Lookup for vulnerable packages by Package URL.

Purlpkg:rpm/redhat/rh-mariadb100-mariadb@1:10.0.28-5?arch=el6
Typerpm
Namespaceredhat
Namerh-mariadb100-mariadb
Version1:10.0.28-5
Qualifiers
arch el6
Subpath
Is_vulnerabletrue
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
0
url VCID-3c35-xvzk-eqdc
vulnerability_id VCID-3c35-xvzk-eqdc
summary mysql: race condition while setting stats during MyISAM table repair (CPU Oct 2016)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5616.json
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5616.json
1
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6
scoring_system cvssv2
scoring_elements AV:L/AC:H/Au:S/C:C/I:C/A:C
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1378936
reference_id 1378936
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1378936
3
reference_url https://access.redhat.com/errata/RHSA-2016:2130
reference_id RHSA-2016:2130
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2130
4
reference_url https://access.redhat.com/errata/RHSA-2016:2131
reference_id RHSA-2016:2131
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2131
5
reference_url https://access.redhat.com/errata/RHSA-2016:2595
reference_id RHSA-2016:2595
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2595
6
reference_url https://access.redhat.com/errata/RHSA-2016:2749
reference_id RHSA-2016:2749
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2749
7
reference_url https://access.redhat.com/errata/RHSA-2016:2927
reference_id RHSA-2016:2927
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2927
8
reference_url https://access.redhat.com/errata/RHSA-2016:2928
reference_id RHSA-2016:2928
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2928
9
reference_url https://access.redhat.com/errata/RHSA-2017:0184
reference_id RHSA-2017:0184
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:0184
fixed_packages
aliases CVE-2016-5616
risk_score 10.0
exploitability 2.0
weighted_severity 6.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3c35-xvzk-eqdc
1
url VCID-f8p4-hpsh-2fcw
vulnerability_id VCID-f8p4-hpsh-2fcw
summary
Multiple vulnerabilities were found in MySQL, the worst of which
    may allow remote execution of arbitrary code.
references
0
reference_url http://rhn.redhat.com/errata/RHSA-2016-2927.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T16:21:49Z/
url http://rhn.redhat.com/errata/RHSA-2016-2927.html
1
reference_url http://rhn.redhat.com/errata/RHSA-2016-2928.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T16:21:49Z/
url http://rhn.redhat.com/errata/RHSA-2016-2928.html
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3600.json
reference_id
reference_type
scores
0
value 6.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3600.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-3600
reference_id
reference_type
scores
0
value 0.00811
scoring_system epss
scoring_elements 0.74268
published_at 2026-04-16T12:55:00Z
1
value 0.00811
scoring_system epss
scoring_elements 0.74215
published_at 2026-04-04T12:55:00Z
2
value 0.00811
scoring_system epss
scoring_elements 0.7422
published_at 2026-04-08T12:55:00Z
3
value 0.00811
scoring_system epss
scoring_elements 0.74235
published_at 2026-04-09T12:55:00Z
4
value 0.00811
scoring_system epss
scoring_elements 0.74256
published_at 2026-04-11T12:55:00Z
5
value 0.00811
scoring_system epss
scoring_elements 0.74237
published_at 2026-04-12T12:55:00Z
6
value 0.00811
scoring_system epss
scoring_elements 0.7423
published_at 2026-04-13T12:55:00Z
7
value 0.00811
scoring_system epss
scoring_elements 0.74187
published_at 2026-04-07T12:55:00Z
8
value 0.00811
scoring_system epss
scoring_elements 0.74182
published_at 2026-04-01T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-3600
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3302
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3302
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3305
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3305
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3308
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3308
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3309
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3309
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3329
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3329
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3453
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3453
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3456
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3456
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3461
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3461
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3462
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3462
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3463
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3463
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3464
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3464
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3600
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3600
16
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.6
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:S/C:P/I:P/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
17
reference_url http://www.debian.org/security/2017/dsa-3834
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T16:21:49Z/
url http://www.debian.org/security/2017/dsa-3834
18
reference_url http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T16:21:49Z/
url http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
19
reference_url http://www.securityfocus.com/bid/97765
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T16:21:49Z/
url http://www.securityfocus.com/bid/97765
20
reference_url http://www.securitytracker.com/id/1038287
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T16:21:49Z/
url http://www.securitytracker.com/id/1038287
21
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1433010
reference_id 1433010
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1433010
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-3600
reference_id CVE-2017-3600
reference_type
scores
0
value 6.0
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:S/C:P/I:P/A:P
1
value 6.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-3600
35
reference_url https://security.gentoo.org/glsa/201802-04
reference_id GLSA-201802-04
reference_type
scores
url https://security.gentoo.org/glsa/201802-04
36
reference_url https://access.redhat.com/errata/RHSA-2016:2927
reference_id RHSA-2016:2927
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2927
37
reference_url https://access.redhat.com/errata/RHSA-2016:2928
reference_id RHSA-2016:2928
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2928
38
reference_url https://access.redhat.com/errata/RHSA-2017:2192
reference_id RHSA-2017:2192
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T16:21:49Z/
url https://access.redhat.com/errata/RHSA-2017:2192
39
reference_url https://access.redhat.com/errata/RHSA-2017:2787
reference_id RHSA-2017:2787
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T16:21:49Z/
url https://access.redhat.com/errata/RHSA-2017:2787
40
reference_url https://access.redhat.com/errata/RHSA-2017:2886
reference_id RHSA-2017:2886
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T16:21:49Z/
url https://access.redhat.com/errata/RHSA-2017:2886
41
reference_url https://usn.ubuntu.com/3269-1/
reference_id USN-3269-1
reference_type
scores
url https://usn.ubuntu.com/3269-1/
42
reference_url https://usn.ubuntu.com/3357-2/
reference_id USN-3357-2
reference_type
scores
url https://usn.ubuntu.com/3357-2/
fixed_packages
aliases CVE-2017-3600
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-f8p4-hpsh-2fcw
2
url VCID-g1pp-9qqg-1beb
vulnerability_id VCID-g1pp-9qqg-1beb
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-6663.json
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-6663.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-6663
reference_id
reference_type
scores
0
value 0.02334
scoring_system epss
scoring_elements 0.84783
published_at 2026-04-02T12:55:00Z
1
value 0.02334
scoring_system epss
scoring_elements 0.84802
published_at 2026-04-04T12:55:00Z
2
value 0.02334
scoring_system epss
scoring_elements 0.84768
published_at 2026-04-01T12:55:00Z
3
value 0.03137
scoring_system epss
scoring_elements 0.86886
published_at 2026-04-11T12:55:00Z
4
value 0.03137
scoring_system epss
scoring_elements 0.86882
published_at 2026-04-12T12:55:00Z
5
value 0.03137
scoring_system epss
scoring_elements 0.86877
published_at 2026-04-13T12:55:00Z
6
value 0.03137
scoring_system epss
scoring_elements 0.86894
published_at 2026-04-16T12:55:00Z
7
value 0.03137
scoring_system epss
scoring_elements 0.86845
published_at 2026-04-07T12:55:00Z
8
value 0.03137
scoring_system epss
scoring_elements 0.86865
published_at 2026-04-08T12:55:00Z
9
value 0.03137
scoring_system epss
scoring_elements 0.86873
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-6663
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3492
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3492
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5584
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5584
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5624
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5624
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5626
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5626
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5629
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5629
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6663
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6663
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7440
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7440
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8283
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8283
10
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.5
scoring_system cvssv2
scoring_elements AV:L/AC:H/Au:S/C:P/I:P/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1378936
reference_id 1378936
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1378936
12
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/40678.c
reference_id CVE-2016-6663;CVE-2016-5616
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/40678.c
13
reference_url https://legalhackers.com/advisories/MySQL-Maria-Percona-PrivEscRace-CVE-2016-6663-5616-Exploit.html
reference_id CVE-2016-6663;CVE-2016-5616
reference_type exploit
scores
url https://legalhackers.com/advisories/MySQL-Maria-Percona-PrivEscRace-CVE-2016-6663-5616-Exploit.html
14
reference_url https://access.redhat.com/errata/RHSA-2016:2130
reference_id RHSA-2016:2130
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2130
15
reference_url https://access.redhat.com/errata/RHSA-2016:2131
reference_id RHSA-2016:2131
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2131
16
reference_url https://access.redhat.com/errata/RHSA-2016:2595
reference_id RHSA-2016:2595
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2595
17
reference_url https://access.redhat.com/errata/RHSA-2016:2749
reference_id RHSA-2016:2749
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2749
18
reference_url https://access.redhat.com/errata/RHSA-2016:2927
reference_id RHSA-2016:2927
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2927
19
reference_url https://access.redhat.com/errata/RHSA-2016:2928
reference_id RHSA-2016:2928
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2928
20
reference_url https://access.redhat.com/errata/RHSA-2017:0184
reference_id RHSA-2017:0184
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:0184
fixed_packages
aliases CVE-2016-6663
risk_score 10.0
exploitability 2.0
weighted_severity 6.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-g1pp-9qqg-1beb
3
url VCID-gp4w-bdxg-6kab
vulnerability_id VCID-gp4w-bdxg-6kab
summary
Multiple vulnerabilities have been found in MariaDB and MySQL, the
    worst of which could lead to the remote execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5629.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5629.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-5629
reference_id
reference_type
scores
0
value 0.00501
scoring_system epss
scoring_elements 0.65954
published_at 2026-04-02T12:55:00Z
1
value 0.00501
scoring_system epss
scoring_elements 0.66024
published_at 2026-04-16T12:55:00Z
2
value 0.00501
scoring_system epss
scoring_elements 0.65989
published_at 2026-04-13T12:55:00Z
3
value 0.00501
scoring_system epss
scoring_elements 0.66019
published_at 2026-04-12T12:55:00Z
4
value 0.00501
scoring_system epss
scoring_elements 0.66032
published_at 2026-04-11T12:55:00Z
5
value 0.00501
scoring_system epss
scoring_elements 0.66013
published_at 2026-04-09T12:55:00Z
6
value 0.00501
scoring_system epss
scoring_elements 0.65913
published_at 2026-04-01T12:55:00Z
7
value 0.00501
scoring_system epss
scoring_elements 0.66001
published_at 2026-04-08T12:55:00Z
8
value 0.00501
scoring_system epss
scoring_elements 0.65984
published_at 2026-04-04T12:55:00Z
9
value 0.00501
scoring_system epss
scoring_elements 0.6595
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-5629
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3492
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3492
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5584
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5584
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5624
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5624
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5626
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5626
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5629
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5629
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6663
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6663
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7440
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7440
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8283
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8283
10
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:P
1
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
11
reference_url http://www.securitytracker.com/id/1037050
reference_id 1037050
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:33Z/
url http://www.securitytracker.com/id/1037050
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1386572
reference_id 1386572
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1386572
13
reference_url http://www.securityfocus.com/bid/93668
reference_id 93668
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:33Z/
url http://www.securityfocus.com/bid/93668
14
reference_url https://security.gentoo.org/glsa/201701-01
reference_id GLSA-201701-01
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:33Z/
url https://security.gentoo.org/glsa/201701-01
15
reference_url https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/
reference_id mariadb-10028-release-notes
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:33Z/
url https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/
16
reference_url https://mariadb.com/kb/en/mariadb/mariadb-10118-release-notes/
reference_id mariadb-10118-release-notes
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:33Z/
url https://mariadb.com/kb/en/mariadb/mariadb-10118-release-notes/
17
reference_url https://mariadb.com/kb/en/mariadb/mariadb-5552-release-notes/
reference_id mariadb-5552-release-notes
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:33Z/
url https://mariadb.com/kb/en/mariadb/mariadb-5552-release-notes/
18
reference_url https://access.redhat.com/errata/RHSA-2016:2130
reference_id RHSA-2016:2130
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2130
19
reference_url http://rhn.redhat.com/errata/RHSA-2016-2130.html
reference_id RHSA-2016-2130.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:33Z/
url http://rhn.redhat.com/errata/RHSA-2016-2130.html
20
reference_url https://access.redhat.com/errata/RHSA-2016:2131
reference_id RHSA-2016:2131
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2131
21
reference_url http://rhn.redhat.com/errata/RHSA-2016-2131.html
reference_id RHSA-2016-2131.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:33Z/
url http://rhn.redhat.com/errata/RHSA-2016-2131.html
22
reference_url https://access.redhat.com/errata/RHSA-2016:2595
reference_id RHSA-2016:2595
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2595
23
reference_url http://rhn.redhat.com/errata/RHSA-2016-2595.html
reference_id RHSA-2016-2595.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:33Z/
url http://rhn.redhat.com/errata/RHSA-2016-2595.html
24
reference_url https://access.redhat.com/errata/RHSA-2016:2749
reference_id RHSA-2016:2749
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2749
25
reference_url http://rhn.redhat.com/errata/RHSA-2016-2749.html
reference_id RHSA-2016-2749.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:33Z/
url http://rhn.redhat.com/errata/RHSA-2016-2749.html
26
reference_url https://access.redhat.com/errata/RHSA-2016:2927
reference_id RHSA-2016:2927
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2927
27
reference_url https://access.redhat.com/errata/RHSA-2016:2928
reference_id RHSA-2016:2928
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2928
fixed_packages
aliases CVE-2016-5629
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gp4w-bdxg-6kab
4
url VCID-gyjy-c8wc-qubd
vulnerability_id VCID-gyjy-c8wc-qubd
summary
Multiple vulnerabilities have been found in MariaDB and MySQL, the
    worst of which could lead to the remote execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5612.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5612.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-5612
reference_id
reference_type
scores
0
value 0.00712
scoring_system epss
scoring_elements 0.72302
published_at 2026-04-16T12:55:00Z
1
value 0.00712
scoring_system epss
scoring_elements 0.72217
published_at 2026-04-01T12:55:00Z
2
value 0.00712
scoring_system epss
scoring_elements 0.72267
published_at 2026-04-09T12:55:00Z
3
value 0.00712
scoring_system epss
scoring_elements 0.72289
published_at 2026-04-11T12:55:00Z
4
value 0.00712
scoring_system epss
scoring_elements 0.72273
published_at 2026-04-12T12:55:00Z
5
value 0.00712
scoring_system epss
scoring_elements 0.7226
published_at 2026-04-13T12:55:00Z
6
value 0.00712
scoring_system epss
scoring_elements 0.72222
published_at 2026-04-02T12:55:00Z
7
value 0.00712
scoring_system epss
scoring_elements 0.72242
published_at 2026-04-04T12:55:00Z
8
value 0.00712
scoring_system epss
scoring_elements 0.72218
published_at 2026-04-07T12:55:00Z
9
value 0.00712
scoring_system epss
scoring_elements 0.72255
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-5612
2
reference_url http://www.securitytracker.com/id/1037050
reference_id 1037050
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:48Z/
url http://www.securitytracker.com/id/1037050
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1386561
reference_id 1386561
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1386561
4
reference_url http://www.securityfocus.com/bid/93630
reference_id 93630
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:48Z/
url http://www.securityfocus.com/bid/93630
5
reference_url https://security.gentoo.org/glsa/201701-01
reference_id GLSA-201701-01
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:48Z/
url https://security.gentoo.org/glsa/201701-01
6
reference_url https://access.redhat.com/errata/RHSA-2016:1601
reference_id RHSA-2016:1601
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1601
7
reference_url https://access.redhat.com/errata/RHSA-2016:2130
reference_id RHSA-2016:2130
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2130
8
reference_url http://rhn.redhat.com/errata/RHSA-2016-2130.html
reference_id RHSA-2016-2130.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:48Z/
url http://rhn.redhat.com/errata/RHSA-2016-2130.html
9
reference_url https://access.redhat.com/errata/RHSA-2016:2131
reference_id RHSA-2016:2131
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2131
10
reference_url http://rhn.redhat.com/errata/RHSA-2016-2131.html
reference_id RHSA-2016-2131.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:48Z/
url http://rhn.redhat.com/errata/RHSA-2016-2131.html
11
reference_url https://access.redhat.com/errata/RHSA-2016:2595
reference_id RHSA-2016:2595
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2595
12
reference_url http://rhn.redhat.com/errata/RHSA-2016-2595.html
reference_id RHSA-2016-2595.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:48Z/
url http://rhn.redhat.com/errata/RHSA-2016-2595.html
13
reference_url https://access.redhat.com/errata/RHSA-2016:2927
reference_id RHSA-2016:2927
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2927
fixed_packages
aliases CVE-2016-5612
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gyjy-c8wc-qubd
5
url VCID-jj46-73tp-nub5
vulnerability_id VCID-jj46-73tp-nub5
summary
Multiple vulnerabilities have been found in MariaDB and MySQL, the
    worst of which could lead to the remote execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5630.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5630.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-5630
reference_id
reference_type
scores
0
value 0.00755
scoring_system epss
scoring_elements 0.73284
published_at 2026-04-16T12:55:00Z
1
value 0.00755
scoring_system epss
scoring_elements 0.73189
published_at 2026-04-01T12:55:00Z
2
value 0.00755
scoring_system epss
scoring_elements 0.7323
published_at 2026-04-08T12:55:00Z
3
value 0.00755
scoring_system epss
scoring_elements 0.73244
published_at 2026-04-09T12:55:00Z
4
value 0.00755
scoring_system epss
scoring_elements 0.73269
published_at 2026-04-11T12:55:00Z
5
value 0.00755
scoring_system epss
scoring_elements 0.73249
published_at 2026-04-12T12:55:00Z
6
value 0.00755
scoring_system epss
scoring_elements 0.73242
published_at 2026-04-13T12:55:00Z
7
value 0.00755
scoring_system epss
scoring_elements 0.73199
published_at 2026-04-02T12:55:00Z
8
value 0.00755
scoring_system epss
scoring_elements 0.7322
published_at 2026-04-04T12:55:00Z
9
value 0.00755
scoring_system epss
scoring_elements 0.73194
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-5630
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url http://www.securitytracker.com/id/1037050
reference_id 1037050
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:31Z/
url http://www.securitytracker.com/id/1037050
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1386573
reference_id 1386573
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1386573
5
reference_url http://www.securityfocus.com/bid/93674
reference_id 93674
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:31Z/
url http://www.securityfocus.com/bid/93674
6
reference_url https://security.gentoo.org/glsa/201701-01
reference_id GLSA-201701-01
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:31Z/
url https://security.gentoo.org/glsa/201701-01
7
reference_url https://access.redhat.com/errata/RHSA-2016:1601
reference_id RHSA-2016:1601
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1601
8
reference_url https://access.redhat.com/errata/RHSA-2016:2927
reference_id RHSA-2016:2927
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2927
fixed_packages
aliases CVE-2016-5630
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jj46-73tp-nub5
6
url VCID-mfgg-7s54-gqg8
vulnerability_id VCID-mfgg-7s54-gqg8
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5624.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5624.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-5624
reference_id
reference_type
scores
0
value 0.0069
scoring_system epss
scoring_elements 0.71817
published_at 2026-04-16T12:55:00Z
1
value 0.0069
scoring_system epss
scoring_elements 0.71734
published_at 2026-04-01T12:55:00Z
2
value 0.0069
scoring_system epss
scoring_elements 0.71741
published_at 2026-04-02T12:55:00Z
3
value 0.0069
scoring_system epss
scoring_elements 0.7176
published_at 2026-04-04T12:55:00Z
4
value 0.0069
scoring_system epss
scoring_elements 0.71735
published_at 2026-04-07T12:55:00Z
5
value 0.0069
scoring_system epss
scoring_elements 0.71774
published_at 2026-04-08T12:55:00Z
6
value 0.0069
scoring_system epss
scoring_elements 0.71785
published_at 2026-04-09T12:55:00Z
7
value 0.0069
scoring_system epss
scoring_elements 0.71809
published_at 2026-04-11T12:55:00Z
8
value 0.0069
scoring_system epss
scoring_elements 0.71792
published_at 2026-04-12T12:55:00Z
9
value 0.0069
scoring_system epss
scoring_elements 0.71775
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-5624
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3492
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3492
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5584
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5584
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5624
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5624
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5626
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5626
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5629
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5629
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6663
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6663
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7440
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7440
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8283
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8283
10
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:P
1
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
11
reference_url http://www.securitytracker.com/id/1037050
reference_id 1037050
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:38Z/
url http://www.securitytracker.com/id/1037050
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1386566
reference_id 1386566
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1386566
13
reference_url http://www.securityfocus.com/bid/93635
reference_id 93635
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:38Z/
url http://www.securityfocus.com/bid/93635
14
reference_url https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/
reference_id mariadb-10028-release-notes
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:38Z/
url https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/
15
reference_url https://mariadb.com/kb/en/mariadb/mariadb-10118-release-notes/
reference_id mariadb-10118-release-notes
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:38Z/
url https://mariadb.com/kb/en/mariadb/mariadb-10118-release-notes/
16
reference_url https://mariadb.com/kb/en/mariadb/mariadb-5552-release-notes/
reference_id mariadb-5552-release-notes
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:38Z/
url https://mariadb.com/kb/en/mariadb/mariadb-5552-release-notes/
17
reference_url https://access.redhat.com/errata/RHSA-2016:2130
reference_id RHSA-2016:2130
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2130
18
reference_url http://rhn.redhat.com/errata/RHSA-2016-2130.html
reference_id RHSA-2016-2130.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:38Z/
url http://rhn.redhat.com/errata/RHSA-2016-2130.html
19
reference_url https://access.redhat.com/errata/RHSA-2016:2131
reference_id RHSA-2016:2131
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2131
20
reference_url http://rhn.redhat.com/errata/RHSA-2016-2131.html
reference_id RHSA-2016-2131.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:38Z/
url http://rhn.redhat.com/errata/RHSA-2016-2131.html
21
reference_url https://access.redhat.com/errata/RHSA-2016:2595
reference_id RHSA-2016:2595
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2595
22
reference_url http://rhn.redhat.com/errata/RHSA-2016-2595.html
reference_id RHSA-2016-2595.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:38Z/
url http://rhn.redhat.com/errata/RHSA-2016-2595.html
23
reference_url https://access.redhat.com/errata/RHSA-2016:2927
reference_id RHSA-2016:2927
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2927
24
reference_url https://access.redhat.com/errata/RHSA-2016:2928
reference_id RHSA-2016:2928
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2928
fixed_packages
aliases CVE-2016-5624
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mfgg-7s54-gqg8
7
url VCID-rted-6vzz-mbcv
vulnerability_id VCID-rted-6vzz-mbcv
summary
Multiple vulnerabilities have been found in MariaDB and MySQL, the
    worst of which could lead to the remote execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3492.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3492.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-3492
reference_id
reference_type
scores
0
value 0.00566
scoring_system epss
scoring_elements 0.68513
published_at 2026-04-16T12:55:00Z
1
value 0.00566
scoring_system epss
scoring_elements 0.68412
published_at 2026-04-01T12:55:00Z
2
value 0.00566
scoring_system epss
scoring_elements 0.68431
published_at 2026-04-02T12:55:00Z
3
value 0.00566
scoring_system epss
scoring_elements 0.68451
published_at 2026-04-04T12:55:00Z
4
value 0.00566
scoring_system epss
scoring_elements 0.68427
published_at 2026-04-07T12:55:00Z
5
value 0.00566
scoring_system epss
scoring_elements 0.68477
published_at 2026-04-08T12:55:00Z
6
value 0.00566
scoring_system epss
scoring_elements 0.68494
published_at 2026-04-09T12:55:00Z
7
value 0.00566
scoring_system epss
scoring_elements 0.6852
published_at 2026-04-11T12:55:00Z
8
value 0.00566
scoring_system epss
scoring_elements 0.68508
published_at 2026-04-12T12:55:00Z
9
value 0.00566
scoring_system epss
scoring_elements 0.68475
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-3492
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3492
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3492
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5584
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5584
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5624
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5624
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5626
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5626
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5629
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5629
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6663
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6663
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7440
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7440
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8283
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8283
10
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
11
reference_url http://www.securitytracker.com/id/1037050
reference_id 1037050
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:50:08Z/
url http://www.securitytracker.com/id/1037050
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1386554
reference_id 1386554
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1386554
13
reference_url http://www.securityfocus.com/bid/93650
reference_id 93650
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:50:08Z/
url http://www.securityfocus.com/bid/93650
14
reference_url https://security.gentoo.org/glsa/201701-01
reference_id GLSA-201701-01
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:50:08Z/
url https://security.gentoo.org/glsa/201701-01
15
reference_url https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/
reference_id mariadb-10028-release-notes
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:50:08Z/
url https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/
16
reference_url https://mariadb.com/kb/en/mariadb/mariadb-10118-release-notes/
reference_id mariadb-10118-release-notes
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:50:08Z/
url https://mariadb.com/kb/en/mariadb/mariadb-10118-release-notes/
17
reference_url https://mariadb.com/kb/en/mariadb/mariadb-5552-release-notes/
reference_id mariadb-5552-release-notes
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:50:08Z/
url https://mariadb.com/kb/en/mariadb/mariadb-5552-release-notes/
18
reference_url https://access.redhat.com/errata/RHSA-2016:2130
reference_id RHSA-2016:2130
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2130
19
reference_url http://rhn.redhat.com/errata/RHSA-2016-2130.html
reference_id RHSA-2016-2130.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:50:08Z/
url http://rhn.redhat.com/errata/RHSA-2016-2130.html
20
reference_url https://access.redhat.com/errata/RHSA-2016:2131
reference_id RHSA-2016:2131
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2131
21
reference_url http://rhn.redhat.com/errata/RHSA-2016-2131.html
reference_id RHSA-2016-2131.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:50:08Z/
url http://rhn.redhat.com/errata/RHSA-2016-2131.html
22
reference_url https://access.redhat.com/errata/RHSA-2016:2595
reference_id RHSA-2016:2595
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2595
23
reference_url http://rhn.redhat.com/errata/RHSA-2016-2595.html
reference_id RHSA-2016-2595.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:50:08Z/
url http://rhn.redhat.com/errata/RHSA-2016-2595.html
24
reference_url https://access.redhat.com/errata/RHSA-2016:2749
reference_id RHSA-2016:2749
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2749
25
reference_url http://rhn.redhat.com/errata/RHSA-2016-2749.html
reference_id RHSA-2016-2749.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:50:08Z/
url http://rhn.redhat.com/errata/RHSA-2016-2749.html
26
reference_url https://access.redhat.com/errata/RHSA-2016:2927
reference_id RHSA-2016:2927
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2927
27
reference_url https://access.redhat.com/errata/RHSA-2016:2928
reference_id RHSA-2016:2928
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2928
fixed_packages
aliases CVE-2016-3492
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rted-6vzz-mbcv
8
url VCID-skzt-r7sx-1ucv
vulnerability_id VCID-skzt-r7sx-1ucv
summary
Multiple vulnerabilities have been found in MariaDB and MySQL, the
    worst of which could lead to the remote execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-6662.json
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-6662.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-6662
reference_id
reference_type
scores
0
value 0.89577
scoring_system epss
scoring_elements 0.99554
published_at 2026-04-04T12:55:00Z
1
value 0.89577
scoring_system epss
scoring_elements 0.99553
published_at 2026-04-02T12:55:00Z
2
value 0.89577
scoring_system epss
scoring_elements 0.99555
published_at 2026-04-07T12:55:00Z
3
value 0.89577
scoring_system epss
scoring_elements 0.99556
published_at 2026-04-12T12:55:00Z
4
value 0.89577
scoring_system epss
scoring_elements 0.99557
published_at 2026-04-13T12:55:00Z
5
value 0.89577
scoring_system epss
scoring_elements 0.99559
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-6662
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6662
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6662
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.5
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:S/C:C/I:C/A:C
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1375198
reference_id 1375198
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1375198
5
reference_url http://legalhackers.com/advisories/MySQL-Exploit-Remote-Root-Code-Execution-Privesc-CVE-2016-6662.html
reference_id CVE-2016-6662
reference_type exploit
scores
url http://legalhackers.com/advisories/MySQL-Exploit-Remote-Root-Code-Execution-Privesc-CVE-2016-6662.html
6
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/40360.py
reference_id CVE-2016-6662
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/40360.py
7
reference_url https://security.gentoo.org/glsa/201701-01
reference_id GLSA-201701-01
reference_type
scores
url https://security.gentoo.org/glsa/201701-01
8
reference_url https://access.redhat.com/errata/RHSA-2016:2058
reference_id RHSA-2016:2058
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2058
9
reference_url https://access.redhat.com/errata/RHSA-2016:2059
reference_id RHSA-2016:2059
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2059
10
reference_url https://access.redhat.com/errata/RHSA-2016:2060
reference_id RHSA-2016:2060
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2060
11
reference_url https://access.redhat.com/errata/RHSA-2016:2061
reference_id RHSA-2016:2061
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2061
12
reference_url https://access.redhat.com/errata/RHSA-2016:2062
reference_id RHSA-2016:2062
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2062
13
reference_url https://access.redhat.com/errata/RHSA-2016:2077
reference_id RHSA-2016:2077
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2077
14
reference_url https://access.redhat.com/errata/RHSA-2016:2130
reference_id RHSA-2016:2130
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2130
15
reference_url https://access.redhat.com/errata/RHSA-2016:2131
reference_id RHSA-2016:2131
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2131
16
reference_url https://access.redhat.com/errata/RHSA-2016:2595
reference_id RHSA-2016:2595
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2595
17
reference_url https://access.redhat.com/errata/RHSA-2016:2749
reference_id RHSA-2016:2749
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2749
18
reference_url https://access.redhat.com/errata/RHSA-2016:2927
reference_id RHSA-2016:2927
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2927
19
reference_url https://access.redhat.com/errata/RHSA-2016:2928
reference_id RHSA-2016:2928
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2928
20
reference_url https://access.redhat.com/errata/RHSA-2017:0184
reference_id RHSA-2017:0184
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:0184
21
reference_url https://usn.ubuntu.com/3078-1/
reference_id USN-3078-1
reference_type
scores
url https://usn.ubuntu.com/3078-1/
fixed_packages
aliases CVE-2016-6662
risk_score 10.0
exploitability 2.0
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-skzt-r7sx-1ucv
9
url VCID-tvdv-3ed5-h3dt
vulnerability_id VCID-tvdv-3ed5-h3dt
summary
Multiple vulnerabilities have been found in MariaDB and MySQL, the
    worst of which could lead to the remote execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5626.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5626.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-5626
reference_id
reference_type
scores
0
value 0.00369
scoring_system epss
scoring_elements 0.58837
published_at 2026-04-16T12:55:00Z
1
value 0.00369
scoring_system epss
scoring_elements 0.58702
published_at 2026-04-01T12:55:00Z
2
value 0.00369
scoring_system epss
scoring_elements 0.58776
published_at 2026-04-02T12:55:00Z
3
value 0.00369
scoring_system epss
scoring_elements 0.58797
published_at 2026-04-04T12:55:00Z
4
value 0.00369
scoring_system epss
scoring_elements 0.58766
published_at 2026-04-07T12:55:00Z
5
value 0.00369
scoring_system epss
scoring_elements 0.58818
published_at 2026-04-08T12:55:00Z
6
value 0.00369
scoring_system epss
scoring_elements 0.58824
published_at 2026-04-12T12:55:00Z
7
value 0.00369
scoring_system epss
scoring_elements 0.58842
published_at 2026-04-11T12:55:00Z
8
value 0.00369
scoring_system epss
scoring_elements 0.58805
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-5626
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3492
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3492
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5584
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5584
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5624
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5624
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5626
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5626
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5629
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5629
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6663
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6663
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7440
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7440
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8283
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8283
10
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
11
reference_url http://www.securitytracker.com/id/1037050
reference_id 1037050
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:36Z/
url http://www.securitytracker.com/id/1037050
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1386568
reference_id 1386568
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1386568
13
reference_url http://www.securityfocus.com/bid/93638
reference_id 93638
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:36Z/
url http://www.securityfocus.com/bid/93638
14
reference_url https://security.gentoo.org/glsa/201701-01
reference_id GLSA-201701-01
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:36Z/
url https://security.gentoo.org/glsa/201701-01
15
reference_url https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/
reference_id mariadb-10028-release-notes
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:36Z/
url https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/
16
reference_url https://mariadb.com/kb/en/mariadb/mariadb-10118-release-notes/
reference_id mariadb-10118-release-notes
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:36Z/
url https://mariadb.com/kb/en/mariadb/mariadb-10118-release-notes/
17
reference_url https://mariadb.com/kb/en/mariadb/mariadb-5552-release-notes/
reference_id mariadb-5552-release-notes
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:36Z/
url https://mariadb.com/kb/en/mariadb/mariadb-5552-release-notes/
18
reference_url https://access.redhat.com/errata/RHSA-2016:2130
reference_id RHSA-2016:2130
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2130
19
reference_url http://rhn.redhat.com/errata/RHSA-2016-2130.html
reference_id RHSA-2016-2130.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:36Z/
url http://rhn.redhat.com/errata/RHSA-2016-2130.html
20
reference_url https://access.redhat.com/errata/RHSA-2016:2131
reference_id RHSA-2016:2131
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2131
21
reference_url http://rhn.redhat.com/errata/RHSA-2016-2131.html
reference_id RHSA-2016-2131.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:36Z/
url http://rhn.redhat.com/errata/RHSA-2016-2131.html
22
reference_url https://access.redhat.com/errata/RHSA-2016:2595
reference_id RHSA-2016:2595
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2595
23
reference_url http://rhn.redhat.com/errata/RHSA-2016-2595.html
reference_id RHSA-2016-2595.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:36Z/
url http://rhn.redhat.com/errata/RHSA-2016-2595.html
24
reference_url https://access.redhat.com/errata/RHSA-2016:2749
reference_id RHSA-2016:2749
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2749
25
reference_url http://rhn.redhat.com/errata/RHSA-2016-2749.html
reference_id RHSA-2016-2749.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:36Z/
url http://rhn.redhat.com/errata/RHSA-2016-2749.html
26
reference_url https://access.redhat.com/errata/RHSA-2016:2927
reference_id RHSA-2016:2927
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2927
27
reference_url https://access.redhat.com/errata/RHSA-2016:2928
reference_id RHSA-2016:2928
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2928
fixed_packages
aliases CVE-2016-5626
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tvdv-3ed5-h3dt
10
url VCID-tyes-eb5w-jqfa
vulnerability_id VCID-tyes-eb5w-jqfa
summary mysql: Incorrect input validation allowing code execution via mysqldump
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5483.json
reference_id
reference_type
scores
0
value 6.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5483.json
1
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1433010
reference_id 1433010
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1433010
3
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-5483
reference_id CVE-2016-5483
reference_type
scores
url https://nvd.nist.gov/vuln/detail/CVE-2016-5483
4
reference_url https://access.redhat.com/errata/RHSA-2016:2131
reference_id RHSA-2016:2131
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2131
5
reference_url https://access.redhat.com/errata/RHSA-2016:2927
reference_id RHSA-2016:2927
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2927
6
reference_url https://access.redhat.com/errata/RHSA-2016:2928
reference_id RHSA-2016:2928
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2928
7
reference_url https://access.redhat.com/errata/RHSA-2017:2192
reference_id RHSA-2017:2192
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:2192
8
reference_url https://access.redhat.com/errata/RHSA-2017:2787
reference_id RHSA-2017:2787
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:2787
9
reference_url https://access.redhat.com/errata/RHSA-2017:2886
reference_id RHSA-2017:2886
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:2886
fixed_packages
aliases CVE-2016-5483
risk_score 2.9
exploitability 0.5
weighted_severity 5.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tyes-eb5w-jqfa
11
url VCID-v165-afmm-w3er
vulnerability_id VCID-v165-afmm-w3er
summary
Multiple vulnerabilities were found in MySQL, the worst of which
    may allow remote execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3651.json
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3651.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-3651
reference_id
reference_type
scores
0
value 0.00414
scoring_system epss
scoring_elements 0.61578
published_at 2026-04-16T12:55:00Z
1
value 0.00414
scoring_system epss
scoring_elements 0.61486
published_at 2026-04-07T12:55:00Z
2
value 0.00414
scoring_system epss
scoring_elements 0.61534
published_at 2026-04-08T12:55:00Z
3
value 0.00414
scoring_system epss
scoring_elements 0.61548
published_at 2026-04-09T12:55:00Z
4
value 0.00414
scoring_system epss
scoring_elements 0.61569
published_at 2026-04-11T12:55:00Z
5
value 0.00414
scoring_system epss
scoring_elements 0.61556
published_at 2026-04-12T12:55:00Z
6
value 0.00414
scoring_system epss
scoring_elements 0.61536
published_at 2026-04-13T12:55:00Z
7
value 0.00414
scoring_system epss
scoring_elements 0.61487
published_at 2026-04-02T12:55:00Z
8
value 0.00414
scoring_system epss
scoring_elements 0.6141
published_at 2026-04-01T12:55:00Z
9
value 0.00414
scoring_system epss
scoring_elements 0.61515
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-3651
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3635
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3635
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3636
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3636
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3641
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3641
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3648
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3648
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3651
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3651
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3652
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3652
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3653
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3653
9
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:P/A:N
1
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
10
reference_url http://www.securitytracker.com/id/1038928
reference_id 1038928
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:47:44Z/
url http://www.securitytracker.com/id/1038928
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1472708
reference_id 1472708
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1472708
12
reference_url http://www.securityfocus.com/bid/99802
reference_id 99802
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:47:44Z/
url http://www.securityfocus.com/bid/99802
13
reference_url http://www.debian.org/security/2017/dsa-3922
reference_id dsa-3922
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:47:44Z/
url http://www.debian.org/security/2017/dsa-3922
14
reference_url https://security.gentoo.org/glsa/201802-04
reference_id GLSA-201802-04
reference_type
scores
url https://security.gentoo.org/glsa/201802-04
15
reference_url https://access.redhat.com/errata/RHSA-2016:2927
reference_id RHSA-2016:2927
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2927
16
reference_url https://access.redhat.com/errata/RHSA-2016:2928
reference_id RHSA-2016:2928
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2928
17
reference_url https://access.redhat.com/errata/RHSA-2017:2192
reference_id RHSA-2017:2192
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:47:44Z/
url https://access.redhat.com/errata/RHSA-2017:2192
18
reference_url https://access.redhat.com/errata/RHSA-2017:2787
reference_id RHSA-2017:2787
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:47:44Z/
url https://access.redhat.com/errata/RHSA-2017:2787
19
reference_url https://access.redhat.com/errata/RHSA-2017:2886
reference_id RHSA-2017:2886
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:47:44Z/
url https://access.redhat.com/errata/RHSA-2017:2886
20
reference_url https://access.redhat.com/errata/RHSA-2018:2439
reference_id RHSA-2018:2439
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:47:44Z/
url https://access.redhat.com/errata/RHSA-2018:2439
21
reference_url https://access.redhat.com/errata/RHSA-2018:2729
reference_id RHSA-2018:2729
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:47:44Z/
url https://access.redhat.com/errata/RHSA-2018:2729
22
reference_url https://usn.ubuntu.com/3357-1/
reference_id USN-3357-1
reference_type
scores
url https://usn.ubuntu.com/3357-1/
23
reference_url https://usn.ubuntu.com/3357-2/
reference_id USN-3357-2
reference_type
scores
url https://usn.ubuntu.com/3357-2/
fixed_packages
aliases CVE-2017-3651
risk_score 1.9
exploitability 0.5
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-v165-afmm-w3er
12
url VCID-vh5y-15tw-d7fd
vulnerability_id VCID-vh5y-15tw-d7fd
summary
Multiple vulnerabilities have been found in MariaDB and MySQL, the
    worst of which could lead to the remote execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8283.json
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8283.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-8283
reference_id
reference_type
scores
0
value 0.00361
scoring_system epss
scoring_elements 0.58229
published_at 2026-04-02T12:55:00Z
1
value 0.00361
scoring_system epss
scoring_elements 0.5829
published_at 2026-04-16T12:55:00Z
2
value 0.00361
scoring_system epss
scoring_elements 0.58258
published_at 2026-04-13T12:55:00Z
3
value 0.00361
scoring_system epss
scoring_elements 0.58278
published_at 2026-04-12T12:55:00Z
4
value 0.00361
scoring_system epss
scoring_elements 0.583
published_at 2026-04-11T12:55:00Z
5
value 0.00361
scoring_system epss
scoring_elements 0.58283
published_at 2026-04-09T12:55:00Z
6
value 0.00361
scoring_system epss
scoring_elements 0.58144
published_at 2026-04-01T12:55:00Z
7
value 0.00361
scoring_system epss
scoring_elements 0.58277
published_at 2026-04-08T12:55:00Z
8
value 0.00361
scoring_system epss
scoring_elements 0.58249
published_at 2026-04-04T12:55:00Z
9
value 0.00361
scoring_system epss
scoring_elements 0.58223
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-8283
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3492
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3492
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5584
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5584
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5624
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5624
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5626
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5626
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5629
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5629
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6663
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6663
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7440
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7440
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8283
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8283
10
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:P
1
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
11
reference_url http://www.securitytracker.com/id/1037050
reference_id 1037050
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:22Z/
url http://www.securitytracker.com/id/1037050
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1386585
reference_id 1386585
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1386585
13
reference_url http://www.securityfocus.com/bid/93737
reference_id 93737
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:22Z/
url http://www.securityfocus.com/bid/93737
14
reference_url https://security.gentoo.org/glsa/201701-01
reference_id GLSA-201701-01
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:22Z/
url https://security.gentoo.org/glsa/201701-01
15
reference_url https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/
reference_id mariadb-10028-release-notes
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:22Z/
url https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/
16
reference_url https://mariadb.com/kb/en/mariadb/mariadb-10118-release-notes/
reference_id mariadb-10118-release-notes
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:22Z/
url https://mariadb.com/kb/en/mariadb/mariadb-10118-release-notes/
17
reference_url https://mariadb.com/kb/en/mariadb/mariadb-5552-release-notes/
reference_id mariadb-5552-release-notes
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:22Z/
url https://mariadb.com/kb/en/mariadb/mariadb-5552-release-notes/
18
reference_url https://access.redhat.com/errata/RHSA-2016:2130
reference_id RHSA-2016:2130
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2130
19
reference_url http://rhn.redhat.com/errata/RHSA-2016-2130.html
reference_id RHSA-2016-2130.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:22Z/
url http://rhn.redhat.com/errata/RHSA-2016-2130.html
20
reference_url https://access.redhat.com/errata/RHSA-2016:2131
reference_id RHSA-2016:2131
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2131
21
reference_url http://rhn.redhat.com/errata/RHSA-2016-2131.html
reference_id RHSA-2016-2131.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:22Z/
url http://rhn.redhat.com/errata/RHSA-2016-2131.html
22
reference_url https://access.redhat.com/errata/RHSA-2016:2595
reference_id RHSA-2016:2595
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2595
23
reference_url http://rhn.redhat.com/errata/RHSA-2016-2595.html
reference_id RHSA-2016-2595.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:22Z/
url http://rhn.redhat.com/errata/RHSA-2016-2595.html
24
reference_url https://access.redhat.com/errata/RHSA-2016:2749
reference_id RHSA-2016:2749
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2749
25
reference_url http://rhn.redhat.com/errata/RHSA-2016-2749.html
reference_id RHSA-2016-2749.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:22Z/
url http://rhn.redhat.com/errata/RHSA-2016-2749.html
26
reference_url https://access.redhat.com/errata/RHSA-2016:2927
reference_id RHSA-2016:2927
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2927
27
reference_url https://access.redhat.com/errata/RHSA-2016:2928
reference_id RHSA-2016:2928
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2928
fixed_packages
aliases CVE-2016-8283
risk_score 1.9
exploitability 0.5
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vh5y-15tw-d7fd
Fixing_vulnerabilities
Risk_score10.0
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:rpm/redhat/rh-mariadb100-mariadb@1:10.0.28-5%3Farch=el6