa-3922
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:47:41Z/
url http://www.debian.org/security/2017/dsa-3922
22
reference_url https://www.debian.org/security/2017/dsa-3955
reference_id dsa-3955
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:47:41Z/
url https://www.debian.org/security/2017/dsa-3955
23
reference_url https://security.gentoo.org/glsa/201802-04
reference_id GLSA-201802-04
reference_type
scores
url https://security.gentoo.org/glsa/201802-04
24
reference_url https://access.redhat.com/errata/RHSA-2017:2787
reference_id RHSA-2017:2787
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:47:41Z/
url https://access.redhat.com/errata/RHSA-2017:2787
25
reference_url https://access.redhat.com/errata/RHSA-2017:2886
reference_id RHSA-2017:2886
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:47:41Z/
url https://access.redhat.com/errata/RHSA-2017:2886
26
reference_url https://access.redhat.com/errata/RHSA-2018:0279
reference_id RHSA-2018:0279
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:47:41Z/
url https://access.redhat.com/errata/RHSA-2018:0279
27
reference_url https://access.redhat.com/errata/RHSA-2018:0574
reference_id RHSA-2018:0574
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:47:41Z/
url https://access.redhat.com/errata/RHSA-2018:0574
28
reference_url https://access.redhat.com/errata/RHSA-2018:2439
reference_id RHSA-2018:2439
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:47:41Z/
url https://access.redhat.com/errata/RHSA-2018:2439
29
reference_url https://access.redhat.com/errata/RHSA-2018:2729
reference_id RHSA-2018:2729
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:47:41Z/
url https://access.redhat.com/errata/RHSA-2018:2729
30
reference_url https://usn.ubuntu.com/3357-1/
reference_id USN-3357-1
reference_type
scores
url https://usn.ubuntu.com/3357-1/
31
reference_url https://usn.ubuntu.com/3357-2/
reference_id USN-3357-2
reference_type
scores
url https://usn.ubuntu.com/3357-2/
fixed_packages
aliases CVE-2017-3653
risk_score 1.4
exploitability 0.5
weighted_severity 2.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5sjj-599v-vybg
7
url VCID-67sx-dk4r-yfb6
vulnerability_id VCID-67sx-dk4r-yfb6
summary mysql: Server: DML unspecified vulnerability (CPU Jul 2017)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3640.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3640.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-3640
reference_id
reference_type
scores
0
value 0.00349
scoring_system epss
scoring_elements 0.57408
published_at 2026-04-02T12:55:00Z
1
value 0.00349
scoring_system epss
scoring_elements 0.57436
published_at 2026-04-13T12:55:00Z
2
value 0.00349
scoring_system epss
scoring_elements 0.57327
published_at 2026-04-01T12:55:00Z
3
value 0.00349
scoring_system epss
scoring_elements 0.57407
published_at 2026-04-07T12:55:00Z
4
value 0.00349
scoring_system epss
scoring_elements 0.5746
published_at 2026-04-08T12:55:00Z
5
value 0.00349
scoring_system epss
scoring_elements 0.57462
published_at 2026-04-16T12:55:00Z
6
value 0.00349
scoring_system epss
scoring_elements 0.57478
published_at 2026-04-11T12:55:00Z
7
value 0.00349
scoring_system epss
scoring_elements 0.57456
published_at 2026-04-12T12:55:00Z
8
value 0.00349
scoring_system epss
scoring_elements 0.57431
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-3640
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:C
1
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url http://www.securitytracker.com/id/1038928
reference_id 1038928
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:48:16Z/
url http://www.securitytracker.com/id/1038928
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1472692
reference_id 1472692
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1472692
5
reference_url http://www.securityfocus.com/bid/99765
reference_id 99765
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:48:16Z/
url http://www.securityfocus.com/bid/99765
6
reference_url https://access.redhat.com/errata/RHSA-2017:2886
reference_id RHSA-2017:2886
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:48:16Z/
url https://access.redhat.com/errata/RHSA-2017:2886
7
reference_url https://usn.ubuntu.com/3357-1/
reference_id USN-3357-1
reference_type
scores
url https://usn.ubuntu.com/3357-1/
fixed_packages
aliases CVE-2017-3640
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-67sx-dk4r-yfb6
8
url VCID-6g4n-3xfu-hfee
vulnerability_id VCID-6g4n-3xfu-hfee
summary
Multiple vulnerabilities were found in MySQL, the worst of which
    may allow remote execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3308.json
reference_id
reference_type
scores
0
value 7.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3308.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-3308
reference_id
reference_type
scores
0
value 0.00321
scoring_system epss
scoring_elements 0.55158
published_at 2026-04-16T12:55:00Z
1
value 0.00321
scoring_system epss
scoring_elements 0.54995
published_at 2026-04-01T12:55:00Z
2
value 0.00321
scoring_system epss
scoring_elements 0.55096
published_at 2026-04-02T12:55:00Z
3
value 0.00321
scoring_system epss
scoring_elements 0.5512
published_at 2026-04-04T12:55:00Z
4
value 0.00321
scoring_system epss
scoring_elements 0.55095
published_at 2026-04-07T12:55:00Z
5
value 0.00321
scoring_system epss
scoring_elements 0.55146
published_at 2026-04-08T12:55:00Z
6
value 0.00321
scoring_system epss
scoring_elements 0.55145
published_at 2026-04-09T12:55:00Z
7
value 0.00321
scoring_system epss
scoring_elements 0.55157
published_at 2026-04-11T12:55:00Z
8
value 0.00321
scoring_system epss
scoring_elements 0.55137
published_at 2026-04-12T12:55:00Z
9
value 0.00321
scoring_system epss
scoring_elements 0.55119
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-3308
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10286
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10286
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10379
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10379
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10384
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10384
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3302
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3302
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3305
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3305
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3308
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3308
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3309
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3309
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3329
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3329
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3453
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3453
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3456
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3456
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3461
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3461
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3462
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3462
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3463
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3463
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3464
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3464
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3600
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3600
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3636
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3636
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3641
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3641
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3653
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3653
20
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 2.1
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:S/C:N/I:N/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
21
reference_url http://www.debian.org/security/2017/dsa-3834
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:46:18Z/
url http://www.debian.org/security/2017/dsa-3834
22
reference_url http://www.debian.org/security/2017/dsa-3944
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:46:18Z/
url http://www.debian.org/security/2017/dsa-3944
23
reference_url http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:46:18Z/
url http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
24
reference_url http://www.securityfocus.com/bid/97725
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:46:18Z/
url http://www.securityfocus.com/bid/97725
25
reference_url http://www.securitytracker.com/id/1038287
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:46:18Z/
url http://www.securitytracker.com/id/1038287
26
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1443358
reference_id 1443358
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1443358
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-3308
reference_id CVE-2017-3308
reference_type
scores
0
value 4.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:P
1
value 7.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-3308
43
reference_url https://security.gentoo.org/glsa/201802-04
reference_id GLSA-201802-04
reference_type
scores
url https://security.gentoo.org/glsa/201802-04
44
reference_url https://access.redhat.com/errata/RHSA-2017:2192
reference_id RHSA-2017:2192
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:46:18Z/
url https://access.redhat.com/errata/RHSA-2017:2192
45
reference_url https://access.redhat.com/errata/RHSA-2017:2787
reference_id RHSA-2017:2787
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:46:18Z/
url https://access.redhat.com/errata/RHSA-2017:2787
46
reference_url https://access.redhat.com/errata/RHSA-2017:2886
reference_id RHSA-2017:2886
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:46:18Z/
url https://access.redhat.com/errata/RHSA-2017:2886
47
reference_url https://access.redhat.com/errata/RHSA-2018:0279
reference_id RHSA-2018:0279
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:46:18Z/
url https://access.redhat.com/errata/RHSA-2018:0279
48
reference_url https://access.redhat.com/errata/RHSA-2018:0574
reference_id RHSA-2018:0574
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:46:18Z/
url https://access.redhat.com/errata/RHSA-2018:0574
49
reference_url https://usn.ubuntu.com/3269-1/
reference_id USN-3269-1
reference_type
scores
url https://usn.ubuntu.com/3269-1/
50
reference_url https://usn.ubuntu.com/3357-2/
reference_id USN-3357-2
reference_type
scores
url https://usn.ubuntu.com/3357-2/
fixed_packages
aliases CVE-2017-3308
risk_score 3.5
exploitability 0.5
weighted_severity 6.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6g4n-3xfu-hfee
9
url VCID-6nfa-zy2p-zkdj
vulnerability_id VCID-6nfa-zy2p-zkdj
summary
Multiple vulnerabilities were found in MySQL, the worst of which
    may allow remote execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3647.json
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3647.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-3647
reference_id
reference_type
scores
0
value 0.00406
scoring_system epss
scoring_elements 0.61104
published_at 2026-04-16T12:55:00Z
1
value 0.00406
scoring_system epss
scoring_elements 0.60939
published_at 2026-04-01T12:55:00Z
2
value 0.00406
scoring_system epss
scoring_elements 0.61016
published_at 2026-04-02T12:55:00Z
3
value 0.00406
scoring_system epss
scoring_elements 0.61058
published_at 2026-04-08T12:55:00Z
4
value 0.00406
scoring_system epss
scoring_elements 0.61074
published_at 2026-04-09T12:55:00Z
5
value 0.00406
scoring_system epss
scoring_elements 0.61095
published_at 2026-04-11T12:55:00Z
6
value 0.00406
scoring_system epss
scoring_elements 0.61082
published_at 2026-04-12T12:55:00Z
7
value 0.00406
scoring_system epss
scoring_elements 0.61063
published_at 2026-04-13T12:55:00Z
8
value 0.00406
scoring_system epss
scoring_elements 0.61045
published_at 2026-04-04T12:55:00Z
9
value 0.00406
scoring_system epss
scoring_elements 0.6101
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-3647
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:S/C:N/I:N/A:C
1
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url http://www.securitytracker.com/id/1038928
reference_id 1038928
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:47:56Z/
url http://www.securitytracker.com/id/1038928
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1472703
reference_id 1472703
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1472703
5
reference_url http://www.securityfocus.com/bid/99796
reference_id 99796
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:47:56Z/
url http://www.securityfocus.com/bid/99796
6
reference_url https://security.gentoo.org/glsa/201802-04
reference_id GLSA-201802-04
reference_type
scores
url https://security.gentoo.org/glsa/201802-04
7
reference_url https://access.redhat.com/errata/RHSA-2017:2787
reference_id RHSA-2017:2787
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:47:56Z/
url https://access.redhat.com/errata/RHSA-2017:2787
8
reference_url https://access.redhat.com/errata/RHSA-2017:2886
reference_id RHSA-2017:2886
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:47:56Z/
url https://access.redhat.com/errata/RHSA-2017:2886
9
reference_url https://usn.ubuntu.com/3357-1/
reference_id USN-3357-1
reference_type
scores
url https://usn.ubuntu.com/3357-1/
fixed_packages
aliases CVE-2017-3647
risk_score 2.0
exploitability 0.5
weighted_severity 4.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6nfa-zy2p-zkdj
10
url VCID-8p2f-ab4e-yyd1
vulnerability_id VCID-8p2f-ab4e-yyd1
summary
Multiple vulnerabilities were found in MySQL, the worst of which
    may allow remote execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3450.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3450.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-3450
reference_id
reference_type
scores
0
value 0.01049
scoring_system epss
scoring_elements 0.77568
published_at 2026-04-16T12:55:00Z
1
value 0.01049
scoring_system epss
scoring_elements 0.77471
published_at 2026-04-01T12:55:00Z
2
value 0.01049
scoring_system epss
scoring_elements 0.77477
published_at 2026-04-02T12:55:00Z
3
value 0.01049
scoring_system epss
scoring_elements 0.77483
published_at 2026-04-07T12:55:00Z
4
value 0.01049
scoring_system epss
scoring_elements 0.77513
published_at 2026-04-08T12:55:00Z
5
value 0.01049
scoring_system epss
scoring_elements 0.77522
published_at 2026-04-09T12:55:00Z
6
value 0.01049
scoring_system epss
scoring_elements 0.77548
published_at 2026-04-11T12:55:00Z
7
value 0.01049
scoring_system epss
scoring_elements 0.77533
published_at 2026-04-12T12:55:00Z
8
value 0.01049
scoring_system epss
scoring_elements 0.7753
published_at 2026-04-13T12:55:00Z
9
value 0.01049
scoring_system epss
scoring_elements 0.77503
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-3450
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:40:28Z/
url http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
4
reference_url http://www.securityfocus.com/bid/97747
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:40:28Z/
url http://www.securityfocus.com/bid/97747
5
reference_url http://www.securitytracker.com/id/1038287
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:40:28Z/
url http://www.securitytracker.com/id/1038287
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1443363
reference_id 1443363
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1443363
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
8
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-3450
reference_id CVE-2017-3450
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
1
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-3450
9
reference_url https://security.gentoo.org/glsa/201802-04
reference_id GLSA-201802-04
reference_type
scores
url https://security.gentoo.org/glsa/201802-04
10
reference_url https://access.redhat.com/errata/RHSA-2017:2787
reference_id RHSA-2017:2787
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:40:28Z/
url https://access.redhat.com/errata/RHSA-2017:2787
11
reference_url https://access.redhat.com/errata/RHSA-2017:2886
reference_id RHSA-2017:2886
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:40:28Z/
url https://access.redhat.com/errata/RHSA-2017:2886
12
reference_url https://usn.ubuntu.com/3269-1/
reference_id USN-3269-1
reference_type
scores
url https://usn.ubuntu.com/3269-1/
fixed_packages
aliases CVE-2017-3450
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8p2f-ab4e-yyd1
11
url VCID-9f48-53dz-13an
vulnerability_id VCID-9f48-53dz-13an
summary
Multiple vulnerabilities have been found in MariaDB, the worst of
    which could lead to privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3318.json
reference_id
reference_type
scores
0
value 4.0
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3318.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-3318
reference_id
reference_type
scores
0
value 0.00052
scoring_system epss
scoring_elements 0.16294
published_at 2026-04-16T12:55:00Z
1
value 0.00052
scoring_system epss
scoring_elements 0.1629
published_at 2026-04-01T12:55:00Z
2
value 0.00052
scoring_system epss
scoring_elements 0.16472
published_at 2026-04-02T12:55:00Z
3
value 0.00052
scoring_system epss
scoring_elements 0.16533
published_at 2026-04-04T12:55:00Z
4
value 0.00052
scoring_system epss
scoring_elements 0.1633
published_at 2026-04-07T12:55:00Z
5
value 0.00052
scoring_system epss
scoring_elements 0.16416
published_at 2026-04-08T12:55:00Z
6
value 0.00052
scoring_system epss
scoring_elements 0.16474
published_at 2026-04-09T12:55:00Z
7
value 0.00052
scoring_system epss
scoring_elements 0.16459
published_at 2026-04-11T12:55:00Z
8
value 0.00052
scoring_system epss
scoring_elements 0.16419
published_at 2026-04-12T12:55:00Z
9
value 0.00052
scoring_system epss
scoring_elements 0.16358
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-3318
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6664
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6664
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3238
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3238
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3243
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3243
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3244
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3244
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3257
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3257
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3258
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3258
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3265
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3265
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3291
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3291
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3312
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3312
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3313
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3313
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3317
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3317
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3318
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3318
14
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 1
scoring_system cvssv2
scoring_elements AV:L/AC:H/Au:S/C:P/I:N/A:N
1
value 4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1414357
reference_id 1414357
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1414357
16
reference_url http://www.securityfocus.com/bid/95588
reference_id 95588
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-08T20:09:30Z/
url http://www.securityfocus.com/bid/95588
17
reference_url http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
reference_id cpujan2017-2881727.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-08T20:09:30Z/
url http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
18
reference_url http://www.debian.org/security/2017/dsa-3767
reference_id dsa-3767
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-08T20:09:30Z/
url http://www.debian.org/security/2017/dsa-3767
19
reference_url http://www.debian.org/security/2017/dsa-3770
reference_id dsa-3770
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-08T20:09:30Z/
url http://www.debian.org/security/2017/dsa-3770
20
reference_url https://security.gentoo.org/glsa/201702-17
reference_id GLSA-201702-17
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-08T20:09:30Z/
url https://security.gentoo.org/glsa/201702-17
21
reference_url https://security.gentoo.org/glsa/201702-18
reference_id GLSA-201702-18
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-08T20:09:30Z/
url https://security.gentoo.org/glsa/201702-18
22
reference_url https://access.redhat.com/errata/RHSA-2017:2192
reference_id RHSA-2017:2192
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-08T20:09:30Z/
url https://access.redhat.com/errata/RHSA-2017:2192
23
reference_url https://access.redhat.com/errata/RHSA-2017:2787
reference_id RHSA-2017:2787
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-08T20:09:30Z/
url https://access.redhat.com/errata/RHSA-2017:2787
24
reference_url https://access.redhat.com/errata/RHSA-2017:2886
reference_id RHSA-2017:2886
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-08T20:09:30Z/
url https://access.redhat.com/errata/RHSA-2017:2886
25
reference_url https://access.redhat.com/errata/RHSA-2018:0279
reference_id RHSA-2018:0279
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-08T20:09:30Z/
url https://access.redhat.com/errata/RHSA-2018:0279
26
reference_url https://access.redhat.com/errata/RHSA-2018:0574
reference_id RHSA-2018:0574
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-08T20:09:30Z/
url https://access.redhat.com/errata/RHSA-2018:0574
27
reference_url https://usn.ubuntu.com/3174-1/
reference_id USN-3174-1
reference_type
scores
url https://usn.ubuntu.com/3174-1/
fixed_packages
aliases CVE-2017-3318
risk_score 1.8
exploitability 0.5
weighted_severity 3.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9f48-53dz-13an
12
url VCID-9w98-nfg2-muh2
vulnerability_id VCID-9w98-nfg2-muh2
summary
Multiple vulnerabilities have been found in MariaDB, the worst of
    which could lead to privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3238.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3238.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-3238
reference_id
reference_type
scores
0
value 0.02525
scoring_system epss
scoring_elements 0.85451
published_at 2026-04-16T12:55:00Z
1
value 0.02525
scoring_system epss
scoring_elements 0.85353
published_at 2026-04-01T12:55:00Z
2
value 0.02525
scoring_system epss
scoring_elements 0.85385
published_at 2026-04-04T12:55:00Z
3
value 0.02525
scoring_system epss
scoring_elements 0.85387
published_at 2026-04-07T12:55:00Z
4
value 0.02525
scoring_system epss
scoring_elements 0.85409
published_at 2026-04-08T12:55:00Z
5
value 0.02525
scoring_system epss
scoring_elements 0.85417
published_at 2026-04-09T12:55:00Z
6
value 0.02525
scoring_system epss
scoring_elements 0.85432
published_at 2026-04-11T12:55:00Z
7
value 0.02525
scoring_system epss
scoring_elements 0.8543
published_at 2026-04-12T12:55:00Z
8
value 0.02525
scoring_system epss
scoring_elements 0.85427
published_at 2026-04-13T12:55:00Z
9
value 0.02525
scoring_system epss
scoring_elements 0.85366
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-3238
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6664
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6664
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3238
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3238
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3243
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3243
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3244
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3244
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3257
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3257
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3258
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3258
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3265
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3265
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3291
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3291
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3312
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3312
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3313
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3313
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3317
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3317
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3318
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3318
14
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:C
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1414338
reference_id 1414338
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1414338
16
reference_url http://www.securityfocus.com/bid/95571
reference_id 95571
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:35Z/
url http://www.securityfocus.com/bid/95571
17
reference_url http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
reference_id cpujan2017-2881727.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:35Z/
url http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
18
reference_url http://www.debian.org/security/2017/dsa-3767
reference_id dsa-3767
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:35Z/
url http://www.debian.org/security/2017/dsa-3767
19
reference_url http://www.debian.org/security/2017/dsa-3770
reference_id dsa-3770
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:35Z/
url http://www.debian.org/security/2017/dsa-3770
20
reference_url https://security.gentoo.org/glsa/201702-17
reference_id GLSA-201702-17
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:35Z/
url https://security.gentoo.org/glsa/201702-17
21
reference_url https://security.gentoo.org/glsa/201702-18
reference_id GLSA-201702-18
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:35Z/
url https://security.gentoo.org/glsa/201702-18
22
reference_url https://access.redhat.com/errata/RHSA-2017:2192
reference_id RHSA-2017:2192
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:35Z/
url https://access.redhat.com/errata/RHSA-2017:2192
23
reference_url https://access.redhat.com/errata/RHSA-2017:2787
reference_id RHSA-2017:2787
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:35Z/
url https://access.redhat.com/errata/RHSA-2017:2787
24
reference_url https://access.redhat.com/errata/RHSA-2017:2886
reference_id RHSA-2017:2886
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:35Z/
url https://access.redhat.com/errata/RHSA-2017:2886
25
reference_url https://access.redhat.com/errata/RHSA-2018:0279
reference_id RHSA-2018:0279
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:35Z/
url https://access.redhat.com/errata/RHSA-2018:0279
26
reference_url https://access.redhat.com/errata/RHSA-2018:0574
reference_id RHSA-2018:0574
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:35Z/
url https://access.redhat.com/errata/RHSA-2018:0574
27
reference_url https://usn.ubuntu.com/3174-1/
reference_id USN-3174-1
reference_type
scores
url https://usn.ubuntu.com/3174-1/
fixed_packages
aliases CVE-2017-3238
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9w98-nfg2-muh2
13
url VCID-9y4c-n9n1-r3ff
vulnerability_id VCID-9y4c-n9n1-r3ff
summary
Multiple vulnerabilities were found in MySQL, the worst of which
    may allow remote execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3634.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3634.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-3634
reference_id
reference_type
scores
0
value 0.00429
scoring_system epss
scoring_elements 0.62554
published_at 2026-04-16T12:55:00Z
1
value 0.00429
scoring_system epss
scoring_elements 0.62404
published_at 2026-04-01T12:55:00Z
2
value 0.00429
scoring_system epss
scoring_elements 0.62462
published_at 2026-04-02T12:55:00Z
3
value 0.00429
scoring_system epss
scoring_elements 0.62512
published_at 2026-04-08T12:55:00Z
4
value 0.00429
scoring_system epss
scoring_elements 0.62528
published_at 2026-04-09T12:55:00Z
5
value 0.00429
scoring_system epss
scoring_elements 0.62547
published_at 2026-04-11T12:55:00Z
6
value 0.00429
scoring_system epss
scoring_elements 0.62536
published_at 2026-04-12T12:55:00Z
7
value 0.00429
scoring_system epss
scoring_elements 0.62513
published_at 2026-04-13T12:55:00Z
8
value 0.00429
scoring_system epss
scoring_elements 0.62494
published_at 2026-04-04T12:55:00Z
9
value 0.00429
scoring_system epss
scoring_elements 0.62461
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-3634
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:C
1
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url http://www.securitytracker.com/id/1038928
reference_id 1038928
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:48:27Z/
url http://www.securitytracker.com/id/1038928
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1472684
reference_id 1472684
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1472684
5
reference_url http://www.securityfocus.com/bid/99729
reference_id 99729
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:48:27Z/
url http://www.securityfocus.com/bid/99729
6
reference_url https://security.gentoo.org/glsa/201802-04
reference_id GLSA-201802-04
reference_type
scores
url https://security.gentoo.org/glsa/201802-04
7
reference_url https://access.redhat.com/errata/RHSA-2017:2787
reference_id RHSA-2017:2787
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:48:27Z/
url https://access.redhat.com/errata/RHSA-2017:2787
8
reference_url https://access.redhat.com/errata/RHSA-2017:2886
reference_id RHSA-2017:2886
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:48:27Z/
url https://access.redhat.com/errata/RHSA-2017:2886
9
reference_url https://usn.ubuntu.com/3357-1/
reference_id USN-3357-1
reference_type
scores
url https://usn.ubuntu.com/3357-1/
fixed_packages
aliases CVE-2017-3634
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9y4c-n9n1-r3ff
14
url VCID-aj47-bgya-33e8
vulnerability_id VCID-aj47-bgya-33e8
summary mysql: Server: DML unspecified vulnerability (CPU Apr 2017)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3458.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3458.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-3458
reference_id
reference_type
scores
0
value 0.0047
scoring_system epss
scoring_elements 0.64594
published_at 2026-04-16T12:55:00Z
1
value 0.0047
scoring_system epss
scoring_elements 0.6452
published_at 2026-04-07T12:55:00Z
2
value 0.0047
scoring_system epss
scoring_elements 0.64568
published_at 2026-04-08T12:55:00Z
3
value 0.0047
scoring_system epss
scoring_elements 0.64584
published_at 2026-04-09T12:55:00Z
4
value 0.0047
scoring_system epss
scoring_elements 0.64601
published_at 2026-04-11T12:55:00Z
5
value 0.0047
scoring_system epss
scoring_elements 0.64588
published_at 2026-04-12T12:55:00Z
6
value 0.0047
scoring_system epss
scoring_elements 0.6456
published_at 2026-04-13T12:55:00Z
7
value 0.0047
scoring_system epss
scoring_elements 0.64532
published_at 2026-04-02T12:55:00Z
8
value 0.0047
scoring_system epss
scoring_elements 0.64479
published_at 2026-04-01T12:55:00Z
9
value 0.0047
scoring_system epss
scoring_elements 0.64561
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-3458
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 2.1
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:S/C:N/I:N/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:46:02Z/
url http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
4
reference_url http://www.securityfocus.com/bid/97837
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:46:02Z/
url http://www.securityfocus.com/bid/97837
5
reference_url http://www.securitytracker.com/id/1038287
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:46:02Z/
url http://www.securitytracker.com/id/1038287
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1443372
reference_id 1443372
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1443372
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
8
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-3458
reference_id CVE-2017-3458
reference_type
scores
0
value 4.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:P
1
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-3458
9
reference_url https://access.redhat.com/errata/RHSA-2017:2886
reference_id RHSA-2017:2886
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:46:02Z/
url https://access.redhat.com/errata/RHSA-2017:2886
10
reference_url https://usn.ubuntu.com/3269-1/
reference_id USN-3269-1
reference_type
scores
url https://usn.ubuntu.com/3269-1/
fixed_packages
aliases CVE-2017-3458
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-aj47-bgya-33e8
15
url VCID-apdj-21j8-33gc
vulnerability_id VCID-apdj-21j8-33gc
summary mysql: Server: C API unspecified vulnerability (CPU Apr 2017)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3467.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3467.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-3467
reference_id
reference_type
scores
0
value 0.00566
scoring_system epss
scoring_elements 0.68493
published_at 2026-04-16T12:55:00Z
1
value 0.00566
scoring_system epss
scoring_elements 0.68407
published_at 2026-04-07T12:55:00Z
2
value 0.00566
scoring_system epss
scoring_elements 0.68457
published_at 2026-04-08T12:55:00Z
3
value 0.00566
scoring_system epss
scoring_elements 0.68474
published_at 2026-04-09T12:55:00Z
4
value 0.00566
scoring_system epss
scoring_elements 0.685
published_at 2026-04-11T12:55:00Z
5
value 0.00566
scoring_system epss
scoring_elements 0.68488
published_at 2026-04-12T12:55:00Z
6
value 0.00566
scoring_system epss
scoring_elements 0.68455
published_at 2026-04-13T12:55:00Z
7
value 0.00566
scoring_system epss
scoring_elements 0.68411
published_at 2026-04-02T12:55:00Z
8
value 0.00566
scoring_system epss
scoring_elements 0.68391
published_at 2026-04-01T12:55:00Z
9
value 0.00566
scoring_system epss
scoring_elements 0.68431
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-3467
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 2.6
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:P/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:53Z/
url http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
4
reference_url http://www.securityfocus.com/bid/97825
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:53Z/
url http://www.securityfocus.com/bid/97825
5
reference_url http://www.securitytracker.com/id/1038287
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:53Z/
url http://www.securitytracker.com/id/1038287
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1443382
reference_id 1443382
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1443382
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
8
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-3467
reference_id CVE-2017-3467
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:N/A:N
1
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2017-3467
9
reference_url https://access.redhat.com/errata/RHSA-2017:2886
reference_id RHSA-2017:2886
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:53Z/
url https://access.redhat.com/errata/RHSA-2017:2886
10
reference_url https://usn.ubuntu.com/3269-1/
reference_id USN-3269-1
reference_type
scores
url https://usn.ubuntu.com/3269-1/
fixed_packages
aliases CVE-2017-3467
risk_score 1.9
exploitability 0.5
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-apdj-21j8-33gc
16
url VCID-bhxk-8byp-eyap
vulnerability_id VCID-bhxk-8byp-eyap
summary
Multiple vulnerabilities were found in MySQL, the worst of which
    may allow remote execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3309.json
reference_id
reference_type
scores
0
value 7.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3309.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-3309
reference_id
reference_type
scores
0
value 0.00319
scoring_system epss
scoring_elements 0.54932
published_at 2026-04-16T12:55:00Z
1
value 0.00319
scoring_system epss
scoring_elements 0.54905
published_at 2026-04-04T12:55:00Z
2
value 0.00319
scoring_system epss
scoring_elements 0.54875
published_at 2026-04-07T12:55:00Z
3
value 0.00319
scoring_system epss
scoring_elements 0.54924
published_at 2026-04-08T12:55:00Z
4
value 0.00319
scoring_system epss
scoring_elements 0.54923
published_at 2026-04-09T12:55:00Z
5
value 0.00319
scoring_system epss
scoring_elements 0.54935
published_at 2026-04-11T12:55:00Z
6
value 0.00319
scoring_system epss
scoring_elements 0.54917
published_at 2026-04-12T12:55:00Z
7
value 0.00319
scoring_system epss
scoring_elements 0.54894
published_at 2026-04-13T12:55:00Z
8
value 0.00319
scoring_system epss
scoring_elements 0.54879
published_at 2026-04-02T12:55:00Z
9
value 0.00319
scoring_system epss
scoring_elements 0.54809
published_at 2026-04-01T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-3309
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10286
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10286
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10379
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10379
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10384
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10384
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3302
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3302
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3305
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3305
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3308
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3308
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3309
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3309
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3329
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3329
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3453
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3453
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3456
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3456
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3461
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3461
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3462
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3462
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3463
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3463
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3464
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3464
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3600
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3600
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3636
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3636
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3641
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3641
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3653
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3653
20
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 2.1
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:S/C:N/I:N/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
21
reference_url http://www.debian.org/security/2017/dsa-3834
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:46:17Z/
url http://www.debian.org/security/2017/dsa-3834
22
reference_url http://www.debian.org/security/2017/dsa-3944
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:46:17Z/
url http://www.debian.org/security/2017/dsa-3944
23
reference_url http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:46:17Z/
url http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
24
reference_url http://www.securityfocus.com/bid/97742
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:46:17Z/
url http://www.securityfocus.com/bid/97742
25
reference_url http://www.securitytracker.com/id/1038287
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:46:17Z/
url http://www.securitytracker.com/id/1038287
26
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1443359
reference_id 1443359
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1443359
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-3309
reference_id CVE-2017-3309
reference_type
scores
0
value 4.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:P
1
value 7.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-3309
43
reference_url https://security.gentoo.org/glsa/201802-04
reference_id GLSA-201802-04
reference_type
scores
url https://security.gentoo.org/glsa/201802-04
44
reference_url https://access.redhat.com/errata/RHSA-2017:2192
reference_id RHSA-2017:2192
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:46:17Z/
url https://access.redhat.com/errata/RHSA-2017:2192
45
reference_url https://access.redhat.com/errata/RHSA-2017:2787
reference_id RHSA-2017:2787
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:46:17Z/
url https://access.redhat.com/errata/RHSA-2017:2787
46
reference_url https://access.redhat.com/errata/RHSA-2017:2886
reference_id RHSA-2017:2886
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:46:17Z/
url https://access.redhat.com/errata/RHSA-2017:2886
47
reference_url https://access.redhat.com/errata/RHSA-2018:0279
reference_id RHSA-2018:0279
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:46:17Z/
url https://access.redhat.com/errata/RHSA-2018:0279
48
reference_url https://access.redhat.com/errata/RHSA-2018:0574
reference_id RHSA-2018:0574
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:46:17Z/
url https://access.redhat.com/errata/RHSA-2018:0574
49
reference_url https://usn.ubuntu.com/3269-1/
reference_id USN-3269-1
reference_type
scores
url https://usn.ubuntu.com/3269-1/
50
reference_url https://usn.ubuntu.com/3357-2/
reference_id USN-3357-2
reference_type
scores
url https://usn.ubuntu.com/3357-2/
fixed_packages
aliases CVE-2017-3309
risk_score 3.5
exploitability 0.5
weighted_severity 6.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bhxk-8byp-eyap
17
url VCID-cpmw-6wnf-5fhu
vulnerability_id VCID-cpmw-6wnf-5fhu
summary mysql: Server: DML unspecified vulnerability (CPU Apr 2017)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3457.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3457.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-3457
reference_id
reference_type
scores
0
value 0.0047
scoring_system epss
scoring_elements 0.64594
published_at 2026-04-16T12:55:00Z
1
value 0.0047
scoring_system epss
scoring_elements 0.6452
published_at 2026-04-07T12:55:00Z
2
value 0.0047
scoring_system epss
scoring_elements 0.64568
published_at 2026-04-08T12:55:00Z
3
value 0.0047
scoring_system epss
scoring_elements 0.64584
published_at 2026-04-09T12:55:00Z
4
value 0.0047
scoring_system epss
scoring_elements 0.64601
published_at 2026-04-11T12:55:00Z
5
value 0.0047
scoring_system epss
scoring_elements 0.64588
published_at 2026-04-12T12:55:00Z
6
value 0.0047
scoring_system epss
scoring_elements 0.6456
published_at 2026-04-13T12:55:00Z
7
value 0.0047
scoring_system epss
scoring_elements 0.64532
published_at 2026-04-02T12:55:00Z
8
value 0.0047
scoring_system epss
scoring_elements 0.64479
published_at 2026-04-01T12:55:00Z
9
value 0.0047
scoring_system epss
scoring_elements 0.64561
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-3457
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 2.1
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:S/C:N/I:N/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:46:03Z/
url http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
4
reference_url http://www.securityfocus.com/bid/97845
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:46:03Z/
url http://www.securityfocus.com/bid/97845
5
reference_url http://www.securitytracker.com/id/1038287
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:46:03Z/
url http://www.securitytracker.com/id/1038287
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1443371
reference_id 1443371
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1443371
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
8
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-3457
reference_id CVE-2017-3457
reference_type
scores
0
value 4.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:P
1
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-3457
9
reference_url https://access.redhat.com/errata/RHSA-2017:2886
reference_id RHSA-2017:2886
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:46:03Z/
url https://access.redhat.com/errata/RHSA-2017:2886
10
reference_url https://usn.ubuntu.com/3269-1/
reference_id USN-3269-1
reference_type
scores
url https://usn.ubuntu.com/3269-1/
fixed_packages
aliases CVE-2017-3457
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-cpmw-6wnf-5fhu
18
url VCID-exub-t1nc-n3a6
vulnerability_id VCID-exub-t1nc-n3a6
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could lead to privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3320.json
reference_id
reference_type
scores
0
value 2.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3320.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-3320
reference_id
reference_type
scores
0
value 0.00297
scoring_system epss
scoring_elements 0.5306
published_at 2026-04-02T12:55:00Z
1
value 0.00297
scoring_system epss
scoring_elements 0.53157
published_at 2026-04-16T12:55:00Z
2
value 0.00297
scoring_system epss
scoring_elements 0.53033
published_at 2026-04-01T12:55:00Z
3
value 0.00297
scoring_system epss
scoring_elements 0.53053
published_at 2026-04-07T12:55:00Z
4
value 0.00297
scoring_system epss
scoring_elements 0.53104
published_at 2026-04-08T12:55:00Z
5
value 0.00297
scoring_system epss
scoring_elements 0.53098
published_at 2026-04-09T12:55:00Z
6
value 0.00297
scoring_system epss
scoring_elements 0.53148
published_at 2026-04-11T12:55:00Z
7
value 0.00297
scoring_system epss
scoring_elements 0.53133
published_at 2026-04-12T12:55:00Z
8
value 0.00297
scoring_system epss
scoring_elements 0.53117
published_at 2026-04-13T12:55:00Z
9
value 0.00297
scoring_system epss
scoring_elements 0.53085
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-3320
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:P/I:N/A:N
1
value 2.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1414360
reference_id 1414360
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1414360
4
reference_url http://www.securityfocus.com/bid/95470
reference_id 95470
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-08T20:09:28Z/
url http://www.securityfocus.com/bid/95470
5
reference_url http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
reference_id cpujan2017-2881727.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-08T20:09:28Z/
url http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
6
reference_url https://security.gentoo.org/glsa/201702-17
reference_id GLSA-201702-17
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-08T20:09:28Z/
url https://security.gentoo.org/glsa/201702-17
7
reference_url https://access.redhat.com/errata/RHSA-2017:2886
reference_id RHSA-2017:2886
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-08T20:09:28Z/
url https://access.redhat.com/errata/RHSA-2017:2886
8
reference_url https://usn.ubuntu.com/3174-1/
reference_id USN-3174-1
reference_type
scores
url https://usn.ubuntu.com/3174-1/
fixed_packages
aliases CVE-2017-3320
risk_score 1.1
exploitability 0.5
weighted_severity 2.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-exub-t1nc-n3a6
19
url VCID-f8p4-hpsh-2fcw
vulnerability_id VCID-f8p4-hpsh-2fcw
summary
Multiple vulnerabilities were found in MySQL, the worst of which
    may allow remote execution of arbitrary code.
references
0
reference_url http://rhn.redhat.com/errata/RHSA-2016-2927.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T16:21:49Z/
url http://rhn.redhat.com/errata/RHSA-2016-2927.html
1
reference_url http://rhn.redhat.com/errata/RHSA-2016-2928.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T16:21:49Z/
url http://rhn.redhat.com/errata/RHSA-2016-2928.html
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3600.json
reference_id
reference_type
scores
0
value 6.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3600.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-3600
reference_id
reference_type
scores
0
value 0.00811
scoring_system epss
scoring_elements 0.74268
published_at 2026-04-16T12:55:00Z
1
value 0.00811
scoring_system epss
scoring_elements 0.74215
published_at 2026-04-04T12:55:00Z
2
value 0.00811
scoring_system epss
scoring_elements 0.7422
published_at 2026-04-08T12:55:00Z
3
value 0.00811
scoring_system epss
scoring_elements 0.74235
published_at 2026-04-09T12:55:00Z
4
value 0.00811
scoring_system epss
scoring_elements 0.74256
published_at 2026-04-11T12:55:00Z
5
value 0.00811
scoring_system epss
scoring_elements 0.74237
published_at 2026-04-12T12:55:00Z
6
value 0.00811
scoring_system epss
scoring_elements 0.7423
published_at 2026-04-13T12:55:00Z
7
value 0.00811
scoring_system epss
scoring_elements 0.74187
published_at 2026-04-07T12:55:00Z
8
value 0.00811
scoring_system epss
scoring_elements 0.74182
published_at 2026-04-01T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-3600
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3302
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3302
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3305
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3305
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3308
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3308
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3309
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3309
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3329
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3329
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3453
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3453
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3456
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3456
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3461
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3461
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3462
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3462
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3463
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3463
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3464
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3464
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3600
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3600
16
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.6
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:S/C:P/I:P/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
17
reference_url http://www.debian.org/security/2017/dsa-3834
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T16:21:49Z/
url http://www.debian.org/security/2017/dsa-3834
18
reference_url http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T16:21:49Z/
url http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
19
reference_url http://www.securityfocus.com/bid/97765
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T16:21:49Z/
url http://www.securityfocus.com/bid/97765
20
reference_url http://www.securitytracker.com/id/1038287
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T16:21:49Z/
url http://www.securitytracker.com/id/1038287
21
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1433010
reference_id 1433010
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1433010
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-3600
reference_id CVE-2017-3600
reference_type
scores
0
value 6.0
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:S/C:P/I:P/A:P
1
value 6.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-3600
35
reference_url https://security.gentoo.org/glsa/201802-04
reference_id GLSA-201802-04
reference_type
scores
url https://security.gentoo.org/glsa/201802-04
36
reference_url https://access.redhat.com/errata/RHSA-2016:2927
reference_id RHSA-2016:2927
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2927
37
reference_url https://access.redhat.com/errata/RHSA-2016:2928
reference_id RHSA-2016:2928
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2928
38
reference_url https://access.redhat.com/errata/RHSA-2017:2192
reference_id RHSA-2017:2192
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T16:21:49Z/
url https://access.redhat.com/errata/RHSA-2017:2192
39
reference_url https://access.redhat.com/errata/RHSA-2017:2787
reference_id RHSA-2017:2787
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T16:21:49Z/
url https://access.redhat.com/errata/RHSA-2017:2787
40
reference_url https://access.redhat.com/errata/RHSA-2017:2886
reference_id RHSA-2017:2886
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T16:21:49Z/
url https://access.redhat.com/errata/RHSA-2017:2886
41
reference_url https://usn.ubuntu.com/3269-1/
reference_id USN-3269-1
reference_type
scores
url https://usn.ubuntu.com/3269-1/
42
reference_url https://usn.ubuntu.com/3357-2/
reference_id USN-3357-2
reference_type
scores
url https://usn.ubuntu.com/3357-2/
fixed_packages
aliases CVE-2017-3600
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-f8p4-hpsh-2fcw
20
url VCID-fb3q-pxc2-qqdz
vulnerability_id VCID-fb3q-pxc2-qqdz
summary mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2017)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3645.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3645.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-3645
reference_id
reference_type
scores
0
value 0.00349
scoring_system epss
scoring_elements 0.57408
published_at 2026-04-02T12:55:00Z
1
value 0.00349
scoring_system epss
scoring_elements 0.57436
published_at 2026-04-13T12:55:00Z
2
value 0.00349
scoring_system epss
scoring_elements 0.57327
published_at 2026-04-01T12:55:00Z
3
value 0.00349
scoring_system epss
scoring_elements 0.57407
published_at 2026-04-07T12:55:00Z
4
value 0.00349
scoring_system epss
scoring_elements 0.5746
published_at 2026-04-08T12:55:00Z
5
value 0.00349
scoring_system epss
scoring_elements 0.57462
published_at 2026-04-16T12:55:00Z
6
value 0.00349
scoring_system epss
scoring_elements 0.57478
published_at 2026-04-11T12:55:00Z
7
value 0.00349
scoring_system epss
scoring_elements 0.57456
published_at 2026-04-12T12:55:00Z
8
value 0.00349
scoring_system epss
scoring_elements 0.57431
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-3645
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:C
1
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url http://www.securitytracker.com/id/1038928
reference_id 1038928
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:47:59Z/
url http://www.securitytracker.com/id/1038928
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1472700
reference_id 1472700
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1472700
5
reference_url http://www.securityfocus.com/bid/99783
reference_id 99783
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:47:59Z/
url http://www.securityfocus.com/bid/99783
6
reference_url https://access.redhat.com/errata/RHSA-2017:2886
reference_id RHSA-2017:2886
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:47:59Z/
url https://access.redhat.com/errata/RHSA-2017:2886
7
reference_url https://usn.ubuntu.com/3357-1/
reference_id USN-3357-1
reference_type
scores
url https://usn.ubuntu.com/3357-1/
fixed_packages
aliases CVE-2017-3645
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fb3q-pxc2-qqdz
21
url VCID-j7uc-c14d-nqac
vulnerability_id VCID-j7uc-c14d-nqac
summary
Multiple vulnerabilities were found in MySQL, the worst of which
    may allow remote execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3599.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3599.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-3599
reference_id
reference_type
scores
0
value 0.87337
scoring_system epss
scoring_elements 0.99457
published_at 2026-04-16T12:55:00Z
1
value 0.87337
scoring_system epss
scoring_elements 0.99448
published_at 2026-04-04T12:55:00Z
2
value 0.87337
scoring_system epss
scoring_elements 0.99447
published_at 2026-04-02T12:55:00Z
3
value 0.87337
scoring_system epss
scoring_elements 0.9945
published_at 2026-04-07T12:55:00Z
4
value 0.87337
scoring_system epss
scoring_elements 0.99451
published_at 2026-04-08T12:55:00Z
5
value 0.87337
scoring_system epss
scoring_elements 0.99452
published_at 2026-04-09T12:55:00Z
6
value 0.87337
scoring_system epss
scoring_elements 0.99453
published_at 2026-04-11T12:55:00Z
7
value 0.87337
scoring_system epss
scoring_elements 0.99454
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-3599
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 2.6
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:N/I:N/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://www.exploit-db.com/exploits/41954/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T16:19:42Z/
url https://www.exploit-db.com/exploits/41954/
4
reference_url https://www.secforce.com/blog/2017/04/cve-2017-3599-pre-auth-mysql-remote-dos/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T16:19:42Z/
url https://www.secforce.com/blog/2017/04/cve-2017-3599-pre-auth-mysql-remote-dos/
5
reference_url http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T16:19:42Z/
url http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
6
reference_url http://www.securityfocus.com/bid/97754
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T16:19:42Z/
url http://www.securityfocus.com/bid/97754
7
reference_url http://www.securitytracker.com/id/1038287
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T16:19:42Z/
url http://www.securitytracker.com/id/1038287
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1443386
reference_id 1443386
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1443386
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
10
reference_url https://github.com/SECFORCE/CVE-2017-3599/blob/575707b35ab6b18fe87577392fc45b036f46e217/cve-2017-3599_poc.py
reference_id CVE-2017-3599
reference_type exploit
scores
url https://github.com/SECFORCE/CVE-2017-3599/blob/575707b35ab6b18fe87577392fc45b036f46e217/cve-2017-3599_poc.py
11
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/41954.py
reference_id CVE-2017-3599
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/41954.py
12
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-3599
reference_id CVE-2017-3599
reference_type
scores
0
value 7.8
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:C
1
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-3599
13
reference_url https://security.gentoo.org/glsa/201802-04
reference_id GLSA-201802-04
reference_type
scores
url https://security.gentoo.org/glsa/201802-04
14
reference_url https://access.redhat.com/errata/RHSA-2017:2787
reference_id RHSA-2017:2787
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T16:19:42Z/
url https://access.redhat.com/errata/RHSA-2017:2787
15
reference_url https://access.redhat.com/errata/RHSA-2017:2886
reference_id RHSA-2017:2886
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T16:19:42Z/
url https://access.redhat.com/errata/RHSA-2017:2886
16
reference_url https://usn.ubuntu.com/3269-1/
reference_id USN-3269-1
reference_type
scores
url https://usn.ubuntu.com/3269-1/
fixed_packages
aliases CVE-2017-3599
risk_score 10.0
exploitability 2.0
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-j7uc-c14d-nqac
22
url VCID-jdcu-4mpq-1far
vulnerability_id VCID-jdcu-4mpq-1far
summary mysql: X Plugin unspecified vulnerability (CPU Jul 2017)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3646.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3646.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-3646
reference_id
reference_type
scores
0
value 0.00349
scoring_system epss
scoring_elements 0.57408
published_at 2026-04-02T12:55:00Z
1
value 0.00349
scoring_system epss
scoring_elements 0.57436
published_at 2026-04-13T12:55:00Z
2
value 0.00349
scoring_system epss
scoring_elements 0.57327
published_at 2026-04-01T12:55:00Z
3
value 0.00349
scoring_system epss
scoring_elements 0.57407
published_at 2026-04-07T12:55:00Z
4
value 0.00349
scoring_system epss
scoring_elements 0.5746
published_at 2026-04-08T12:55:00Z
5
value 0.00349
scoring_system epss
scoring_elements 0.57462
published_at 2026-04-16T12:55:00Z
6
value 0.00349
scoring_system epss
scoring_elements 0.57478
published_at 2026-04-11T12:55:00Z
7
value 0.00349
scoring_system epss
scoring_elements 0.57456
published_at 2026-04-12T12:55:00Z
8
value 0.00349
scoring_system epss
scoring_elements 0.57431
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-3646
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:C
1
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url http://www.securitytracker.com/id/1038928
reference_id 1038928
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:47:58Z/
url http://www.securitytracker.com/id/1038928
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1472701
reference_id 1472701
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1472701
5
reference_url http://www.securityfocus.com/bid/99786
reference_id 99786
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:47:58Z/
url http://www.securityfocus.com/bid/99786
6
reference_url https://access.redhat.com/errata/RHSA-2017:2886
reference_id RHSA-2017:2886
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:47:58Z/
url https://access.redhat.com/errata/RHSA-2017:2886
fixed_packages
aliases CVE-2017-3646
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jdcu-4mpq-1far
23
url VCID-jgff-4jyp-9fgr
vulnerability_id VCID-jgff-4jyp-9fgr
summary
Multiple vulnerabilities were found in MySQL, the worst of which
    may allow remote execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3641.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3641.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-3641
reference_id
reference_type
scores
0
value 0.00187
scoring_system epss
scoring_elements 0.40585
published_at 2026-04-16T12:55:00Z
1
value 0.00187
scoring_system epss
scoring_elements 0.40565
published_at 2026-04-02T12:55:00Z
2
value 0.00187
scoring_system epss
scoring_elements 0.40485
published_at 2026-04-01T12:55:00Z
3
value 0.00187
scoring_system epss
scoring_elements 0.40593
published_at 2026-04-11T12:55:00Z
4
value 0.00187
scoring_system epss
scoring_elements 0.40514
published_at 2026-04-07T12:55:00Z
5
value 0.00187
scoring_system epss
scoring_elements 0.40564
published_at 2026-04-08T12:55:00Z
6
value 0.00187
scoring_system epss
scoring_elements 0.40575
published_at 2026-04-09T12:55:00Z
7
value 0.00187
scoring_system epss
scoring_elements 0.40557
published_at 2026-04-12T12:55:00Z
8
value 0.00187
scoring_system epss
scoring_elements 0.40537
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-3641
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10286
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10286
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10379
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10379
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10384
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10384
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3308
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3308
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3309
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3309
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3453
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3453
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3456
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3456
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3464
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3464
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3635
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3635
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3636
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3636
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3641
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3641
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3648
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3648
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3651
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3651
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3652
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3652
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3653
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3653
17
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:C
1
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
18
reference_url http://www.securitytracker.com/id/1038928
reference_id 1038928
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:48:15Z/
url http://www.securitytracker.com/id/1038928
19
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1472693
reference_id 1472693
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1472693
20
reference_url http://www.securityfocus.com/bid/99767
reference_id 99767
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:48:15Z/
url http://www.securityfocus.com/bid/99767
21
reference_url http://www.debian.org/security/2017/dsa-3922
reference_id dsa-3922
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:48:15Z/
url http://www.debian.org/security/2017/dsa-3922
22
reference_url https://www.debian.org/security/2017/dsa-3955
reference_id dsa-3955
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:48:15Z/
url https://www.debian.org/security/2017/dsa-3955
23
reference_url https://security.gentoo.org/glsa/201802-04
reference_id GLSA-201802-04
reference_type
scores
url https://security.gentoo.org/glsa/201802-04
24
reference_url https://access.redhat.com/errata/RHSA-2017:2787
reference_id RHSA-2017:2787
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:48:15Z/
url https://access.redhat.com/errata/RHSA-2017:2787
25
reference_url https://access.redhat.com/errata/RHSA-2017:2886
reference_id RHSA-2017:2886
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:48:15Z/
url https://access.redhat.com/errata/RHSA-2017:2886
26
reference_url https://access.redhat.com/errata/RHSA-2018:0279
reference_id RHSA-2018:0279
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:48:15Z/
url https://access.redhat.com/errata/RHSA-2018:0279
27
reference_url https://access.redhat.com/errata/RHSA-2018:0574
reference_id RHSA-2018:0574
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:48:15Z/
url https://access.redhat.com/errata/RHSA-2018:0574
28
reference_url https://access.redhat.com/errata/RHSA-2018:2439
reference_id RHSA-2018:2439
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:48:15Z/
url https://access.redhat.com/errata/RHSA-2018:2439
29
reference_url https://access.redhat.com/errata/RHSA-2018:2729
reference_id RHSA-2018:2729
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:48:15Z/
url https://access.redhat.com/errata/RHSA-2018:2729
30
reference_url https://usn.ubuntu.com/3357-1/
reference_id USN-3357-1
reference_type
scores
url https://usn.ubuntu.com/3357-1/
31
reference_url https://usn.ubuntu.com/3357-2/
reference_id USN-3357-2
reference_type
scores
url https://usn.ubuntu.com/3357-2/
fixed_packages
aliases CVE-2017-3641
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jgff-4jyp-9fgr
24
url VCID-jh1g-h62w-3yhd
vulnerability_id VCID-jh1g-h62w-3yhd
summary mysql: Server: Security: Privileges unspecified vulnerability (CPU Apr 2017)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3455.json
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3455.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-3455
reference_id
reference_type
scores
0
value 0.00356
scoring_system epss
scoring_elements 0.57954
published_at 2026-04-16T12:55:00Z
1
value 0.00356
scoring_system epss
scoring_elements 0.57948
published_at 2026-04-08T12:55:00Z
2
value 0.00356
scoring_system epss
scoring_elements 0.5795
published_at 2026-04-09T12:55:00Z
3
value 0.00356
scoring_system epss
scoring_elements 0.57966
published_at 2026-04-11T12:55:00Z
4
value 0.00356
scoring_system epss
scoring_elements 0.57944
published_at 2026-04-12T12:55:00Z
5
value 0.00356
scoring_system epss
scoring_elements 0.57924
published_at 2026-04-13T12:55:00Z
6
value 0.00356
scoring_system epss
scoring_elements 0.57898
published_at 2026-04-02T12:55:00Z
7
value 0.00356
scoring_system epss
scoring_elements 0.57813
published_at 2026-04-01T12:55:00Z
8
value 0.00356
scoring_system epss
scoring_elements 0.57918
published_at 2026-04-04T12:55:00Z
9
value 0.00356
scoring_system epss
scoring_elements 0.57893
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-3455
2
reference_url http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:46:05Z/
url http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
3
reference_url http://www.securityfocus.com/bid/97820
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:46:05Z/
url http://www.securityfocus.com/bid/97820
4
reference_url http://www.securitytracker.com/id/1038287
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:46:05Z/
url http://www.securitytracker.com/id/1038287
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1443368
reference_id 1443368
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1443368
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
7
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-3455
reference_id CVE-2017-3455
reference_type
scores
0
value 5.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:P/I:P/A:N
1
value 5.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2017-3455
8
reference_url https://access.redhat.com/errata/RHSA-2017:2886
reference_id RHSA-2017:2886
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:46:05Z/
url https://access.redhat.com/errata/RHSA-2017:2886
9
reference_url https://usn.ubuntu.com/3269-1/
reference_id USN-3269-1
reference_type
scores
url https://usn.ubuntu.com/3269-1/
fixed_packages
aliases CVE-2017-3455
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jh1g-h62w-3yhd
25
url VCID-mde2-1ynu-auh2
vulnerability_id VCID-mde2-1ynu-auh2
summary
Multiple vulnerabilities were found in MySQL, the worst of which
    may allow remote execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3456.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3456.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-3456
reference_id
reference_type
scores
0
value 0.0018
scoring_system epss
scoring_elements 0.39721
published_at 2026-04-16T12:55:00Z
1
value 0.0018
scoring_system epss
scoring_elements 0.39555
published_at 2026-04-01T12:55:00Z
2
value 0.0018
scoring_system epss
scoring_elements 0.39704
published_at 2026-04-02T12:55:00Z
3
value 0.0018
scoring_system epss
scoring_elements 0.39726
published_at 2026-04-04T12:55:00Z
4
value 0.0018
scoring_system epss
scoring_elements 0.39644
published_at 2026-04-07T12:55:00Z
5
value 0.0018
scoring_system epss
scoring_elements 0.39699
published_at 2026-04-08T12:55:00Z
6
value 0.0018
scoring_system epss
scoring_elements 0.39713
published_at 2026-04-09T12:55:00Z
7
value 0.0018
scoring_system epss
scoring_elements 0.39723
published_at 2026-04-11T12:55:00Z
8
value 0.0018
scoring_system epss
scoring_elements 0.39687
published_at 2026-04-12T12:55:00Z
9
value 0.0018
scoring_system epss
scoring_elements 0.3967
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-3456
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10286
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10286
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10379
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10379
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10384
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10384
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3302
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3302
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3305
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3305
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3308
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3308
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3309
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3309
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3329
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3329
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3453
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3453
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3456
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3456
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3461
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3461
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3462
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3462
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3463
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3463
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3464
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3464
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3600
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3600
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3636
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3636
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3641
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3641
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3653
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3653
20
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 2.1
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:S/C:N/I:N/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
21
reference_url http://www.debian.org/security/2017/dsa-3834
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:46:04Z/
url http://www.debian.org/security/2017/dsa-3834
22
reference_url http://www.debian.org/security/2017/dsa-3944
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:46:04Z/
url http://www.debian.org/security/2017/dsa-3944
23
reference_url http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:46:04Z/
url http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
24
reference_url http://www.securityfocus.com/bid/97831
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:46:04Z/
url http://www.securityfocus.com/bid/97831
25
reference_url http://www.securitytracker.com/id/1038287
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:46:04Z/
url http://www.securitytracker.com/id/1038287
26
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1443369
reference_id 1443369
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1443369
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-3456
reference_id CVE-2017-3456
reference_type
scores
0
value 4.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:P
1
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-3456
43
reference_url https://security.gentoo.org/glsa/201802-04
reference_id GLSA-201802-04
reference_type
scores
url https://security.gentoo.org/glsa/201802-04
44
reference_url https://access.redhat.com/errata/RHSA-2017:2192
reference_id RHSA-2017:2192
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:46:04Z/
url https://access.redhat.com/errata/RHSA-2017:2192
45
reference_url https://access.redhat.com/errata/RHSA-2017:2787
reference_id RHSA-2017:2787
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:46:04Z/
url https://access.redhat.com/errata/RHSA-2017:2787
46
reference_url https://access.redhat.com/errata/RHSA-2017:2886
reference_id RHSA-2017:2886
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:46:04Z/
url https://access.redhat.com/errata/RHSA-2017:2886
47
reference_url https://access.redhat.com/errata/RHSA-2018:0279
reference_id RHSA-2018:0279
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:46:04Z/
url https://access.redhat.com/errata/RHSA-2018:0279
48
reference_url https://access.redhat.com/errata/RHSA-2018:0574
reference_id RHSA-2018:0574
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:46:04Z/
url https://access.redhat.com/errata/RHSA-2018:0574
49
reference_url https://usn.ubuntu.com/3269-1/
reference_id USN-3269-1
reference_type
scores
url https://usn.ubuntu.com/3269-1/
50
reference_url https://usn.ubuntu.com/3357-2/
reference_id USN-3357-2
reference_type
scores
url https://usn.ubuntu.com/3357-2/
fixed_packages
aliases CVE-2017-3456
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mde2-1ynu-auh2
26
url VCID-mna9-kjfu-xkcn
vulnerability_id VCID-mna9-kjfu-xkcn
summary mysql: Server: Security: Privileges unspecified vulnerability (CPU Jul 2019)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-2730.json
reference_id
reference_type
scores
0
value 2.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-2730.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-2730
reference_id
reference_type
scores
0
value 0.00308
scoring_system epss
scoring_elements 0.53895
published_at 2026-04-01T12:55:00Z
1
value 0.00308
scoring_system epss
scoring_elements 0.53912
published_at 2026-04-02T12:55:00Z
2
value 0.00308
scoring_system epss
scoring_elements 0.54016
published_at 2026-04-16T12:55:00Z
3
value 0.00308
scoring_system epss
scoring_elements 0.54013
published_at 2026-04-11T12:55:00Z
4
value 0.00308
scoring_system epss
scoring_elements 0.53996
published_at 2026-04-12T12:55:00Z
5
value 0.00308
scoring_system epss
scoring_elements 0.53978
published_at 2026-04-13T12:55:00Z
6
value 0.00308
scoring_system epss
scoring_elements 0.5394
published_at 2026-04-04T12:55:00Z
7
value 0.00308
scoring_system epss
scoring_elements 0.53914
published_at 2026-04-07T12:55:00Z
8
value 0.00308
scoring_system epss
scoring_elements 0.53966
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-2730
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1731995
reference_id 1731995
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1731995
3
reference_url http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
reference_id cpujul2019-5072835.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:18:38Z/
url http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
4
reference_url https://support.f5.com/csp/article/K51272092
reference_id K51272092
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:18:38Z/
url https://support.f5.com/csp/article/K51272092
5
reference_url https://support.f5.com/csp/article/K51272092?utm_source=f5support&amp%3Butm_medium=RSS
reference_id K51272092?utm_source=f5support&amp%3Butm_medium=RSS
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:18:38Z/
url https://support.f5.com/csp/article/K51272092?utm_source=f5support&amp%3Butm_medium=RSS
6
reference_url https://access.redhat.com/errata/RHSA-2017:2886
reference_id RHSA-2017:2886
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:2886
fixed_packages
aliases CVE-2019-2730
risk_score 1.2
exploitability 0.5
weighted_severity 2.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mna9-kjfu-xkcn
27
url VCID-mz71-vku8-ckbm
vulnerability_id VCID-mz71-vku8-ckbm
summary
Multiple vulnerabilities were found in MySQL, the worst of which
    may allow remote execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3461.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3461.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-3461
reference_id
reference_type
scores
0
value 0.00543
scoring_system epss
scoring_elements 0.67751
published_at 2026-04-16T12:55:00Z
1
value 0.00543
scoring_system epss
scoring_elements 0.67638
published_at 2026-04-01T12:55:00Z
2
value 0.00543
scoring_system epss
scoring_elements 0.67673
published_at 2026-04-07T12:55:00Z
3
value 0.00543
scoring_system epss
scoring_elements 0.67693
published_at 2026-04-04T12:55:00Z
4
value 0.00543
scoring_system epss
scoring_elements 0.67725
published_at 2026-04-08T12:55:00Z
5
value 0.00543
scoring_system epss
scoring_elements 0.67739
published_at 2026-04-09T12:55:00Z
6
value 0.00543
scoring_system epss
scoring_elements 0.67763
published_at 2026-04-11T12:55:00Z
7
value 0.00543
scoring_system epss
scoring_elements 0.67748
published_at 2026-04-12T12:55:00Z
8
value 0.00543
scoring_system epss
scoring_elements 0.67715
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-3461
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3302
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3302
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3305
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3305
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3308
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3308
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3309
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3309
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3329
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3329
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3453
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3453
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3456
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3456
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3461
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3461
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3462
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3462
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3463
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3463
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3464
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3464
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3600
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3600
14
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 2.1
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:S/C:N/I:N/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
15
reference_url http://www.debian.org/security/2017/dsa-3834
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:58Z/
url http://www.debian.org/security/2017/dsa-3834
16
reference_url http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:58Z/
url http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
17
reference_url http://www.securityfocus.com/bid/97812
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:58Z/
url http://www.securityfocus.com/bid/97812
18
reference_url http://www.securitytracker.com/id/1038287
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:58Z/
url http://www.securitytracker.com/id/1038287
19
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1443376
reference_id 1443376
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1443376
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-3461
reference_id CVE-2017-3461
reference_type
scores
0
value 4.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:P
1
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-3461
23
reference_url https://security.gentoo.org/glsa/201802-04
reference_id GLSA-201802-04
reference_type
scores
url https://security.gentoo.org/glsa/201802-04
24
reference_url https://access.redhat.com/errata/RHSA-2017:2787
reference_id RHSA-2017:2787
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:58Z/
url https://access.redhat.com/errata/RHSA-2017:2787
25
reference_url https://access.redhat.com/errata/RHSA-2017:2886
reference_id RHSA-2017:2886
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:58Z/
url https://access.redhat.com/errata/RHSA-2017:2886
26
reference_url https://usn.ubuntu.com/3269-1/
reference_id USN-3269-1
reference_type
scores
url https://usn.ubuntu.com/3269-1/
27
reference_url https://usn.ubuntu.com/3357-2/
reference_id USN-3357-2
reference_type
scores
url https://usn.ubuntu.com/3357-2/
fixed_packages
aliases CVE-2017-3461
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mz71-vku8-ckbm
28
url VCID-n2gx-t138-9bgc
vulnerability_id VCID-n2gx-t138-9bgc
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could lead to privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8327.json
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8327.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-8327
reference_id
reference_type
scores
0
value 0.00484
scoring_system epss
scoring_elements 0.65292
published_at 2026-04-16T12:55:00Z
1
value 0.00484
scoring_system epss
scoring_elements 0.65176
published_at 2026-04-01T12:55:00Z
2
value 0.00484
scoring_system epss
scoring_elements 0.65268
published_at 2026-04-08T12:55:00Z
3
value 0.00484
scoring_system epss
scoring_elements 0.6528
published_at 2026-04-09T12:55:00Z
4
value 0.00484
scoring_system epss
scoring_elements 0.65298
published_at 2026-04-11T12:55:00Z
5
value 0.00484
scoring_system epss
scoring_elements 0.65285
published_at 2026-04-12T12:55:00Z
6
value 0.00484
scoring_system epss
scoring_elements 0.65258
published_at 2026-04-13T12:55:00Z
7
value 0.00484
scoring_system epss
scoring_elements 0.65226
published_at 2026-04-02T12:55:00Z
8
value 0.00484
scoring_system epss
scoring_elements 0.65251
published_at 2026-04-04T12:55:00Z
9
value 0.00484
scoring_system epss
scoring_elements 0.65218
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-8327
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:S/C:N/I:N/A:C
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1414337
reference_id 1414337
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1414337
4
reference_url http://www.securityfocus.com/bid/95557
reference_id 95557
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:49Z/
url http://www.securityfocus.com/bid/95557
5
reference_url http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
reference_id cpujan2017-2881727.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:49Z/
url http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
6
reference_url https://security.gentoo.org/glsa/201702-17
reference_id GLSA-201702-17
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:49Z/
url https://security.gentoo.org/glsa/201702-17
7
reference_url https://access.redhat.com/errata/RHSA-2017:2787
reference_id RHSA-2017:2787
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:49Z/
url https://access.redhat.com/errata/RHSA-2017:2787
8
reference_url https://access.redhat.com/errata/RHSA-2017:2886
reference_id RHSA-2017:2886
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:49Z/
url https://access.redhat.com/errata/RHSA-2017:2886
9
reference_url https://usn.ubuntu.com/3174-1/
reference_id USN-3174-1
reference_type
scores
url https://usn.ubuntu.com/3174-1/
fixed_packages
aliases CVE-2016-8327
risk_score 2.0
exploitability 0.5
weighted_severity 4.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-n2gx-t138-9bgc
29
url VCID-nfxj-pb12-xfbc
vulnerability_id VCID-nfxj-pb12-xfbc
summary mysql: Server: Security: Privileges unspecified vulnerability (CPU Apr 2017)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3465.json
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3465.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-3465
reference_id
reference_type
scores
0
value 0.00339
scoring_system epss
scoring_elements 0.56733
published_at 2026-04-16T12:55:00Z
1
value 0.00339
scoring_system epss
scoring_elements 0.56586
published_at 2026-04-01T12:55:00Z
2
value 0.00339
scoring_system epss
scoring_elements 0.56703
published_at 2026-04-04T12:55:00Z
3
value 0.00339
scoring_system epss
scoring_elements 0.56734
published_at 2026-04-08T12:55:00Z
4
value 0.00339
scoring_system epss
scoring_elements 0.56739
published_at 2026-04-09T12:55:00Z
5
value 0.00339
scoring_system epss
scoring_elements 0.56747
published_at 2026-04-11T12:55:00Z
6
value 0.00339
scoring_system epss
scoring_elements 0.56723
published_at 2026-04-12T12:55:00Z
7
value 0.00339
scoring_system epss
scoring_elements 0.56702
published_at 2026-04-13T12:55:00Z
8
value 0.00339
scoring_system epss
scoring_elements 0.56682
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-3465
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:P/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:54Z/
url http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
4
reference_url http://www.securityfocus.com/bid/97822
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:54Z/
url http://www.securityfocus.com/bid/97822
5
reference_url http://www.securitytracker.com/id/1038287
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:54Z/
url http://www.securitytracker.com/id/1038287
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1443380
reference_id 1443380
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1443380
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
8
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-3465
reference_id CVE-2017-3465
reference_type
scores
0
value 4.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:P/A:N
1
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2017-3465
9
reference_url https://access.redhat.com/errata/RHSA-2017:2886
reference_id RHSA-2017:2886
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:54Z/
url https://access.redhat.com/errata/RHSA-2017:2886
10
reference_url https://usn.ubuntu.com/3269-1/
reference_id USN-3269-1
reference_type
scores
url https://usn.ubuntu.com/3269-1/
fixed_packages
aliases CVE-2017-3465
risk_score 1.9
exploitability 0.5
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-nfxj-pb12-xfbc
30
url VCID-nj41-1zpw-gkh9
vulnerability_id VCID-nj41-1zpw-gkh9
summary
Multiple vulnerabilities were found in MySQL, the worst of which
    may allow remote execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3462.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3462.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-3462
reference_id
reference_type
scores
0
value 0.00585
scoring_system epss
scoring_elements 0.69091
published_at 2026-04-16T12:55:00Z
1
value 0.00585
scoring_system epss
scoring_elements 0.68986
published_at 2026-04-01T12:55:00Z
2
value 0.00585
scoring_system epss
scoring_elements 0.69003
published_at 2026-04-07T12:55:00Z
3
value 0.00585
scoring_system epss
scoring_elements 0.69023
published_at 2026-04-04T12:55:00Z
4
value 0.00585
scoring_system epss
scoring_elements 0.69053
published_at 2026-04-08T12:55:00Z
5
value 0.00585
scoring_system epss
scoring_elements 0.69072
published_at 2026-04-09T12:55:00Z
6
value 0.00585
scoring_system epss
scoring_elements 0.69095
published_at 2026-04-11T12:55:00Z
7
value 0.00585
scoring_system epss
scoring_elements 0.6908
published_at 2026-04-12T12:55:00Z
8
value 0.00585
scoring_system epss
scoring_elements 0.69051
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-3462
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3302
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3302
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3305
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3305
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3308
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3308
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3309
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3309
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3329
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3329
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3453
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3453
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3456
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3456
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3461
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3461
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3462
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3462
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3463
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3463
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3464
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3464
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3600
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3600
14
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 2.1
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:S/C:N/I:N/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
15
reference_url http://www.debian.org/security/2017/dsa-3834
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:57Z/
url http://www.debian.org/security/2017/dsa-3834
16
reference_url http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:57Z/
url http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
17
reference_url http://www.securityfocus.com/bid/97851
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:57Z/
url http://www.securityfocus.com/bid/97851
18
reference_url http://www.securitytracker.com/id/1038287
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:57Z/
url http://www.securitytracker.com/id/1038287
19
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1443377
reference_id 1443377
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1443377
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-3462
reference_id CVE-2017-3462
reference_type
scores
0
value 4.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:P
1
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-3462
23
reference_url https://security.gentoo.org/glsa/201802-04
reference_id GLSA-201802-04
reference_type
scores
url https://security.gentoo.org/glsa/201802-04
24
reference_url https://access.redhat.com/errata/RHSA-2017:2787
reference_id RHSA-2017:2787
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:57Z/
url https://access.redhat.com/errata/RHSA-2017:2787
25
reference_url https://access.redhat.com/errata/RHSA-2017:2886
reference_id RHSA-2017:2886
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:57Z/
url https://access.redhat.com/errata/RHSA-2017:2886
26
reference_url https://usn.ubuntu.com/3269-1/
reference_id USN-3269-1
reference_type
scores
url https://usn.ubuntu.com/3269-1/
27
reference_url https://usn.ubuntu.com/3357-2/
reference_id USN-3357-2
reference_type
scores
url https://usn.ubuntu.com/3357-2/
fixed_packages
aliases CVE-2017-3462
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-nj41-1zpw-gkh9
31
url VCID-nsam-w1d3-pbdb
vulnerability_id VCID-nsam-w1d3-pbdb
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could lead to privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3256.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3256.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-3256
reference_id
reference_type
scores
0
value 0.00604
scoring_system epss
scoring_elements 0.69521
published_at 2026-04-02T12:55:00Z
1
value 0.00604
scoring_system epss
scoring_elements 0.69615
published_at 2026-04-16T12:55:00Z
2
value 0.00604
scoring_system epss
scoring_elements 0.6951
published_at 2026-04-01T12:55:00Z
3
value 0.00604
scoring_system epss
scoring_elements 0.69566
published_at 2026-04-08T12:55:00Z
4
value 0.00604
scoring_system epss
scoring_elements 0.69582
published_at 2026-04-09T12:55:00Z
5
value 0.00604
scoring_system epss
scoring_elements 0.69604
published_at 2026-04-11T12:55:00Z
6
value 0.00604
scoring_system epss
scoring_elements 0.69588
published_at 2026-04-12T12:55:00Z
7
value 0.00604
scoring_system epss
scoring_elements 0.69575
published_at 2026-04-13T12:55:00Z
8
value 0.00604
scoring_system epss
scoring_elements 0.69537
published_at 2026-04-04T12:55:00Z
9
value 0.00604
scoring_system epss
scoring_elements 0.69516
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-3256
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:C
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1414345
reference_id 1414345
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1414345
4
reference_url http://www.securityfocus.com/bid/95486
reference_id 95486
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:14Z/
url http://www.securityfocus.com/bid/95486
5
reference_url http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
reference_id cpujan2017-2881727.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:14Z/
url http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
6
reference_url https://security.gentoo.org/glsa/201702-17
reference_id GLSA-201702-17
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:14Z/
url https://security.gentoo.org/glsa/201702-17
7
reference_url https://access.redhat.com/errata/RHSA-2017:2886
reference_id RHSA-2017:2886
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:14Z/
url https://access.redhat.com/errata/RHSA-2017:2886
8
reference_url https://usn.ubuntu.com/3174-1/
reference_id USN-3174-1
reference_type
scores
url https://usn.ubuntu.com/3174-1/
fixed_packages
aliases CVE-2017-3256
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-nsam-w1d3-pbdb
32
url VCID-nxh7-fuvk-pqc8
vulnerability_id VCID-nxh7-fuvk-pqc8
summary
Multiple vulnerabilities were found in MySQL, the worst of which
    may allow remote execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3633.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3633.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-3633
reference_id
reference_type
scores
0
value 0.00799
scoring_system epss
scoring_elements 0.74065
published_at 2026-04-16T12:55:00Z
1
value 0.00799
scoring_system epss
scoring_elements 0.73984
published_at 2026-04-02T12:55:00Z
2
value 0.00799
scoring_system epss
scoring_elements 0.73981
published_at 2026-04-07T12:55:00Z
3
value 0.00799
scoring_system epss
scoring_elements 0.74015
published_at 2026-04-08T12:55:00Z
4
value 0.00799
scoring_system epss
scoring_elements 0.74029
published_at 2026-04-09T12:55:00Z
5
value 0.00799
scoring_system epss
scoring_elements 0.74051
published_at 2026-04-11T12:55:00Z
6
value 0.00799
scoring_system epss
scoring_elements 0.74033
published_at 2026-04-12T12:55:00Z
7
value 0.00799
scoring_system epss
scoring_elements 0.74026
published_at 2026-04-13T12:55:00Z
8
value 0.00799
scoring_system epss
scoring_elements 0.73978
published_at 2026-04-01T12:55:00Z
9
value 0.00799
scoring_system epss
scoring_elements 0.74011
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-3633
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:N/I:P/A:C
1
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url http://www.securitytracker.com/id/1038928
reference_id 1038928
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:48:30Z/
url http://www.securitytracker.com/id/1038928
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1472683
reference_id 1472683
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1472683
5
reference_url http://www.securityfocus.com/bid/99722
reference_id 99722
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:48:30Z/
url http://www.securityfocus.com/bid/99722
6
reference_url https://security.gentoo.org/glsa/201802-04
reference_id GLSA-201802-04
reference_type
scores
url https://security.gentoo.org/glsa/201802-04
7
reference_url https://access.redhat.com/errata/RHSA-2017:2787
reference_id RHSA-2017:2787
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:48:30Z/
url https://access.redhat.com/errata/RHSA-2017:2787
8
reference_url https://access.redhat.com/errata/RHSA-2017:2886
reference_id RHSA-2017:2886
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:48:30Z/
url https://access.redhat.com/errata/RHSA-2017:2886
9
reference_url https://usn.ubuntu.com/3357-1/
reference_id USN-3357-1
reference_type
scores
url https://usn.ubuntu.com/3357-1/
fixed_packages
aliases CVE-2017-3633
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-nxh7-fuvk-pqc8
33
url VCID-p623-gxyv-g7fs
vulnerability_id VCID-p623-gxyv-g7fs
summary
Multiple vulnerabilities have been found in MariaDB, the worst of
    which could lead to privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3291.json
reference_id
reference_type
scores
0
value 6.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3291.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-3291
reference_id
reference_type
scores
0
value 0.00091
scoring_system epss
scoring_elements 0.2558
published_at 2026-04-16T12:55:00Z
1
value 0.00091
scoring_system epss
scoring_elements 0.25664
published_at 2026-04-01T12:55:00Z
2
value 0.00091
scoring_system epss
scoring_elements 0.25775
published_at 2026-04-04T12:55:00Z
3
value 0.00091
scoring_system epss
scoring_elements 0.25545
published_at 2026-04-07T12:55:00Z
4
value 0.00091
scoring_system epss
scoring_elements 0.25618
published_at 2026-04-08T12:55:00Z
5
value 0.00091
scoring_system epss
scoring_elements 0.25665
published_at 2026-04-09T12:55:00Z
6
value 0.00091
scoring_system epss
scoring_elements 0.25676
published_at 2026-04-11T12:55:00Z
7
value 0.00091
scoring_system epss
scoring_elements 0.25635
published_at 2026-04-12T12:55:00Z
8
value 0.00091
scoring_system epss
scoring_elements 0.25578
published_at 2026-04-13T12:55:00Z
9
value 0.00091
scoring_system epss
scoring_elements 0.25734
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-3291
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6664
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6664
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3238
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3238
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3243
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3243
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3244
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3244
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3257
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3257
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3258
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3258
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3265
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3265
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3291
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3291
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3312
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3312
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3313
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3313
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3317
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3317
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3318
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3318
14
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6
scoring_system cvssv2
scoring_elements AV:L/AC:H/Au:S/C:C/I:C/A:C
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1414429
reference_id 1414429
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1414429
16
reference_url http://www.securityfocus.com/bid/95501
reference_id 95501
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:06:04Z/
url http://www.securityfocus.com/bid/95501
17
reference_url http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
reference_id cpujan2017-2881727.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:06:04Z/
url http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
18
reference_url http://www.debian.org/security/2017/dsa-3767
reference_id dsa-3767
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:06:04Z/
url http://www.debian.org/security/2017/dsa-3767
19
reference_url http://www.debian.org/security/2017/dsa-3770
reference_id dsa-3770
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:06:04Z/
url http://www.debian.org/security/2017/dsa-3770
20
reference_url https://security.gentoo.org/glsa/201702-17
reference_id GLSA-201702-17
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:06:04Z/
url https://security.gentoo.org/glsa/201702-17
21
reference_url https://security.gentoo.org/glsa/201702-18
reference_id GLSA-201702-18
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:06:04Z/
url https://security.gentoo.org/glsa/201702-18
22
reference_url https://access.redhat.com/errata/RHSA-2017:2192
reference_id RHSA-2017:2192
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:06:04Z/
url https://access.redhat.com/errata/RHSA-2017:2192
23
reference_url https://access.redhat.com/errata/RHSA-2017:2787
reference_id RHSA-2017:2787
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:06:04Z/
url https://access.redhat.com/errata/RHSA-2017:2787
24
reference_url https://access.redhat.com/errata/RHSA-2017:2886
reference_id RHSA-2017:2886
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:06:04Z/
url https://access.redhat.com/errata/RHSA-2017:2886
25
reference_url https://access.redhat.com/errata/RHSA-2018:0279
reference_id RHSA-2018:0279
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:06:04Z/
url https://access.redhat.com/errata/RHSA-2018:0279
26
reference_url https://access.redhat.com/errata/RHSA-2018:0574
reference_id RHSA-2018:0574
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:06:04Z/
url https://access.redhat.com/errata/RHSA-2018:0574
27
reference_url https://usn.ubuntu.com/3174-1/
reference_id USN-3174-1
reference_type
scores
url https://usn.ubuntu.com/3174-1/
fixed_packages
aliases CVE-2017-3291
risk_score 2.9
exploitability 0.5
weighted_severity 5.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-p623-gxyv-g7fs
34
url VCID-pv92-6p9x-v7bs
vulnerability_id VCID-pv92-6p9x-v7bs
summary
Multiple vulnerabilities have been found in MariaDB, the worst of
    which could lead to privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3317.json
reference_id
reference_type
scores
0
value 4.0
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:H/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3317.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-3317
reference_id
reference_type
scores
0
value 0.00022
scoring_system epss
scoring_elements 0.05967
published_at 2026-04-16T12:55:00Z
1
value 0.00022
scoring_system epss
scoring_elements 0.05903
published_at 2026-04-01T12:55:00Z
2
value 0.00022
scoring_system epss
scoring_elements 0.05968
published_at 2026-04-04T12:55:00Z
3
value 0.00022
scoring_system epss
scoring_elements 0.05951
published_at 2026-04-07T12:55:00Z
4
value 0.00022
scoring_system epss
scoring_elements 0.0599
published_at 2026-04-08T12:55:00Z
5
value 0.00022
scoring_system epss
scoring_elements 0.06028
published_at 2026-04-09T12:55:00Z
6
value 0.00022
scoring_system epss
scoring_elements 0.06019
published_at 2026-04-11T12:55:00Z
7
value 0.00022
scoring_system epss
scoring_elements 0.0601
published_at 2026-04-12T12:55:00Z
8
value 0.00022
scoring_system epss
scoring_elements 0.06002
published_at 2026-04-13T12:55:00Z
9
value 0.00022
scoring_system epss
scoring_elements 0.05935
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-3317
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6664
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6664
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3238
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3238
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3243
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3243
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3244
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3244
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3257
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3257
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3258
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3258
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3265
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3265
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3291
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3291
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3312
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3312
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3313
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3313
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3317
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3317
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3318
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3318
14
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.8
scoring_system cvssv2
scoring_elements AV:L/AC:H/Au:S/C:N/I:N/A:C
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1414355
reference_id 1414355
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1414355
16
reference_url http://www.securityfocus.com/bid/95585
reference_id 95585
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-08T20:09:31Z/
url http://www.securityfocus.com/bid/95585
17
reference_url http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
reference_id cpujan2017-2881727.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-08T20:09:31Z/
url http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
18
reference_url http://www.debian.org/security/2017/dsa-3767
reference_id dsa-3767
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-08T20:09:31Z/
url http://www.debian.org/security/2017/dsa-3767
19
reference_url http://www.debian.org/security/2017/dsa-3770
reference_id dsa-3770
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-08T20:09:31Z/
url http://www.debian.org/security/2017/dsa-3770
20
reference_url https://security.gentoo.org/glsa/201702-17
reference_id GLSA-201702-17
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-08T20:09:31Z/
url https://security.gentoo.org/glsa/201702-17
21
reference_url https://security.gentoo.org/glsa/201702-18
reference_id GLSA-201702-18
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-08T20:09:31Z/
url https://security.gentoo.org/glsa/201702-18
22
reference_url https://access.redhat.com/errata/RHSA-2017:2192
reference_id RHSA-2017:2192
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-08T20:09:31Z/
url https://access.redhat.com/errata/RHSA-2017:2192
23
reference_url https://access.redhat.com/errata/RHSA-2017:2787
reference_id RHSA-2017:2787
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-08T20:09:31Z/
url https://access.redhat.com/errata/RHSA-2017:2787
24
reference_url https://access.redhat.com/errata/RHSA-2017:2886
reference_id RHSA-2017:2886
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-08T20:09:31Z/
url https://access.redhat.com/errata/RHSA-2017:2886
25
reference_url https://access.redhat.com/errata/RHSA-2018:0279
reference_id RHSA-2018:0279
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-08T20:09:31Z/
url https://access.redhat.com/errata/RHSA-2018:0279
26
reference_url https://access.redhat.com/errata/RHSA-2018:0574
reference_id RHSA-2018:0574
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-08T20:09:31Z/
url https://access.redhat.com/errata/RHSA-2018:0574
27
reference_url https://usn.ubuntu.com/3174-1/
reference_id USN-3174-1
reference_type
scores
url https://usn.ubuntu.com/3174-1/
fixed_packages
aliases CVE-2017-3317
risk_score 1.8
exploitability 0.5
weighted_severity 3.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pv92-6p9x-v7bs
35
url VCID-py18-tg4u-h3d2
vulnerability_id VCID-py18-tg4u-h3d2
summary mysql: Server: Audit Plug-in unspecified vulnerability (CPU Apr 2017)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3460.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3460.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-3460
reference_id
reference_type
scores
0
value 0.0047
scoring_system epss
scoring_elements 0.64594
published_at 2026-04-16T12:55:00Z
1
value 0.0047
scoring_system epss
scoring_elements 0.64479
published_at 2026-04-01T12:55:00Z
2
value 0.0047
scoring_system epss
scoring_elements 0.6452
published_at 2026-04-07T12:55:00Z
3
value 0.0047
scoring_system epss
scoring_elements 0.64568
published_at 2026-04-08T12:55:00Z
4
value 0.0047
scoring_system epss
scoring_elements 0.64584
published_at 2026-04-09T12:55:00Z
5
value 0.0047
scoring_system epss
scoring_elements 0.64601
published_at 2026-04-11T12:55:00Z
6
value 0.0047
scoring_system epss
scoring_elements 0.64588
published_at 2026-04-12T12:55:00Z
7
value 0.0047
scoring_system epss
scoring_elements 0.6456
published_at 2026-04-13T12:55:00Z
8
value 0.0047
scoring_system epss
scoring_elements 0.64532
published_at 2026-04-02T12:55:00Z
9
value 0.0047
scoring_system epss
scoring_elements 0.64561
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-3460
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 2.1
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:S/C:N/I:N/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:59Z/
url http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
4
reference_url http://www.securityfocus.com/bid/97826
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:59Z/
url http://www.securityfocus.com/bid/97826
5
reference_url http://www.securitytracker.com/id/1038287
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:59Z/
url http://www.securitytracker.com/id/1038287
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1443375
reference_id 1443375
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1443375
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
8
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-3460
reference_id CVE-2017-3460
reference_type
scores
0
value 4.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:P
1
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-3460
9
reference_url https://access.redhat.com/errata/RHSA-2017:2886
reference_id RHSA-2017:2886
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:59Z/
url https://access.redhat.com/errata/RHSA-2017:2886
10
reference_url https://usn.ubuntu.com/3269-1/
reference_id USN-3269-1
reference_type
scores
url https://usn.ubuntu.com/3269-1/
fixed_packages
aliases CVE-2017-3460
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-py18-tg4u-h3d2
36
url VCID-pyk1-dgtz-h7fw
vulnerability_id VCID-pyk1-dgtz-h7fw
summary mysql: Server: UDF unspecified vulnerability (CPU Jul 2017)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3529.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3529.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-3529
reference_id
reference_type
scores
0
value 0.00511
scoring_system epss
scoring_elements 0.66385
published_at 2026-04-02T12:55:00Z
1
value 0.00511
scoring_system epss
scoring_elements 0.66457
published_at 2026-04-16T12:55:00Z
2
value 0.00511
scoring_system epss
scoring_elements 0.66347
published_at 2026-04-01T12:55:00Z
3
value 0.00511
scoring_system epss
scoring_elements 0.6643
published_at 2026-04-08T12:55:00Z
4
value 0.00511
scoring_system epss
scoring_elements 0.66444
published_at 2026-04-09T12:55:00Z
5
value 0.00511
scoring_system epss
scoring_elements 0.66464
published_at 2026-04-11T12:55:00Z
6
value 0.00511
scoring_system epss
scoring_elements 0.66452
published_at 2026-04-12T12:55:00Z
7
value 0.00511
scoring_system epss
scoring_elements 0.66421
published_at 2026-04-13T12:55:00Z
8
value 0.00511
scoring_system epss
scoring_elements 0.66412
published_at 2026-04-04T12:55:00Z
9
value 0.00511
scoring_system epss
scoring_elements 0.66382
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-3529
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:S/C:N/I:N/A:C
1
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url http://www.securitytracker.com/id/1038928
reference_id 1038928
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:48:32Z/
url http://www.securitytracker.com/id/1038928
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1472682
reference_id 1472682
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1472682
5
reference_url http://www.securityfocus.com/bid/99746
reference_id 99746
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:48:32Z/
url http://www.securityfocus.com/bid/99746
6
reference_url https://access.redhat.com/errata/RHSA-2017:2886
reference_id RHSA-2017:2886
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:48:32Z/
url https://access.redhat.com/errata/RHSA-2017:2886
7
reference_url https://usn.ubuntu.com/3357-1/
reference_id USN-3357-1
reference_type
scores
url https://usn.ubuntu.com/3357-1/
fixed_packages
aliases CVE-2017-3529
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pyk1-dgtz-h7fw
37
url VCID-qrk5-6ryp-wkce
vulnerability_id VCID-qrk5-6ryp-wkce
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could lead to privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3251.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3251.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-3251
reference_id
reference_type
scores
0
value 0.005
scoring_system epss
scoring_elements 0.65938
published_at 2026-04-02T12:55:00Z
1
value 0.005
scoring_system epss
scoring_elements 0.66009
published_at 2026-04-16T12:55:00Z
2
value 0.005
scoring_system epss
scoring_elements 0.65897
published_at 2026-04-01T12:55:00Z
3
value 0.005
scoring_system epss
scoring_elements 0.65987
published_at 2026-04-08T12:55:00Z
4
value 0.005
scoring_system epss
scoring_elements 0.65999
published_at 2026-04-09T12:55:00Z
5
value 0.005
scoring_system epss
scoring_elements 0.66017
published_at 2026-04-11T12:55:00Z
6
value 0.005
scoring_system epss
scoring_elements 0.66004
published_at 2026-04-12T12:55:00Z
7
value 0.005
scoring_system epss
scoring_elements 0.65974
published_at 2026-04-13T12:55:00Z
8
value 0.005
scoring_system epss
scoring_elements 0.65969
published_at 2026-04-04T12:55:00Z
9
value 0.005
scoring_system epss
scoring_elements 0.65935
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-3251
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:C
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1414343
reference_id 1414343
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1414343
4
reference_url http://www.securityfocus.com/bid/95482
reference_id 95482
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:18Z/
url http://www.securityfocus.com/bid/95482
5
reference_url http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
reference_id cpujan2017-2881727.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:18Z/
url http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
6
reference_url https://security.gentoo.org/glsa/201702-17
reference_id GLSA-201702-17
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:18Z/
url https://security.gentoo.org/glsa/201702-17
7
reference_url https://access.redhat.com/errata/RHSA-2017:2886
reference_id RHSA-2017:2886
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:18Z/
url https://access.redhat.com/errata/RHSA-2017:2886
8
reference_url https://usn.ubuntu.com/3174-1/
reference_id USN-3174-1
reference_type
scores
url https://usn.ubuntu.com/3174-1/
fixed_packages
aliases CVE-2017-3251
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qrk5-6ryp-wkce
38
url VCID-r1ah-dt43-3kc4
vulnerability_id VCID-r1ah-dt43-3kc4
summary mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2017)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3642.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3642.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-3642
reference_id
reference_type
scores
0
value 0.00349
scoring_system epss
scoring_elements 0.57408
published_at 2026-04-02T12:55:00Z
1
value 0.00349
scoring_system epss
scoring_elements 0.57436
published_at 2026-04-13T12:55:00Z
2
value 0.00349
scoring_system epss
scoring_elements 0.57327
published_at 2026-04-01T12:55:00Z
3
value 0.00349
scoring_system epss
scoring_elements 0.57407
published_at 2026-04-07T12:55:00Z
4
value 0.00349
scoring_system epss
scoring_elements 0.5746
published_at 2026-04-08T12:55:00Z
5
value 0.00349
scoring_system epss
scoring_elements 0.57462
published_at 2026-04-16T12:55:00Z
6
value 0.00349
scoring_system epss
scoring_elements 0.57478
published_at 2026-04-11T12:55:00Z
7
value 0.00349
scoring_system epss
scoring_elements 0.57456
published_at 2026-04-12T12:55:00Z
8
value 0.00349
scoring_system epss
scoring_elements 0.57431
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-3642
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:C
1
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url http://www.securitytracker.com/id/1038928
reference_id 1038928
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:48:13Z/
url http://www.securitytracker.com/id/1038928
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1472695
reference_id 1472695
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1472695
5
reference_url http://www.securityfocus.com/bid/99779
reference_id 99779
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:48:13Z/
url http://www.securityfocus.com/bid/99779
6
reference_url https://access.redhat.com/errata/RHSA-2017:2886
reference_id RHSA-2017:2886
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:48:13Z/
url https://access.redhat.com/errata/RHSA-2017:2886
7
reference_url https://usn.ubuntu.com/3357-1/
reference_id USN-3357-1
reference_type
scores
url https://usn.ubuntu.com/3357-1/
fixed_packages
aliases CVE-2017-3642
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-r1ah-dt43-3kc4
39
url VCID-rg55-f36d-3ybb
vulnerability_id VCID-rg55-f36d-3ybb
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could lead to privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3319.json
reference_id
reference_type
scores
0
value 3.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3319.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-3319
reference_id
reference_type
scores
0
value 0.00589
scoring_system epss
scoring_elements 0.69092
published_at 2026-04-02T12:55:00Z
1
value 0.00589
scoring_system epss
scoring_elements 0.69182
published_at 2026-04-16T12:55:00Z
2
value 0.00589
scoring_system epss
scoring_elements 0.69076
published_at 2026-04-01T12:55:00Z
3
value 0.00589
scoring_system epss
scoring_elements 0.69145
published_at 2026-04-08T12:55:00Z
4
value 0.00589
scoring_system epss
scoring_elements 0.69165
published_at 2026-04-09T12:55:00Z
5
value 0.00589
scoring_system epss
scoring_elements 0.69186
published_at 2026-04-11T12:55:00Z
6
value 0.00589
scoring_system epss
scoring_elements 0.69171
published_at 2026-04-12T12:55:00Z
7
value 0.00589
scoring_system epss
scoring_elements 0.69142
published_at 2026-04-13T12:55:00Z
8
value 0.00589
scoring_system epss
scoring_elements 0.69114
published_at 2026-04-04T12:55:00Z
9
value 0.00589
scoring_system epss
scoring_elements 0.69095
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-3319
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 2.1
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:S/C:P/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1414358
reference_id 1414358
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1414358
4
reference_url http://www.securityfocus.com/bid/95479
reference_id 95479
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-08T20:09:29Z/
url http://www.securityfocus.com/bid/95479
5
reference_url http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
reference_id cpujan2017-2881727.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-08T20:09:29Z/
url http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
6
reference_url https://security.gentoo.org/glsa/201702-17
reference_id GLSA-201702-17
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-08T20:09:29Z/
url https://security.gentoo.org/glsa/201702-17
7
reference_url https://access.redhat.com/errata/RHSA-2017:2886
reference_id RHSA-2017:2886
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-08T20:09:29Z/
url https://access.redhat.com/errata/RHSA-2017:2886
8
reference_url https://usn.ubuntu.com/3174-1/
reference_id USN-3174-1
reference_type
scores
url https://usn.ubuntu.com/3174-1/
fixed_packages
aliases CVE-2017-3319
risk_score 1.4
exploitability 0.5
weighted_severity 2.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rg55-f36d-3ybb
40
url VCID-rssq-mfc2-ckaf
vulnerability_id VCID-rssq-mfc2-ckaf
summary
Multiple vulnerabilities have been found in MariaDB, the worst of
    which could lead to privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3258.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3258.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-3258
reference_id
reference_type
scores
0
value 0.00312
scoring_system epss
scoring_elements 0.54407
published_at 2026-04-13T12:55:00Z
1
value 0.00312
scoring_system epss
scoring_elements 0.54327
published_at 2026-04-01T12:55:00Z
2
value 0.00312
scoring_system epss
scoring_elements 0.54347
published_at 2026-04-02T12:55:00Z
3
value 0.00312
scoring_system epss
scoring_elements 0.54377
published_at 2026-04-04T12:55:00Z
4
value 0.00312
scoring_system epss
scoring_elements 0.54351
published_at 2026-04-07T12:55:00Z
5
value 0.00312
scoring_system epss
scoring_elements 0.54403
published_at 2026-04-08T12:55:00Z
6
value 0.00312
scoring_system epss
scoring_elements 0.54398
published_at 2026-04-09T12:55:00Z
7
value 0.00312
scoring_system epss
scoring_elements 0.54446
published_at 2026-04-16T12:55:00Z
8
value 0.00312
scoring_system epss
scoring_elements 0.54429
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-3258
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6664
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6664
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3238
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3238
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3243
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3243
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3244
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3244
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3257
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3257
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3258
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3258
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3265
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3265
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3291
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3291
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3312
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3312
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3313
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3313
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3317
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3317
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3318
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3318
14
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:C
1
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1414351
reference_id 1414351
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1414351
16
reference_url http://www.securityfocus.com/bid/95560
reference_id 95560
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:10Z/
url http://www.securityfocus.com/bid/95560
17
reference_url http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
reference_id cpujan2017-2881727.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:10Z/
url http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
18
reference_url http://www.debian.org/security/2017/dsa-3767
reference_id dsa-3767
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:10Z/
url http://www.debian.org/security/2017/dsa-3767
19
reference_url http://www.debian.org/security/2017/dsa-3770
reference_id dsa-3770
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:10Z/
url http://www.debian.org/security/2017/dsa-3770
20
reference_url https://security.gentoo.org/glsa/201702-17
reference_id GLSA-201702-17
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:10Z/
url https://security.gentoo.org/glsa/201702-17
21
reference_url https://security.gentoo.org/glsa/201702-18
reference_id GLSA-201702-18
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:10Z/
url https://security.gentoo.org/glsa/201702-18
22
reference_url https://access.redhat.com/errata/RHSA-2017:2192
reference_id RHSA-2017:2192
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:10Z/
url https://access.redhat.com/errata/RHSA-2017:2192
23
reference_url https://access.redhat.com/errata/RHSA-2017:2787
reference_id RHSA-2017:2787
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:10Z/
url https://access.redhat.com/errata/RHSA-2017:2787
24
reference_url https://access.redhat.com/errata/RHSA-2017:2886
reference_id RHSA-2017:2886
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:10Z/
url https://access.redhat.com/errata/RHSA-2017:2886
25
reference_url https://access.redhat.com/errata/RHSA-2018:0279
reference_id RHSA-2018:0279
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:10Z/
url https://access.redhat.com/errata/RHSA-2018:0279
26
reference_url https://access.redhat.com/errata/RHSA-2018:0574
reference_id RHSA-2018:0574
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:10Z/
url https://access.redhat.com/errata/RHSA-2018:0574
27
reference_url https://usn.ubuntu.com/3174-1/
reference_id USN-3174-1
reference_type
scores
url https://usn.ubuntu.com/3174-1/
fixed_packages
aliases CVE-2017-3258
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rssq-mfc2-ckaf
41
url VCID-tf68-atyj-b7cj
vulnerability_id VCID-tf68-atyj-b7cj
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could lead to privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3273.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3273.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-3273
reference_id
reference_type
scores
0
value 0.00852
scoring_system epss
scoring_elements 0.74936
published_at 2026-04-16T12:55:00Z
1
value 0.00852
scoring_system epss
scoring_elements 0.74859
published_at 2026-04-01T12:55:00Z
2
value 0.00852
scoring_system epss
scoring_elements 0.7486
published_at 2026-04-02T12:55:00Z
3
value 0.00852
scoring_system epss
scoring_elements 0.74895
published_at 2026-04-08T12:55:00Z
4
value 0.00852
scoring_system epss
scoring_elements 0.74907
published_at 2026-04-09T12:55:00Z
5
value 0.00852
scoring_system epss
scoring_elements 0.74931
published_at 2026-04-11T12:55:00Z
6
value 0.00852
scoring_system epss
scoring_elements 0.74909
published_at 2026-04-12T12:55:00Z
7
value 0.00852
scoring_system epss
scoring_elements 0.74899
published_at 2026-04-13T12:55:00Z
8
value 0.00852
scoring_system epss
scoring_elements 0.74888
published_at 2026-04-04T12:55:00Z
9
value 0.00852
scoring_system epss
scoring_elements 0.74862
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-3273
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:C
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1414352
reference_id 1414352
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1414352
4
reference_url http://www.securityfocus.com/bid/95583
reference_id 95583
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:03Z/
url http://www.securityfocus.com/bid/95583
5
reference_url http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
reference_id cpujan2017-2881727.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:03Z/
url http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
6
reference_url https://security.gentoo.org/glsa/201702-17
reference_id GLSA-201702-17
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:03Z/
url https://security.gentoo.org/glsa/201702-17
7
reference_url https://access.redhat.com/errata/RHSA-2017:2787
reference_id RHSA-2017:2787
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:03Z/
url https://access.redhat.com/errata/RHSA-2017:2787
8
reference_url https://access.redhat.com/errata/RHSA-2017:2886
reference_id RHSA-2017:2886
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:03Z/
url https://access.redhat.com/errata/RHSA-2017:2886
9
reference_url https://usn.ubuntu.com/3174-1/
reference_id USN-3174-1
reference_type
scores
url https://usn.ubuntu.com/3174-1/
fixed_packages
aliases CVE-2017-3273
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tf68-atyj-b7cj
42
url VCID-tyes-eb5w-jqfa
vulnerability_id VCID-tyes-eb5w-jqfa
summary mysql: Incorrect input validation allowing code execution via mysqldump
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5483.json
reference_id
reference_type
scores
0
value 6.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5483.json
1
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1433010
reference_id 1433010
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1433010
3
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-5483
reference_id CVE-2016-5483
reference_type
scores
url https://nvd.nist.gov/vuln/detail/CVE-2016-5483
4
reference_url https://access.redhat.com/errata/RHSA-2016:2131
reference_id RHSA-2016:2131
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2131
5
reference_url https://access.redhat.com/errata/RHSA-2016:2927
reference_id RHSA-2016:2927
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2927
6
reference_url https://access.redhat.com/errata/RHSA-2016:2928
reference_id RHSA-2016:2928
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2928
7
reference_url https://access.redhat.com/errata/RHSA-2017:2192
reference_id RHSA-2017:2192
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:2192
8
reference_url https://access.redhat.com/errata/RHSA-2017:2787
reference_id RHSA-2017:2787
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:2787
9
reference_url https://access.redhat.com/errata/RHSA-2017:2886
reference_id RHSA-2017:2886
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:2886
fixed_packages
aliases CVE-2016-5483
risk_score 2.9
exploitability 0.5
weighted_severity 5.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tyes-eb5w-jqfa
43
url VCID-u2c7-p86x-5bgf
vulnerability_id VCID-u2c7-p86x-5bgf
summary
Multiple vulnerabilities were found in MySQL, the worst of which
    may allow remote execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3652.json
reference_id
reference_type
scores
0
value 4.2
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3652.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-3652
reference_id
reference_type
scores
0
value 0.00426
scoring_system epss
scoring_elements 0.62328
published_at 2026-04-16T12:55:00Z
1
value 0.00426
scoring_system epss
scoring_elements 0.6223
published_at 2026-04-02T12:55:00Z
2
value 0.00426
scoring_system epss
scoring_elements 0.62227
published_at 2026-04-07T12:55:00Z
3
value 0.00426
scoring_system epss
scoring_elements 0.62278
published_at 2026-04-08T12:55:00Z
4
value 0.00426
scoring_system epss
scoring_elements 0.62295
published_at 2026-04-09T12:55:00Z
5
value 0.00426
scoring_system epss
scoring_elements 0.62314
published_at 2026-04-11T12:55:00Z
6
value 0.00426
scoring_system epss
scoring_elements 0.62304
published_at 2026-04-12T12:55:00Z
7
value 0.00426
scoring_system epss
scoring_elements 0.62282
published_at 2026-04-13T12:55:00Z
8
value 0.00426
scoring_system epss
scoring_elements 0.62173
published_at 2026-04-01T12:55:00Z
9
value 0.00426
scoring_system epss
scoring_elements 0.6226
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-3652
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3635
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3635
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3636
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3636
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3641
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3641
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3648
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3648
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3651
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3651
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3652
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3652
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3653
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3653
9
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.6
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:S/C:P/I:P/A:N
1
value 4.2
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
10
reference_url http://www.securitytracker.com/id/1038928
reference_id 1038928
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:47:43Z/
url http://www.securitytracker.com/id/1038928
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1472710
reference_id 1472710
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1472710
12
reference_url http://www.securityfocus.com/bid/99805
reference_id 99805
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:47:43Z/
url http://www.securityfocus.com/bid/99805
13
reference_url http://www.debian.org/security/2017/dsa-3922
reference_id dsa-3922
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:47:43Z/
url http://www.debian.org/security/2017/dsa-3922
14
reference_url https://security.gentoo.org/glsa/201802-04
reference_id GLSA-201802-04
reference_type
scores
url https://security.gentoo.org/glsa/201802-04
15
reference_url https://access.redhat.com/errata/RHSA-2017:2787
reference_id RHSA-2017:2787
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:47:43Z/
url https://access.redhat.com/errata/RHSA-2017:2787
16
reference_url https://access.redhat.com/errata/RHSA-2017:2886
reference_id RHSA-2017:2886
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:47:43Z/
url https://access.redhat.com/errata/RHSA-2017:2886
17
reference_url https://usn.ubuntu.com/3357-1/
reference_id USN-3357-1
reference_type
scores
url https://usn.ubuntu.com/3357-1/
18
reference_url https://usn.ubuntu.com/3357-2/
reference_id USN-3357-2
reference_type
scores
url https://usn.ubuntu.com/3357-2/
fixed_packages
aliases CVE-2017-3652
risk_score 1.9
exploitability 0.5
weighted_severity 3.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-u2c7-p86x-5bgf
44
url VCID-uc9j-1fjq-e7et
vulnerability_id VCID-uc9j-1fjq-e7et
summary mysql: Server: InnoDB unspecified vulnerability (CPU Apr 2017)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3454.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3454.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-3454
reference_id
reference_type
scores
0
value 0.00368
scoring_system epss
scoring_elements 0.5879
published_at 2026-04-16T12:55:00Z
1
value 0.00368
scoring_system epss
scoring_elements 0.58645
published_at 2026-04-01T12:55:00Z
2
value 0.00368
scoring_system epss
scoring_elements 0.5875
published_at 2026-04-04T12:55:00Z
3
value 0.00368
scoring_system epss
scoring_elements 0.58717
published_at 2026-04-07T12:55:00Z
4
value 0.00368
scoring_system epss
scoring_elements 0.5877
published_at 2026-04-08T12:55:00Z
5
value 0.00368
scoring_system epss
scoring_elements 0.58777
published_at 2026-04-12T12:55:00Z
6
value 0.00368
scoring_system epss
scoring_elements 0.58795
published_at 2026-04-11T12:55:00Z
7
value 0.00368
scoring_system epss
scoring_elements 0.58757
published_at 2026-04-13T12:55:00Z
8
value 0.00368
scoring_system epss
scoring_elements 0.58729
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-3454
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 2.1
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:S/C:N/I:N/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:46:06Z/
url http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
4
reference_url http://www.securityfocus.com/bid/97791
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:46:06Z/
url http://www.securityfocus.com/bid/97791
5
reference_url http://www.securitytracker.com/id/1038287
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:46:06Z/
url http://www.securitytracker.com/id/1038287
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1443366
reference_id 1443366
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1443366
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
8
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-3454
reference_id CVE-2017-3454
reference_type
scores
0
value 5.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:P/A:P
1
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-3454
9
reference_url https://access.redhat.com/errata/RHSA-2017:2886
reference_id RHSA-2017:2886
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:46:06Z/
url https://access.redhat.com/errata/RHSA-2017:2886
10
reference_url https://usn.ubuntu.com/3269-1/
reference_id USN-3269-1
reference_type
scores
url https://usn.ubuntu.com/3269-1/
fixed_packages
aliases CVE-2017-3454
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-uc9j-1fjq-e7et
45
url VCID-un5y-y9sq-1ufb
vulnerability_id VCID-un5y-y9sq-1ufb
summary
Multiple vulnerabilities have been found in MariaDB, the worst of
    which could lead to privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3244.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3244.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-3244
reference_id
reference_type
scores
0
value 0.00314
scoring_system epss
scoring_elements 0.54596
published_at 2026-04-16T12:55:00Z
1
value 0.00314
scoring_system epss
scoring_elements 0.54473
published_at 2026-04-01T12:55:00Z
2
value 0.00314
scoring_system epss
scoring_elements 0.54572
published_at 2026-04-04T12:55:00Z
3
value 0.00314
scoring_system epss
scoring_elements 0.54541
published_at 2026-04-07T12:55:00Z
4
value 0.00314
scoring_system epss
scoring_elements 0.54592
published_at 2026-04-08T12:55:00Z
5
value 0.00314
scoring_system epss
scoring_elements 0.54587
published_at 2026-04-09T12:55:00Z
6
value 0.00314
scoring_system epss
scoring_elements 0.54599
published_at 2026-04-11T12:55:00Z
7
value 0.00314
scoring_system epss
scoring_elements 0.54581
published_at 2026-04-12T12:55:00Z
8
value 0.00314
scoring_system epss
scoring_elements 0.54559
published_at 2026-04-13T12:55:00Z
9
value 0.00314
scoring_system epss
scoring_elements 0.54548
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-3244
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6664
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6664
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3238
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3238
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3243
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3243
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3244
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3244
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3257
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3257
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3258
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3258
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3265
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3265
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3291
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3291
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3312
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3312
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3313
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3313
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3317
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3317
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3318
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3318
14
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:C
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1414342
reference_id 1414342
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1414342
16
reference_url http://www.securityfocus.com/bid/95565
reference_id 95565
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:25Z/
url http://www.securityfocus.com/bid/95565
17
reference_url http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
reference_id cpujan2017-2881727.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:25Z/
url http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
18
reference_url http://www.debian.org/security/2017/dsa-3767
reference_id dsa-3767
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:25Z/
url http://www.debian.org/security/2017/dsa-3767
19
reference_url http://www.debian.org/security/2017/dsa-3770
reference_id dsa-3770
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:25Z/
url http://www.debian.org/security/2017/dsa-3770
20
reference_url https://security.gentoo.org/glsa/201702-17
reference_id GLSA-201702-17
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:25Z/
url https://security.gentoo.org/glsa/201702-17
21
reference_url https://security.gentoo.org/glsa/201702-18
reference_id GLSA-201702-18
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:25Z/
url https://security.gentoo.org/glsa/201702-18
22
reference_url https://access.redhat.com/errata/RHSA-2017:2192
reference_id RHSA-2017:2192
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:25Z/
url https://access.redhat.com/errata/RHSA-2017:2192
23
reference_url https://access.redhat.com/errata/RHSA-2017:2787
reference_id RHSA-2017:2787
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:25Z/
url https://access.redhat.com/errata/RHSA-2017:2787
24
reference_url https://access.redhat.com/errata/RHSA-2017:2886
reference_id RHSA-2017:2886
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:25Z/
url https://access.redhat.com/errata/RHSA-2017:2886
25
reference_url https://access.redhat.com/errata/RHSA-2018:0279
reference_id RHSA-2018:0279
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:25Z/
url https://access.redhat.com/errata/RHSA-2018:0279
26
reference_url https://access.redhat.com/errata/RHSA-2018:0574
reference_id RHSA-2018:0574
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:25Z/
url https://access.redhat.com/errata/RHSA-2018:0574
27
reference_url https://usn.ubuntu.com/3174-1/
reference_id USN-3174-1
reference_type
scores
url https://usn.ubuntu.com/3174-1/
fixed_packages
aliases CVE-2017-3244
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-un5y-y9sq-1ufb
46
url VCID-v165-afmm-w3er
vulnerability_id VCID-v165-afmm-w3er
summary
Multiple vulnerabilities were found in MySQL, the worst of which
    may allow remote execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3651.json
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3651.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-3651
reference_id
reference_type
scores
0
value 0.00414
scoring_system epss
scoring_elements 0.61578
published_at 2026-04-16T12:55:00Z
1
value 0.00414
scoring_system epss
scoring_elements 0.61486
published_at 2026-04-07T12:55:00Z
2
value 0.00414
scoring_system epss
scoring_elements 0.61534
published_at 2026-04-08T12:55:00Z
3
value 0.00414
scoring_system epss
scoring_elements 0.61548
published_at 2026-04-09T12:55:00Z
4
value 0.00414
scoring_system epss
scoring_elements 0.61569
published_at 2026-04-11T12:55:00Z
5
value 0.00414
scoring_system epss
scoring_elements 0.61556
published_at 2026-04-12T12:55:00Z
6
value 0.00414
scoring_system epss
scoring_elements 0.61536
published_at 2026-04-13T12:55:00Z
7
value 0.00414
scoring_system epss
scoring_elements 0.61487
published_at 2026-04-02T12:55:00Z
8
value 0.00414
scoring_system epss
scoring_elements 0.6141
published_at 2026-04-01T12:55:00Z
9
value 0.00414
scoring_system epss
scoring_elements 0.61515
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-3651
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3635
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3635
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3636
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3636
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3641
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3641
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3648
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3648
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3651
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3651
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3652
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3652
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3653
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3653
9
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:P/A:N
1
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
10
reference_url http://www.securitytracker.com/id/1038928
reference_id 1038928
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:47:44Z/
url http://www.securitytracker.com/id/1038928
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1472708
reference_id 1472708
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1472708
12
reference_url http://www.securityfocus.com/bid/99802
reference_id 99802
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:47:44Z/
url http://www.securityfocus.com/bid/99802
13
reference_url http://www.debian.org/security/2017/dsa-3922
reference_id dsa-3922
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:47:44Z/
url http://www.debian.org/security/2017/dsa-3922
14
reference_url https://security.gentoo.org/glsa/201802-04
reference_id GLSA-201802-04
reference_type
scores
url https://security.gentoo.org/glsa/201802-04
15
reference_url https://access.redhat.com/errata/RHSA-2016:2927
reference_id RHSA-2016:2927
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2927
16
reference_url https://access.redhat.com/errata/RHSA-2016:2928
reference_id RHSA-2016:2928
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2928
17
reference_url https://access.redhat.com/errata/RHSA-2017:2192
reference_id RHSA-2017:2192
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:47:44Z/
url https://access.redhat.com/errata/RHSA-2017:2192
18
reference_url https://access.redhat.com/errata/RHSA-2017:2787
reference_id RHSA-2017:2787
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:47:44Z/
url https://access.redhat.com/errata/RHSA-2017:2787
19
reference_url https://access.redhat.com/errata/RHSA-2017:2886
reference_id RHSA-2017:2886
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:47:44Z/
url https://access.redhat.com/errata/RHSA-2017:2886
20
reference_url https://access.redhat.com/errata/RHSA-2018:2439
reference_id RHSA-2018:2439
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:47:44Z/
url https://access.redhat.com/errata/RHSA-2018:2439
21
reference_url https://access.redhat.com/errata/RHSA-2018:2729
reference_id RHSA-2018:2729
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:47:44Z/
url https://access.redhat.com/errata/RHSA-2018:2729
22
reference_url https://usn.ubuntu.com/3357-1/
reference_id USN-3357-1
reference_type
scores
url https://usn.ubuntu.com/3357-1/
23
reference_url https://usn.ubuntu.com/3357-2/
reference_id USN-3357-2
reference_type
scores
url https://usn.ubuntu.com/3357-2/
fixed_packages
aliases CVE-2017-3651
risk_score 1.9
exploitability 0.5
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-v165-afmm-w3er
47
url VCID-v4gv-g9n5-ukgc
vulnerability_id VCID-v4gv-g9n5-ukgc
summary
Multiple vulnerabilities were found in MySQL, the worst of which
    may allow remote execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3453.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3453.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-3453
reference_id
reference_type
scores
0
value 0.00419
scoring_system epss
scoring_elements 0.61923
published_at 2026-04-16T12:55:00Z
1
value 0.00419
scoring_system epss
scoring_elements 0.61751
published_at 2026-04-01T12:55:00Z
2
value 0.00419
scoring_system epss
scoring_elements 0.61825
published_at 2026-04-07T12:55:00Z
3
value 0.00419
scoring_system epss
scoring_elements 0.61855
published_at 2026-04-04T12:55:00Z
4
value 0.00419
scoring_system epss
scoring_elements 0.61875
published_at 2026-04-08T12:55:00Z
5
value 0.00419
scoring_system epss
scoring_elements 0.6189
published_at 2026-04-09T12:55:00Z
6
value 0.00419
scoring_system epss
scoring_elements 0.61912
published_at 2026-04-11T12:55:00Z
7
value 0.00419
scoring_system epss
scoring_elements 0.619
published_at 2026-04-12T12:55:00Z
8
value 0.00419
scoring_system epss
scoring_elements 0.6188
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-3453
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10286
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10286
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10379
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10379
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10384
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10384
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3302
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3302
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3305
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3305
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3308
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3308
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3309
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3309
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3329
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3329
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3453
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3453
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3456
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3456
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3461
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3461
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3462
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3462
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3463
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3463
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3464
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3464
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3600
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3600
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3636
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3636
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3641
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3641
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3653
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3653
20
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 2.1
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:S/C:N/I:N/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
21
reference_url http://www.debian.org/security/2017/dsa-3834
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:46:07Z/
url http://www.debian.org/security/2017/dsa-3834
22
reference_url http://www.debian.org/security/2017/dsa-3944
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:46:07Z/
url http://www.debian.org/security/2017/dsa-3944
23
reference_url http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:46:07Z/
url http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
24
reference_url http://www.securityfocus.com/bid/97776
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:46:07Z/
url http://www.securityfocus.com/bid/97776
25
reference_url http://www.securitytracker.com/id/1038287
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:46:07Z/
url http://www.securitytracker.com/id/1038287
26
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1443365
reference_id 1443365
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1443365
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-3453
reference_id CVE-2017-3453
reference_type
scores
0
value 4.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:P
1
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-3453
42
reference_url https://security.gentoo.org/glsa/201802-04
reference_id GLSA-201802-04
reference_type
scores
url https://security.gentoo.org/glsa/201802-04
43
reference_url https://access.redhat.com/errata/RHSA-2017:2192
reference_id RHSA-2017:2192
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:46:07Z/
url https://access.redhat.com/errata/RHSA-2017:2192
44
reference_url https://access.redhat.com/errata/RHSA-2017:2787
reference_id RHSA-2017:2787
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:46:07Z/
url https://access.redhat.com/errata/RHSA-2017:2787
45
reference_url https://access.redhat.com/errata/RHSA-2017:2886
reference_id RHSA-2017:2886
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:46:07Z/
url https://access.redhat.com/errata/RHSA-2017:2886
46
reference_url https://access.redhat.com/errata/RHSA-2018:0279
reference_id RHSA-2018:0279
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:46:07Z/
url https://access.redhat.com/errata/RHSA-2018:0279
47
reference_url https://access.redhat.com/errata/RHSA-2018:0574
reference_id RHSA-2018:0574
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:46:07Z/
url https://access.redhat.com/errata/RHSA-2018:0574
48
reference_url https://usn.ubuntu.com/3269-1/
reference_id USN-3269-1
reference_type
scores
url https://usn.ubuntu.com/3269-1/
49
reference_url https://usn.ubuntu.com/3357-2/
reference_id USN-3357-2
reference_type
scores
url https://usn.ubuntu.com/3357-2/
fixed_packages
aliases CVE-2017-3453
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-v4gv-g9n5-ukgc
48
url VCID-vfhu-cx61-77f1
vulnerability_id VCID-vfhu-cx61-77f1
summary
Multiple vulnerabilities were found in MySQL, the worst of which
    may allow remote execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3649.json
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3649.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-3649
reference_id
reference_type
scores
0
value 0.00406
scoring_system epss
scoring_elements 0.61104
published_at 2026-04-16T12:55:00Z
1
value 0.00406
scoring_system epss
scoring_elements 0.60939
published_at 2026-04-01T12:55:00Z
2
value 0.00406
scoring_system epss
scoring_elements 0.61016
published_at 2026-04-02T12:55:00Z
3
value 0.00406
scoring_system epss
scoring_elements 0.61058
published_at 2026-04-08T12:55:00Z
4
value 0.00406
scoring_system epss
scoring_elements 0.61074
published_at 2026-04-09T12:55:00Z
5
value 0.00406
scoring_system epss
scoring_elements 0.61095
published_at 2026-04-11T12:55:00Z
6
value 0.00406
scoring_system epss
scoring_elements 0.61082
published_at 2026-04-12T12:55:00Z
7
value 0.00406
scoring_system epss
scoring_elements 0.61063
published_at 2026-04-13T12:55:00Z
8
value 0.00406
scoring_system epss
scoring_elements 0.61045
published_at 2026-04-04T12:55:00Z
9
value 0.00406
scoring_system epss
scoring_elements 0.6101
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-3649
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:S/C:N/I:N/A:C
1
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url http://www.securitytracker.com/id/1038928
reference_id 1038928
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:47:49Z/
url http://www.securitytracker.com/id/1038928
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1472705
reference_id 1472705
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1472705
5
reference_url http://www.securityfocus.com/bid/99799
reference_id 99799
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:47:49Z/
url http://www.securityfocus.com/bid/99799
6
reference_url https://security.gentoo.org/glsa/201802-04
reference_id GLSA-201802-04
reference_type
scores
url https://security.gentoo.org/glsa/201802-04
7
reference_url https://access.redhat.com/errata/RHSA-2017:2787
reference_id RHSA-2017:2787
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:47:49Z/
url https://access.redhat.com/errata/RHSA-2017:2787
8
reference_url https://access.redhat.com/errata/RHSA-2017:2886
reference_id RHSA-2017:2886
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:47:49Z/
url https://access.redhat.com/errata/RHSA-2017:2886
9
reference_url https://usn.ubuntu.com/3357-1/
reference_id USN-3357-1
reference_type
scores
url https://usn.ubuntu.com/3357-1/
fixed_packages
aliases CVE-2017-3649
risk_score 2.0
exploitability 0.5
weighted_severity 4.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vfhu-cx61-77f1
49
url VCID-w1u1-r49p-yycs
vulnerability_id VCID-w1u1-r49p-yycs
summary mysql: Server: Security: Encryption unspecified vulnerability (CPU Apr 2017)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3468.json
reference_id
reference_type
scores
0
value 3.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3468.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-3468
reference_id
reference_type
scores
0
value 0.00204
scoring_system epss
scoring_elements 0.42649
published_at 2026-04-16T12:55:00Z
1
value 0.00204
scoring_system epss
scoring_elements 0.42568
published_at 2026-04-07T12:55:00Z
2
value 0.00204
scoring_system epss
scoring_elements 0.4262
published_at 2026-04-08T12:55:00Z
3
value 0.00204
scoring_system epss
scoring_elements 0.42631
published_at 2026-04-09T12:55:00Z
4
value 0.00204
scoring_system epss
scoring_elements 0.42654
published_at 2026-04-11T12:55:00Z
5
value 0.00204
scoring_system epss
scoring_elements 0.42618
published_at 2026-04-12T12:55:00Z
6
value 0.00204
scoring_system epss
scoring_elements 0.4259
published_at 2026-04-13T12:55:00Z
7
value 0.00204
scoring_system epss
scoring_elements 0.42601
published_at 2026-04-02T12:55:00Z
8
value 0.00204
scoring_system epss
scoring_elements 0.4253
published_at 2026-04-01T12:55:00Z
9
value 0.00204
scoring_system epss
scoring_elements 0.4263
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-3468
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 2.1
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:S/C:N/I:P/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:52Z/
url http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
4
reference_url http://www.securityfocus.com/bid/97848
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:52Z/
url http://www.securityfocus.com/bid/97848
5
reference_url http://www.securitytracker.com/id/1038287
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:52Z/
url http://www.securitytracker.com/id/1038287
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1443385
reference_id 1443385
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1443385
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
8
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-3468
reference_id CVE-2017-3468
reference_type
scores
0
value 3.5
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:S/C:N/I:P/A:N
1
value 3.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2017-3468
9
reference_url https://access.redhat.com/errata/RHSA-2017:2886
reference_id RHSA-2017:2886
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:52Z/
url https://access.redhat.com/errata/RHSA-2017:2886
10
reference_url https://usn.ubuntu.com/3269-1/
reference_id USN-3269-1
reference_type
scores
url https://usn.ubuntu.com/3269-1/
fixed_packages
aliases CVE-2017-3468
risk_score 1.6
exploitability 0.5
weighted_severity 3.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-w1u1-r49p-yycs
50
url VCID-w8a7-1nnk-kub5
vulnerability_id VCID-w8a7-1nnk-kub5
summary mysql: C API unspecified vulnerability (CPU Jul 2017)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3650.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3650.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-3650
reference_id
reference_type
scores
0
value 0.00566
scoring_system epss
scoring_elements 0.68411
published_at 2026-04-02T12:55:00Z
1
value 0.00566
scoring_system epss
scoring_elements 0.68493
published_at 2026-04-16T12:55:00Z
2
value 0.00566
scoring_system epss
scoring_elements 0.68391
published_at 2026-04-01T12:55:00Z
3
value 0.00566
scoring_system epss
scoring_elements 0.68457
published_at 2026-04-08T12:55:00Z
4
value 0.00566
scoring_system epss
scoring_elements 0.68474
published_at 2026-04-09T12:55:00Z
5
value 0.00566
scoring_system epss
scoring_elements 0.685
published_at 2026-04-11T12:55:00Z
6
value 0.00566
scoring_system epss
scoring_elements 0.68488
published_at 2026-04-12T12:55:00Z
7
value 0.00566
scoring_system epss
scoring_elements 0.68455
published_at 2026-04-13T12:55:00Z
8
value 0.00566
scoring_system epss
scoring_elements 0.68431
published_at 2026-04-04T12:55:00Z
9
value 0.00566
scoring_system epss
scoring_elements 0.68407
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-3650
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 2.6
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:P/I:N/A:N
1
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url http://www.securitytracker.com/id/1038928
reference_id 1038928
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:47:46Z/
url http://www.securitytracker.com/id/1038928
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1472706
reference_id 1472706
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1472706
5
reference_url http://www.securityfocus.com/bid/99808
reference_id 99808
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:47:46Z/
url http://www.securityfocus.com/bid/99808
6
reference_url https://access.redhat.com/errata/RHSA-2017:2886
reference_id RHSA-2017:2886
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:47:46Z/
url https://access.redhat.com/errata/RHSA-2017:2886
7
reference_url https://usn.ubuntu.com/3357-1/
reference_id USN-3357-1
reference_type
scores
url https://usn.ubuntu.com/3357-1/
fixed_packages
aliases CVE-2017-3650
risk_score 1.6
exploitability 0.5
weighted_severity 3.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-w8a7-1nnk-kub5
51
url VCID-wjfw-kksb-a7aw
vulnerability_id VCID-wjfw-kksb-a7aw
summary mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2017)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3459.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3459.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-3459
reference_id
reference_type
scores
0
value 0.0047
scoring_system epss
scoring_elements 0.64594
published_at 2026-04-16T12:55:00Z
1
value 0.0047
scoring_system epss
scoring_elements 0.6452
published_at 2026-04-07T12:55:00Z
2
value 0.0047
scoring_system epss
scoring_elements 0.64568
published_at 2026-04-08T12:55:00Z
3
value 0.0047
scoring_system epss
scoring_elements 0.64584
published_at 2026-04-09T12:55:00Z
4
value 0.0047
scoring_system epss
scoring_elements 0.64601
published_at 2026-04-11T12:55:00Z
5
value 0.0047
scoring_system epss
scoring_elements 0.64588
published_at 2026-04-12T12:55:00Z
6
value 0.0047
scoring_system epss
scoring_elements 0.6456
published_at 2026-04-13T12:55:00Z
7
value 0.0047
scoring_system epss
scoring_elements 0.64532
published_at 2026-04-02T12:55:00Z
8
value 0.0047
scoring_system epss
scoring_elements 0.64479
published_at 2026-04-01T12:55:00Z
9
value 0.0047
scoring_system epss
scoring_elements 0.64561
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-3459
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 2.1
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:S/C:N/I:N/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:46:01Z/
url http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
4
reference_url http://www.securityfocus.com/bid/97847
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:46:01Z/
url http://www.securityfocus.com/bid/97847
5
reference_url http://www.securitytracker.com/id/1038287
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:46:01Z/
url http://www.securitytracker.com/id/1038287
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1443374
reference_id 1443374
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1443374
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
8
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-3459
reference_id CVE-2017-3459
reference_type
scores
0
value 4.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:P
1
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-3459
9
reference_url https://access.redhat.com/errata/RHSA-2017:2886
reference_id RHSA-2017:2886
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:46:01Z/
url https://access.redhat.com/errata/RHSA-2017:2886
10
reference_url https://usn.ubuntu.com/3269-1/
reference_id USN-3269-1
reference_type
scores
url https://usn.ubuntu.com/3269-1/
fixed_packages
aliases CVE-2017-3459
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wjfw-kksb-a7aw
52
url VCID-wnkm-c1tm-53bb
vulnerability_id VCID-wnkm-c1tm-53bb
summary mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2017)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3638.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3638.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-3638
reference_id
reference_type
scores
0
value 0.00349
scoring_system epss
scoring_elements 0.57408
published_at 2026-04-02T12:55:00Z
1
value 0.00349
scoring_system epss
scoring_elements 0.57436
published_at 2026-04-13T12:55:00Z
2
value 0.00349
scoring_system epss
scoring_elements 0.57327
published_at 2026-04-01T12:55:00Z
3
value 0.00349
scoring_system epss
scoring_elements 0.57462
published_at 2026-04-16T12:55:00Z
4
value 0.00349
scoring_system epss
scoring_elements 0.57478
published_at 2026-04-11T12:55:00Z
5
value 0.00349
scoring_system epss
scoring_elements 0.57456
published_at 2026-04-12T12:55:00Z
6
value 0.00349
scoring_system epss
scoring_elements 0.57431
published_at 2026-04-04T12:55:00Z
7
value 0.00349
scoring_system epss
scoring_elements 0.57407
published_at 2026-04-07T12:55:00Z
8
value 0.00349
scoring_system epss
scoring_elements 0.5746
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-3638
2
reference_url http://www.securitytracker.com/id/1038928
reference_id 1038928
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:48:19Z/
url http://www.securitytracker.com/id/1038928
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1472688
reference_id 1472688
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1472688
4
reference_url http://www.securityfocus.com/bid/99778
reference_id 99778
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:48:19Z/
url http://www.securityfocus.com/bid/99778
5
reference_url https://access.redhat.com/errata/RHSA-2017:2886
reference_id RHSA-2017:2886
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:48:19Z/
url https://access.redhat.com/errata/RHSA-2017:2886
6
reference_url https://usn.ubuntu.com/3357-1/
reference_id USN-3357-1
reference_type
scores
url https://usn.ubuntu.com/3357-1/
fixed_packages
aliases CVE-2017-3638
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wnkm-c1tm-53bb
53
url VCID-wrna-cc9g-sqbe
vulnerability_id VCID-wrna-cc9g-sqbe
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could lead to privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3313.json
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3313.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-3313
reference_id
reference_type
scores
0
value 0.00053
scoring_system epss
scoring_elements 0.16556
published_at 2026-04-16T12:55:00Z
1
value 0.00053
scoring_system epss
scoring_elements 0.16818
published_at 2026-04-04T12:55:00Z
2
value 0.00053
scoring_system epss
scoring_elements 0.16603
published_at 2026-04-07T12:55:00Z
3
value 0.00053
scoring_system epss
scoring_elements 0.16688
published_at 2026-04-08T12:55:00Z
4
value 0.00053
scoring_system epss
scoring_elements 0.16742
published_at 2026-04-09T12:55:00Z
5
value 0.00053
scoring_system epss
scoring_elements 0.16722
published_at 2026-04-11T12:55:00Z
6
value 0.00053
scoring_system epss
scoring_elements 0.16679
published_at 2026-04-12T12:55:00Z
7
value 0.00053
scoring_system epss
scoring_elements 0.1662
published_at 2026-04-13T12:55:00Z
8
value 0.00053
scoring_system epss
scoring_elements 0.16758
published_at 2026-04-02T12:55:00Z
9
value 0.00053
scoring_system epss
scoring_elements 0.16579
published_at 2026-04-01T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-3313
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3238
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3238
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3243
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3243
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3244
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3244
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3258
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3258
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3265
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3265
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3291
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3291
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3302
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3302
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3312
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3312
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3313
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3313
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3317
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3317
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3318
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3318
13
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.8
scoring_system cvssv2
scoring_elements AV:L/AC:H/Au:S/C:C/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
14
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1414353
reference_id 1414353
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1414353
15
reference_url http://www.securityfocus.com/bid/95527
reference_id 95527
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-08T20:09:35Z/
url http://www.securityfocus.com/bid/95527
16
reference_url http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
reference_id cpujan2017-2881727.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-08T20:09:35Z/
url http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
17
reference_url http://www.debian.org/security/2017/dsa-3767
reference_id dsa-3767
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-08T20:09:35Z/
url http://www.debian.org/security/2017/dsa-3767
18
reference_url http://www.debian.org/security/2017/dsa-3809
reference_id dsa-3809
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-08T20:09:35Z/
url http://www.debian.org/security/2017/dsa-3809
19
reference_url https://security.gentoo.org/glsa/201702-17
reference_id GLSA-201702-17
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-08T20:09:35Z/
url https://security.gentoo.org/glsa/201702-17
20
reference_url https://access.redhat.com/errata/RHSA-2017:2192
reference_id RHSA-2017:2192
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-08T20:09:35Z/
url https://access.redhat.com/errata/RHSA-2017:2192
21
reference_url https://access.redhat.com/errata/RHSA-2017:2787
reference_id RHSA-2017:2787
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-08T20:09:35Z/
url https://access.redhat.com/errata/RHSA-2017:2787
22
reference_url https://access.redhat.com/errata/RHSA-2017:2886
reference_id RHSA-2017:2886
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-08T20:09:35Z/
url https://access.redhat.com/errata/RHSA-2017:2886
23
reference_url https://access.redhat.com/errata/RHSA-2018:0279
reference_id RHSA-2018:0279
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-08T20:09:35Z/
url https://access.redhat.com/errata/RHSA-2018:0279
24
reference_url https://access.redhat.com/errata/RHSA-2018:0574
reference_id RHSA-2018:0574
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-08T20:09:35Z/
url https://access.redhat.com/errata/RHSA-2018:0574
25
reference_url https://usn.ubuntu.com/3174-1/
reference_id USN-3174-1
reference_type
scores
url https://usn.ubuntu.com/3174-1/
fixed_packages
aliases CVE-2017-3313
risk_score 2.1
exploitability 0.5
weighted_severity 4.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wrna-cc9g-sqbe
54
url VCID-x4j5-9wz1-k3ba
vulnerability_id VCID-x4j5-9wz1-k3ba
summary mysql: Server: DML unspecified vulnerability (CPU Jul 2017)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3644.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3644.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-3644
reference_id
reference_type
scores
0
value 0.00349
scoring_system epss
scoring_elements 0.57408
published_at 2026-04-02T12:55:00Z
1
value 0.00349
scoring_system epss
scoring_elements 0.57436
published_at 2026-04-13T12:55:00Z
2
value 0.00349
scoring_system epss
scoring_elements 0.57327
published_at 2026-04-01T12:55:00Z
3
value 0.00349
scoring_system epss
scoring_elements 0.57407
published_at 2026-04-07T12:55:00Z
4
value 0.00349
scoring_system epss
scoring_elements 0.5746
published_at 2026-04-08T12:55:00Z
5
value 0.00349
scoring_system epss
scoring_elements 0.57462
published_at 2026-04-16T12:55:00Z
6
value 0.00349
scoring_system epss
scoring_elements 0.57478
published_at 2026-04-11T12:55:00Z
7
value 0.00349
scoring_system epss
scoring_elements 0.57456
published_at 2026-04-12T12:55:00Z
8
value 0.00349
scoring_system epss
scoring_elements 0.57431
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-3644
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:C
1
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url http://www.securitytracker.com/id/1038928
reference_id 1038928
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:48:02Z/
url http://www.securitytracker.com/id/1038928
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1472698
reference_id 1472698
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1472698
5
reference_url http://www.securityfocus.com/bid/99775
reference_id 99775
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:48:02Z/
url http://www.securityfocus.com/bid/99775
6
reference_url https://access.redhat.com/errata/RHSA-2017:2886
reference_id RHSA-2017:2886
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:48:02Z/
url https://access.redhat.com/errata/RHSA-2017:2886
7
reference_url https://usn.ubuntu.com/3357-1/
reference_id USN-3357-1
reference_type
scores
url https://usn.ubuntu.com/3357-1/
fixed_packages
aliases CVE-2017-3644
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-x4j5-9wz1-k3ba
55
url VCID-xm6s-rath-87av
vulnerability_id VCID-xm6s-rath-87av
summary mysql: Server: DML unspecified vulnerability (CPU Apr 2017)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3331.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3331.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-3331
reference_id
reference_type
scores
0
value 0.00488
scoring_system epss
scoring_elements 0.65498
published_at 2026-04-16T12:55:00Z
1
value 0.00488
scoring_system epss
scoring_elements 0.65419
published_at 2026-04-07T12:55:00Z
2
value 0.00488
scoring_system epss
scoring_elements 0.65472
published_at 2026-04-08T12:55:00Z
3
value 0.00488
scoring_system epss
scoring_elements 0.65484
published_at 2026-04-09T12:55:00Z
4
value 0.00488
scoring_system epss
scoring_elements 0.65502
published_at 2026-04-11T12:55:00Z
5
value 0.00488
scoring_system epss
scoring_elements 0.65489
published_at 2026-04-12T12:55:00Z
6
value 0.00488
scoring_system epss
scoring_elements 0.65461
published_at 2026-04-13T12:55:00Z
7
value 0.00488
scoring_system epss
scoring_elements 0.65427
published_at 2026-04-02T12:55:00Z
8
value 0.00488
scoring_system epss
scoring_elements 0.65379
published_at 2026-04-01T12:55:00Z
9
value 0.00488
scoring_system epss
scoring_elements 0.65455
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-3331
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:46:15Z/
url http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
4
reference_url http://www.securityfocus.com/bid/97772
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:46:15Z/
url http://www.securityfocus.com/bid/97772
5
reference_url http://www.securitytracker.com/id/1038287
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:46:15Z/
url http://www.securitytracker.com/id/1038287
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1443362
reference_id 1443362
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1443362
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.7.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:5.7.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.7.11:*:*:*:*:*:*:*
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.7.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:5.7.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.7.12:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.7.13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:5.7.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.7.13:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.7.14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:5.7.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.7.14:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.7.15:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:5.7.15:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.7.15:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.7.16:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:5.7.16:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.7.16:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.7.17:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:5.7.17:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.7.17:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-3331
reference_id CVE-2017-3331
reference_type
scores
0
value 4.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:P
1
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-3331
15
reference_url https://access.redhat.com/errata/RHSA-2017:2886
reference_id RHSA-2017:2886
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:46:15Z/
url https://access.redhat.com/errata/RHSA-2017:2886
16
reference_url https://usn.ubuntu.com/3269-1/
reference_id USN-3269-1
reference_type
scores
url https://usn.ubuntu.com/3269-1/
fixed_packages
aliases CVE-2017-3331
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xm6s-rath-87av
56
url VCID-xyuf-au4f-57fr
vulnerability_id VCID-xyuf-au4f-57fr
summary
Multiple vulnerabilities were found in MySQL, the worst of which
    may allow remote execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3648.json
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3648.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-3648
reference_id
reference_type
scores
0
value 0.00543
scoring_system epss
scoring_elements 0.67751
published_at 2026-04-16T12:55:00Z
1
value 0.00543
scoring_system epss
scoring_elements 0.67638
published_at 2026-04-01T12:55:00Z
2
value 0.00543
scoring_system epss
scoring_elements 0.67673
published_at 2026-04-07T12:55:00Z
3
value 0.00543
scoring_system epss
scoring_elements 0.67693
published_at 2026-04-04T12:55:00Z
4
value 0.00543
scoring_system epss
scoring_elements 0.67725
published_at 2026-04-08T12:55:00Z
5
value 0.00543
scoring_system epss
scoring_elements 0.67739
published_at 2026-04-09T12:55:00Z
6
value 0.00543
scoring_system epss
scoring_elements 0.67763
published_at 2026-04-11T12:55:00Z
7
value 0.00543
scoring_system epss
scoring_elements 0.67748
published_at 2026-04-12T12:55:00Z
8
value 0.00543
scoring_system epss
scoring_elements 0.67715
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-3648
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3635
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3635
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3636
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3636
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3641
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3641
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3648
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3648
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3651
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3651
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3652
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3652
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3653
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3653
9
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:S/C:N/I:N/A:C
1
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
10
reference_url http://www.securitytracker.com/id/1038928
reference_id 1038928
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:47:53Z/
url http://www.securitytracker.com/id/1038928
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1472704
reference_id 1472704
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1472704
12
reference_url http://www.securityfocus.com/bid/99789
reference_id 99789
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:47:53Z/
url http://www.securityfocus.com/bid/99789
13
reference_url http://www.debian.org/security/2017/dsa-3922
reference_id dsa-3922
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:47:53Z/
url http://www.debian.org/security/2017/dsa-3922
14
reference_url https://security.gentoo.org/glsa/201802-04
reference_id GLSA-201802-04
reference_type
scores
url https://security.gentoo.org/glsa/201802-04
15
reference_url https://access.redhat.com/errata/RHSA-2017:2787
reference_id RHSA-2017:2787
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:47:53Z/
url https://access.redhat.com/errata/RHSA-2017:2787
16
reference_url https://access.redhat.com/errata/RHSA-2017:2886
reference_id RHSA-2017:2886
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:47:53Z/
url https://access.redhat.com/errata/RHSA-2017:2886
17
reference_url https://usn.ubuntu.com/3357-1/
reference_id USN-3357-1
reference_type
scores
url https://usn.ubuntu.com/3357-1/
18
reference_url https://usn.ubuntu.com/3357-2/
reference_id USN-3357-2
reference_type
scores
url https://usn.ubuntu.com/3357-2/
fixed_packages
aliases CVE-2017-3648
risk_score 2.0
exploitability 0.5
weighted_severity 4.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xyuf-au4f-57fr
57
url VCID-zx7y-1ubr-byhu
vulnerability_id VCID-zx7y-1ubr-byhu
summary mysql: Server: DML unspecified vulnerability (CPU Jul 2017)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3643.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3643.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-3643
reference_id
reference_type
scores
0
value 0.00349
scoring_system epss
scoring_elements 0.57408
published_at 2026-04-02T12:55:00Z
1
value 0.00349
scoring_system epss
scoring_elements 0.57436
published_at 2026-04-13T12:55:00Z
2
value 0.00349
scoring_system epss
scoring_elements 0.57327
published_at 2026-04-01T12:55:00Z
3
value 0.00349
scoring_system epss
scoring_elements 0.57407
published_at 2026-04-07T12:55:00Z
4
value 0.00349
scoring_system epss
scoring_elements 0.5746
published_at 2026-04-08T12:55:00Z
5
value 0.00349
scoring_system epss
scoring_elements 0.57462
published_at 2026-04-16T12:55:00Z
6
value 0.00349
scoring_system epss
scoring_elements 0.57478
published_at 2026-04-11T12:55:00Z
7
value 0.00349
scoring_system epss
scoring_elements 0.57456
published_at 2026-04-12T12:55:00Z
8
value 0.00349
scoring_system epss
scoring_elements 0.57431
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-3643
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:C
1
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url http://www.securitytracker.com/id/1038928
reference_id 1038928
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:48:09Z/
url http://www.securitytracker.com/id/1038928
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1472697
reference_id 1472697
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1472697
5
reference_url http://www.securityfocus.com/bid/99772
reference_id 99772
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:48:09Z/
url http://www.securityfocus.com/bid/99772
6
reference_url https://access.redhat.com/errata/RHSA-2017:2886
reference_id RHSA-2017:2886
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:48:09Z/
url https://access.redhat.com/errata/RHSA-2017:2886
7
reference_url https://usn.ubuntu.com/3357-1/
reference_id USN-3357-1
reference_type
scores
url https://usn.ubuntu.com/3357-1/
fixed_packages
aliases CVE-2017-3643
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zx7y-1ubr-byhu
Fixing_vulnerabilities
Risk_score10.0
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:rpm/redhat/rh-mysql57-mysql@5.7.19-6%3Farch=el6