Lookup for vulnerable packages by Package URL.

Purlpkg:rpm/redhat/mariadb55-mariadb@5.5.53-1?arch=el7
Typerpm
Namespaceredhat
Namemariadb55-mariadb
Version5.5.53-1
Qualifiers
arch el7
Subpath
Is_vulnerabletrue
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
0
url VCID-3c35-xvzk-eqdc
vulnerability_id VCID-3c35-xvzk-eqdc
summary mysql: race condition while setting stats during MyISAM table repair (CPU Oct 2016)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5616.json
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5616.json
1
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6
scoring_system cvssv2
scoring_elements AV:L/AC:H/Au:S/C:C/I:C/A:C
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1378936
reference_id 1378936
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1378936
3
reference_url https://access.redhat.com/errata/RHSA-2016:2130
reference_id RHSA-2016:2130
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2130
4
reference_url https://access.redhat.com/errata/RHSA-2016:2131
reference_id RHSA-2016:2131
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2131
5
reference_url https://access.redhat.com/errata/RHSA-2016:2595
reference_id RHSA-2016:2595
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2595
6
reference_url https://access.redhat.com/errata/RHSA-2016:2749
reference_id RHSA-2016:2749
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2749
7
reference_url https://access.redhat.com/errata/RHSA-2016:2927
reference_id RHSA-2016:2927
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2927
8
reference_url https://access.redhat.com/errata/RHSA-2016:2928
reference_id RHSA-2016:2928
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2928
9
reference_url https://access.redhat.com/errata/RHSA-2017:0184
reference_id RHSA-2017:0184
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:0184
fixed_packages
aliases CVE-2016-5616
risk_score 10.0
exploitability 2.0
weighted_severity 6.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3c35-xvzk-eqdc
1
url VCID-g1pp-9qqg-1beb
vulnerability_id VCID-g1pp-9qqg-1beb
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-6663.json
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-6663.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-6663
reference_id
reference_type
scores
0
value 0.02334
scoring_system epss
scoring_elements 0.84802
published_at 2026-04-04T12:55:00Z
1
value 0.02334
scoring_system epss
scoring_elements 0.84768
published_at 2026-04-01T12:55:00Z
2
value 0.02334
scoring_system epss
scoring_elements 0.84783
published_at 2026-04-02T12:55:00Z
3
value 0.03137
scoring_system epss
scoring_elements 0.86886
published_at 2026-04-11T12:55:00Z
4
value 0.03137
scoring_system epss
scoring_elements 0.86882
published_at 2026-04-12T12:55:00Z
5
value 0.03137
scoring_system epss
scoring_elements 0.86877
published_at 2026-04-13T12:55:00Z
6
value 0.03137
scoring_system epss
scoring_elements 0.86894
published_at 2026-04-16T12:55:00Z
7
value 0.03137
scoring_system epss
scoring_elements 0.86899
published_at 2026-04-18T12:55:00Z
8
value 0.03137
scoring_system epss
scoring_elements 0.86845
published_at 2026-04-07T12:55:00Z
9
value 0.03137
scoring_system epss
scoring_elements 0.86865
published_at 2026-04-08T12:55:00Z
10
value 0.03137
scoring_system epss
scoring_elements 0.86873
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-6663
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3492
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3492
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5584
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5584
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5624
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5624
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5626
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5626
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5629
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5629
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6663
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6663
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7440
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7440
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8283
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8283
10
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.5
scoring_system cvssv2
scoring_elements AV:L/AC:H/Au:S/C:P/I:P/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1378936
reference_id 1378936
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1378936
12
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/40678.c
reference_id CVE-2016-6663;CVE-2016-5616
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/40678.c
13
reference_url https://legalhackers.com/advisories/MySQL-Maria-Percona-PrivEscRace-CVE-2016-6663-5616-Exploit.html
reference_id CVE-2016-6663;CVE-2016-5616
reference_type exploit
scores
url https://legalhackers.com/advisories/MySQL-Maria-Percona-PrivEscRace-CVE-2016-6663-5616-Exploit.html
14
reference_url https://access.redhat.com/errata/RHSA-2016:2130
reference_id RHSA-2016:2130
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2130
15
reference_url https://access.redhat.com/errata/RHSA-2016:2131
reference_id RHSA-2016:2131
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2131
16
reference_url https://access.redhat.com/errata/RHSA-2016:2595
reference_id RHSA-2016:2595
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2595
17
reference_url https://access.redhat.com/errata/RHSA-2016:2749
reference_id RHSA-2016:2749
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2749
18
reference_url https://access.redhat.com/errata/RHSA-2016:2927
reference_id RHSA-2016:2927
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2927
19
reference_url https://access.redhat.com/errata/RHSA-2016:2928
reference_id RHSA-2016:2928
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2928
20
reference_url https://access.redhat.com/errata/RHSA-2017:0184
reference_id RHSA-2017:0184
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:0184
fixed_packages
aliases CVE-2016-6663
risk_score 10.0
exploitability 2.0
weighted_severity 6.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-g1pp-9qqg-1beb
2
url VCID-gp4w-bdxg-6kab
vulnerability_id VCID-gp4w-bdxg-6kab
summary
Multiple vulnerabilities have been found in MariaDB and MySQL, the
    worst of which could lead to the remote execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5629.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5629.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-5629
reference_id
reference_type
scores
0
value 0.00501
scoring_system epss
scoring_elements 0.66038
published_at 2026-04-18T12:55:00Z
1
value 0.00501
scoring_system epss
scoring_elements 0.65954
published_at 2026-04-02T12:55:00Z
2
value 0.00501
scoring_system epss
scoring_elements 0.65984
published_at 2026-04-04T12:55:00Z
3
value 0.00501
scoring_system epss
scoring_elements 0.6595
published_at 2026-04-07T12:55:00Z
4
value 0.00501
scoring_system epss
scoring_elements 0.66001
published_at 2026-04-08T12:55:00Z
5
value 0.00501
scoring_system epss
scoring_elements 0.66013
published_at 2026-04-09T12:55:00Z
6
value 0.00501
scoring_system epss
scoring_elements 0.66032
published_at 2026-04-11T12:55:00Z
7
value 0.00501
scoring_system epss
scoring_elements 0.66019
published_at 2026-04-12T12:55:00Z
8
value 0.00501
scoring_system epss
scoring_elements 0.65989
published_at 2026-04-13T12:55:00Z
9
value 0.00501
scoring_system epss
scoring_elements 0.66024
published_at 2026-04-16T12:55:00Z
10
value 0.00501
scoring_system epss
scoring_elements 0.65913
published_at 2026-04-01T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-5629
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3492
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3492
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5584
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5584
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5624
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5624
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5626
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5626
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5629
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5629
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6663
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6663
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7440
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7440
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8283
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8283
10
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:P
1
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
11
reference_url http://www.securitytracker.com/id/1037050
reference_id 1037050
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:33Z/
url http://www.securitytracker.com/id/1037050
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1386572
reference_id 1386572
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1386572
13
reference_url http://www.securityfocus.com/bid/93668
reference_id 93668
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:33Z/
url http://www.securityfocus.com/bid/93668
14
reference_url https://security.gentoo.org/glsa/201701-01
reference_id GLSA-201701-01
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:33Z/
url https://security.gentoo.org/glsa/201701-01
15
reference_url https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/
reference_id mariadb-10028-release-notes
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:33Z/
url https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/
16
reference_url https://mariadb.com/kb/en/mariadb/mariadb-10118-release-notes/
reference_id mariadb-10118-release-notes
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:33Z/
url https://mariadb.com/kb/en/mariadb/mariadb-10118-release-notes/
17
reference_url https://mariadb.com/kb/en/mariadb/mariadb-5552-release-notes/
reference_id mariadb-5552-release-notes
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:33Z/
url https://mariadb.com/kb/en/mariadb/mariadb-5552-release-notes/
18
reference_url https://access.redhat.com/errata/RHSA-2016:2130
reference_id RHSA-2016:2130
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2130
19
reference_url http://rhn.redhat.com/errata/RHSA-2016-2130.html
reference_id RHSA-2016-2130.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:33Z/
url http://rhn.redhat.com/errata/RHSA-2016-2130.html
20
reference_url https://access.redhat.com/errata/RHSA-2016:2131
reference_id RHSA-2016:2131
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2131
21
reference_url http://rhn.redhat.com/errata/RHSA-2016-2131.html
reference_id RHSA-2016-2131.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:33Z/
url http://rhn.redhat.com/errata/RHSA-2016-2131.html
22
reference_url https://access.redhat.com/errata/RHSA-2016:2595
reference_id RHSA-2016:2595
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2595
23
reference_url http://rhn.redhat.com/errata/RHSA-2016-2595.html
reference_id RHSA-2016-2595.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:33Z/
url http://rhn.redhat.com/errata/RHSA-2016-2595.html
24
reference_url https://access.redhat.com/errata/RHSA-2016:2749
reference_id RHSA-2016:2749
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2749
25
reference_url http://rhn.redhat.com/errata/RHSA-2016-2749.html
reference_id RHSA-2016-2749.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:33Z/
url http://rhn.redhat.com/errata/RHSA-2016-2749.html
26
reference_url https://access.redhat.com/errata/RHSA-2016:2927
reference_id RHSA-2016:2927
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2927
27
reference_url https://access.redhat.com/errata/RHSA-2016:2928
reference_id RHSA-2016:2928
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2928
fixed_packages
aliases CVE-2016-5629
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gp4w-bdxg-6kab
3
url VCID-gyjy-c8wc-qubd
vulnerability_id VCID-gyjy-c8wc-qubd
summary
Multiple vulnerabilities have been found in MariaDB and MySQL, the
    worst of which could lead to the remote execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5612.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5612.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-5612
reference_id
reference_type
scores
0
value 0.00712
scoring_system epss
scoring_elements 0.72311
published_at 2026-04-18T12:55:00Z
1
value 0.00712
scoring_system epss
scoring_elements 0.72217
published_at 2026-04-01T12:55:00Z
2
value 0.00712
scoring_system epss
scoring_elements 0.72289
published_at 2026-04-11T12:55:00Z
3
value 0.00712
scoring_system epss
scoring_elements 0.72273
published_at 2026-04-12T12:55:00Z
4
value 0.00712
scoring_system epss
scoring_elements 0.7226
published_at 2026-04-13T12:55:00Z
5
value 0.00712
scoring_system epss
scoring_elements 0.72302
published_at 2026-04-16T12:55:00Z
6
value 0.00712
scoring_system epss
scoring_elements 0.72222
published_at 2026-04-02T12:55:00Z
7
value 0.00712
scoring_system epss
scoring_elements 0.72242
published_at 2026-04-04T12:55:00Z
8
value 0.00712
scoring_system epss
scoring_elements 0.72218
published_at 2026-04-07T12:55:00Z
9
value 0.00712
scoring_system epss
scoring_elements 0.72255
published_at 2026-04-08T12:55:00Z
10
value 0.00712
scoring_system epss
scoring_elements 0.72267
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-5612
2
reference_url http://www.securitytracker.com/id/1037050
reference_id 1037050
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:48Z/
url http://www.securitytracker.com/id/1037050
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1386561
reference_id 1386561
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1386561
4
reference_url http://www.securityfocus.com/bid/93630
reference_id 93630
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:48Z/
url http://www.securityfocus.com/bid/93630
5
reference_url https://security.gentoo.org/glsa/201701-01
reference_id GLSA-201701-01
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:48Z/
url https://security.gentoo.org/glsa/201701-01
6
reference_url https://access.redhat.com/errata/RHSA-2016:1601
reference_id RHSA-2016:1601
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1601
7
reference_url https://access.redhat.com/errata/RHSA-2016:2130
reference_id RHSA-2016:2130
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2130
8
reference_url http://rhn.redhat.com/errata/RHSA-2016-2130.html
reference_id RHSA-2016-2130.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:48Z/
url http://rhn.redhat.com/errata/RHSA-2016-2130.html
9
reference_url https://access.redhat.com/errata/RHSA-2016:2131
reference_id RHSA-2016:2131
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2131
10
reference_url http://rhn.redhat.com/errata/RHSA-2016-2131.html
reference_id RHSA-2016-2131.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:48Z/
url http://rhn.redhat.com/errata/RHSA-2016-2131.html
11
reference_url https://access.redhat.com/errata/RHSA-2016:2595
reference_id RHSA-2016:2595
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2595
12
reference_url http://rhn.redhat.com/errata/RHSA-2016-2595.html
reference_id RHSA-2016-2595.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:48Z/
url http://rhn.redhat.com/errata/RHSA-2016-2595.html
13
reference_url https://access.redhat.com/errata/RHSA-2016:2927
reference_id RHSA-2016:2927
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2927
fixed_packages
aliases CVE-2016-5612
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gyjy-c8wc-qubd
4
url VCID-mfgg-7s54-gqg8
vulnerability_id VCID-mfgg-7s54-gqg8
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5624.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5624.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-5624
reference_id
reference_type
scores
0
value 0.0069
scoring_system epss
scoring_elements 0.71823
published_at 2026-04-18T12:55:00Z
1
value 0.0069
scoring_system epss
scoring_elements 0.71734
published_at 2026-04-01T12:55:00Z
2
value 0.0069
scoring_system epss
scoring_elements 0.7176
published_at 2026-04-04T12:55:00Z
3
value 0.0069
scoring_system epss
scoring_elements 0.71735
published_at 2026-04-07T12:55:00Z
4
value 0.0069
scoring_system epss
scoring_elements 0.71774
published_at 2026-04-08T12:55:00Z
5
value 0.0069
scoring_system epss
scoring_elements 0.71785
published_at 2026-04-09T12:55:00Z
6
value 0.0069
scoring_system epss
scoring_elements 0.71809
published_at 2026-04-11T12:55:00Z
7
value 0.0069
scoring_system epss
scoring_elements 0.71792
published_at 2026-04-12T12:55:00Z
8
value 0.0069
scoring_system epss
scoring_elements 0.71775
published_at 2026-04-13T12:55:00Z
9
value 0.0069
scoring_system epss
scoring_elements 0.71817
published_at 2026-04-16T12:55:00Z
10
value 0.0069
scoring_system epss
scoring_elements 0.71741
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-5624
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3492
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3492
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5584
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5584
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5624
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5624
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5626
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5626
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5629
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5629
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6663
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6663
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7440
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7440
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8283
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8283
10
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:P
1
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
11
reference_url http://www.securitytracker.com/id/1037050
reference_id 1037050
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:38Z/
url http://www.securitytracker.com/id/1037050
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1386566
reference_id 1386566
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1386566
13
reference_url http://www.securityfocus.com/bid/93635
reference_id 93635
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:38Z/
url http://www.securityfocus.com/bid/93635
14
reference_url https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/
reference_id mariadb-10028-release-notes
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:38Z/
url https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/
15
reference_url https://mariadb.com/kb/en/mariadb/mariadb-10118-release-notes/
reference_id mariadb-10118-release-notes
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:38Z/
url https://mariadb.com/kb/en/mariadb/mariadb-10118-release-notes/
16
reference_url https://mariadb.com/kb/en/mariadb/mariadb-5552-release-notes/
reference_id mariadb-5552-release-notes
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:38Z/
url https://mariadb.com/kb/en/mariadb/mariadb-5552-release-notes/
17
reference_url https://access.redhat.com/errata/RHSA-2016:2130
reference_id RHSA-2016:2130
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2130
18
reference_url http://rhn.redhat.com/errata/RHSA-2016-2130.html
reference_id RHSA-2016-2130.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:38Z/
url http://rhn.redhat.com/errata/RHSA-2016-2130.html
19
reference_url https://access.redhat.com/errata/RHSA-2016:2131
reference_id RHSA-2016:2131
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2131
20
reference_url http://rhn.redhat.com/errata/RHSA-2016-2131.html
reference_id RHSA-2016-2131.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:38Z/
url http://rhn.redhat.com/errata/RHSA-2016-2131.html
21
reference_url https://access.redhat.com/errata/RHSA-2016:2595
reference_id RHSA-2016:2595
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2595
22
reference_url http://rhn.redhat.com/errata/RHSA-2016-2595.html
reference_id RHSA-2016-2595.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:38Z/
url http://rhn.redhat.com/errata/RHSA-2016-2595.html
23
reference_url https://access.redhat.com/errata/RHSA-2016:2927
reference_id RHSA-2016:2927
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2927
24
reference_url https://access.redhat.com/errata/RHSA-2016:2928
reference_id RHSA-2016:2928
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2928
fixed_packages
aliases CVE-2016-5624
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mfgg-7s54-gqg8
5
url VCID-rted-6vzz-mbcv
vulnerability_id VCID-rted-6vzz-mbcv
summary
Multiple vulnerabilities have been found in MariaDB and MySQL, the
    worst of which could lead to the remote execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3492.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3492.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-3492
reference_id
reference_type
scores
0
value 0.00566
scoring_system epss
scoring_elements 0.68526
published_at 2026-04-18T12:55:00Z
1
value 0.00566
scoring_system epss
scoring_elements 0.68451
published_at 2026-04-04T12:55:00Z
2
value 0.00566
scoring_system epss
scoring_elements 0.68427
published_at 2026-04-07T12:55:00Z
3
value 0.00566
scoring_system epss
scoring_elements 0.68477
published_at 2026-04-08T12:55:00Z
4
value 0.00566
scoring_system epss
scoring_elements 0.68494
published_at 2026-04-09T12:55:00Z
5
value 0.00566
scoring_system epss
scoring_elements 0.6852
published_at 2026-04-11T12:55:00Z
6
value 0.00566
scoring_system epss
scoring_elements 0.68508
published_at 2026-04-12T12:55:00Z
7
value 0.00566
scoring_system epss
scoring_elements 0.68475
published_at 2026-04-13T12:55:00Z
8
value 0.00566
scoring_system epss
scoring_elements 0.68513
published_at 2026-04-16T12:55:00Z
9
value 0.00566
scoring_system epss
scoring_elements 0.68412
published_at 2026-04-01T12:55:00Z
10
value 0.00566
scoring_system epss
scoring_elements 0.68431
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-3492
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3492
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3492
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5584
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5584
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5624
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5624
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5626
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5626
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5629
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5629
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6663
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6663
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7440
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7440
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8283
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8283
10
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
11
reference_url http://www.securitytracker.com/id/1037050
reference_id 1037050
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:50:08Z/
url http://www.securitytracker.com/id/1037050
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1386554
reference_id 1386554
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1386554
13
reference_url http://www.securityfocus.com/bid/93650
reference_id 93650
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:50:08Z/
url http://www.securityfocus.com/bid/93650
14
reference_url https://security.gentoo.org/glsa/201701-01
reference_id GLSA-201701-01
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:50:08Z/
url https://security.gentoo.org/glsa/201701-01
15
reference_url https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/
reference_id mariadb-10028-release-notes
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:50:08Z/
url https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/
16
reference_url https://mariadb.com/kb/en/mariadb/mariadb-10118-release-notes/
reference_id mariadb-10118-release-notes
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:50:08Z/
url https://mariadb.com/kb/en/mariadb/mariadb-10118-release-notes/
17
reference_url https://mariadb.com/kb/en/mariadb/mariadb-5552-release-notes/
reference_id mariadb-5552-release-notes
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:50:08Z/
url https://mariadb.com/kb/en/mariadb/mariadb-5552-release-notes/
18
reference_url https://access.redhat.com/errata/RHSA-2016:2130
reference_id RHSA-2016:2130
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2130
19
reference_url http://rhn.redhat.com/errata/RHSA-2016-2130.html
reference_id RHSA-2016-2130.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:50:08Z/
url http://rhn.redhat.com/errata/RHSA-2016-2130.html
20
reference_url https://access.redhat.com/errata/RHSA-2016:2131
reference_id RHSA-2016:2131
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2131
21
reference_url http://rhn.redhat.com/errata/RHSA-2016-2131.html
reference_id RHSA-2016-2131.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:50:08Z/
url http://rhn.redhat.com/errata/RHSA-2016-2131.html
22
reference_url https://access.redhat.com/errata/RHSA-2016:2595
reference_id RHSA-2016:2595
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2595
23
reference_url http://rhn.redhat.com/errata/RHSA-2016-2595.html
reference_id RHSA-2016-2595.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:50:08Z/
url http://rhn.redhat.com/errata/RHSA-2016-2595.html
24
reference_url https://access.redhat.com/errata/RHSA-2016:2749
reference_id RHSA-2016:2749
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2749
25
reference_url http://rhn.redhat.com/errata/RHSA-2016-2749.html
reference_id RHSA-2016-2749.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:50:08Z/
url http://rhn.redhat.com/errata/RHSA-2016-2749.html
26
reference_url https://access.redhat.com/errata/RHSA-2016:2927
reference_id RHSA-2016:2927
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2927
27
reference_url https://access.redhat.com/errata/RHSA-2016:2928
reference_id RHSA-2016:2928
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2928
fixed_packages
aliases CVE-2016-3492
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rted-6vzz-mbcv
6
url VCID-skzt-r7sx-1ucv
vulnerability_id VCID-skzt-r7sx-1ucv
summary
Multiple vulnerabilities have been found in MariaDB and MySQL, the
    worst of which could lead to the remote execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-6662.json
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-6662.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-6662
reference_id
reference_type
scores
0
value 0.89577
scoring_system epss
scoring_elements 0.99554
published_at 2026-04-04T12:55:00Z
1
value 0.89577
scoring_system epss
scoring_elements 0.99553
published_at 2026-04-02T12:55:00Z
2
value 0.89577
scoring_system epss
scoring_elements 0.99555
published_at 2026-04-07T12:55:00Z
3
value 0.89577
scoring_system epss
scoring_elements 0.99556
published_at 2026-04-12T12:55:00Z
4
value 0.89577
scoring_system epss
scoring_elements 0.99557
published_at 2026-04-13T12:55:00Z
5
value 0.89577
scoring_system epss
scoring_elements 0.99559
published_at 2026-04-16T12:55:00Z
6
value 0.89577
scoring_system epss
scoring_elements 0.9956
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-6662
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6662
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6662
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.5
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:S/C:C/I:C/A:C
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1375198
reference_id 1375198
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1375198
5
reference_url http://legalhackers.com/advisories/MySQL-Exploit-Remote-Root-Code-Execution-Privesc-CVE-2016-6662.html
reference_id CVE-2016-6662
reference_type exploit
scores
url http://legalhackers.com/advisories/MySQL-Exploit-Remote-Root-Code-Execution-Privesc-CVE-2016-6662.html
6
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/40360.py
reference_id CVE-2016-6662
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/40360.py
7
reference_url https://security.gentoo.org/glsa/201701-01
reference_id GLSA-201701-01
reference_type
scores
url https://security.gentoo.org/glsa/201701-01
8
reference_url https://access.redhat.com/errata/RHSA-2016:2058
reference_id RHSA-2016:2058
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2058
9
reference_url https://access.redhat.com/errata/RHSA-2016:2059
reference_id RHSA-2016:2059
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2059
10
reference_url https://access.redhat.com/errata/RHSA-2016:2060
reference_id RHSA-2016:2060
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2060
11
reference_url https://access.redhat.com/errata/RHSA-2016:2061
reference_id RHSA-2016:2061
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2061
12
reference_url https://access.redhat.com/errata/RHSA-2016:2062
reference_id RHSA-2016:2062
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2062
13
reference_url https://access.redhat.com/errata/RHSA-2016:2077
reference_id RHSA-2016:2077
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2077
14
reference_url https://access.redhat.com/errata/RHSA-2016:2130
reference_id RHSA-2016:2130
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2130
15
reference_url https://access.redhat.com/errata/RHSA-2016:2131
reference_id RHSA-2016:2131
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2131
16
reference_url https://access.redhat.com/errata/RHSA-2016:2595
reference_id RHSA-2016:2595
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2595
17
reference_url https://access.redhat.com/errata/RHSA-2016:2749
reference_id RHSA-2016:2749
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2749
18
reference_url https://access.redhat.com/errata/RHSA-2016:2927
reference_id RHSA-2016:2927
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2927
19
reference_url https://access.redhat.com/errata/RHSA-2016:2928
reference_id RHSA-2016:2928
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2928
20
reference_url https://access.redhat.com/errata/RHSA-2017:0184
reference_id RHSA-2017:0184
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:0184
21
reference_url https://usn.ubuntu.com/3078-1/
reference_id USN-3078-1
reference_type
scores
url https://usn.ubuntu.com/3078-1/
fixed_packages
aliases CVE-2016-6662
risk_score 10.0
exploitability 2.0
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-skzt-r7sx-1ucv
7
url VCID-tvdv-3ed5-h3dt
vulnerability_id VCID-tvdv-3ed5-h3dt
summary
Multiple vulnerabilities have been found in MariaDB and MySQL, the
    worst of which could lead to the remote execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5626.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5626.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-5626
reference_id
reference_type
scores
0
value 0.00369
scoring_system epss
scoring_elements 0.58837
published_at 2026-04-16T12:55:00Z
1
value 0.00369
scoring_system epss
scoring_elements 0.58702
published_at 2026-04-01T12:55:00Z
2
value 0.00369
scoring_system epss
scoring_elements 0.58776
published_at 2026-04-02T12:55:00Z
3
value 0.00369
scoring_system epss
scoring_elements 0.58797
published_at 2026-04-04T12:55:00Z
4
value 0.00369
scoring_system epss
scoring_elements 0.58766
published_at 2026-04-07T12:55:00Z
5
value 0.00369
scoring_system epss
scoring_elements 0.58818
published_at 2026-04-08T12:55:00Z
6
value 0.00369
scoring_system epss
scoring_elements 0.58824
published_at 2026-04-12T12:55:00Z
7
value 0.00369
scoring_system epss
scoring_elements 0.58842
published_at 2026-04-18T12:55:00Z
8
value 0.00369
scoring_system epss
scoring_elements 0.58805
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-5626
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3492
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3492
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5584
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5584
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5624
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5624
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5626
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5626
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5629
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5629
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6663
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6663
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7440
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7440
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8283
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8283
10
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
11
reference_url http://www.securitytracker.com/id/1037050
reference_id 1037050
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:36Z/
url http://www.securitytracker.com/id/1037050
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1386568
reference_id 1386568
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1386568
13
reference_url http://www.securityfocus.com/bid/93638
reference_id 93638
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:36Z/
url http://www.securityfocus.com/bid/93638
14
reference_url https://security.gentoo.org/glsa/201701-01
reference_id GLSA-201701-01
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:36Z/
url https://security.gentoo.org/glsa/201701-01
15
reference_url https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/
reference_id mariadb-10028-release-notes
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:36Z/
url https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/
16
reference_url https://mariadb.com/kb/en/mariadb/mariadb-10118-release-notes/
reference_id mariadb-10118-release-notes
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:36Z/
url https://mariadb.com/kb/en/mariadb/mariadb-10118-release-notes/
17
reference_url https://mariadb.com/kb/en/mariadb/mariadb-5552-release-notes/
reference_id mariadb-5552-release-notes
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:36Z/
url https://mariadb.com/kb/en/mariadb/mariadb-5552-release-notes/
18
reference_url https://access.redhat.com/errata/RHSA-2016:2130
reference_id RHSA-2016:2130
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2130
19
reference_url http://rhn.redhat.com/errata/RHSA-2016-2130.html
reference_id RHSA-2016-2130.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:36Z/
url http://rhn.redhat.com/errata/RHSA-2016-2130.html
20
reference_url https://access.redhat.com/errata/RHSA-2016:2131
reference_id RHSA-2016:2131
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2131
21
reference_url http://rhn.redhat.com/errata/RHSA-2016-2131.html
reference_id RHSA-2016-2131.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:36Z/
url http://rhn.redhat.com/errata/RHSA-2016-2131.html
22
reference_url https://access.redhat.com/errata/RHSA-2016:2595
reference_id RHSA-2016:2595
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2595
23
reference_url http://rhn.redhat.com/errata/RHSA-2016-2595.html
reference_id RHSA-2016-2595.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:36Z/
url http://rhn.redhat.com/errata/RHSA-2016-2595.html
24
reference_url https://access.redhat.com/errata/RHSA-2016:2749
reference_id RHSA-2016:2749
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2749
25
reference_url http://rhn.redhat.com/errata/RHSA-2016-2749.html
reference_id RHSA-2016-2749.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:36Z/
url http://rhn.redhat.com/errata/RHSA-2016-2749.html
26
reference_url https://access.redhat.com/errata/RHSA-2016:2927
reference_id RHSA-2016:2927
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2927
27
reference_url https://access.redhat.com/errata/RHSA-2016:2928
reference_id RHSA-2016:2928
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2928
fixed_packages
aliases CVE-2016-5626
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tvdv-3ed5-h3dt
8
url VCID-tyes-eb5w-jqfa
vulnerability_id VCID-tyes-eb5w-jqfa
summary mysql: Incorrect input validation allowing code execution via mysqldump
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5483.json
reference_id
reference_type
scores
0
value 6.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5483.json
1
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1433010
reference_id 1433010
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1433010
3
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-5483
reference_id CVE-2016-5483
reference_type
scores
url https://nvd.nist.gov/vuln/detail/CVE-2016-5483
4
reference_url https://access.redhat.com/errata/RHSA-2016:2131
reference_id RHSA-2016:2131
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2131
5
reference_url https://access.redhat.com/errata/RHSA-2016:2927
reference_id RHSA-2016:2927
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2927
6
reference_url https://access.redhat.com/errata/RHSA-2016:2928
reference_id RHSA-2016:2928
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2928
7
reference_url https://access.redhat.com/errata/RHSA-2017:2192
reference_id RHSA-2017:2192
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:2192
8
reference_url https://access.redhat.com/errata/RHSA-2017:2787
reference_id RHSA-2017:2787
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:2787
9
reference_url https://access.redhat.com/errata/RHSA-2017:2886
reference_id RHSA-2017:2886
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:2886
fixed_packages
aliases CVE-2016-5483
risk_score 2.9
exploitability 0.5
weighted_severity 5.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tyes-eb5w-jqfa
9
url VCID-vh5y-15tw-d7fd
vulnerability_id VCID-vh5y-15tw-d7fd
summary
Multiple vulnerabilities have been found in MariaDB and MySQL, the
    worst of which could lead to the remote execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8283.json
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8283.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-8283
reference_id
reference_type
scores
0
value 0.00361
scoring_system epss
scoring_elements 0.58292
published_at 2026-04-18T12:55:00Z
1
value 0.00361
scoring_system epss
scoring_elements 0.58229
published_at 2026-04-02T12:55:00Z
2
value 0.00361
scoring_system epss
scoring_elements 0.58249
published_at 2026-04-04T12:55:00Z
3
value 0.00361
scoring_system epss
scoring_elements 0.58223
published_at 2026-04-07T12:55:00Z
4
value 0.00361
scoring_system epss
scoring_elements 0.58277
published_at 2026-04-08T12:55:00Z
5
value 0.00361
scoring_system epss
scoring_elements 0.58283
published_at 2026-04-09T12:55:00Z
6
value 0.00361
scoring_system epss
scoring_elements 0.583
published_at 2026-04-11T12:55:00Z
7
value 0.00361
scoring_system epss
scoring_elements 0.58278
published_at 2026-04-12T12:55:00Z
8
value 0.00361
scoring_system epss
scoring_elements 0.58258
published_at 2026-04-13T12:55:00Z
9
value 0.00361
scoring_system epss
scoring_elements 0.5829
published_at 2026-04-16T12:55:00Z
10
value 0.00361
scoring_system epss
scoring_elements 0.58144
published_at 2026-04-01T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-8283
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3492
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3492
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5584
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5584
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5624
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5624
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5626
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5626
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5629
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5629
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6663
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6663
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7440
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7440
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8283
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8283
10
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:P
1
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
11
reference_url http://www.securitytracker.com/id/1037050
reference_id 1037050
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:22Z/
url http://www.securitytracker.com/id/1037050
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1386585
reference_id 1386585
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1386585
13
reference_url http://www.securityfocus.com/bid/93737
reference_id 93737
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:22Z/
url http://www.securityfocus.com/bid/93737
14
reference_url https://security.gentoo.org/glsa/201701-01
reference_id GLSA-201701-01
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:22Z/
url https://security.gentoo.org/glsa/201701-01
15
reference_url https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/
reference_id mariadb-10028-release-notes
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:22Z/
url https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/
16
reference_url https://mariadb.com/kb/en/mariadb/mariadb-10118-release-notes/
reference_id mariadb-10118-release-notes
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:22Z/
url https://mariadb.com/kb/en/mariadb/mariadb-10118-release-notes/
17
reference_url https://mariadb.com/kb/en/mariadb/mariadb-5552-release-notes/
reference_id mariadb-5552-release-notes
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:22Z/
url https://mariadb.com/kb/en/mariadb/mariadb-5552-release-notes/
18
reference_url https://access.redhat.com/errata/RHSA-2016:2130
reference_id RHSA-2016:2130
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2130
19
reference_url http://rhn.redhat.com/errata/RHSA-2016-2130.html
reference_id RHSA-2016-2130.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:22Z/
url http://rhn.redhat.com/errata/RHSA-2016-2130.html
20
reference_url https://access.redhat.com/errata/RHSA-2016:2131
reference_id RHSA-2016:2131
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2131
21
reference_url http://rhn.redhat.com/errata/RHSA-2016-2131.html
reference_id RHSA-2016-2131.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:22Z/
url http://rhn.redhat.com/errata/RHSA-2016-2131.html
22
reference_url https://access.redhat.com/errata/RHSA-2016:2595
reference_id RHSA-2016:2595
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2595
23
reference_url http://rhn.redhat.com/errata/RHSA-2016-2595.html
reference_id RHSA-2016-2595.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:22Z/
url http://rhn.redhat.com/errata/RHSA-2016-2595.html
24
reference_url https://access.redhat.com/errata/RHSA-2016:2749
reference_id RHSA-2016:2749
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2749
25
reference_url http://rhn.redhat.com/errata/RHSA-2016-2749.html
reference_id RHSA-2016-2749.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:22Z/
url http://rhn.redhat.com/errata/RHSA-2016-2749.html
26
reference_url https://access.redhat.com/errata/RHSA-2016:2927
reference_id RHSA-2016:2927
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2927
27
reference_url https://access.redhat.com/errata/RHSA-2016:2928
reference_id RHSA-2016:2928
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2928
fixed_packages
aliases CVE-2016-8283
risk_score 1.9
exploitability 0.5
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vh5y-15tw-d7fd
Fixing_vulnerabilities
Risk_score10.0
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:rpm/redhat/mariadb55-mariadb@5.5.53-1%3Farch=el7