Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/112774?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/112774?format=api", "purl": "pkg:rpm/redhat/mariadb55-mariadb@5.5.53-1?arch=el7", "type": "rpm", "namespace": "redhat", "name": "mariadb55-mariadb", "version": "5.5.53-1", "qualifiers": { "arch": "el7" }, "subpath": "", "is_vulnerable": true, "next_non_vulnerable_version": null, "latest_non_vulnerable_version": null, "affected_by_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/84902?format=api", "vulnerability_id": "VCID-3c35-xvzk-eqdc", "summary": "mysql: race condition while setting stats during MyISAM table repair (CPU Oct 2016)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5616.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5616.json" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:H/Au:S/C:C/I:C/A:C" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1378936", "reference_id": "1378936", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1378936" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:2130", "reference_id": "RHSA-2016:2130", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:2130" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:2131", "reference_id": "RHSA-2016:2131", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:2131" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:2595", "reference_id": "RHSA-2016:2595", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:2595" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:2749", "reference_id": "RHSA-2016:2749", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:2749" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:2927", "reference_id": "RHSA-2016:2927", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:2927" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:2928", "reference_id": "RHSA-2016:2928", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:2928" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0184", "reference_id": "RHSA-2017:0184", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0184" } ], "fixed_packages": [], "aliases": [ "CVE-2016-5616" ], "risk_score": 10.0, "exploitability": "2.0", "weighted_severity": "6.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-3c35-xvzk-eqdc" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/81540?format=api", "vulnerability_id": "VCID-g1pp-9qqg-1beb", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-6663.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-6663.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-6663", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02334", "scoring_system": "epss", "scoring_elements": "0.84802", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02334", "scoring_system": "epss", "scoring_elements": "0.84768", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02334", "scoring_system": "epss", "scoring_elements": "0.84783", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.03137", "scoring_system": "epss", "scoring_elements": "0.86886", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.03137", "scoring_system": "epss", "scoring_elements": "0.86882", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.03137", "scoring_system": "epss", "scoring_elements": "0.86877", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.03137", "scoring_system": "epss", "scoring_elements": "0.86894", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.03137", "scoring_system": "epss", "scoring_elements": "0.86899", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.03137", "scoring_system": "epss", "scoring_elements": "0.86845", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.03137", "scoring_system": "epss", "scoring_elements": "0.86865", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.03137", "scoring_system": "epss", "scoring_elements": "0.86873", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-6663" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3492", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3492" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5584", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5584" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5624", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5624" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5626", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5626" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5629", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5629" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6663", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6663" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7440", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7440" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8283", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8283" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.5", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:H/Au:S/C:P/I:P/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1378936", "reference_id": "1378936", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1378936" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/40678.c", "reference_id": "CVE-2016-6663;CVE-2016-5616", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/40678.c" }, { "reference_url": "https://legalhackers.com/advisories/MySQL-Maria-Percona-PrivEscRace-CVE-2016-6663-5616-Exploit.html", "reference_id": "CVE-2016-6663;CVE-2016-5616", "reference_type": "exploit", "scores": [], "url": "https://legalhackers.com/advisories/MySQL-Maria-Percona-PrivEscRace-CVE-2016-6663-5616-Exploit.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:2130", "reference_id": "RHSA-2016:2130", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:2130" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:2131", "reference_id": "RHSA-2016:2131", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:2131" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:2595", "reference_id": "RHSA-2016:2595", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:2595" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:2749", "reference_id": "RHSA-2016:2749", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:2749" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:2927", "reference_id": "RHSA-2016:2927", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:2927" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:2928", "reference_id": "RHSA-2016:2928", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:2928" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0184", "reference_id": "RHSA-2017:0184", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0184" } ], "fixed_packages": [], "aliases": [ "CVE-2016-6663" ], "risk_score": 10.0, "exploitability": "2.0", "weighted_severity": "6.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-g1pp-9qqg-1beb" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41732?format=api", "vulnerability_id": "VCID-gp4w-bdxg-6kab", "summary": "Multiple vulnerabilities have been found in MariaDB and MySQL, the\n worst of which could lead to the remote execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5629.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5629.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5629", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00501", "scoring_system": "epss", "scoring_elements": "0.66025", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00501", "scoring_system": "epss", "scoring_elements": "0.65913", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00501", "scoring_system": "epss", "scoring_elements": "0.65984", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00501", "scoring_system": "epss", "scoring_elements": "0.6595", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00501", "scoring_system": "epss", "scoring_elements": "0.66001", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00501", "scoring_system": "epss", "scoring_elements": "0.66013", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00501", "scoring_system": "epss", "scoring_elements": "0.66032", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00501", "scoring_system": "epss", "scoring_elements": "0.66019", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00501", "scoring_system": "epss", "scoring_elements": "0.65989", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00501", "scoring_system": "epss", "scoring_elements": "0.66024", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00501", "scoring_system": "epss", "scoring_elements": "0.66038", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00501", "scoring_system": "epss", "scoring_elements": "0.65954", "published_at": "2026-04-02T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5629" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3492", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3492" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5584", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5584" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5624", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5624" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5626", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5626" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5629", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5629" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6663", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6663" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7440", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7440" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8283", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8283" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:S/C:N/I:N/A:P" }, { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "http://www.securitytracker.com/id/1037050", "reference_id": "1037050", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:33Z/" } ], "url": "http://www.securitytracker.com/id/1037050" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1386572", "reference_id": "1386572", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1386572" }, { "reference_url": "http://www.securityfocus.com/bid/93668", "reference_id": "93668", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:33Z/" } ], "url": "http://www.securityfocus.com/bid/93668" }, { "reference_url": "https://security.gentoo.org/glsa/201701-01", "reference_id": "GLSA-201701-01", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:33Z/" } ], "url": "https://security.gentoo.org/glsa/201701-01" }, { "reference_url": "https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/", "reference_id": "mariadb-10028-release-notes", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:33Z/" } ], "url": "https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/" }, { "reference_url": "https://mariadb.com/kb/en/mariadb/mariadb-10118-release-notes/", "reference_id": "mariadb-10118-release-notes", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:33Z/" } ], "url": "https://mariadb.com/kb/en/mariadb/mariadb-10118-release-notes/" }, { "reference_url": "https://mariadb.com/kb/en/mariadb/mariadb-5552-release-notes/", "reference_id": "mariadb-5552-release-notes", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:33Z/" } ], "url": "https://mariadb.com/kb/en/mariadb/mariadb-5552-release-notes/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:2130", "reference_id": "RHSA-2016:2130", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:2130" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-2130.html", "reference_id": "RHSA-2016-2130.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:33Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2016-2130.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:2131", "reference_id": "RHSA-2016:2131", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:2131" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-2131.html", "reference_id": "RHSA-2016-2131.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:33Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2016-2131.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:2595", "reference_id": "RHSA-2016:2595", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:2595" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-2595.html", "reference_id": "RHSA-2016-2595.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:33Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2016-2595.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:2749", "reference_id": "RHSA-2016:2749", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:2749" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-2749.html", "reference_id": "RHSA-2016-2749.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:33Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2016-2749.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:2927", "reference_id": "RHSA-2016:2927", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:2927" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:2928", "reference_id": "RHSA-2016:2928", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:2928" } ], "fixed_packages": [], "aliases": [ "CVE-2016-5629" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-gp4w-bdxg-6kab" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41727?format=api", "vulnerability_id": "VCID-gyjy-c8wc-qubd", "summary": "Multiple vulnerabilities have been found in MariaDB and MySQL, the\n worst of which could lead to the remote execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5612.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5612.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5612", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00712", "scoring_system": "epss", "scoring_elements": "0.72299", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00712", "scoring_system": "epss", "scoring_elements": "0.72217", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00712", "scoring_system": "epss", "scoring_elements": "0.72273", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00712", "scoring_system": "epss", "scoring_elements": "0.7226", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00712", "scoring_system": "epss", "scoring_elements": "0.72302", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00712", "scoring_system": "epss", "scoring_elements": "0.72311", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00712", "scoring_system": "epss", "scoring_elements": "0.72222", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00712", "scoring_system": "epss", "scoring_elements": "0.72242", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00712", "scoring_system": "epss", "scoring_elements": "0.72218", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00712", "scoring_system": "epss", "scoring_elements": "0.72255", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00712", "scoring_system": "epss", "scoring_elements": "0.72267", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00712", "scoring_system": "epss", "scoring_elements": "0.72289", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5612" }, { "reference_url": "http://www.securitytracker.com/id/1037050", "reference_id": "1037050", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:48Z/" } ], "url": "http://www.securitytracker.com/id/1037050" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1386561", "reference_id": "1386561", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1386561" }, { "reference_url": "http://www.securityfocus.com/bid/93630", "reference_id": "93630", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:48Z/" } ], "url": "http://www.securityfocus.com/bid/93630" }, { "reference_url": "https://security.gentoo.org/glsa/201701-01", "reference_id": "GLSA-201701-01", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:48Z/" } ], "url": "https://security.gentoo.org/glsa/201701-01" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:1601", "reference_id": "RHSA-2016:1601", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:1601" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:2130", "reference_id": "RHSA-2016:2130", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:2130" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-2130.html", "reference_id": "RHSA-2016-2130.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:48Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2016-2130.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:2131", "reference_id": "RHSA-2016:2131", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:2131" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-2131.html", "reference_id": "RHSA-2016-2131.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:48Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2016-2131.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:2595", "reference_id": "RHSA-2016:2595", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:2595" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-2595.html", "reference_id": "RHSA-2016-2595.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:48Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2016-2595.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:2927", "reference_id": "RHSA-2016:2927", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:2927" } ], "fixed_packages": [], "aliases": [ "CVE-2016-5612" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-gyjy-c8wc-qubd" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/81539?format=api", "vulnerability_id": "VCID-mfgg-7s54-gqg8", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5624.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5624.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5624", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0069", "scoring_system": "epss", "scoring_elements": "0.71806", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0069", "scoring_system": "epss", "scoring_elements": "0.71734", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0069", "scoring_system": "epss", "scoring_elements": "0.71735", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0069", "scoring_system": "epss", "scoring_elements": "0.71774", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0069", "scoring_system": "epss", "scoring_elements": "0.71785", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0069", "scoring_system": "epss", "scoring_elements": "0.71809", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0069", "scoring_system": "epss", "scoring_elements": "0.71792", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0069", "scoring_system": "epss", "scoring_elements": "0.71775", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0069", "scoring_system": "epss", "scoring_elements": "0.71817", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0069", "scoring_system": "epss", "scoring_elements": "0.71823", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0069", "scoring_system": "epss", "scoring_elements": "0.71741", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0069", "scoring_system": "epss", "scoring_elements": "0.7176", "published_at": "2026-04-04T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5624" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3492", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3492" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5584", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5584" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5624", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5624" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5626", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5626" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5629", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5629" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6663", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6663" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7440", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7440" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8283", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8283" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:S/C:N/I:N/A:P" }, { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "http://www.securitytracker.com/id/1037050", "reference_id": "1037050", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:38Z/" } ], "url": "http://www.securitytracker.com/id/1037050" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1386566", "reference_id": "1386566", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1386566" }, { "reference_url": "http://www.securityfocus.com/bid/93635", "reference_id": "93635", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:38Z/" } ], "url": "http://www.securityfocus.com/bid/93635" }, { "reference_url": "https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/", "reference_id": "mariadb-10028-release-notes", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:38Z/" } ], "url": "https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/" }, { "reference_url": "https://mariadb.com/kb/en/mariadb/mariadb-10118-release-notes/", "reference_id": "mariadb-10118-release-notes", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:38Z/" } ], "url": "https://mariadb.com/kb/en/mariadb/mariadb-10118-release-notes/" }, { "reference_url": "https://mariadb.com/kb/en/mariadb/mariadb-5552-release-notes/", "reference_id": "mariadb-5552-release-notes", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:38Z/" } ], "url": "https://mariadb.com/kb/en/mariadb/mariadb-5552-release-notes/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:2130", "reference_id": "RHSA-2016:2130", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:2130" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-2130.html", "reference_id": "RHSA-2016-2130.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:38Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2016-2130.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:2131", "reference_id": "RHSA-2016:2131", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:2131" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-2131.html", "reference_id": "RHSA-2016-2131.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:38Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2016-2131.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:2595", "reference_id": "RHSA-2016:2595", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:2595" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-2595.html", "reference_id": "RHSA-2016-2595.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:38Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2016-2595.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:2927", "reference_id": "RHSA-2016:2927", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:2927" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:2928", "reference_id": "RHSA-2016:2928", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:2928" } ], "fixed_packages": [], "aliases": [ "CVE-2016-5624" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-mfgg-7s54-gqg8" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41722?format=api", "vulnerability_id": "VCID-rted-6vzz-mbcv", "summary": "Multiple vulnerabilities have been found in MariaDB and MySQL, the\n worst of which could lead to the remote execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3492.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3492.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-3492", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00566", "scoring_system": "epss", "scoring_elements": "0.68505", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00566", "scoring_system": "epss", "scoring_elements": "0.68427", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00566", "scoring_system": "epss", "scoring_elements": "0.68477", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00566", "scoring_system": "epss", "scoring_elements": "0.68494", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00566", "scoring_system": "epss", "scoring_elements": "0.6852", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00566", "scoring_system": "epss", "scoring_elements": "0.68508", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00566", "scoring_system": "epss", "scoring_elements": "0.68475", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00566", "scoring_system": "epss", "scoring_elements": "0.68513", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00566", "scoring_system": "epss", "scoring_elements": "0.68526", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00566", "scoring_system": "epss", "scoring_elements": "0.68412", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00566", "scoring_system": "epss", "scoring_elements": "0.68431", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00566", "scoring_system": "epss", "scoring_elements": "0.68451", "published_at": "2026-04-04T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-3492" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3492", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3492" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5584", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5584" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5624", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5624" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5626", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5626" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5629", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5629" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6663", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6663" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7440", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7440" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8283", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8283" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:S/C:N/I:N/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "http://www.securitytracker.com/id/1037050", "reference_id": "1037050", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:50:08Z/" } ], "url": "http://www.securitytracker.com/id/1037050" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1386554", "reference_id": "1386554", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1386554" }, { "reference_url": "http://www.securityfocus.com/bid/93650", "reference_id": "93650", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:50:08Z/" } ], "url": "http://www.securityfocus.com/bid/93650" }, { "reference_url": "https://security.gentoo.org/glsa/201701-01", "reference_id": "GLSA-201701-01", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:50:08Z/" } ], "url": "https://security.gentoo.org/glsa/201701-01" }, { "reference_url": "https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/", "reference_id": "mariadb-10028-release-notes", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:50:08Z/" } ], "url": "https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/" }, { "reference_url": "https://mariadb.com/kb/en/mariadb/mariadb-10118-release-notes/", "reference_id": "mariadb-10118-release-notes", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:50:08Z/" } ], "url": "https://mariadb.com/kb/en/mariadb/mariadb-10118-release-notes/" }, { "reference_url": "https://mariadb.com/kb/en/mariadb/mariadb-5552-release-notes/", "reference_id": "mariadb-5552-release-notes", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:50:08Z/" } ], "url": "https://mariadb.com/kb/en/mariadb/mariadb-5552-release-notes/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:2130", "reference_id": "RHSA-2016:2130", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:2130" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-2130.html", "reference_id": "RHSA-2016-2130.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:50:08Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2016-2130.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:2131", "reference_id": "RHSA-2016:2131", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:2131" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-2131.html", "reference_id": "RHSA-2016-2131.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:50:08Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2016-2131.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:2595", "reference_id": "RHSA-2016:2595", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:2595" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-2595.html", "reference_id": "RHSA-2016-2595.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:50:08Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2016-2595.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:2749", "reference_id": "RHSA-2016:2749", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:2749" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-2749.html", "reference_id": "RHSA-2016-2749.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:50:08Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2016-2749.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:2927", "reference_id": "RHSA-2016:2927", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:2927" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:2928", "reference_id": "RHSA-2016:2928", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:2928" } ], "fixed_packages": [], "aliases": [ "CVE-2016-3492" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-rted-6vzz-mbcv" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41740?format=api", "vulnerability_id": "VCID-skzt-r7sx-1ucv", "summary": "Multiple vulnerabilities have been found in MariaDB and MySQL, the\n worst of which could lead to the remote execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-6662.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-6662.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-6662", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.89577", "scoring_system": "epss", "scoring_elements": "0.99554", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.89577", "scoring_system": "epss", "scoring_elements": "0.99553", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.89577", "scoring_system": "epss", "scoring_elements": "0.99555", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.89577", "scoring_system": "epss", "scoring_elements": "0.99556", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.89577", "scoring_system": "epss", "scoring_elements": "0.99557", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.89577", "scoring_system": "epss", "scoring_elements": "0.99559", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.89577", "scoring_system": "epss", "scoring_elements": "0.9956", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-6662" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6662", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6662" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.5", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:S/C:C/I:C/A:C" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1375198", "reference_id": "1375198", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1375198" }, { "reference_url": "http://legalhackers.com/advisories/MySQL-Exploit-Remote-Root-Code-Execution-Privesc-CVE-2016-6662.html", "reference_id": "CVE-2016-6662", "reference_type": "exploit", "scores": [], "url": "http://legalhackers.com/advisories/MySQL-Exploit-Remote-Root-Code-Execution-Privesc-CVE-2016-6662.html" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/40360.py", "reference_id": "CVE-2016-6662", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/40360.py" }, { "reference_url": "https://security.gentoo.org/glsa/201701-01", "reference_id": "GLSA-201701-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201701-01" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:2058", "reference_id": "RHSA-2016:2058", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:2058" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:2059", "reference_id": "RHSA-2016:2059", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:2059" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:2060", "reference_id": "RHSA-2016:2060", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:2060" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:2061", "reference_id": "RHSA-2016:2061", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:2061" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:2062", "reference_id": "RHSA-2016:2062", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:2062" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:2077", "reference_id": "RHSA-2016:2077", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:2077" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:2130", "reference_id": "RHSA-2016:2130", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:2130" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:2131", "reference_id": "RHSA-2016:2131", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:2131" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:2595", "reference_id": "RHSA-2016:2595", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:2595" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:2749", "reference_id": "RHSA-2016:2749", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:2749" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:2927", "reference_id": "RHSA-2016:2927", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:2927" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:2928", "reference_id": "RHSA-2016:2928", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:2928" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0184", "reference_id": "RHSA-2017:0184", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0184" }, { "reference_url": "https://usn.ubuntu.com/3078-1/", "reference_id": "USN-3078-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3078-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2016-6662" ], "risk_score": 10.0, "exploitability": "2.0", "weighted_severity": "8.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-skzt-r7sx-1ucv" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41729?format=api", "vulnerability_id": "VCID-tvdv-3ed5-h3dt", "summary": "Multiple vulnerabilities have been found in MariaDB and MySQL, the\n worst of which could lead to the remote execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5626.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5626.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5626", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00369", "scoring_system": "epss", "scoring_elements": "0.58837", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00369", "scoring_system": "epss", "scoring_elements": "0.58702", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00369", "scoring_system": "epss", "scoring_elements": "0.58776", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00369", "scoring_system": "epss", "scoring_elements": "0.58797", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00369", "scoring_system": "epss", "scoring_elements": "0.58766", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00369", "scoring_system": "epss", "scoring_elements": "0.58818", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00369", "scoring_system": "epss", "scoring_elements": "0.58824", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00369", "scoring_system": "epss", "scoring_elements": "0.58842", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00369", "scoring_system": "epss", "scoring_elements": "0.58805", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5626" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3492", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3492" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5584", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5584" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5624", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5624" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5626", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5626" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5629", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5629" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6663", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6663" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7440", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7440" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8283", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8283" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:S/C:N/I:N/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "http://www.securitytracker.com/id/1037050", "reference_id": "1037050", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:36Z/" } ], "url": "http://www.securitytracker.com/id/1037050" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1386568", "reference_id": "1386568", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1386568" }, { "reference_url": "http://www.securityfocus.com/bid/93638", "reference_id": "93638", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:36Z/" } ], "url": "http://www.securityfocus.com/bid/93638" }, { "reference_url": "https://security.gentoo.org/glsa/201701-01", "reference_id": "GLSA-201701-01", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:36Z/" } ], "url": "https://security.gentoo.org/glsa/201701-01" }, { "reference_url": "https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/", "reference_id": "mariadb-10028-release-notes", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:36Z/" } ], "url": "https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/" }, { "reference_url": "https://mariadb.com/kb/en/mariadb/mariadb-10118-release-notes/", "reference_id": "mariadb-10118-release-notes", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:36Z/" } ], "url": "https://mariadb.com/kb/en/mariadb/mariadb-10118-release-notes/" }, { "reference_url": "https://mariadb.com/kb/en/mariadb/mariadb-5552-release-notes/", "reference_id": "mariadb-5552-release-notes", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:36Z/" } ], "url": "https://mariadb.com/kb/en/mariadb/mariadb-5552-release-notes/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:2130", "reference_id": "RHSA-2016:2130", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:2130" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-2130.html", "reference_id": "RHSA-2016-2130.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:36Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2016-2130.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:2131", "reference_id": "RHSA-2016:2131", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:2131" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-2131.html", "reference_id": "RHSA-2016-2131.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:36Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2016-2131.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:2595", "reference_id": "RHSA-2016:2595", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:2595" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-2595.html", "reference_id": "RHSA-2016-2595.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:36Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2016-2595.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:2749", "reference_id": "RHSA-2016:2749", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:2749" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-2749.html", "reference_id": "RHSA-2016-2749.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:36Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2016-2749.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:2927", "reference_id": "RHSA-2016:2927", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:2927" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:2928", "reference_id": "RHSA-2016:2928", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:2928" } ], "fixed_packages": [], "aliases": [ "CVE-2016-5626" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-tvdv-3ed5-h3dt" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/84528?format=api", "vulnerability_id": "VCID-tyes-eb5w-jqfa", "summary": "mysql: Incorrect input validation allowing code execution via mysqldump", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5483.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.4", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5483.json" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1433010", "reference_id": "1433010", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1433010" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-5483", "reference_id": "CVE-2016-5483", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-5483" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:2131", "reference_id": "RHSA-2016:2131", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:2131" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:2927", "reference_id": "RHSA-2016:2927", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:2927" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:2928", "reference_id": "RHSA-2016:2928", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:2928" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:2192", "reference_id": "RHSA-2017:2192", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:2192" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:2787", "reference_id": "RHSA-2017:2787", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:2787" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:2886", "reference_id": "RHSA-2017:2886", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:2886" } ], "fixed_packages": [], "aliases": [ "CVE-2016-5483" ], "risk_score": 2.9, "exploitability": "0.5", "weighted_severity": "5.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-tyes-eb5w-jqfa" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41741?format=api", "vulnerability_id": "VCID-vh5y-15tw-d7fd", "summary": "Multiple vulnerabilities have been found in MariaDB and MySQL, the\n worst of which could lead to the remote execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8283.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8283.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-8283", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00361", "scoring_system": "epss", "scoring_elements": "0.58269", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00361", "scoring_system": "epss", "scoring_elements": "0.58144", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00361", "scoring_system": "epss", "scoring_elements": "0.58249", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00361", "scoring_system": "epss", "scoring_elements": "0.58223", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00361", "scoring_system": "epss", "scoring_elements": "0.58277", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00361", "scoring_system": "epss", "scoring_elements": "0.58283", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00361", "scoring_system": "epss", "scoring_elements": "0.583", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00361", "scoring_system": "epss", "scoring_elements": "0.58278", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00361", "scoring_system": "epss", "scoring_elements": "0.58258", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00361", "scoring_system": "epss", "scoring_elements": "0.5829", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00361", "scoring_system": "epss", "scoring_elements": "0.58292", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00361", "scoring_system": "epss", "scoring_elements": "0.58229", "published_at": "2026-04-02T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-8283" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3492", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3492" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5584", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5584" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5624", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5624" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5626", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5626" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5629", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5629" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6663", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6663" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7440", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7440" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8283", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8283" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:S/C:N/I:N/A:P" }, { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "http://www.securitytracker.com/id/1037050", "reference_id": "1037050", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:22Z/" } ], "url": "http://www.securitytracker.com/id/1037050" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1386585", "reference_id": "1386585", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1386585" }, { "reference_url": "http://www.securityfocus.com/bid/93737", "reference_id": "93737", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:22Z/" } ], "url": "http://www.securityfocus.com/bid/93737" }, { "reference_url": "https://security.gentoo.org/glsa/201701-01", "reference_id": "GLSA-201701-01", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:22Z/" } ], "url": "https://security.gentoo.org/glsa/201701-01" }, { "reference_url": "https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/", "reference_id": "mariadb-10028-release-notes", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:22Z/" } ], "url": "https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/" }, { "reference_url": "https://mariadb.com/kb/en/mariadb/mariadb-10118-release-notes/", "reference_id": "mariadb-10118-release-notes", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:22Z/" } ], "url": "https://mariadb.com/kb/en/mariadb/mariadb-10118-release-notes/" }, { "reference_url": "https://mariadb.com/kb/en/mariadb/mariadb-5552-release-notes/", "reference_id": "mariadb-5552-release-notes", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:22Z/" } ], "url": "https://mariadb.com/kb/en/mariadb/mariadb-5552-release-notes/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:2130", "reference_id": "RHSA-2016:2130", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:2130" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-2130.html", "reference_id": "RHSA-2016-2130.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:22Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2016-2130.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:2131", "reference_id": "RHSA-2016:2131", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:2131" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-2131.html", "reference_id": "RHSA-2016-2131.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:22Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2016-2131.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:2595", "reference_id": "RHSA-2016:2595", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:2595" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-2595.html", "reference_id": "RHSA-2016-2595.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:22Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2016-2595.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:2749", "reference_id": "RHSA-2016:2749", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:2749" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-2749.html", "reference_id": "RHSA-2016-2749.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:22Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2016-2749.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:2927", "reference_id": "RHSA-2016:2927", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:2927" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:2928", "reference_id": "RHSA-2016:2928", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:2928" } ], "fixed_packages": [], "aliases": [ "CVE-2016-8283" ], "risk_score": 1.9, "exploitability": "0.5", "weighted_severity": "3.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vh5y-15tw-d7fd" } ], "fixing_vulnerabilities": [], "risk_score": "10.0", "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/mariadb55-mariadb@5.5.53-1%3Farch=el7" }