Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/111674?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/111674?format=api", "purl": "pkg:rpm/redhat/rh-mariadb101-mariadb@1:10.1.19-6?arch=el7", "type": "rpm", "namespace": "redhat", "name": "rh-mariadb101-mariadb", "version": "1:10.1.19-6", "qualifiers": { "arch": "el7" }, "subpath": "", "is_vulnerable": true, "next_non_vulnerable_version": null, "latest_non_vulnerable_version": null, "affected_by_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/84902?format=api", "vulnerability_id": "VCID-3c35-xvzk-eqdc", "summary": "mysql: race condition while setting stats during MyISAM table repair (CPU Oct 2016)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5616.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5616.json" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:H/Au:S/C:C/I:C/A:C" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1378936", "reference_id": "1378936", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1378936" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:2130", "reference_id": "RHSA-2016:2130", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:2130" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:2131", "reference_id": "RHSA-2016:2131", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:2131" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:2595", "reference_id": "RHSA-2016:2595", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:2595" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:2749", "reference_id": "RHSA-2016:2749", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:2749" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:2927", "reference_id": "RHSA-2016:2927", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:2927" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:2928", "reference_id": "RHSA-2016:2928", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:2928" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0184", "reference_id": "RHSA-2017:0184", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0184" } ], "fixed_packages": [], "aliases": [ "CVE-2016-5616" ], "risk_score": 10.0, "exploitability": "2.0", "weighted_severity": "6.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-3c35-xvzk-eqdc" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49079?format=api", "vulnerability_id": "VCID-f8p4-hpsh-2fcw", "summary": "Multiple vulnerabilities were found in MySQL, the worst of which\n may allow remote execution of arbitrary code.", "references": [ { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-2927.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T16:21:49Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2016-2927.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-2928.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T16:21:49Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2016-2928.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3600.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.4", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3600.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-3600", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00811", "scoring_system": "epss", "scoring_elements": "0.74268", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00811", "scoring_system": "epss", "scoring_elements": "0.74215", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00811", "scoring_system": "epss", "scoring_elements": "0.7422", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00811", "scoring_system": "epss", "scoring_elements": "0.74235", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00811", "scoring_system": "epss", "scoring_elements": "0.74256", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00811", "scoring_system": "epss", "scoring_elements": "0.74237", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00811", "scoring_system": "epss", "scoring_elements": "0.7423", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00811", "scoring_system": "epss", "scoring_elements": "0.74187", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00811", "scoring_system": "epss", "scoring_elements": "0.74182", "published_at": "2026-04-01T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-3600" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3302", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3302" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3305", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3305" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3308", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3308" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3309", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3309" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3329", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3329" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3453", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3453" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3456", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3456" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3461", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3461" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3462", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3462" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3463", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3463" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3464", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3464" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3600", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3600" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.6", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:H/Au:S/C:P/I:P/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "http://www.debian.org/security/2017/dsa-3834", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T16:21:49Z/" } ], "url": "http://www.debian.org/security/2017/dsa-3834" }, { "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T16:21:49Z/" } ], "url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html" }, { "reference_url": "http://www.securityfocus.com/bid/97765", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T16:21:49Z/" } ], "url": "http://www.securityfocus.com/bid/97765" }, { "reference_url": "http://www.securitytracker.com/id/1038287", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T16:21:49Z/" } ], "url": "http://www.securitytracker.com/id/1038287" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1433010", "reference_id": "1433010", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1433010" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-3600", "reference_id": "CVE-2017-3600", "reference_type": "", "scores": [ { "value": "6.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:S/C:P/I:P/A:P" }, { "value": "6.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-3600" }, { "reference_url": "https://security.gentoo.org/glsa/201802-04", "reference_id": "GLSA-201802-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201802-04" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:2927", "reference_id": "RHSA-2016:2927", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:2927" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:2928", "reference_id": "RHSA-2016:2928", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:2928" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:2192", "reference_id": "RHSA-2017:2192", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T16:21:49Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2017:2192" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:2787", "reference_id": "RHSA-2017:2787", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T16:21:49Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2017:2787" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:2886", "reference_id": "RHSA-2017:2886", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T16:21:49Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2017:2886" }, { "reference_url": "https://usn.ubuntu.com/3269-1/", "reference_id": "USN-3269-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3269-1/" }, { "reference_url": "https://usn.ubuntu.com/3357-2/", "reference_id": "USN-3357-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3357-2/" } ], "fixed_packages": [], "aliases": [ "CVE-2017-3600" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-f8p4-hpsh-2fcw" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/81540?format=api", "vulnerability_id": "VCID-g1pp-9qqg-1beb", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-6663.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-6663.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-6663", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02334", "scoring_system": "epss", "scoring_elements": "0.84783", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02334", "scoring_system": "epss", "scoring_elements": "0.84802", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02334", "scoring_system": "epss", "scoring_elements": "0.84768", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.03137", "scoring_system": "epss", "scoring_elements": "0.86886", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.03137", "scoring_system": "epss", "scoring_elements": "0.86882", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.03137", "scoring_system": "epss", "scoring_elements": "0.86877", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.03137", "scoring_system": "epss", "scoring_elements": "0.86894", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.03137", "scoring_system": "epss", "scoring_elements": "0.86845", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.03137", "scoring_system": "epss", "scoring_elements": "0.86865", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.03137", "scoring_system": "epss", "scoring_elements": "0.86873", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-6663" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3492", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3492" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5584", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5584" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5624", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5624" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5626", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5626" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5629", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5629" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6663", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6663" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7440", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7440" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8283", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8283" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.5", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:H/Au:S/C:P/I:P/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1378936", "reference_id": "1378936", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1378936" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/40678.c", "reference_id": "CVE-2016-6663;CVE-2016-5616", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/40678.c" }, { "reference_url": "https://legalhackers.com/advisories/MySQL-Maria-Percona-PrivEscRace-CVE-2016-6663-5616-Exploit.html", "reference_id": "CVE-2016-6663;CVE-2016-5616", "reference_type": "exploit", "scores": [], "url": "https://legalhackers.com/advisories/MySQL-Maria-Percona-PrivEscRace-CVE-2016-6663-5616-Exploit.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:2130", "reference_id": "RHSA-2016:2130", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:2130" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:2131", "reference_id": "RHSA-2016:2131", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:2131" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:2595", "reference_id": "RHSA-2016:2595", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:2595" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:2749", "reference_id": "RHSA-2016:2749", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:2749" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:2927", "reference_id": "RHSA-2016:2927", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:2927" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:2928", "reference_id": "RHSA-2016:2928", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:2928" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0184", "reference_id": "RHSA-2017:0184", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0184" } ], "fixed_packages": [], "aliases": [ "CVE-2016-6663" ], "risk_score": 10.0, "exploitability": "2.0", "weighted_severity": "6.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-g1pp-9qqg-1beb" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41732?format=api", "vulnerability_id": "VCID-gp4w-bdxg-6kab", "summary": "Multiple vulnerabilities have been found in MariaDB and MySQL, the\n worst of which could lead to the remote execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5629.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5629.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5629", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00501", "scoring_system": "epss", "scoring_elements": "0.65954", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00501", "scoring_system": "epss", "scoring_elements": "0.66024", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00501", "scoring_system": "epss", "scoring_elements": "0.65989", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00501", "scoring_system": "epss", "scoring_elements": "0.66019", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00501", "scoring_system": "epss", "scoring_elements": "0.66032", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00501", "scoring_system": "epss", "scoring_elements": "0.66013", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00501", "scoring_system": "epss", "scoring_elements": "0.65913", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00501", "scoring_system": "epss", "scoring_elements": "0.66001", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00501", "scoring_system": "epss", "scoring_elements": "0.65984", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00501", "scoring_system": "epss", "scoring_elements": "0.6595", "published_at": "2026-04-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5629" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3492", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3492" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5584", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5584" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5624", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5624" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5626", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5626" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5629", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5629" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6663", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6663" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7440", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7440" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8283", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8283" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:S/C:N/I:N/A:P" }, { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "http://www.securitytracker.com/id/1037050", "reference_id": "1037050", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:33Z/" } ], "url": "http://www.securitytracker.com/id/1037050" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1386572", "reference_id": "1386572", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1386572" }, { "reference_url": "http://www.securityfocus.com/bid/93668", "reference_id": "93668", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:33Z/" } ], "url": "http://www.securityfocus.com/bid/93668" }, { "reference_url": "https://security.gentoo.org/glsa/201701-01", "reference_id": "GLSA-201701-01", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:33Z/" } ], "url": "https://security.gentoo.org/glsa/201701-01" }, { "reference_url": "https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/", "reference_id": "mariadb-10028-release-notes", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:33Z/" } ], "url": "https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/" }, { "reference_url": "https://mariadb.com/kb/en/mariadb/mariadb-10118-release-notes/", "reference_id": "mariadb-10118-release-notes", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:33Z/" } ], "url": "https://mariadb.com/kb/en/mariadb/mariadb-10118-release-notes/" }, { "reference_url": "https://mariadb.com/kb/en/mariadb/mariadb-5552-release-notes/", "reference_id": "mariadb-5552-release-notes", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:33Z/" } ], "url": "https://mariadb.com/kb/en/mariadb/mariadb-5552-release-notes/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:2130", "reference_id": "RHSA-2016:2130", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:2130" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-2130.html", "reference_id": "RHSA-2016-2130.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:33Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2016-2130.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:2131", "reference_id": "RHSA-2016:2131", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:2131" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-2131.html", "reference_id": "RHSA-2016-2131.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:33Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2016-2131.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:2595", "reference_id": "RHSA-2016:2595", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:2595" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-2595.html", "reference_id": "RHSA-2016-2595.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:33Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2016-2595.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:2749", "reference_id": "RHSA-2016:2749", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:2749" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-2749.html", "reference_id": "RHSA-2016-2749.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:33Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2016-2749.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:2927", "reference_id": "RHSA-2016:2927", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:2927" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:2928", "reference_id": "RHSA-2016:2928", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:2928" } ], "fixed_packages": [], "aliases": [ "CVE-2016-5629" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-gp4w-bdxg-6kab" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/81539?format=api", "vulnerability_id": "VCID-mfgg-7s54-gqg8", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5624.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5624.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5624", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0069", "scoring_system": "epss", "scoring_elements": "0.71817", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0069", "scoring_system": "epss", "scoring_elements": "0.71734", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0069", "scoring_system": "epss", "scoring_elements": "0.71741", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0069", "scoring_system": "epss", "scoring_elements": "0.7176", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0069", "scoring_system": "epss", "scoring_elements": "0.71735", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0069", "scoring_system": "epss", "scoring_elements": "0.71774", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0069", "scoring_system": "epss", "scoring_elements": "0.71785", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0069", "scoring_system": "epss", "scoring_elements": "0.71809", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0069", "scoring_system": "epss", "scoring_elements": "0.71792", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0069", "scoring_system": "epss", "scoring_elements": "0.71775", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5624" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3492", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3492" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5584", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5584" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5624", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5624" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5626", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5626" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5629", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5629" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6663", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6663" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7440", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7440" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8283", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8283" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:S/C:N/I:N/A:P" }, { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "http://www.securitytracker.com/id/1037050", "reference_id": "1037050", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:38Z/" } ], "url": "http://www.securitytracker.com/id/1037050" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1386566", "reference_id": "1386566", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1386566" }, { "reference_url": "http://www.securityfocus.com/bid/93635", "reference_id": "93635", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:38Z/" } ], "url": "http://www.securityfocus.com/bid/93635" }, { "reference_url": "https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/", "reference_id": "mariadb-10028-release-notes", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:38Z/" } ], "url": "https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/" }, { "reference_url": "https://mariadb.com/kb/en/mariadb/mariadb-10118-release-notes/", "reference_id": "mariadb-10118-release-notes", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:38Z/" } ], "url": "https://mariadb.com/kb/en/mariadb/mariadb-10118-release-notes/" }, { "reference_url": "https://mariadb.com/kb/en/mariadb/mariadb-5552-release-notes/", "reference_id": "mariadb-5552-release-notes", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:38Z/" } ], "url": "https://mariadb.com/kb/en/mariadb/mariadb-5552-release-notes/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:2130", "reference_id": "RHSA-2016:2130", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:2130" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-2130.html", "reference_id": "RHSA-2016-2130.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:38Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2016-2130.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:2131", "reference_id": "RHSA-2016:2131", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:2131" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-2131.html", "reference_id": "RHSA-2016-2131.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:38Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2016-2131.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:2595", "reference_id": "RHSA-2016:2595", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:2595" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-2595.html", "reference_id": "RHSA-2016-2595.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:38Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2016-2595.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:2927", "reference_id": "RHSA-2016:2927", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:2927" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:2928", "reference_id": "RHSA-2016:2928", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:2928" } ], "fixed_packages": [], "aliases": [ "CVE-2016-5624" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-mfgg-7s54-gqg8" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41722?format=api", "vulnerability_id": "VCID-rted-6vzz-mbcv", "summary": "Multiple vulnerabilities have been found in MariaDB and MySQL, the\n worst of which could lead to the remote execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3492.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3492.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-3492", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00566", "scoring_system": "epss", "scoring_elements": "0.68513", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00566", "scoring_system": "epss", "scoring_elements": "0.68412", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00566", "scoring_system": "epss", "scoring_elements": "0.68431", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00566", "scoring_system": "epss", "scoring_elements": "0.68451", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00566", "scoring_system": "epss", "scoring_elements": "0.68427", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00566", "scoring_system": "epss", "scoring_elements": "0.68477", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00566", "scoring_system": "epss", "scoring_elements": "0.68494", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00566", "scoring_system": "epss", "scoring_elements": "0.6852", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00566", "scoring_system": "epss", "scoring_elements": "0.68508", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00566", "scoring_system": "epss", "scoring_elements": "0.68475", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-3492" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3492", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3492" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5584", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5584" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5624", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5624" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5626", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5626" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5629", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5629" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6663", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6663" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7440", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7440" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8283", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8283" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:S/C:N/I:N/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "http://www.securitytracker.com/id/1037050", "reference_id": "1037050", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:50:08Z/" } ], "url": "http://www.securitytracker.com/id/1037050" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1386554", "reference_id": "1386554", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1386554" }, { "reference_url": "http://www.securityfocus.com/bid/93650", "reference_id": "93650", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:50:08Z/" } ], "url": "http://www.securityfocus.com/bid/93650" }, { "reference_url": "https://security.gentoo.org/glsa/201701-01", "reference_id": "GLSA-201701-01", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:50:08Z/" } ], "url": "https://security.gentoo.org/glsa/201701-01" }, { "reference_url": "https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/", "reference_id": "mariadb-10028-release-notes", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:50:08Z/" } ], "url": "https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/" }, { "reference_url": "https://mariadb.com/kb/en/mariadb/mariadb-10118-release-notes/", "reference_id": "mariadb-10118-release-notes", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:50:08Z/" } ], "url": "https://mariadb.com/kb/en/mariadb/mariadb-10118-release-notes/" }, { "reference_url": "https://mariadb.com/kb/en/mariadb/mariadb-5552-release-notes/", "reference_id": "mariadb-5552-release-notes", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:50:08Z/" } ], "url": "https://mariadb.com/kb/en/mariadb/mariadb-5552-release-notes/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:2130", "reference_id": "RHSA-2016:2130", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:2130" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-2130.html", "reference_id": "RHSA-2016-2130.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:50:08Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2016-2130.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:2131", "reference_id": "RHSA-2016:2131", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:2131" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-2131.html", "reference_id": "RHSA-2016-2131.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:50:08Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2016-2131.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:2595", "reference_id": "RHSA-2016:2595", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:2595" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-2595.html", "reference_id": "RHSA-2016-2595.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:50:08Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2016-2595.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:2749", "reference_id": "RHSA-2016:2749", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:2749" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-2749.html", "reference_id": "RHSA-2016-2749.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:50:08Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2016-2749.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:2927", "reference_id": "RHSA-2016:2927", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:2927" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:2928", "reference_id": "RHSA-2016:2928", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:2928" } ], "fixed_packages": [], "aliases": [ "CVE-2016-3492" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-rted-6vzz-mbcv" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41740?format=api", "vulnerability_id": "VCID-skzt-r7sx-1ucv", "summary": "Multiple vulnerabilities have been found in MariaDB and MySQL, the\n worst of which could lead to the remote execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-6662.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-6662.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-6662", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.89577", "scoring_system": "epss", "scoring_elements": "0.99554", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.89577", "scoring_system": "epss", "scoring_elements": "0.99553", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.89577", "scoring_system": "epss", "scoring_elements": "0.99555", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.89577", "scoring_system": "epss", "scoring_elements": "0.99556", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.89577", "scoring_system": "epss", "scoring_elements": "0.99557", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.89577", "scoring_system": "epss", "scoring_elements": "0.99559", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-6662" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6662", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6662" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.5", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:S/C:C/I:C/A:C" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1375198", "reference_id": "1375198", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1375198" }, { "reference_url": "http://legalhackers.com/advisories/MySQL-Exploit-Remote-Root-Code-Execution-Privesc-CVE-2016-6662.html", "reference_id": "CVE-2016-6662", "reference_type": "exploit", "scores": [], "url": "http://legalhackers.com/advisories/MySQL-Exploit-Remote-Root-Code-Execution-Privesc-CVE-2016-6662.html" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/40360.py", "reference_id": "CVE-2016-6662", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/40360.py" }, { "reference_url": "https://security.gentoo.org/glsa/201701-01", "reference_id": "GLSA-201701-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201701-01" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:2058", "reference_id": "RHSA-2016:2058", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:2058" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:2059", "reference_id": "RHSA-2016:2059", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:2059" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:2060", "reference_id": "RHSA-2016:2060", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:2060" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:2061", "reference_id": "RHSA-2016:2061", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:2061" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:2062", "reference_id": "RHSA-2016:2062", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:2062" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:2077", "reference_id": "RHSA-2016:2077", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:2077" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:2130", "reference_id": "RHSA-2016:2130", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:2130" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:2131", "reference_id": "RHSA-2016:2131", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:2131" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:2595", "reference_id": "RHSA-2016:2595", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:2595" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:2749", "reference_id": "RHSA-2016:2749", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:2749" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:2927", "reference_id": "RHSA-2016:2927", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:2927" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:2928", "reference_id": "RHSA-2016:2928", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:2928" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0184", "reference_id": "RHSA-2017:0184", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0184" }, { "reference_url": "https://usn.ubuntu.com/3078-1/", "reference_id": "USN-3078-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3078-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2016-6662" ], "risk_score": 10.0, "exploitability": "2.0", "weighted_severity": "8.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-skzt-r7sx-1ucv" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41729?format=api", "vulnerability_id": "VCID-tvdv-3ed5-h3dt", "summary": "Multiple vulnerabilities have been found in MariaDB and MySQL, the\n worst of which could lead to the remote execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5626.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5626.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5626", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00369", "scoring_system": "epss", "scoring_elements": "0.58837", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00369", "scoring_system": "epss", "scoring_elements": "0.58702", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00369", "scoring_system": "epss", "scoring_elements": "0.58776", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00369", "scoring_system": "epss", "scoring_elements": "0.58797", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00369", "scoring_system": "epss", "scoring_elements": "0.58766", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00369", "scoring_system": "epss", "scoring_elements": "0.58818", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00369", "scoring_system": "epss", "scoring_elements": "0.58824", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00369", "scoring_system": "epss", "scoring_elements": "0.58842", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00369", "scoring_system": "epss", "scoring_elements": "0.58805", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5626" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3492", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3492" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5584", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5584" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5624", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5624" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5626", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5626" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5629", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5629" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6663", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6663" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7440", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7440" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8283", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8283" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:S/C:N/I:N/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "http://www.securitytracker.com/id/1037050", "reference_id": "1037050", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:36Z/" } ], "url": "http://www.securitytracker.com/id/1037050" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1386568", "reference_id": "1386568", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1386568" }, { "reference_url": "http://www.securityfocus.com/bid/93638", "reference_id": "93638", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:36Z/" } ], "url": "http://www.securityfocus.com/bid/93638" }, { "reference_url": "https://security.gentoo.org/glsa/201701-01", "reference_id": "GLSA-201701-01", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:36Z/" } ], "url": "https://security.gentoo.org/glsa/201701-01" }, { "reference_url": "https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/", "reference_id": "mariadb-10028-release-notes", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:36Z/" } ], "url": "https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/" }, { "reference_url": "https://mariadb.com/kb/en/mariadb/mariadb-10118-release-notes/", "reference_id": "mariadb-10118-release-notes", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:36Z/" } ], "url": "https://mariadb.com/kb/en/mariadb/mariadb-10118-release-notes/" }, { "reference_url": "https://mariadb.com/kb/en/mariadb/mariadb-5552-release-notes/", "reference_id": "mariadb-5552-release-notes", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:36Z/" } ], "url": "https://mariadb.com/kb/en/mariadb/mariadb-5552-release-notes/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:2130", "reference_id": "RHSA-2016:2130", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:2130" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-2130.html", "reference_id": "RHSA-2016-2130.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:36Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2016-2130.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:2131", "reference_id": "RHSA-2016:2131", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:2131" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-2131.html", "reference_id": "RHSA-2016-2131.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:36Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2016-2131.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:2595", "reference_id": "RHSA-2016:2595", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:2595" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-2595.html", "reference_id": "RHSA-2016-2595.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:36Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2016-2595.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:2749", "reference_id": "RHSA-2016:2749", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:2749" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-2749.html", "reference_id": "RHSA-2016-2749.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:36Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2016-2749.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:2927", "reference_id": "RHSA-2016:2927", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:2927" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:2928", "reference_id": "RHSA-2016:2928", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:2928" } ], "fixed_packages": [], "aliases": [ "CVE-2016-5626" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-tvdv-3ed5-h3dt" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/84528?format=api", "vulnerability_id": "VCID-tyes-eb5w-jqfa", "summary": "mysql: Incorrect input validation allowing code execution via mysqldump", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5483.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.4", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5483.json" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1433010", "reference_id": "1433010", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1433010" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-5483", "reference_id": "CVE-2016-5483", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-5483" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:2131", "reference_id": "RHSA-2016:2131", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:2131" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:2927", "reference_id": "RHSA-2016:2927", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:2927" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:2928", "reference_id": "RHSA-2016:2928", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:2928" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:2192", "reference_id": "RHSA-2017:2192", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:2192" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:2787", "reference_id": "RHSA-2017:2787", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:2787" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:2886", "reference_id": "RHSA-2017:2886", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:2886" } ], "fixed_packages": [], "aliases": [ "CVE-2016-5483" ], "risk_score": 2.9, "exploitability": "0.5", "weighted_severity": "5.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-tyes-eb5w-jqfa" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49089?format=api", "vulnerability_id": "VCID-v165-afmm-w3er", "summary": "Multiple vulnerabilities were found in MySQL, the worst of which\n may allow remote execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3651.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3651.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-3651", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00414", "scoring_system": "epss", "scoring_elements": "0.61578", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00414", "scoring_system": "epss", "scoring_elements": "0.61486", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00414", "scoring_system": "epss", "scoring_elements": "0.61534", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00414", "scoring_system": "epss", "scoring_elements": "0.61548", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00414", "scoring_system": "epss", "scoring_elements": "0.61569", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00414", "scoring_system": "epss", "scoring_elements": "0.61556", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00414", "scoring_system": "epss", "scoring_elements": "0.61536", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00414", "scoring_system": "epss", "scoring_elements": "0.61487", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00414", "scoring_system": "epss", "scoring_elements": "0.6141", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00414", "scoring_system": "epss", "scoring_elements": "0.61515", "published_at": "2026-04-04T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-3651" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3635", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3635" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3636", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3636" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3641", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3641" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3648", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3648" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3651", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3651" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3652", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3652" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3653", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3653" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:S/C:N/I:P/A:N" }, { "value": "4.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "http://www.securitytracker.com/id/1038928", "reference_id": "1038928", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:47:44Z/" } ], "url": "http://www.securitytracker.com/id/1038928" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1472708", "reference_id": "1472708", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1472708" }, { "reference_url": "http://www.securityfocus.com/bid/99802", "reference_id": "99802", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:47:44Z/" } ], "url": "http://www.securityfocus.com/bid/99802" }, { "reference_url": "http://www.debian.org/security/2017/dsa-3922", "reference_id": "dsa-3922", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:47:44Z/" } ], "url": "http://www.debian.org/security/2017/dsa-3922" }, { "reference_url": "https://security.gentoo.org/glsa/201802-04", "reference_id": "GLSA-201802-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201802-04" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:2927", "reference_id": "RHSA-2016:2927", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:2927" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:2928", "reference_id": "RHSA-2016:2928", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:2928" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:2192", "reference_id": "RHSA-2017:2192", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:47:44Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2017:2192" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:2787", "reference_id": "RHSA-2017:2787", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:47:44Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2017:2787" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:2886", "reference_id": "RHSA-2017:2886", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:47:44Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2017:2886" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:2439", "reference_id": "RHSA-2018:2439", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:47:44Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2018:2439" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:2729", "reference_id": "RHSA-2018:2729", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:47:44Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2018:2729" }, { "reference_url": "https://usn.ubuntu.com/3357-1/", "reference_id": "USN-3357-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3357-1/" }, { "reference_url": "https://usn.ubuntu.com/3357-2/", "reference_id": "USN-3357-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3357-2/" } ], "fixed_packages": [], "aliases": [ "CVE-2017-3651" ], "risk_score": 1.9, "exploitability": "0.5", "weighted_severity": "3.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-v165-afmm-w3er" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41741?format=api", "vulnerability_id": "VCID-vh5y-15tw-d7fd", "summary": "Multiple vulnerabilities have been found in MariaDB and MySQL, the\n worst of which could lead to the remote execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8283.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8283.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-8283", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00361", "scoring_system": "epss", "scoring_elements": "0.58229", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00361", "scoring_system": "epss", "scoring_elements": "0.5829", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00361", "scoring_system": "epss", "scoring_elements": "0.58258", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00361", "scoring_system": "epss", "scoring_elements": "0.58278", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00361", "scoring_system": "epss", "scoring_elements": "0.583", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00361", "scoring_system": "epss", "scoring_elements": "0.58283", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00361", "scoring_system": "epss", "scoring_elements": "0.58144", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00361", "scoring_system": "epss", "scoring_elements": "0.58277", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00361", "scoring_system": "epss", "scoring_elements": "0.58249", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00361", "scoring_system": "epss", "scoring_elements": "0.58223", "published_at": "2026-04-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-8283" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3492", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3492" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5584", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5584" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5624", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5624" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5626", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5626" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5629", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5629" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6663", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6663" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7440", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7440" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8283", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8283" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:S/C:N/I:N/A:P" }, { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "http://www.securitytracker.com/id/1037050", "reference_id": "1037050", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:22Z/" } ], "url": "http://www.securitytracker.com/id/1037050" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1386585", "reference_id": "1386585", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1386585" }, { "reference_url": "http://www.securityfocus.com/bid/93737", "reference_id": "93737", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:22Z/" } ], "url": "http://www.securityfocus.com/bid/93737" }, { "reference_url": "https://security.gentoo.org/glsa/201701-01", "reference_id": "GLSA-201701-01", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:22Z/" } ], "url": "https://security.gentoo.org/glsa/201701-01" }, { "reference_url": "https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/", "reference_id": "mariadb-10028-release-notes", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:22Z/" } ], "url": "https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/" }, { "reference_url": "https://mariadb.com/kb/en/mariadb/mariadb-10118-release-notes/", "reference_id": "mariadb-10118-release-notes", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:22Z/" } ], "url": "https://mariadb.com/kb/en/mariadb/mariadb-10118-release-notes/" }, { "reference_url": "https://mariadb.com/kb/en/mariadb/mariadb-5552-release-notes/", "reference_id": "mariadb-5552-release-notes", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:22Z/" } ], "url": "https://mariadb.com/kb/en/mariadb/mariadb-5552-release-notes/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:2130", "reference_id": "RHSA-2016:2130", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:2130" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-2130.html", "reference_id": "RHSA-2016-2130.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:22Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2016-2130.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:2131", "reference_id": "RHSA-2016:2131", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:2131" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-2131.html", "reference_id": "RHSA-2016-2131.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:22Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2016-2131.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:2595", "reference_id": "RHSA-2016:2595", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:2595" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-2595.html", "reference_id": "RHSA-2016-2595.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:22Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2016-2595.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:2749", "reference_id": "RHSA-2016:2749", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:2749" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-2749.html", "reference_id": "RHSA-2016-2749.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:22Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2016-2749.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:2927", "reference_id": "RHSA-2016:2927", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:2927" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:2928", "reference_id": "RHSA-2016:2928", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:2928" } ], "fixed_packages": [], "aliases": [ "CVE-2016-8283" ], "risk_score": 1.9, "exploitability": "0.5", "weighted_severity": "3.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vh5y-15tw-d7fd" } ], "fixing_vulnerabilities": [], "risk_score": "10.0", "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/rh-mariadb101-mariadb@1:10.1.19-6%3Farch=el7" }