Lookup for vulnerable packages by Package URL.

Purlpkg:rpm/redhat/rh-mariadb100-mariadb@1:10.0.25-4?arch=el7
Typerpm
Namespaceredhat
Namerh-mariadb100-mariadb
Version1:10.0.25-4
Qualifiers
arch el7
Subpath
Is_vulnerabletrue
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
0
url VCID-1rdp-4637-tfh7
vulnerability_id VCID-1rdp-4637-tfh7
summary
Multiple vulnerabilities have been found in libpcre, the worst of
    which could lead to arbitrary code execution, or cause a Denial of Service
    condition.
references
0
reference_url http://rhn.redhat.com/errata/RHSA-2016-1025.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-1025.html
1
reference_url http://rhn.redhat.com/errata/RHSA-2016-2750.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-2750.html
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8388.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8388.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-8388
reference_id
reference_type
scores
0
value 0.04176
scoring_system epss
scoring_elements 0.8871
published_at 2026-04-21T12:55:00Z
1
value 0.04176
scoring_system epss
scoring_elements 0.88645
published_at 2026-04-01T12:55:00Z
2
value 0.04176
scoring_system epss
scoring_elements 0.88654
published_at 2026-04-02T12:55:00Z
3
value 0.04176
scoring_system epss
scoring_elements 0.88671
published_at 2026-04-07T12:55:00Z
4
value 0.04176
scoring_system epss
scoring_elements 0.88689
published_at 2026-04-08T12:55:00Z
5
value 0.04176
scoring_system epss
scoring_elements 0.88695
published_at 2026-04-09T12:55:00Z
6
value 0.04176
scoring_system epss
scoring_elements 0.88707
published_at 2026-04-11T12:55:00Z
7
value 0.04176
scoring_system epss
scoring_elements 0.887
published_at 2026-04-12T12:55:00Z
8
value 0.04176
scoring_system epss
scoring_elements 0.88701
published_at 2026-04-13T12:55:00Z
9
value 0.04176
scoring_system epss
scoring_elements 0.88714
published_at 2026-04-16T12:55:00Z
10
value 0.04176
scoring_system epss
scoring_elements 0.88711
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-8388
4
reference_url https://bto.bluecoat.com/security-advisory/sa128
reference_id
reference_type
scores
url https://bto.bluecoat.com/security-advisory/sa128
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8388
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8388
6
reference_url http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup
reference_id
reference_type
scores
url http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup
7
reference_url http://www-01.ibm.com/support/docview.wss?uid=isg3T1023886
reference_id
reference_type
scores
url http://www-01.ibm.com/support/docview.wss?uid=isg3T1023886
8
reference_url http://www.openwall.com/lists/oss-security/2015/11/29/1
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2015/11/29/1
9
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
10
reference_url http://www.securityfocus.com/bid/85576
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/85576
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1237223
reference_id 1237223
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1237223
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:perl_compatible_regular_expression_library:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pcre:perl_compatible_regular_expression_library:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:perl_compatible_regular_expression_library:*:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-8388
reference_id CVE-2015-8388
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2015-8388
15
reference_url https://security.gentoo.org/glsa/201607-02
reference_id GLSA-201607-02
reference_type
scores
url https://security.gentoo.org/glsa/201607-02
16
reference_url https://access.redhat.com/errata/RHSA-2016:1025
reference_id RHSA-2016:1025
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1025
17
reference_url https://access.redhat.com/errata/RHSA-2016:1132
reference_id RHSA-2016:1132
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1132
18
reference_url https://access.redhat.com/errata/RHSA-2016:2750
reference_id RHSA-2016:2750
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2750
19
reference_url https://usn.ubuntu.com/2943-1/
reference_id USN-2943-1
reference_type
scores
url https://usn.ubuntu.com/2943-1/
fixed_packages
aliases CVE-2015-8388
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1rdp-4637-tfh7
1
url VCID-2jer-ss8p-7kbg
vulnerability_id VCID-2jer-ss8p-7kbg
summary security update
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:27Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:27Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:27Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:27Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:27Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:27Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html
6
reference_url http://rhn.redhat.com/errata/RHSA-2016-0534.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:27Z/
url http://rhn.redhat.com/errata/RHSA-2016-0534.html
7
reference_url http://rhn.redhat.com/errata/RHSA-2016-0705.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:27Z/
url http://rhn.redhat.com/errata/RHSA-2016-0705.html
8
reference_url http://rhn.redhat.com/errata/RHSA-2016-1480.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:27Z/
url http://rhn.redhat.com/errata/RHSA-2016-1480.html
9
reference_url http://rhn.redhat.com/errata/RHSA-2016-1481.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:27Z/
url http://rhn.redhat.com/errata/RHSA-2016-1481.html
10
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0642.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0642.json
11
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-0642
reference_id
reference_type
scores
0
value 0.00377
scoring_system epss
scoring_elements 0.59151
published_at 2026-04-01T12:55:00Z
1
value 0.00377
scoring_system epss
scoring_elements 0.59213
published_at 2026-04-07T12:55:00Z
2
value 0.00377
scoring_system epss
scoring_elements 0.59266
published_at 2026-04-08T12:55:00Z
3
value 0.00377
scoring_system epss
scoring_elements 0.59279
published_at 2026-04-09T12:55:00Z
4
value 0.00377
scoring_system epss
scoring_elements 0.59299
published_at 2026-04-11T12:55:00Z
5
value 0.00377
scoring_system epss
scoring_elements 0.59282
published_at 2026-04-12T12:55:00Z
6
value 0.00377
scoring_system epss
scoring_elements 0.59264
published_at 2026-04-13T12:55:00Z
7
value 0.00377
scoring_system epss
scoring_elements 0.59301
published_at 2026-04-16T12:55:00Z
8
value 0.00377
scoring_system epss
scoring_elements 0.59308
published_at 2026-04-18T12:55:00Z
9
value 0.00377
scoring_system epss
scoring_elements 0.5929
published_at 2026-04-21T12:55:00Z
10
value 0.00377
scoring_system epss
scoring_elements 0.59225
published_at 2026-04-02T12:55:00Z
11
value 0.00377
scoring_system epss
scoring_elements 0.59249
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-0642
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0640
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0640
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0641
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0641
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0642
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0642
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0643
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0643
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0644
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0644
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0646
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0646
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0647
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0647
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0648
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0648
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0649
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0649
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0650
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0650
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0666
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0666
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2047
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2047
24
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv2
scoring_elements AV:L/AC:H/Au:M/C:N/I:P/A:C
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
25
reference_url http://www.debian.org/security/2016/dsa-3557
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:27Z/
url http://www.debian.org/security/2016/dsa-3557
26
reference_url http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:27Z/
url http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
27
reference_url http://www.securityfocus.com/bid/86445
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:27Z/
url http://www.securityfocus.com/bid/86445
28
reference_url http://www.securitytracker.com/id/1035606
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:27Z/
url http://www.securitytracker.com/id/1035606
29
reference_url http://www.ubuntu.com/usn/USN-2953-1
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:27Z/
url http://www.ubuntu.com/usn/USN-2953-1
30
reference_url http://www.ubuntu.com/usn/USN-2954-1
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:27Z/
url http://www.ubuntu.com/usn/USN-2954-1
31
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1329243
reference_id 1329243
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1329243
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp4:*:*:*:*:*:*
reference_id cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp4:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:12:-:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_desktop:12:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:12:-:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:12:sp1:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_desktop:12:sp1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:12:sp1:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp4:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:11:sp4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp4:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:12:-:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:12:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:12:-:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:12:sp1:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:12:sp1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:12:sp1:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp4:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp4:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:-:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:-:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:sp1:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:sp1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:sp1:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_workstation_extension:12:*:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_workstation_extension:12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_workstation_extension:12:*:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_workstation_extension:12:sp1:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_workstation_extension:12:sp1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_workstation_extension:12:sp1:*:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-0642
reference_id CVE-2016-0642
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:M/C:N/I:P/A:P
1
value 4.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2016-0642
71
reference_url https://access.redhat.com/errata/RHSA-2016:0534
reference_id RHSA-2016:0534
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0534
72
reference_url https://access.redhat.com/errata/RHSA-2016:0705
reference_id RHSA-2016:0705
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0705
73
reference_url https://access.redhat.com/errata/RHSA-2016:1132
reference_id RHSA-2016:1132
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:27Z/
url https://access.redhat.com/errata/RHSA-2016:1132
74
reference_url https://access.redhat.com/errata/RHSA-2016:1480
reference_id RHSA-2016:1480
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1480
75
reference_url https://access.redhat.com/errata/RHSA-2016:1481
reference_id RHSA-2016:1481
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1481
76
reference_url https://usn.ubuntu.com/2953-1/
reference_id USN-2953-1
reference_type
scores
url https://usn.ubuntu.com/2953-1/
77
reference_url https://usn.ubuntu.com/2954-1/
reference_id USN-2954-1
reference_type
scores
url https://usn.ubuntu.com/2954-1/
fixed_packages
aliases CVE-2016-0642
risk_score 2.1
exploitability 0.5
weighted_severity 4.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2jer-ss8p-7kbg
2
url VCID-2vp1-j324-dkat
vulnerability_id VCID-2vp1-j324-dkat
summary security update
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:58:48Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:58:48Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:58:48Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:58:48Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:58:48Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:58:48Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html
6
reference_url http://rhn.redhat.com/errata/RHSA-2016-0705.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:58:48Z/
url http://rhn.redhat.com/errata/RHSA-2016-0705.html
7
reference_url http://rhn.redhat.com/errata/RHSA-2016-1480.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:58:48Z/
url http://rhn.redhat.com/errata/RHSA-2016-1480.html
8
reference_url http://rhn.redhat.com/errata/RHSA-2016-1481.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:58:48Z/
url http://rhn.redhat.com/errata/RHSA-2016-1481.html
9
reference_url http://rhn.redhat.com/errata/RHSA-2016-1602.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:58:48Z/
url http://rhn.redhat.com/errata/RHSA-2016-1602.html
10
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0666.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0666.json
11
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-0666
reference_id
reference_type
scores
0
value 0.00243
scoring_system epss
scoring_elements 0.47524
published_at 2026-04-21T12:55:00Z
1
value 0.00243
scoring_system epss
scoring_elements 0.47494
published_at 2026-04-02T12:55:00Z
2
value 0.00243
scoring_system epss
scoring_elements 0.47515
published_at 2026-04-09T12:55:00Z
3
value 0.00243
scoring_system epss
scoring_elements 0.47518
published_at 2026-04-08T12:55:00Z
4
value 0.00243
scoring_system epss
scoring_elements 0.47537
published_at 2026-04-11T12:55:00Z
5
value 0.00243
scoring_system epss
scoring_elements 0.47513
published_at 2026-04-12T12:55:00Z
6
value 0.00243
scoring_system epss
scoring_elements 0.47521
published_at 2026-04-13T12:55:00Z
7
value 0.00243
scoring_system epss
scoring_elements 0.4758
published_at 2026-04-16T12:55:00Z
8
value 0.00243
scoring_system epss
scoring_elements 0.47573
published_at 2026-04-18T12:55:00Z
9
value 0.00243
scoring_system epss
scoring_elements 0.47464
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-0666
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0640
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0640
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0641
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0641
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0642
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0642
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0643
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0643
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0644
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0644
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0646
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0646
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0647
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0647
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0648
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0648
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0649
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0649
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0650
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0650
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0655
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0655
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0666
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0666
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0668
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0668
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2047
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2047
26
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.6
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:S/C:N/I:N/A:C
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
27
reference_url https://mariadb.com/kb/en/mariadb/mariadb-10025-release-notes/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:58:48Z/
url https://mariadb.com/kb/en/mariadb/mariadb-10025-release-notes/
28
reference_url https://mariadb.com/kb/en/mariadb/mariadb-10114-release-notes/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:58:48Z/
url https://mariadb.com/kb/en/mariadb/mariadb-10114-release-notes/
29
reference_url https://mariadb.com/kb/en/mariadb/mariadb-5549-release-notes/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:58:48Z/
url https://mariadb.com/kb/en/mariadb/mariadb-5549-release-notes/
30
reference_url http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:58:48Z/
url http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168
31
reference_url http://www.debian.org/security/2016/dsa-3557
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:58:48Z/
url http://www.debian.org/security/2016/dsa-3557
32
reference_url http://www.debian.org/security/2016/dsa-3595
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:58:48Z/
url http://www.debian.org/security/2016/dsa-3595
33
reference_url http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:58:48Z/
url http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
34
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:58:48Z/
url http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
35
reference_url http://www.securityfocus.com/bid/86509
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:58:48Z/
url http://www.securityfocus.com/bid/86509
36
reference_url http://www.securitytracker.com/id/1035606
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:58:48Z/
url http://www.securitytracker.com/id/1035606
37
reference_url http://www.ubuntu.com/usn/USN-2953-1
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:58:48Z/
url http://www.ubuntu.com/usn/USN-2953-1
38
reference_url http://www.ubuntu.com/usn/USN-2954-1
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:58:48Z/
url http://www.ubuntu.com/usn/USN-2954-1
39
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1329270
reference_id 1329270
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1329270
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:powerkvm:2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ibm:powerkvm:2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:powerkvm:2.1:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:powerkvm:3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ibm:powerkvm:3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:powerkvm:3.1:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-0666
reference_id CVE-2016-0666
reference_type
scores
0
value 3.5
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:S/C:N/I:N/A:P
1
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2016-0666
50
reference_url https://access.redhat.com/errata/RHSA-2016:0705
reference_id RHSA-2016:0705
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0705
51
reference_url https://access.redhat.com/errata/RHSA-2016:1132
reference_id RHSA-2016:1132
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:58:48Z/
url https://access.redhat.com/errata/RHSA-2016:1132
52
reference_url https://access.redhat.com/errata/RHSA-2016:1480
reference_id RHSA-2016:1480
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1480
53
reference_url https://access.redhat.com/errata/RHSA-2016:1481
reference_id RHSA-2016:1481
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1481
54
reference_url https://access.redhat.com/errata/RHSA-2016:1602
reference_id RHSA-2016:1602
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1602
55
reference_url https://usn.ubuntu.com/2953-1/
reference_id USN-2953-1
reference_type
scores
url https://usn.ubuntu.com/2953-1/
56
reference_url https://usn.ubuntu.com/2954-1/
reference_id USN-2954-1
reference_type
scores
url https://usn.ubuntu.com/2954-1/
fixed_packages
aliases CVE-2016-0666
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2vp1-j324-dkat
3
url VCID-3fnd-29cd-2bhu
vulnerability_id VCID-3fnd-29cd-2bhu
summary security update
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:58:44Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:58:44Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:58:44Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:58:44Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:58:44Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html
5
reference_url http://rhn.redhat.com/errata/RHSA-2016-0705.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:58:44Z/
url http://rhn.redhat.com/errata/RHSA-2016-0705.html
6
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0668.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0668.json
7
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-0668
reference_id
reference_type
scores
0
value 0.00357
scoring_system epss
scoring_elements 0.58006
published_at 2026-04-21T12:55:00Z
1
value 0.00357
scoring_system epss
scoring_elements 0.57991
published_at 2026-04-04T12:55:00Z
2
value 0.00357
scoring_system epss
scoring_elements 0.57967
published_at 2026-04-07T12:55:00Z
3
value 0.00357
scoring_system epss
scoring_elements 0.58023
published_at 2026-04-08T12:55:00Z
4
value 0.00357
scoring_system epss
scoring_elements 0.58025
published_at 2026-04-09T12:55:00Z
5
value 0.00357
scoring_system epss
scoring_elements 0.58042
published_at 2026-04-11T12:55:00Z
6
value 0.00357
scoring_system epss
scoring_elements 0.5802
published_at 2026-04-12T12:55:00Z
7
value 0.00357
scoring_system epss
scoring_elements 0.58
published_at 2026-04-13T12:55:00Z
8
value 0.00357
scoring_system epss
scoring_elements 0.5803
published_at 2026-04-16T12:55:00Z
9
value 0.00357
scoring_system epss
scoring_elements 0.58028
published_at 2026-04-18T12:55:00Z
10
value 0.00357
scoring_system epss
scoring_elements 0.57888
published_at 2026-04-01T12:55:00Z
11
value 0.00357
scoring_system epss
scoring_elements 0.57972
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-0668
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0640
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0640
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0641
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0641
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0643
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0643
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0644
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0644
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0646
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0646
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0647
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0647
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0648
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0648
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0649
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0649
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0650
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0650
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0655
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0655
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0666
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0666
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0668
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0668
20
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv2
scoring_elements AV:L/AC:H/Au:M/C:N/I:N/A:C
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
21
reference_url https://mariadb.com/kb/en/mariadb/mariadb-10024-release-notes/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:58:44Z/
url https://mariadb.com/kb/en/mariadb/mariadb-10024-release-notes/
22
reference_url https://mariadb.com/kb/en/mariadb/mariadb-10112-release-notes/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:58:44Z/
url https://mariadb.com/kb/en/mariadb/mariadb-10112-release-notes/
23
reference_url http://www.debian.org/security/2016/dsa-3595
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:58:44Z/
url http://www.debian.org/security/2016/dsa-3595
24
reference_url http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:58:44Z/
url http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
25
reference_url http://www.securityfocus.com/bid/86467
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:58:44Z/
url http://www.securityfocus.com/bid/86467
26
reference_url http://www.securitytracker.com/id/1035606
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:58:44Z/
url http://www.securitytracker.com/id/1035606
27
reference_url http://www.ubuntu.com/usn/USN-2953-1
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:58:44Z/
url http://www.ubuntu.com/usn/USN-2953-1
28
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1329273
reference_id 1329273
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1329273
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:12:-:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_desktop:12:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:12:-:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:12:sp1:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_desktop:12:sp1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:12:sp1:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:12:-:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:12:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:12:-:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:12:sp1:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:12:sp1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:12:sp1:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:-:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:-:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:sp1:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:sp1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:sp1:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_workstation_extension:12:-:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_workstation_extension:12:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_workstation_extension:12:-:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_workstation_extension:12:sp1:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_workstation_extension:12:sp1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_workstation_extension:12:sp1:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-0668
reference_id CVE-2016-0668
reference_type
scores
0
value 1.7
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:M/C:N/I:N/A:P
1
value 4.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2016-0668
46
reference_url https://access.redhat.com/errata/RHSA-2016:0705
reference_id RHSA-2016:0705
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0705
47
reference_url https://access.redhat.com/errata/RHSA-2016:1132
reference_id RHSA-2016:1132
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:58:44Z/
url https://access.redhat.com/errata/RHSA-2016:1132
48
reference_url https://usn.ubuntu.com/2953-1/
reference_id USN-2953-1
reference_type
scores
url https://usn.ubuntu.com/2953-1/
fixed_packages
aliases CVE-2016-0668
risk_score 1.9
exploitability 0.5
weighted_severity 3.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3fnd-29cd-2bhu
4
url VCID-3qjy-4cen-7qev
vulnerability_id VCID-3qjy-4cen-7qev
summary security update
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00015.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00015.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00016.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00016.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html
6
reference_url http://rhn.redhat.com/errata/RHSA-2016-0534.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0534.html
7
reference_url http://rhn.redhat.com/errata/RHSA-2016-0705.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0705.html
8
reference_url http://rhn.redhat.com/errata/RHSA-2016-1480.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-1480.html
9
reference_url http://rhn.redhat.com/errata/RHSA-2016-1481.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-1481.html
10
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0606.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0606.json
11
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-0606
reference_id
reference_type
scores
0
value 0.00166
scoring_system epss
scoring_elements 0.37721
published_at 2026-04-21T12:55:00Z
1
value 0.00166
scoring_system epss
scoring_elements 0.37781
published_at 2026-04-18T12:55:00Z
2
value 0.00166
scoring_system epss
scoring_elements 0.3765
published_at 2026-04-01T12:55:00Z
3
value 0.00166
scoring_system epss
scoring_elements 0.37832
published_at 2026-04-02T12:55:00Z
4
value 0.00166
scoring_system epss
scoring_elements 0.37857
published_at 2026-04-04T12:55:00Z
5
value 0.00166
scoring_system epss
scoring_elements 0.37736
published_at 2026-04-07T12:55:00Z
6
value 0.00166
scoring_system epss
scoring_elements 0.37786
published_at 2026-04-08T12:55:00Z
7
value 0.00166
scoring_system epss
scoring_elements 0.37799
published_at 2026-04-09T12:55:00Z
8
value 0.00166
scoring_system epss
scoring_elements 0.37813
published_at 2026-04-11T12:55:00Z
9
value 0.00166
scoring_system epss
scoring_elements 0.37778
published_at 2026-04-12T12:55:00Z
10
value 0.00166
scoring_system epss
scoring_elements 0.37753
published_at 2026-04-13T12:55:00Z
11
value 0.00166
scoring_system epss
scoring_elements 0.37801
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-0606
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0505
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0505
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0546
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0546
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0596
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0596
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0597
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0597
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0598
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0598
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0600
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0600
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0606
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0606
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0608
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0608
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0609
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0609
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0616
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0616
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2047
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2047
23
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.5
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:S/C:N/I:P/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
24
reference_url https://mariadb.com/kb/en/mariadb/mariadb-10110-release-notes/
reference_id
reference_type
scores
url https://mariadb.com/kb/en/mariadb/mariadb-10110-release-notes/
25
reference_url https://mariadb.com/kb/en/mariadb/mariadb-5547-release-notes/
reference_id
reference_type
scores
url https://mariadb.com/kb/en/mariadb/mariadb-5547-release-notes/
26
reference_url https://mariadb.com/kb/en/mdb-10023-rn/
reference_id
reference_type
scores
url https://mariadb.com/kb/en/mdb-10023-rn/
27
reference_url http://www.debian.org/security/2016/dsa-3453
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3453
28
reference_url http://www.debian.org/security/2016/dsa-3459
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3459
29
reference_url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
30
reference_url http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
31
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
32
reference_url http://www.securitytracker.com/id/1034708
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1034708
33
reference_url http://www.ubuntu.com/usn/USN-2881-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2881-1
34
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1301504
reference_id 1301504
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1301504
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node_eus:7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_hpc_node_eus:7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node_eus:7.2:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-0606
reference_id CVE-2016-0606
reference_type
scores
0
value 3.5
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:S/C:N/I:P/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2016-0606
56
reference_url https://access.redhat.com/errata/RHSA-2016:0534
reference_id RHSA-2016:0534
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0534
57
reference_url https://access.redhat.com/errata/RHSA-2016:0705
reference_id RHSA-2016:0705
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0705
58
reference_url https://access.redhat.com/errata/RHSA-2016:1132
reference_id RHSA-2016:1132
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1132
59
reference_url https://access.redhat.com/errata/RHSA-2016:1480
reference_id RHSA-2016:1480
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1480
60
reference_url https://access.redhat.com/errata/RHSA-2016:1481
reference_id RHSA-2016:1481
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1481
61
reference_url https://usn.ubuntu.com/2881-1/
reference_id USN-2881-1
reference_type
scores
url https://usn.ubuntu.com/2881-1/
fixed_packages
aliases CVE-2016-0606
risk_score 1.6
exploitability 0.5
weighted_severity 3.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3qjy-4cen-7qev
5
url VCID-3vg3-y6dk-n3ag
vulnerability_id VCID-3vg3-y6dk-n3ag
summary
Multiple vulnerabilities have been found in libpcre, the worst of
    which could lead to arbitrary code execution, or cause a Denial of Service
    condition.
references
0
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2016-March/178193.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2016-March/178193.html
1
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2016-March/178955.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2016-March/178955.html
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1283.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1283.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-1283
reference_id
reference_type
scores
0
value 0.0251
scoring_system epss
scoring_elements 0.85388
published_at 2026-04-18T12:55:00Z
1
value 0.0251
scoring_system epss
scoring_elements 0.85371
published_at 2026-04-12T12:55:00Z
2
value 0.0251
scoring_system epss
scoring_elements 0.85373
published_at 2026-04-11T12:55:00Z
3
value 0.0251
scoring_system epss
scoring_elements 0.85387
published_at 2026-04-16T12:55:00Z
4
value 0.0251
scoring_system epss
scoring_elements 0.85368
published_at 2026-04-13T12:55:00Z
5
value 0.0251
scoring_system epss
scoring_elements 0.85385
published_at 2026-04-21T12:55:00Z
6
value 0.02952
scoring_system epss
scoring_elements 0.86456
published_at 2026-04-09T12:55:00Z
7
value 0.02952
scoring_system epss
scoring_elements 0.86428
published_at 2026-04-07T12:55:00Z
8
value 0.02952
scoring_system epss
scoring_elements 0.86447
published_at 2026-04-08T12:55:00Z
9
value 0.03762
scoring_system epss
scoring_elements 0.87983
published_at 2026-04-01T12:55:00Z
10
value 0.03762
scoring_system epss
scoring_elements 0.88006
published_at 2026-04-04T12:55:00Z
11
value 0.03762
scoring_system epss
scoring_elements 0.87992
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-1283
4
reference_url https://bto.bluecoat.com/security-advisory/sa128
reference_id
reference_type
scores
url https://bto.bluecoat.com/security-advisory/sa128
5
reference_url https://bugs.exim.org/show_bug.cgi?id=1767
reference_id
reference_type
scores
url https://bugs.exim.org/show_bug.cgi?id=1767
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1283
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1283
7
reference_url https://www.tenable.com/security/tns-2016-18
reference_id
reference_type
scores
url https://www.tenable.com/security/tns-2016-18
8
reference_url https://www.tenable.com/security/tns-2017-14
reference_id
reference_type
scores
url https://www.tenable.com/security/tns-2017-14
9
reference_url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
10
reference_url http://www.securityfocus.com/bid/79825
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/79825
11
reference_url http://www.securitytracker.com/id/1034555
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1034555
12
reference_url http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.343110
reference_id
reference_type
scores
url http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.343110
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1295385
reference_id 1295385
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1295385
14
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=809706
reference_id 809706
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=809706
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:pcre:8.38:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pcre:pcre:8.38:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:pcre:8.38:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:php:php:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:*:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-1283
reference_id CVE-2016-1283
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
1
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2016-1283
21
reference_url https://security.gentoo.org/glsa/201607-02
reference_id GLSA-201607-02
reference_type
scores
url https://security.gentoo.org/glsa/201607-02
22
reference_url https://access.redhat.com/errata/RHSA-2016:1132
reference_id RHSA-2016:1132
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1132
23
reference_url https://usn.ubuntu.com/2943-1/
reference_id USN-2943-1
reference_type
scores
url https://usn.ubuntu.com/2943-1/
fixed_packages
aliases CVE-2016-1283
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3vg3-y6dk-n3ag
6
url VCID-3wxw-5hsh-tqhj
vulnerability_id VCID-3wxw-5hsh-tqhj
summary
Multiple vulnerabilities have been found in libpcre, the worst of
    which could lead to arbitrary code execution, or cause a Denial of Service
    condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5073.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5073.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-5073
reference_id
reference_type
scores
0
value 0.00547
scoring_system epss
scoring_elements 0.67796
published_at 2026-04-01T12:55:00Z
1
value 0.00547
scoring_system epss
scoring_elements 0.6783
published_at 2026-04-02T12:55:00Z
2
value 0.00547
scoring_system epss
scoring_elements 0.6785
published_at 2026-04-04T12:55:00Z
3
value 0.00547
scoring_system epss
scoring_elements 0.67829
published_at 2026-04-07T12:55:00Z
4
value 0.00547
scoring_system epss
scoring_elements 0.6788
published_at 2026-04-08T12:55:00Z
5
value 0.00547
scoring_system epss
scoring_elements 0.67894
published_at 2026-04-09T12:55:00Z
6
value 0.00547
scoring_system epss
scoring_elements 0.67917
published_at 2026-04-18T12:55:00Z
7
value 0.00547
scoring_system epss
scoring_elements 0.67904
published_at 2026-04-16T12:55:00Z
8
value 0.00547
scoring_system epss
scoring_elements 0.67868
published_at 2026-04-13T12:55:00Z
9
value 0.00547
scoring_system epss
scoring_elements 0.67898
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-5073
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5073
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5073
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1237223
reference_id 1237223
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1237223
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=790000
reference_id 790000
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=790000
5
reference_url https://security.gentoo.org/glsa/201607-02
reference_id GLSA-201607-02
reference_type
scores
url https://security.gentoo.org/glsa/201607-02
6
reference_url https://access.redhat.com/errata/RHSA-2016:1025
reference_id RHSA-2016:1025
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1025
7
reference_url https://access.redhat.com/errata/RHSA-2016:1132
reference_id RHSA-2016:1132
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1132
8
reference_url https://access.redhat.com/errata/RHSA-2016:2750
reference_id RHSA-2016:2750
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2750
9
reference_url https://usn.ubuntu.com/2694-1/
reference_id USN-2694-1
reference_type
scores
url https://usn.ubuntu.com/2694-1/
10
reference_url https://usn.ubuntu.com/2943-1/
reference_id USN-2943-1
reference_type
scores
url https://usn.ubuntu.com/2943-1/
fixed_packages
aliases CVE-2015-5073
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3wxw-5hsh-tqhj
7
url VCID-4kzr-datq-bbcp
vulnerability_id VCID-4kzr-datq-bbcp
summary
Multiple vulnerabilities have been found in libpcre, the worst of
    which could lead to arbitrary code execution, or cause a Denial of Service
    condition.
references
0
reference_url http://rhn.redhat.com/errata/RHSA-2016-2750.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-2750.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8392.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8392.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-8392
reference_id
reference_type
scores
0
value 0.04389
scoring_system epss
scoring_elements 0.89006
published_at 2026-04-18T12:55:00Z
1
value 0.04389
scoring_system epss
scoring_elements 0.88939
published_at 2026-04-01T12:55:00Z
2
value 0.04389
scoring_system epss
scoring_elements 0.88947
published_at 2026-04-02T12:55:00Z
3
value 0.04389
scoring_system epss
scoring_elements 0.88963
published_at 2026-04-04T12:55:00Z
4
value 0.04389
scoring_system epss
scoring_elements 0.88966
published_at 2026-04-07T12:55:00Z
5
value 0.04389
scoring_system epss
scoring_elements 0.88985
published_at 2026-04-08T12:55:00Z
6
value 0.04389
scoring_system epss
scoring_elements 0.8899
published_at 2026-04-09T12:55:00Z
7
value 0.04389
scoring_system epss
scoring_elements 0.89002
published_at 2026-04-21T12:55:00Z
8
value 0.04389
scoring_system epss
scoring_elements 0.88996
published_at 2026-04-12T12:55:00Z
9
value 0.04389
scoring_system epss
scoring_elements 0.88995
published_at 2026-04-13T12:55:00Z
10
value 0.04389
scoring_system epss
scoring_elements 0.89008
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-8392
3
reference_url https://bto.bluecoat.com/security-advisory/sa128
reference_id
reference_type
scores
url https://bto.bluecoat.com/security-advisory/sa128
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8392
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8392
5
reference_url http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup
reference_id
reference_type
scores
url http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup
6
reference_url http://www.openwall.com/lists/oss-security/2015/11/29/1
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2015/11/29/1
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1287690
reference_id 1287690
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1287690
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:perl_compatible_regular_expression_library:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pcre:perl_compatible_regular_expression_library:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:perl_compatible_regular_expression_library:*:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-8392
reference_id CVE-2015-8392
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2015-8392
10
reference_url https://security.gentoo.org/glsa/201607-02
reference_id GLSA-201607-02
reference_type
scores
url https://security.gentoo.org/glsa/201607-02
11
reference_url https://access.redhat.com/errata/RHSA-2016:1132
reference_id RHSA-2016:1132
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1132
12
reference_url https://access.redhat.com/errata/RHSA-2016:2750
reference_id RHSA-2016:2750
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2750
13
reference_url https://usn.ubuntu.com/2943-1/
reference_id USN-2943-1
reference_type
scores
url https://usn.ubuntu.com/2943-1/
fixed_packages
aliases CVE-2015-8392
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4kzr-datq-bbcp
8
url VCID-55fg-6c2c-6bg8
vulnerability_id VCID-55fg-6c2c-6bg8
summary security update
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00015.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00015.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00016.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00016.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html
6
reference_url http://rhn.redhat.com/errata/RHSA-2016-0534.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0534.html
7
reference_url http://rhn.redhat.com/errata/RHSA-2016-0705.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0705.html
8
reference_url http://rhn.redhat.com/errata/RHSA-2016-1480.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-1480.html
9
reference_url http://rhn.redhat.com/errata/RHSA-2016-1481.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-1481.html
10
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0600.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0600.json
11
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-0600
reference_id
reference_type
scores
0
value 0.00338
scoring_system epss
scoring_elements 0.5664
published_at 2026-04-21T12:55:00Z
1
value 0.00338
scoring_system epss
scoring_elements 0.56668
published_at 2026-04-18T12:55:00Z
2
value 0.00338
scoring_system epss
scoring_elements 0.56522
published_at 2026-04-01T12:55:00Z
3
value 0.00338
scoring_system epss
scoring_elements 0.56618
published_at 2026-04-07T12:55:00Z
4
value 0.00338
scoring_system epss
scoring_elements 0.56639
published_at 2026-04-04T12:55:00Z
5
value 0.00338
scoring_system epss
scoring_elements 0.56669
published_at 2026-04-16T12:55:00Z
6
value 0.00338
scoring_system epss
scoring_elements 0.56675
published_at 2026-04-09T12:55:00Z
7
value 0.00338
scoring_system epss
scoring_elements 0.56683
published_at 2026-04-11T12:55:00Z
8
value 0.00338
scoring_system epss
scoring_elements 0.56658
published_at 2026-04-12T12:55:00Z
9
value 0.00338
scoring_system epss
scoring_elements 0.56638
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-0600
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0505
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0505
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0546
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0546
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0596
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0596
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0597
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0597
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0598
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0598
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0600
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0600
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0606
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0606
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0608
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0608
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0609
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0609
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0616
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0616
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2047
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2047
23
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.5
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:S/C:N/I:N/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
24
reference_url https://mariadb.com/kb/en/mariadb/mariadb-10110-release-notes/
reference_id
reference_type
scores
url https://mariadb.com/kb/en/mariadb/mariadb-10110-release-notes/
25
reference_url https://mariadb.com/kb/en/mariadb/mariadb-5547-release-notes/
reference_id
reference_type
scores
url https://mariadb.com/kb/en/mariadb/mariadb-5547-release-notes/
26
reference_url https://mariadb.com/kb/en/mdb-10023-rn/
reference_id
reference_type
scores
url https://mariadb.com/kb/en/mdb-10023-rn/
27
reference_url http://www.debian.org/security/2016/dsa-3453
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3453
28
reference_url http://www.debian.org/security/2016/dsa-3459
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3459
29
reference_url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
30
reference_url http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
31
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
32
reference_url http://www.securityfocus.com/bid/81188
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/81188
33
reference_url http://www.securitytracker.com/id/1034708
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1034708
34
reference_url http://www.ubuntu.com/usn/USN-2881-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2881-1
35
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1301501
reference_id 1301501
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1301501
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node_eus:7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_hpc_node_eus:7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node_eus:7.2:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-0600
reference_id CVE-2016-0600
reference_type
scores
0
value 3.5
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:S/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2016-0600
57
reference_url https://access.redhat.com/errata/RHSA-2016:0534
reference_id RHSA-2016:0534
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0534
58
reference_url https://access.redhat.com/errata/RHSA-2016:0705
reference_id RHSA-2016:0705
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0705
59
reference_url https://access.redhat.com/errata/RHSA-2016:1132
reference_id RHSA-2016:1132
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1132
60
reference_url https://access.redhat.com/errata/RHSA-2016:1480
reference_id RHSA-2016:1480
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1480
61
reference_url https://access.redhat.com/errata/RHSA-2016:1481
reference_id RHSA-2016:1481
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1481
62
reference_url https://usn.ubuntu.com/2881-1/
reference_id USN-2881-1
reference_type
scores
url https://usn.ubuntu.com/2881-1/
fixed_packages
aliases CVE-2016-0600
risk_score 1.6
exploitability 0.5
weighted_severity 3.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-55fg-6c2c-6bg8
9
url VCID-5vhs-7ffz-rkaf
vulnerability_id VCID-5vhs-7ffz-rkaf
summary
Multiple vulnerabilities have been found in libpcre, the worst of
    which could lead to arbitrary code execution, or cause a Denial of Service
    condition.
references
0
reference_url http://rhn.redhat.com/errata/RHSA-2016-2750.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-2750.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8395.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8395.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-8395
reference_id
reference_type
scores
0
value 0.02405
scoring_system epss
scoring_elements 0.85099
published_at 2026-04-18T12:55:00Z
1
value 0.02405
scoring_system epss
scoring_elements 0.85
published_at 2026-04-01T12:55:00Z
2
value 0.02405
scoring_system epss
scoring_elements 0.85013
published_at 2026-04-02T12:55:00Z
3
value 0.02405
scoring_system epss
scoring_elements 0.8503
published_at 2026-04-04T12:55:00Z
4
value 0.02405
scoring_system epss
scoring_elements 0.85035
published_at 2026-04-07T12:55:00Z
5
value 0.02405
scoring_system epss
scoring_elements 0.85057
published_at 2026-04-08T12:55:00Z
6
value 0.02405
scoring_system epss
scoring_elements 0.85064
published_at 2026-04-09T12:55:00Z
7
value 0.02405
scoring_system epss
scoring_elements 0.8508
published_at 2026-04-11T12:55:00Z
8
value 0.02405
scoring_system epss
scoring_elements 0.85079
published_at 2026-04-12T12:55:00Z
9
value 0.02405
scoring_system epss
scoring_elements 0.85075
published_at 2026-04-13T12:55:00Z
10
value 0.02405
scoring_system epss
scoring_elements 0.85096
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-8395
3
reference_url https://bto.bluecoat.com/security-advisory/sa128
reference_id
reference_type
scores
url https://bto.bluecoat.com/security-advisory/sa128
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8395
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8395
5
reference_url http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup
reference_id
reference_type
scores
url http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup
6
reference_url http://www.openwall.com/lists/oss-security/2015/11/29/1
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2015/11/29/1
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1287711
reference_id 1287711
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1287711
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:perl_compatible_regular_expression_library:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pcre:perl_compatible_regular_expression_library:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:perl_compatible_regular_expression_library:*:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-8395
reference_id CVE-2015-8395
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2015-8395
10
reference_url https://security.gentoo.org/glsa/201607-02
reference_id GLSA-201607-02
reference_type
scores
url https://security.gentoo.org/glsa/201607-02
11
reference_url https://access.redhat.com/errata/RHSA-2016:1132
reference_id RHSA-2016:1132
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1132
12
reference_url https://access.redhat.com/errata/RHSA-2016:2750
reference_id RHSA-2016:2750
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2750
13
reference_url https://usn.ubuntu.com/2943-1/
reference_id USN-2943-1
reference_type
scores
url https://usn.ubuntu.com/2943-1/
fixed_packages
aliases CVE-2015-8395
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5vhs-7ffz-rkaf
10
url VCID-5yzf-3vz6-9yhu
vulnerability_id VCID-5yzf-3vz6-9yhu
summary security update
references
0
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177539.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177539.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00010.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00010.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00011.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00011.html
3
reference_url http://lists.opensuse.org/opensuse-updates/2016-02/msg00039.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2016-02/msg00039.html
4
reference_url http://rhn.redhat.com/errata/RHSA-2016-0534.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0534.html
5
reference_url http://rhn.redhat.com/errata/RHSA-2016-0705.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0705.html
6
reference_url http://rhn.redhat.com/errata/RHSA-2016-1480.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-1480.html
7
reference_url http://rhn.redhat.com/errata/RHSA-2016-1481.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-1481.html
8
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4861.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4861.json
9
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-4861
reference_id
reference_type
scores
0
value 0.00392
scoring_system epss
scoring_elements 0.60239
published_at 2026-04-21T12:55:00Z
1
value 0.00392
scoring_system epss
scoring_elements 0.60078
published_at 2026-04-01T12:55:00Z
2
value 0.00392
scoring_system epss
scoring_elements 0.60156
published_at 2026-04-02T12:55:00Z
3
value 0.00392
scoring_system epss
scoring_elements 0.60181
published_at 2026-04-04T12:55:00Z
4
value 0.00392
scoring_system epss
scoring_elements 0.6015
published_at 2026-04-07T12:55:00Z
5
value 0.00392
scoring_system epss
scoring_elements 0.602
published_at 2026-04-08T12:55:00Z
6
value 0.00392
scoring_system epss
scoring_elements 0.60214
published_at 2026-04-09T12:55:00Z
7
value 0.00392
scoring_system epss
scoring_elements 0.60235
published_at 2026-04-11T12:55:00Z
8
value 0.00392
scoring_system epss
scoring_elements 0.60222
published_at 2026-04-12T12:55:00Z
9
value 0.00392
scoring_system epss
scoring_elements 0.60204
published_at 2026-04-13T12:55:00Z
10
value 0.00392
scoring_system epss
scoring_elements 0.60244
published_at 2026-04-16T12:55:00Z
11
value 0.00392
scoring_system epss
scoring_elements 0.60251
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-4861
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4792
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4792
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4802
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4802
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4815
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4815
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4816
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4816
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4819
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4819
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4826
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4826
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4830
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4830
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4836
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4836
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4858
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4858
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4861
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4861
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4870
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4870
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4879
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4879
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4895
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4895
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4913
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4913
24
reference_url https://www.suse.com/support/update/announcement/2016/suse-su-20160296-1.html
reference_id
reference_type
scores
url https://www.suse.com/support/update/announcement/2016/suse-su-20160296-1.html
25
reference_url http://www.debian.org/security/2015/dsa-3377
reference_id
reference_type
scores
url http://www.debian.org/security/2015/dsa-3377
26
reference_url http://www.debian.org/security/2015/dsa-3385
reference_id
reference_type
scores
url http://www.debian.org/security/2015/dsa-3385
27
reference_url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
28
reference_url http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
29
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
30
reference_url http://www.securityfocus.com/bid/77137
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/77137
31
reference_url http://www.securitytracker.com/id/1033894
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1033894
32
reference_url http://www.ubuntu.com/usn/USN-2781-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2781-1
33
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1274776
reference_id 1274776
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1274776
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-4861
reference_id CVE-2015-4861
reference_type
scores
0
value 3.5
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:S/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2015-4861
67
reference_url https://access.redhat.com/errata/RHSA-2016:0534
reference_id RHSA-2016:0534
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0534
68
reference_url https://access.redhat.com/errata/RHSA-2016:0705
reference_id RHSA-2016:0705
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0705
69
reference_url https://access.redhat.com/errata/RHSA-2016:1132
reference_id RHSA-2016:1132
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1132
70
reference_url https://access.redhat.com/errata/RHSA-2016:1480
reference_id RHSA-2016:1480
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1480
71
reference_url https://access.redhat.com/errata/RHSA-2016:1481
reference_id RHSA-2016:1481
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1481
72
reference_url https://usn.ubuntu.com/2781-1/
reference_id USN-2781-1
reference_type
scores
url https://usn.ubuntu.com/2781-1/
fixed_packages
aliases CVE-2015-4861
risk_score 1.6
exploitability 0.5
weighted_severity 3.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5yzf-3vz6-9yhu
11
url VCID-7qj2-atsh-pub4
vulnerability_id VCID-7qj2-atsh-pub4
summary security update
references
0
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177539.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177539.html
1
reference_url http://rhn.redhat.com/errata/RHSA-2015-1628.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-1628.html
2
reference_url http://rhn.redhat.com/errata/RHSA-2016-0534.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0534.html
3
reference_url http://rhn.redhat.com/errata/RHSA-2016-1481.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-1481.html
4
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4879.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4879.json
5
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-4879
reference_id
reference_type
scores
0
value 0.00327
scoring_system epss
scoring_elements 0.55712
published_at 2026-04-21T12:55:00Z
1
value 0.00327
scoring_system epss
scoring_elements 0.5555
published_at 2026-04-01T12:55:00Z
2
value 0.00327
scoring_system epss
scoring_elements 0.55662
published_at 2026-04-02T12:55:00Z
3
value 0.00327
scoring_system epss
scoring_elements 0.55686
published_at 2026-04-04T12:55:00Z
4
value 0.00327
scoring_system epss
scoring_elements 0.55664
published_at 2026-04-07T12:55:00Z
5
value 0.00327
scoring_system epss
scoring_elements 0.55715
published_at 2026-04-08T12:55:00Z
6
value 0.00327
scoring_system epss
scoring_elements 0.55718
published_at 2026-04-09T12:55:00Z
7
value 0.00327
scoring_system epss
scoring_elements 0.55727
published_at 2026-04-11T12:55:00Z
8
value 0.00327
scoring_system epss
scoring_elements 0.55707
published_at 2026-04-12T12:55:00Z
9
value 0.00327
scoring_system epss
scoring_elements 0.5569
published_at 2026-04-13T12:55:00Z
10
value 0.00327
scoring_system epss
scoring_elements 0.55729
published_at 2026-04-16T12:55:00Z
11
value 0.00327
scoring_system epss
scoring_elements 0.55733
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-4879
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4792
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4792
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4802
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4802
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4815
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4815
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4816
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4816
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4819
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4819
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4826
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4826
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4830
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4830
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4836
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4836
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4858
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4858
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4861
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4861
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4870
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4870
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4879
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4879
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4895
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4895
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4913
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4913
20
reference_url http://www.debian.org/security/2015/dsa-3377
reference_id
reference_type
scores
url http://www.debian.org/security/2015/dsa-3377
21
reference_url http://www.debian.org/security/2015/dsa-3385
reference_id
reference_type
scores
url http://www.debian.org/security/2015/dsa-3385
22
reference_url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
23
reference_url http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
24
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
25
reference_url http://www.securityfocus.com/bid/77140
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/77140
26
reference_url http://www.securitytracker.com/id/1033894
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1033894
27
reference_url http://www.ubuntu.com/usn/USN-2781-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2781-1
28
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1274783
reference_id 1274783
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1274783
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:-:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:linux:7:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:-:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-4879
reference_id CVE-2015-4879
reference_type
scores
0
value 4.6
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:S/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2015-4879
59
reference_url https://access.redhat.com/errata/RHSA-2015:1628
reference_id RHSA-2015:1628
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1628
60
reference_url https://access.redhat.com/errata/RHSA-2015:1629
reference_id RHSA-2015:1629
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1629
61
reference_url https://access.redhat.com/errata/RHSA-2015:1630
reference_id RHSA-2015:1630
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1630
62
reference_url https://access.redhat.com/errata/RHSA-2016:0534
reference_id RHSA-2016:0534
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0534
63
reference_url https://access.redhat.com/errata/RHSA-2016:1132
reference_id RHSA-2016:1132
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1132
64
reference_url https://access.redhat.com/errata/RHSA-2016:1481
reference_id RHSA-2016:1481
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1481
65
reference_url https://usn.ubuntu.com/2781-1/
reference_id USN-2781-1
reference_type
scores
url https://usn.ubuntu.com/2781-1/
fixed_packages
aliases CVE-2015-4879
risk_score 2.0
exploitability 0.5
weighted_severity 4.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7qj2-atsh-pub4
12
url VCID-7tj3-dfxj-bke7
vulnerability_id VCID-7tj3-dfxj-bke7
summary security update
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:17Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:17Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:17Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:17Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:17Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:17Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html
6
reference_url http://rhn.redhat.com/errata/RHSA-2016-0705.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:17Z/
url http://rhn.redhat.com/errata/RHSA-2016-0705.html
7
reference_url http://rhn.redhat.com/errata/RHSA-2016-1480.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:17Z/
url http://rhn.redhat.com/errata/RHSA-2016-1480.html
8
reference_url http://rhn.redhat.com/errata/RHSA-2016-1481.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:17Z/
url http://rhn.redhat.com/errata/RHSA-2016-1481.html
9
reference_url http://rhn.redhat.com/errata/RHSA-2016-1602.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:17Z/
url http://rhn.redhat.com/errata/RHSA-2016-1602.html
10
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0647.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0647.json
11
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-0647
reference_id
reference_type
scores
0
value 0.00243
scoring_system epss
scoring_elements 0.47524
published_at 2026-04-21T12:55:00Z
1
value 0.00243
scoring_system epss
scoring_elements 0.47494
published_at 2026-04-02T12:55:00Z
2
value 0.00243
scoring_system epss
scoring_elements 0.47515
published_at 2026-04-09T12:55:00Z
3
value 0.00243
scoring_system epss
scoring_elements 0.47518
published_at 2026-04-08T12:55:00Z
4
value 0.00243
scoring_system epss
scoring_elements 0.47537
published_at 2026-04-11T12:55:00Z
5
value 0.00243
scoring_system epss
scoring_elements 0.47513
published_at 2026-04-12T12:55:00Z
6
value 0.00243
scoring_system epss
scoring_elements 0.47521
published_at 2026-04-13T12:55:00Z
7
value 0.00243
scoring_system epss
scoring_elements 0.4758
published_at 2026-04-16T12:55:00Z
8
value 0.00243
scoring_system epss
scoring_elements 0.47573
published_at 2026-04-18T12:55:00Z
9
value 0.00243
scoring_system epss
scoring_elements 0.47464
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-0647
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0640
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0640
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0641
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0641
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0642
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0642
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0643
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0643
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0644
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0644
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0646
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0646
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0647
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0647
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0648
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0648
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0649
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0649
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0650
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0650
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0655
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0655
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0666
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0666
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0668
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0668
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2047
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2047
26
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:N/I:C/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
27
reference_url https://mariadb.com/kb/en/mariadb/mariadb-10025-release-notes/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:17Z/
url https://mariadb.com/kb/en/mariadb/mariadb-10025-release-notes/
28
reference_url https://mariadb.com/kb/en/mariadb/mariadb-10114-release-notes/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:17Z/
url https://mariadb.com/kb/en/mariadb/mariadb-10114-release-notes/
29
reference_url https://mariadb.com/kb/en/mariadb/mariadb-5549-release-notes/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:17Z/
url https://mariadb.com/kb/en/mariadb/mariadb-5549-release-notes/
30
reference_url http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:17Z/
url http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168
31
reference_url http://www.debian.org/security/2016/dsa-3557
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:17Z/
url http://www.debian.org/security/2016/dsa-3557
32
reference_url http://www.debian.org/security/2016/dsa-3595
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:17Z/
url http://www.debian.org/security/2016/dsa-3595
33
reference_url http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:17Z/
url http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
34
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:17Z/
url http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
35
reference_url http://www.securityfocus.com/bid/86495
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:17Z/
url http://www.securityfocus.com/bid/86495
36
reference_url http://www.securitytracker.com/id/1035606
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:17Z/
url http://www.securitytracker.com/id/1035606
37
reference_url http://www.ubuntu.com/usn/USN-2953-1
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:17Z/
url http://www.ubuntu.com/usn/USN-2953-1
38
reference_url http://www.ubuntu.com/usn/USN-2954-1
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:17Z/
url http://www.ubuntu.com/usn/USN-2954-1
39
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1329249
reference_id 1329249
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1329249
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:powerkvm:2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ibm:powerkvm:2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:powerkvm:2.1:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:powerkvm:3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ibm:powerkvm:3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:powerkvm:3.1:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-0647
reference_id CVE-2016-0647
reference_type
scores
0
value 4.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:P
1
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2016-0647
50
reference_url https://access.redhat.com/errata/RHSA-2016:0705
reference_id RHSA-2016:0705
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0705
51
reference_url https://access.redhat.com/errata/RHSA-2016:1132
reference_id RHSA-2016:1132
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:17Z/
url https://access.redhat.com/errata/RHSA-2016:1132
52
reference_url https://access.redhat.com/errata/RHSA-2016:1480
reference_id RHSA-2016:1480
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1480
53
reference_url https://access.redhat.com/errata/RHSA-2016:1481
reference_id RHSA-2016:1481
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1481
54
reference_url https://access.redhat.com/errata/RHSA-2016:1602
reference_id RHSA-2016:1602
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1602
55
reference_url https://usn.ubuntu.com/2953-1/
reference_id USN-2953-1
reference_type
scores
url https://usn.ubuntu.com/2953-1/
56
reference_url https://usn.ubuntu.com/2954-1/
reference_id USN-2954-1
reference_type
scores
url https://usn.ubuntu.com/2954-1/
fixed_packages
aliases CVE-2016-0647
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7tj3-dfxj-bke7
13
url VCID-7w3v-5s98-a7ec
vulnerability_id VCID-7w3v-5s98-a7ec
summary security update
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html
6
reference_url http://rhn.redhat.com/errata/RHSA-2016-0534.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0534.html
7
reference_url http://rhn.redhat.com/errata/RHSA-2016-0705.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0705.html
8
reference_url http://rhn.redhat.com/errata/RHSA-2016-1480.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-1480.html
9
reference_url http://rhn.redhat.com/errata/RHSA-2016-1481.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-1481.html
10
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2047.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2047.json
11
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-2047
reference_id
reference_type
scores
0
value 0.01749
scoring_system epss
scoring_elements 0.82589
published_at 2026-04-21T12:55:00Z
1
value 0.01749
scoring_system epss
scoring_elements 0.82549
published_at 2026-04-13T12:55:00Z
2
value 0.01749
scoring_system epss
scoring_elements 0.82585
published_at 2026-04-18T12:55:00Z
3
value 0.01749
scoring_system epss
scoring_elements 0.82477
published_at 2026-04-01T12:55:00Z
4
value 0.01749
scoring_system epss
scoring_elements 0.82492
published_at 2026-04-02T12:55:00Z
5
value 0.01749
scoring_system epss
scoring_elements 0.8251
published_at 2026-04-04T12:55:00Z
6
value 0.01749
scoring_system epss
scoring_elements 0.82506
published_at 2026-04-07T12:55:00Z
7
value 0.01749
scoring_system epss
scoring_elements 0.82532
published_at 2026-04-08T12:55:00Z
8
value 0.01749
scoring_system epss
scoring_elements 0.8254
published_at 2026-04-09T12:55:00Z
9
value 0.01749
scoring_system epss
scoring_elements 0.82558
published_at 2026-04-11T12:55:00Z
10
value 0.01749
scoring_system epss
scoring_elements 0.82554
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-2047
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0505
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0505
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0546
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0546
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0596
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0596
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0597
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0597
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0598
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0598
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0600
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0600
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0606
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0606
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0608
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0608
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0609
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0609
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0616
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0616
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0640
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0640
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0641
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0641
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0642
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0642
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0643
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0643
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0644
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0644
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0646
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0646
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0647
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0647
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0648
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0648
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0649
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0649
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0650
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0650
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0666
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0666
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2047
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2047
34
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:S/C:P/I:P/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
35
reference_url https://mariadb.atlassian.net/browse/MDEV-9212
reference_id
reference_type
scores
url https://mariadb.atlassian.net/browse/MDEV-9212
36
reference_url https://mariadb.com/kb/en/mariadb/mariadb-10110-release-notes/
reference_id
reference_type
scores
url https://mariadb.com/kb/en/mariadb/mariadb-10110-release-notes/
37
reference_url https://mariadb.com/kb/en/mariadb/mariadb-5547-release-notes/
reference_id
reference_type
scores
url https://mariadb.com/kb/en/mariadb/mariadb-5547-release-notes/
38
reference_url https://mariadb.com/kb/en/mdb-10023-rn/
reference_id
reference_type
scores
url https://mariadb.com/kb/en/mdb-10023-rn/
39
reference_url http://www.debian.org/security/2016/dsa-3453
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3453
40
reference_url http://www.debian.org/security/2016/dsa-3557
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3557
41
reference_url http://www.openwall.com/lists/oss-security/2016/01/26/3
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2016/01/26/3
42
reference_url http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
43
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
44
reference_url http://www.securityfocus.com/bid/81810
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/81810
45
reference_url http://www.securitytracker.com/id/1035606
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1035606
46
reference_url http://www.ubuntu.com/usn/USN-2953-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2953-1
47
reference_url http://www.ubuntu.com/usn/USN-2954-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2954-1
48
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1301874
reference_id 1301874
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1301874
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-2047
reference_id CVE-2016-2047
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:P/A:N
1
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2016-2047
62
reference_url https://access.redhat.com/errata/RHSA-2016:0534
reference_id RHSA-2016:0534
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0534
63
reference_url https://access.redhat.com/errata/RHSA-2016:0705
reference_id RHSA-2016:0705
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0705
64
reference_url https://access.redhat.com/errata/RHSA-2016:1132
reference_id RHSA-2016:1132
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1132
65
reference_url https://access.redhat.com/errata/RHSA-2016:1480
reference_id RHSA-2016:1480
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1480
66
reference_url https://access.redhat.com/errata/RHSA-2016:1481
reference_id RHSA-2016:1481
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1481
67
reference_url https://usn.ubuntu.com/2953-1/
reference_id USN-2953-1
reference_type
scores
url https://usn.ubuntu.com/2953-1/
68
reference_url https://usn.ubuntu.com/2954-1/
reference_id USN-2954-1
reference_type
scores
url https://usn.ubuntu.com/2954-1/
fixed_packages
aliases CVE-2016-2047
risk_score 2.6
exploitability 0.5
weighted_severity 5.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7w3v-5s98-a7ec
14
url VCID-9591-6344-yuga
vulnerability_id VCID-9591-6344-yuga
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4792.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4792.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-4792
reference_id
reference_type
scores
0
value 0.00906
scoring_system epss
scoring_elements 0.75688
published_at 2026-04-01T12:55:00Z
1
value 0.00906
scoring_system epss
scoring_elements 0.7569
published_at 2026-04-02T12:55:00Z
2
value 0.00906
scoring_system epss
scoring_elements 0.75721
published_at 2026-04-04T12:55:00Z
3
value 0.00906
scoring_system epss
scoring_elements 0.757
published_at 2026-04-07T12:55:00Z
4
value 0.00906
scoring_system epss
scoring_elements 0.75734
published_at 2026-04-08T12:55:00Z
5
value 0.00906
scoring_system epss
scoring_elements 0.75745
published_at 2026-04-13T12:55:00Z
6
value 0.00906
scoring_system epss
scoring_elements 0.75769
published_at 2026-04-11T12:55:00Z
7
value 0.00906
scoring_system epss
scoring_elements 0.75751
published_at 2026-04-12T12:55:00Z
8
value 0.00906
scoring_system epss
scoring_elements 0.75782
published_at 2026-04-16T12:55:00Z
9
value 0.00906
scoring_system epss
scoring_elements 0.75785
published_at 2026-04-18T12:55:00Z
10
value 0.00906
scoring_system epss
scoring_elements 0.75771
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-4792
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4792
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4792
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4802
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4802
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4815
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4815
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4816
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4816
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4819
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4819
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4826
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4826
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4830
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4830
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4836
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4836
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4858
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4858
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4861
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4861
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4870
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4870
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4879
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4879
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4895
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4895
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4913
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4913
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1274752
reference_id 1274752
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1274752
17
reference_url https://access.redhat.com/errata/RHSA-2016:0534
reference_id RHSA-2016:0534
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0534
18
reference_url https://access.redhat.com/errata/RHSA-2016:0705
reference_id RHSA-2016:0705
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0705
19
reference_url https://access.redhat.com/errata/RHSA-2016:1132
reference_id RHSA-2016:1132
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1132
20
reference_url https://access.redhat.com/errata/RHSA-2016:1480
reference_id RHSA-2016:1480
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1480
21
reference_url https://access.redhat.com/errata/RHSA-2016:1481
reference_id RHSA-2016:1481
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1481
22
reference_url https://usn.ubuntu.com/2781-1/
reference_id USN-2781-1
reference_type
scores
url https://usn.ubuntu.com/2781-1/
fixed_packages
aliases CVE-2015-4792
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9591-6344-yuga
15
url VCID-9qd9-48p8-nyey
vulnerability_id VCID-9qd9-48p8-nyey
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4819.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4819.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-4819
reference_id
reference_type
scores
0
value 0.00089
scoring_system epss
scoring_elements 0.25406
published_at 2026-04-01T12:55:00Z
1
value 0.00089
scoring_system epss
scoring_elements 0.2547
published_at 2026-04-02T12:55:00Z
2
value 0.00089
scoring_system epss
scoring_elements 0.25506
published_at 2026-04-04T12:55:00Z
3
value 0.00089
scoring_system epss
scoring_elements 0.25278
published_at 2026-04-07T12:55:00Z
4
value 0.00089
scoring_system epss
scoring_elements 0.25346
published_at 2026-04-08T12:55:00Z
5
value 0.00089
scoring_system epss
scoring_elements 0.2539
published_at 2026-04-09T12:55:00Z
6
value 0.00089
scoring_system epss
scoring_elements 0.25402
published_at 2026-04-11T12:55:00Z
7
value 0.00089
scoring_system epss
scoring_elements 0.2536
published_at 2026-04-12T12:55:00Z
8
value 0.00089
scoring_system epss
scoring_elements 0.25307
published_at 2026-04-13T12:55:00Z
9
value 0.00089
scoring_system epss
scoring_elements 0.25314
published_at 2026-04-16T12:55:00Z
10
value 0.00089
scoring_system epss
scoring_elements 0.25305
published_at 2026-04-18T12:55:00Z
11
value 0.00089
scoring_system epss
scoring_elements 0.25276
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-4819
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4792
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4792
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4802
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4802
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4815
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4815
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4816
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4816
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4819
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4819
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4826
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4826
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4830
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4830
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4836
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4836
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4858
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4858
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4861
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4861
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4870
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4870
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4879
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4879
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4895
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4895
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4913
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4913
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1274764
reference_id 1274764
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1274764
17
reference_url https://access.redhat.com/errata/RHSA-2015:1628
reference_id RHSA-2015:1628
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1628
18
reference_url https://access.redhat.com/errata/RHSA-2015:1629
reference_id RHSA-2015:1629
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1629
19
reference_url https://access.redhat.com/errata/RHSA-2015:1630
reference_id RHSA-2015:1630
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1630
20
reference_url https://access.redhat.com/errata/RHSA-2016:0534
reference_id RHSA-2016:0534
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0534
21
reference_url https://access.redhat.com/errata/RHSA-2016:1132
reference_id RHSA-2016:1132
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1132
22
reference_url https://access.redhat.com/errata/RHSA-2016:1481
reference_id RHSA-2016:1481
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1481
23
reference_url https://usn.ubuntu.com/2781-1/
reference_id USN-2781-1
reference_type
scores
url https://usn.ubuntu.com/2781-1/
fixed_packages
aliases CVE-2015-4819
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9qd9-48p8-nyey
16
url VCID-a17z-sywx-n7h8
vulnerability_id VCID-a17z-sywx-n7h8
summary mysql: unspecified vulnerability in subcomponent: Server: Connection (CPU July 2016)
references
0
reference_url http://rhn.redhat.com/errata/RHSA-2016-0705.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:47:25Z/
url http://rhn.redhat.com/errata/RHSA-2016-0705.html
1
reference_url http://rhn.redhat.com/errata/RHSA-2016-1480.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:47:25Z/
url http://rhn.redhat.com/errata/RHSA-2016-1480.html
2
reference_url http://rhn.redhat.com/errata/RHSA-2016-1481.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:47:25Z/
url http://rhn.redhat.com/errata/RHSA-2016-1481.html
3
reference_url http://rhn.redhat.com/errata/RHSA-2016-1602.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:47:25Z/
url http://rhn.redhat.com/errata/RHSA-2016-1602.html
4
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5444.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5444.json
5
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-5444
reference_id
reference_type
scores
0
value 0.03806
scoring_system epss
scoring_elements 0.88108
published_at 2026-04-21T12:55:00Z
1
value 0.03806
scoring_system epss
scoring_elements 0.8804
published_at 2026-04-01T12:55:00Z
2
value 0.03806
scoring_system epss
scoring_elements 0.88049
published_at 2026-04-02T12:55:00Z
3
value 0.03806
scoring_system epss
scoring_elements 0.88062
published_at 2026-04-04T12:55:00Z
4
value 0.03806
scoring_system epss
scoring_elements 0.88069
published_at 2026-04-07T12:55:00Z
5
value 0.03806
scoring_system epss
scoring_elements 0.88088
published_at 2026-04-08T12:55:00Z
6
value 0.03806
scoring_system epss
scoring_elements 0.88094
published_at 2026-04-09T12:55:00Z
7
value 0.03806
scoring_system epss
scoring_elements 0.88103
published_at 2026-04-11T12:55:00Z
8
value 0.03806
scoring_system epss
scoring_elements 0.88096
published_at 2026-04-12T12:55:00Z
9
value 0.03806
scoring_system epss
scoring_elements 0.88097
published_at 2026-04-13T12:55:00Z
10
value 0.03806
scoring_system epss
scoring_elements 0.8811
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-5444
6
reference_url https://mariadb.com/kb/en/mariadb/mariadb-10025-release-notes/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:47:25Z/
url https://mariadb.com/kb/en/mariadb/mariadb-10025-release-notes/
7
reference_url https://mariadb.com/kb/en/mariadb/mariadb-10114-release-notes/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:47:25Z/
url https://mariadb.com/kb/en/mariadb/mariadb-10114-release-notes/
8
reference_url https://mariadb.com/kb/en/mariadb/mariadb-5549-release-notes/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:47:25Z/
url https://mariadb.com/kb/en/mariadb/mariadb-5549-release-notes/
9
reference_url http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:47:25Z/
url http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168
10
reference_url http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:47:25Z/
url http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
11
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:47:25Z/
url http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
12
reference_url http://www.securityfocus.com/bid/91787
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:47:25Z/
url http://www.securityfocus.com/bid/91787
13
reference_url http://www.securityfocus.com/bid/91987
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:47:25Z/
url http://www.securityfocus.com/bid/91987
14
reference_url http://www.securitytracker.com/id/1036362
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:47:25Z/
url http://www.securitytracker.com/id/1036362
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1358223
reference_id 1358223
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1358223
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:powerkvm:2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ibm:powerkvm:2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:powerkvm:2.1:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:powerkvm:3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ibm:powerkvm:3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:powerkvm:3.1:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-5444
reference_id CVE-2016-5444
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:N/A:N
1
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2016-5444
39
reference_url https://access.redhat.com/errata/RHSA-2016:0705
reference_id RHSA-2016:0705
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0705
40
reference_url https://access.redhat.com/errata/RHSA-2016:1132
reference_id RHSA-2016:1132
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:47:25Z/
url https://access.redhat.com/errata/RHSA-2016:1132
41
reference_url https://access.redhat.com/errata/RHSA-2016:1480
reference_id RHSA-2016:1480
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1480
42
reference_url https://access.redhat.com/errata/RHSA-2016:1481
reference_id RHSA-2016:1481
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1481
43
reference_url https://access.redhat.com/errata/RHSA-2016:1602
reference_id RHSA-2016:1602
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1602
fixed_packages
aliases CVE-2016-5444
risk_score 1.9
exploitability 0.5
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-a17z-sywx-n7h8
17
url VCID-a3hx-qz7x-7ybk
vulnerability_id VCID-a3hx-qz7x-7ybk
summary security update
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:13Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:13Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:13Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:13Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:13Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:13Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html
6
reference_url http://rhn.redhat.com/errata/RHSA-2016-0705.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:13Z/
url http://rhn.redhat.com/errata/RHSA-2016-0705.html
7
reference_url http://rhn.redhat.com/errata/RHSA-2016-1480.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:13Z/
url http://rhn.redhat.com/errata/RHSA-2016-1480.html
8
reference_url http://rhn.redhat.com/errata/RHSA-2016-1481.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:13Z/
url http://rhn.redhat.com/errata/RHSA-2016-1481.html
9
reference_url http://rhn.redhat.com/errata/RHSA-2016-1602.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:13Z/
url http://rhn.redhat.com/errata/RHSA-2016-1602.html
10
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0649.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0649.json
11
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-0649
reference_id
reference_type
scores
0
value 0.00214
scoring_system epss
scoring_elements 0.43877
published_at 2026-04-01T12:55:00Z
1
value 0.00214
scoring_system epss
scoring_elements 0.43921
published_at 2026-04-02T12:55:00Z
2
value 0.00214
scoring_system epss
scoring_elements 0.43944
published_at 2026-04-11T12:55:00Z
3
value 0.00214
scoring_system epss
scoring_elements 0.43874
published_at 2026-04-07T12:55:00Z
4
value 0.00214
scoring_system epss
scoring_elements 0.43924
published_at 2026-04-08T12:55:00Z
5
value 0.00214
scoring_system epss
scoring_elements 0.43926
published_at 2026-04-09T12:55:00Z
6
value 0.00214
scoring_system epss
scoring_elements 0.43911
published_at 2026-04-12T12:55:00Z
7
value 0.00214
scoring_system epss
scoring_elements 0.43895
published_at 2026-04-13T12:55:00Z
8
value 0.00214
scoring_system epss
scoring_elements 0.43957
published_at 2026-04-16T12:55:00Z
9
value 0.00214
scoring_system epss
scoring_elements 0.43948
published_at 2026-04-18T12:55:00Z
10
value 0.00214
scoring_system epss
scoring_elements 0.4388
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-0649
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0640
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0640
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0641
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0641
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0642
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0642
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0643
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0643
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0644
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0644
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0646
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0646
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0647
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0647
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0648
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0648
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0649
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0649
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0650
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0650
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0655
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0655
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0666
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0666
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0668
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0668
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2047
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2047
26
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.6
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:S/C:N/I:N/A:C
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
27
reference_url https://mariadb.com/kb/en/mariadb/mariadb-10024-release-notes/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:13Z/
url https://mariadb.com/kb/en/mariadb/mariadb-10024-release-notes/
28
reference_url https://mariadb.com/kb/en/mariadb/mariadb-10112-release-notes/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:13Z/
url https://mariadb.com/kb/en/mariadb/mariadb-10112-release-notes/
29
reference_url https://mariadb.com/kb/en/mariadb/mariadb-5548-release-notes/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:13Z/
url https://mariadb.com/kb/en/mariadb/mariadb-5548-release-notes/
30
reference_url http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:13Z/
url http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168
31
reference_url http://www.debian.org/security/2016/dsa-3557
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:13Z/
url http://www.debian.org/security/2016/dsa-3557
32
reference_url http://www.debian.org/security/2016/dsa-3595
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:13Z/
url http://www.debian.org/security/2016/dsa-3595
33
reference_url http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:13Z/
url http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
34
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:13Z/
url http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
35
reference_url http://www.securityfocus.com/bid/86498
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:13Z/
url http://www.securityfocus.com/bid/86498
36
reference_url http://www.securitytracker.com/id/1035606
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:13Z/
url http://www.securitytracker.com/id/1035606
37
reference_url http://www.ubuntu.com/usn/USN-2953-1
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:13Z/
url http://www.ubuntu.com/usn/USN-2953-1
38
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1329252
reference_id 1329252
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1329252
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:powerkvm:2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ibm:powerkvm:2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:powerkvm:2.1:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:powerkvm:3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ibm:powerkvm:3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:powerkvm:3.1:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-0649
reference_id CVE-2016-0649
reference_type
scores
0
value 4.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:P
1
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2016-0649
49
reference_url https://access.redhat.com/errata/RHSA-2016:0705
reference_id RHSA-2016:0705
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0705
50
reference_url https://access.redhat.com/errata/RHSA-2016:1132
reference_id RHSA-2016:1132
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:13Z/
url https://access.redhat.com/errata/RHSA-2016:1132
51
reference_url https://access.redhat.com/errata/RHSA-2016:1480
reference_id RHSA-2016:1480
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1480
52
reference_url https://access.redhat.com/errata/RHSA-2016:1481
reference_id RHSA-2016:1481
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1481
53
reference_url https://access.redhat.com/errata/RHSA-2016:1602
reference_id RHSA-2016:1602
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1602
54
reference_url https://usn.ubuntu.com/2953-1/
reference_id USN-2953-1
reference_type
scores
url https://usn.ubuntu.com/2953-1/
fixed_packages
aliases CVE-2016-0649
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-a3hx-qz7x-7ybk
18
url VCID-a952-adu8-8qfx
vulnerability_id VCID-a952-adu8-8qfx
summary
Multiple vulnerabilities have been found in libpcre, the worst of
    which could lead to arbitrary code execution, or cause a Denial of Service
    condition.
references
0
reference_url http://rhn.redhat.com/errata/RHSA-2016-1025.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-1025.html
1
reference_url http://rhn.redhat.com/errata/RHSA-2016-2750.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-2750.html
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8385.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8385.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-8385
reference_id
reference_type
scores
0
value 0.05145
scoring_system epss
scoring_elements 0.89891
published_at 2026-04-18T12:55:00Z
1
value 0.05145
scoring_system epss
scoring_elements 0.89835
published_at 2026-04-01T12:55:00Z
2
value 0.05145
scoring_system epss
scoring_elements 0.89838
published_at 2026-04-02T12:55:00Z
3
value 0.05145
scoring_system epss
scoring_elements 0.89851
published_at 2026-04-04T12:55:00Z
4
value 0.05145
scoring_system epss
scoring_elements 0.89856
published_at 2026-04-07T12:55:00Z
5
value 0.05145
scoring_system epss
scoring_elements 0.89873
published_at 2026-04-08T12:55:00Z
6
value 0.05145
scoring_system epss
scoring_elements 0.89879
published_at 2026-04-09T12:55:00Z
7
value 0.05145
scoring_system epss
scoring_elements 0.89885
published_at 2026-04-21T12:55:00Z
8
value 0.05145
scoring_system epss
scoring_elements 0.89883
published_at 2026-04-12T12:55:00Z
9
value 0.05145
scoring_system epss
scoring_elements 0.89876
published_at 2026-04-13T12:55:00Z
10
value 0.05145
scoring_system epss
scoring_elements 0.8989
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-8385
4
reference_url https://bto.bluecoat.com/security-advisory/sa128
reference_id
reference_type
scores
url https://bto.bluecoat.com/security-advisory/sa128
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8385
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8385
6
reference_url http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup
reference_id
reference_type
scores
url http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup
7
reference_url http://www-01.ibm.com/support/docview.wss?uid=isg3T1023886
reference_id
reference_type
scores
url http://www-01.ibm.com/support/docview.wss?uid=isg3T1023886
8
reference_url http://www.openwall.com/lists/oss-security/2015/11/29/1
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2015/11/29/1
9
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
10
reference_url http://www.securityfocus.com/bid/85572
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/85572
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1287629
reference_id 1287629
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1287629
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:perl_compatible_regular_expression_library:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pcre:perl_compatible_regular_expression_library:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:perl_compatible_regular_expression_library:*:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-8385
reference_id CVE-2015-8385
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2015-8385
15
reference_url https://security.gentoo.org/glsa/201607-02
reference_id GLSA-201607-02
reference_type
scores
url https://security.gentoo.org/glsa/201607-02
16
reference_url https://access.redhat.com/errata/RHSA-2016:1025
reference_id RHSA-2016:1025
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1025
17
reference_url https://access.redhat.com/errata/RHSA-2016:1132
reference_id RHSA-2016:1132
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1132
18
reference_url https://access.redhat.com/errata/RHSA-2016:2750
reference_id RHSA-2016:2750
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2750
19
reference_url https://usn.ubuntu.com/2943-1/
reference_id USN-2943-1
reference_type
scores
url https://usn.ubuntu.com/2943-1/
fixed_packages
aliases CVE-2015-8385
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-a952-adu8-8qfx
19
url VCID-bfnh-7k45-nkg2
vulnerability_id VCID-bfnh-7k45-nkg2
summary security update
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:19Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:19Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:19Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:19Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:19Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:19Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html
6
reference_url http://rhn.redhat.com/errata/RHSA-2016-0705.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:19Z/
url http://rhn.redhat.com/errata/RHSA-2016-0705.html
7
reference_url http://rhn.redhat.com/errata/RHSA-2016-1480.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:19Z/
url http://rhn.redhat.com/errata/RHSA-2016-1480.html
8
reference_url http://rhn.redhat.com/errata/RHSA-2016-1481.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:19Z/
url http://rhn.redhat.com/errata/RHSA-2016-1481.html
9
reference_url http://rhn.redhat.com/errata/RHSA-2016-1602.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:19Z/
url http://rhn.redhat.com/errata/RHSA-2016-1602.html
10
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0646.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0646.json
11
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-0646
reference_id
reference_type
scores
0
value 0.00214
scoring_system epss
scoring_elements 0.4388
published_at 2026-04-21T12:55:00Z
1
value 0.00214
scoring_system epss
scoring_elements 0.43921
published_at 2026-04-02T12:55:00Z
2
value 0.00214
scoring_system epss
scoring_elements 0.43944
published_at 2026-04-11T12:55:00Z
3
value 0.00214
scoring_system epss
scoring_elements 0.43874
published_at 2026-04-07T12:55:00Z
4
value 0.00214
scoring_system epss
scoring_elements 0.43924
published_at 2026-04-08T12:55:00Z
5
value 0.00214
scoring_system epss
scoring_elements 0.43926
published_at 2026-04-09T12:55:00Z
6
value 0.00214
scoring_system epss
scoring_elements 0.43911
published_at 2026-04-12T12:55:00Z
7
value 0.00214
scoring_system epss
scoring_elements 0.43895
published_at 2026-04-13T12:55:00Z
8
value 0.00214
scoring_system epss
scoring_elements 0.43957
published_at 2026-04-16T12:55:00Z
9
value 0.00214
scoring_system epss
scoring_elements 0.43948
published_at 2026-04-18T12:55:00Z
10
value 0.00214
scoring_system epss
scoring_elements 0.43877
published_at 2026-04-01T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-0646
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0640
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0640
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0641
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0641
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0642
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0642
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0643
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0643
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0644
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0644
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0646
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0646
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0647
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0647
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0648
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0648
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0649
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0649
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0650
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0650
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0655
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0655
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0666
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0666
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0668
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0668
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2047
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2047
26
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.6
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:S/C:N/I:N/A:C
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
27
reference_url https://mariadb.com/kb/en/mariadb/mariadb-10024-release-notes/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:19Z/
url https://mariadb.com/kb/en/mariadb/mariadb-10024-release-notes/
28
reference_url https://mariadb.com/kb/en/mariadb/mariadb-10112-release-notes/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:19Z/
url https://mariadb.com/kb/en/mariadb/mariadb-10112-release-notes/
29
reference_url https://mariadb.com/kb/en/mariadb/mariadb-5548-release-notes/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:19Z/
url https://mariadb.com/kb/en/mariadb/mariadb-5548-release-notes/
30
reference_url http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:19Z/
url http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168
31
reference_url http://www.debian.org/security/2016/dsa-3557
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:19Z/
url http://www.debian.org/security/2016/dsa-3557
32
reference_url http://www.debian.org/security/2016/dsa-3595
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:19Z/
url http://www.debian.org/security/2016/dsa-3595
33
reference_url http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:19Z/
url http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
34
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:19Z/
url http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
35
reference_url http://www.securityfocus.com/bid/86436
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:19Z/
url http://www.securityfocus.com/bid/86436
36
reference_url http://www.securitytracker.com/id/1035606
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:19Z/
url http://www.securitytracker.com/id/1035606
37
reference_url http://www.ubuntu.com/usn/USN-2953-1
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:19Z/
url http://www.ubuntu.com/usn/USN-2953-1
38
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1329248
reference_id 1329248
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1329248
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:powerkvm:2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ibm:powerkvm:2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:powerkvm:2.1:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:powerkvm:3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ibm:powerkvm:3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:powerkvm:3.1:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-0646
reference_id CVE-2016-0646
reference_type
scores
0
value 4.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:P
1
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2016-0646
49
reference_url https://access.redhat.com/errata/RHSA-2016:0705
reference_id RHSA-2016:0705
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0705
50
reference_url https://access.redhat.com/errata/RHSA-2016:1132
reference_id RHSA-2016:1132
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:19Z/
url https://access.redhat.com/errata/RHSA-2016:1132
51
reference_url https://access.redhat.com/errata/RHSA-2016:1480
reference_id RHSA-2016:1480
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1480
52
reference_url https://access.redhat.com/errata/RHSA-2016:1481
reference_id RHSA-2016:1481
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1481
53
reference_url https://access.redhat.com/errata/RHSA-2016:1602
reference_id RHSA-2016:1602
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1602
54
reference_url https://usn.ubuntu.com/2953-1/
reference_id USN-2953-1
reference_type
scores
url https://usn.ubuntu.com/2953-1/
fixed_packages
aliases CVE-2016-0646
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bfnh-7k45-nkg2
20
url VCID-bjyw-emd1-zbfv
vulnerability_id VCID-bjyw-emd1-zbfv
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4816.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4816.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-4816
reference_id
reference_type
scores
0
value 0.04002
scoring_system epss
scoring_elements 0.88383
published_at 2026-04-01T12:55:00Z
1
value 0.04002
scoring_system epss
scoring_elements 0.88391
published_at 2026-04-02T12:55:00Z
2
value 0.04002
scoring_system epss
scoring_elements 0.884
published_at 2026-04-04T12:55:00Z
3
value 0.04002
scoring_system epss
scoring_elements 0.88404
published_at 2026-04-07T12:55:00Z
4
value 0.04002
scoring_system epss
scoring_elements 0.88423
published_at 2026-04-08T12:55:00Z
5
value 0.04002
scoring_system epss
scoring_elements 0.8843
published_at 2026-04-09T12:55:00Z
6
value 0.04002
scoring_system epss
scoring_elements 0.8844
published_at 2026-04-11T12:55:00Z
7
value 0.04002
scoring_system epss
scoring_elements 0.88433
published_at 2026-04-12T12:55:00Z
8
value 0.04002
scoring_system epss
scoring_elements 0.88432
published_at 2026-04-13T12:55:00Z
9
value 0.04002
scoring_system epss
scoring_elements 0.88447
published_at 2026-04-16T12:55:00Z
10
value 0.04002
scoring_system epss
scoring_elements 0.88444
published_at 2026-04-18T12:55:00Z
11
value 0.04002
scoring_system epss
scoring_elements 0.88441
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-4816
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4792
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4792
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4802
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4802
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4815
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4815
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4816
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4816
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4819
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4819
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4826
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4826
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4830
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4830
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4836
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4836
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4858
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4858
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4861
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4861
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4870
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4870
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4879
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4879
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4895
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4895
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4913
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4913
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1274761
reference_id 1274761
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1274761
17
reference_url https://access.redhat.com/errata/RHSA-2015:1628
reference_id RHSA-2015:1628
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1628
18
reference_url https://access.redhat.com/errata/RHSA-2015:1629
reference_id RHSA-2015:1629
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1629
19
reference_url https://access.redhat.com/errata/RHSA-2016:0534
reference_id RHSA-2016:0534
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0534
20
reference_url https://access.redhat.com/errata/RHSA-2016:1132
reference_id RHSA-2016:1132
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1132
21
reference_url https://access.redhat.com/errata/RHSA-2016:1481
reference_id RHSA-2016:1481
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1481
22
reference_url https://usn.ubuntu.com/2781-1/
reference_id USN-2781-1
reference_type
scores
url https://usn.ubuntu.com/2781-1/
fixed_packages
aliases CVE-2015-4816
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bjyw-emd1-zbfv
21
url VCID-ca85-vx8c-huht
vulnerability_id VCID-ca85-vx8c-huht
summary security update
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:11Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:11Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:11Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:11Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:11Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:11Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html
6
reference_url http://rhn.redhat.com/errata/RHSA-2016-0705.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:11Z/
url http://rhn.redhat.com/errata/RHSA-2016-0705.html
7
reference_url http://rhn.redhat.com/errata/RHSA-2016-1480.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:11Z/
url http://rhn.redhat.com/errata/RHSA-2016-1480.html
8
reference_url http://rhn.redhat.com/errata/RHSA-2016-1481.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:11Z/
url http://rhn.redhat.com/errata/RHSA-2016-1481.html
9
reference_url http://rhn.redhat.com/errata/RHSA-2016-1602.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:11Z/
url http://rhn.redhat.com/errata/RHSA-2016-1602.html
10
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0650.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0650.json
11
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-0650
reference_id
reference_type
scores
0
value 0.00214
scoring_system epss
scoring_elements 0.43877
published_at 2026-04-01T12:55:00Z
1
value 0.00214
scoring_system epss
scoring_elements 0.43921
published_at 2026-04-02T12:55:00Z
2
value 0.00214
scoring_system epss
scoring_elements 0.43944
published_at 2026-04-11T12:55:00Z
3
value 0.00214
scoring_system epss
scoring_elements 0.43874
published_at 2026-04-07T12:55:00Z
4
value 0.00214
scoring_system epss
scoring_elements 0.43924
published_at 2026-04-08T12:55:00Z
5
value 0.00214
scoring_system epss
scoring_elements 0.43926
published_at 2026-04-09T12:55:00Z
6
value 0.00214
scoring_system epss
scoring_elements 0.43911
published_at 2026-04-12T12:55:00Z
7
value 0.00214
scoring_system epss
scoring_elements 0.43895
published_at 2026-04-13T12:55:00Z
8
value 0.00214
scoring_system epss
scoring_elements 0.43957
published_at 2026-04-16T12:55:00Z
9
value 0.00214
scoring_system epss
scoring_elements 0.43948
published_at 2026-04-18T12:55:00Z
10
value 0.00214
scoring_system epss
scoring_elements 0.4388
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-0650
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0640
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0640
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0641
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0641
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0642
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0642
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0643
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0643
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0644
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0644
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0646
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0646
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0647
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0647
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0648
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0648
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0649
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0649
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0650
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0650
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0655
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0655
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0666
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0666
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0668
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0668
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2047
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2047
26
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.6
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:S/C:N/I:N/A:C
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
27
reference_url https://mariadb.com/kb/en/mariadb/mariadb-10024-release-notes/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:11Z/
url https://mariadb.com/kb/en/mariadb/mariadb-10024-release-notes/
28
reference_url https://mariadb.com/kb/en/mariadb/mariadb-10112-release-notes/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:11Z/
url https://mariadb.com/kb/en/mariadb/mariadb-10112-release-notes/
29
reference_url https://mariadb.com/kb/en/mariadb/mariadb-5548-release-notes/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:11Z/
url https://mariadb.com/kb/en/mariadb/mariadb-5548-release-notes/
30
reference_url http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:11Z/
url http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168
31
reference_url http://www.debian.org/security/2016/dsa-3557
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:11Z/
url http://www.debian.org/security/2016/dsa-3557
32
reference_url http://www.debian.org/security/2016/dsa-3595
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:11Z/
url http://www.debian.org/security/2016/dsa-3595
33
reference_url http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:11Z/
url http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
34
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:11Z/
url http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
35
reference_url http://www.securityfocus.com/bid/86496
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:11Z/
url http://www.securityfocus.com/bid/86496
36
reference_url http://www.securitytracker.com/id/1035606
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:11Z/
url http://www.securitytracker.com/id/1035606
37
reference_url http://www.ubuntu.com/usn/USN-2953-1
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:11Z/
url http://www.ubuntu.com/usn/USN-2953-1
38
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1329253
reference_id 1329253
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1329253
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:powerkvm:2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ibm:powerkvm:2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:powerkvm:2.1:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:powerkvm:3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ibm:powerkvm:3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:powerkvm:3.1:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-0650
reference_id CVE-2016-0650
reference_type
scores
0
value 4.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:P
1
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2016-0650
49
reference_url https://access.redhat.com/errata/RHSA-2016:0705
reference_id RHSA-2016:0705
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0705
50
reference_url https://access.redhat.com/errata/RHSA-2016:1132
reference_id RHSA-2016:1132
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:11Z/
url https://access.redhat.com/errata/RHSA-2016:1132
51
reference_url https://access.redhat.com/errata/RHSA-2016:1480
reference_id RHSA-2016:1480
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1480
52
reference_url https://access.redhat.com/errata/RHSA-2016:1481
reference_id RHSA-2016:1481
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1481
53
reference_url https://access.redhat.com/errata/RHSA-2016:1602
reference_id RHSA-2016:1602
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1602
54
reference_url https://usn.ubuntu.com/2953-1/
reference_id USN-2953-1
reference_type
scores
url https://usn.ubuntu.com/2953-1/
fixed_packages
aliases CVE-2016-0650
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ca85-vx8c-huht
22
url VCID-ceyn-dgzv-5qak
vulnerability_id VCID-ceyn-dgzv-5qak
summary security update
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:02Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:02Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:02Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:02Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:02Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html
5
reference_url http://rhn.redhat.com/errata/RHSA-2016-0705.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:02Z/
url http://rhn.redhat.com/errata/RHSA-2016-0705.html
6
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0655.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0655.json
7
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-0655
reference_id
reference_type
scores
0
value 0.00244
scoring_system epss
scoring_elements 0.47627
published_at 2026-04-01T12:55:00Z
1
value 0.00244
scoring_system epss
scoring_elements 0.47665
published_at 2026-04-02T12:55:00Z
2
value 0.00244
scoring_system epss
scoring_elements 0.47686
published_at 2026-04-09T12:55:00Z
3
value 0.00244
scoring_system epss
scoring_elements 0.47636
published_at 2026-04-07T12:55:00Z
4
value 0.00244
scoring_system epss
scoring_elements 0.47691
published_at 2026-04-08T12:55:00Z
5
value 0.00244
scoring_system epss
scoring_elements 0.4771
published_at 2026-04-11T12:55:00Z
6
value 0.00244
scoring_system epss
scoring_elements 0.47687
published_at 2026-04-12T12:55:00Z
7
value 0.00244
scoring_system epss
scoring_elements 0.47696
published_at 2026-04-13T12:55:00Z
8
value 0.00244
scoring_system epss
scoring_elements 0.47752
published_at 2026-04-16T12:55:00Z
9
value 0.00244
scoring_system epss
scoring_elements 0.47745
published_at 2026-04-18T12:55:00Z
10
value 0.00244
scoring_system epss
scoring_elements 0.47698
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-0655
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0640
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0640
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0641
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0641
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0643
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0643
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0644
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0644
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0646
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0646
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0647
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0647
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0648
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0648
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0649
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0649
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0650
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0650
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0655
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0655
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0666
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0666
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0668
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0668
20
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4
scoring_system cvssv2
scoring_elements AV:L/AC:H/Au:N/C:N/I:N/A:C
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
21
reference_url https://mariadb.com/kb/en/mariadb/mariadb-10025-release-notes/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:02Z/
url https://mariadb.com/kb/en/mariadb/mariadb-10025-release-notes/
22
reference_url https://mariadb.com/kb/en/mariadb/mariadb-10114-release-notes/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:02Z/
url https://mariadb.com/kb/en/mariadb/mariadb-10114-release-notes/
23
reference_url http://www.debian.org/security/2016/dsa-3595
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:02Z/
url http://www.debian.org/security/2016/dsa-3595
24
reference_url http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:02Z/
url http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
25
reference_url http://www.securityfocus.com/bid/86424
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:02Z/
url http://www.securityfocus.com/bid/86424
26
reference_url http://www.securitytracker.com/id/1035606
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:02Z/
url http://www.securitytracker.com/id/1035606
27
reference_url http://www.ubuntu.com/usn/USN-2953-1
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:02Z/
url http://www.ubuntu.com/usn/USN-2953-1
28
reference_url http://www.ubuntu.com/usn/USN-2954-1
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:02Z/
url http://www.ubuntu.com/usn/USN-2954-1
29
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1329259
reference_id 1329259
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1329259
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-0655
reference_id CVE-2016-0655
reference_type
scores
0
value 3.5
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:S/C:N/I:N/A:P
1
value 4.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2016-0655
37
reference_url https://access.redhat.com/errata/RHSA-2016:0705
reference_id RHSA-2016:0705
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0705
38
reference_url https://access.redhat.com/errata/RHSA-2016:1132
reference_id RHSA-2016:1132
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:02Z/
url https://access.redhat.com/errata/RHSA-2016:1132
39
reference_url https://usn.ubuntu.com/2953-1/
reference_id USN-2953-1
reference_type
scores
url https://usn.ubuntu.com/2953-1/
40
reference_url https://usn.ubuntu.com/2954-1/
reference_id USN-2954-1
reference_type
scores
url https://usn.ubuntu.com/2954-1/
fixed_packages
aliases CVE-2016-0655
risk_score 2.1
exploitability 0.5
weighted_severity 4.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ceyn-dgzv-5qak
23
url VCID-ctzs-ypzj-t7dg
vulnerability_id VCID-ctzs-ypzj-t7dg
summary security update
references
0
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177539.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177539.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00010.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00010.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00011.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00011.html
3
reference_url http://lists.opensuse.org/opensuse-updates/2016-02/msg00039.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2016-02/msg00039.html
4
reference_url http://rhn.redhat.com/errata/RHSA-2016-0534.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0534.html
5
reference_url http://rhn.redhat.com/errata/RHSA-2016-0705.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0705.html
6
reference_url http://rhn.redhat.com/errata/RHSA-2016-1480.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-1480.html
7
reference_url http://rhn.redhat.com/errata/RHSA-2016-1481.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-1481.html
8
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4826.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4826.json
9
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-4826
reference_id
reference_type
scores
0
value 0.00276
scoring_system epss
scoring_elements 0.51052
published_at 2026-04-21T12:55:00Z
1
value 0.00276
scoring_system epss
scoring_elements 0.50937
published_at 2026-04-01T12:55:00Z
2
value 0.00276
scoring_system epss
scoring_elements 0.5099
published_at 2026-04-02T12:55:00Z
3
value 0.00276
scoring_system epss
scoring_elements 0.51015
published_at 2026-04-04T12:55:00Z
4
value 0.00276
scoring_system epss
scoring_elements 0.50974
published_at 2026-04-07T12:55:00Z
5
value 0.00276
scoring_system epss
scoring_elements 0.51031
published_at 2026-04-13T12:55:00Z
6
value 0.00276
scoring_system epss
scoring_elements 0.51027
published_at 2026-04-09T12:55:00Z
7
value 0.00276
scoring_system epss
scoring_elements 0.5107
published_at 2026-04-11T12:55:00Z
8
value 0.00276
scoring_system epss
scoring_elements 0.51048
published_at 2026-04-12T12:55:00Z
9
value 0.00276
scoring_system epss
scoring_elements 0.51069
published_at 2026-04-16T12:55:00Z
10
value 0.00276
scoring_system epss
scoring_elements 0.51075
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-4826
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4792
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4792
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4802
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4802
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4815
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4815
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4816
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4816
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4819
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4819
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4826
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4826
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4830
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4830
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4836
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4836
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4858
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4858
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4861
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4861
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4870
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4870
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4879
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4879
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4895
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4895
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4913
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4913
24
reference_url https://www.suse.com/support/update/announcement/2016/suse-su-20160296-1.html
reference_id
reference_type
scores
url https://www.suse.com/support/update/announcement/2016/suse-su-20160296-1.html
25
reference_url http://www.debian.org/security/2015/dsa-3377
reference_id
reference_type
scores
url http://www.debian.org/security/2015/dsa-3377
26
reference_url http://www.debian.org/security/2015/dsa-3385
reference_id
reference_type
scores
url http://www.debian.org/security/2015/dsa-3385
27
reference_url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
28
reference_url http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
29
reference_url http://www.securityfocus.com/bid/77237
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/77237
30
reference_url http://www.securitytracker.com/id/1033894
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1033894
31
reference_url http://www.ubuntu.com/usn/USN-2781-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2781-1
32
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1274766
reference_id 1274766
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1274766
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.1:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-4826
reference_id CVE-2015-4826
reference_type
scores
0
value 4.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:P/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2015-4826
64
reference_url https://access.redhat.com/errata/RHSA-2016:0534
reference_id RHSA-2016:0534
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0534
65
reference_url https://access.redhat.com/errata/RHSA-2016:0705
reference_id RHSA-2016:0705
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0705
66
reference_url https://access.redhat.com/errata/RHSA-2016:1132
reference_id RHSA-2016:1132
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1132
67
reference_url https://access.redhat.com/errata/RHSA-2016:1480
reference_id RHSA-2016:1480
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1480
68
reference_url https://access.redhat.com/errata/RHSA-2016:1481
reference_id RHSA-2016:1481
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1481
69
reference_url https://usn.ubuntu.com/2781-1/
reference_id USN-2781-1
reference_type
scores
url https://usn.ubuntu.com/2781-1/
fixed_packages
aliases CVE-2015-4826
risk_score 1.8
exploitability 0.5
weighted_severity 3.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ctzs-ypzj-t7dg
24
url VCID-cyqa-e362-yyaf
vulnerability_id VCID-cyqa-e362-yyaf
summary security update
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:24Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:24Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:24Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:24Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:24Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:24Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html
6
reference_url http://rhn.redhat.com/errata/RHSA-2016-0705.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:24Z/
url http://rhn.redhat.com/errata/RHSA-2016-0705.html
7
reference_url http://rhn.redhat.com/errata/RHSA-2016-1480.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:24Z/
url http://rhn.redhat.com/errata/RHSA-2016-1480.html
8
reference_url http://rhn.redhat.com/errata/RHSA-2016-1481.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:24Z/
url http://rhn.redhat.com/errata/RHSA-2016-1481.html
9
reference_url http://rhn.redhat.com/errata/RHSA-2016-1602.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:24Z/
url http://rhn.redhat.com/errata/RHSA-2016-1602.html
10
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0643.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0643.json
11
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-0643
reference_id
reference_type
scores
0
value 0.00267
scoring_system epss
scoring_elements 0.50197
published_at 2026-04-21T12:55:00Z
1
value 0.00267
scoring_system epss
scoring_elements 0.50162
published_at 2026-04-02T12:55:00Z
2
value 0.00267
scoring_system epss
scoring_elements 0.5019
published_at 2026-04-12T12:55:00Z
3
value 0.00267
scoring_system epss
scoring_elements 0.5014
published_at 2026-04-07T12:55:00Z
4
value 0.00267
scoring_system epss
scoring_elements 0.50194
published_at 2026-04-08T12:55:00Z
5
value 0.00267
scoring_system epss
scoring_elements 0.50187
published_at 2026-04-09T12:55:00Z
6
value 0.00267
scoring_system epss
scoring_elements 0.50216
published_at 2026-04-11T12:55:00Z
7
value 0.00267
scoring_system epss
scoring_elements 0.50177
published_at 2026-04-13T12:55:00Z
8
value 0.00267
scoring_system epss
scoring_elements 0.50221
published_at 2026-04-16T12:55:00Z
9
value 0.00267
scoring_system epss
scoring_elements 0.50222
published_at 2026-04-18T12:55:00Z
10
value 0.00267
scoring_system epss
scoring_elements 0.50117
published_at 2026-04-01T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-0643
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0640
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0640
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0641
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0641
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0642
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0642
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0643
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0643
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0644
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0644
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0646
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0646
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0647
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0647
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0648
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0648
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0649
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0649
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0650
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0650
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0655
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0655
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0666
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0666
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0668
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0668
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2047
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2047
26
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 1.7
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:S/C:P/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
27
reference_url https://mariadb.com/kb/en/mariadb/mariadb-10025-release-notes/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:24Z/
url https://mariadb.com/kb/en/mariadb/mariadb-10025-release-notes/
28
reference_url https://mariadb.com/kb/en/mariadb/mariadb-10114-release-notes/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:24Z/
url https://mariadb.com/kb/en/mariadb/mariadb-10114-release-notes/
29
reference_url https://mariadb.com/kb/en/mariadb/mariadb-5549-release-notes/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:24Z/
url https://mariadb.com/kb/en/mariadb/mariadb-5549-release-notes/
30
reference_url http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:24Z/
url http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168
31
reference_url http://www.debian.org/security/2016/dsa-3557
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:24Z/
url http://www.debian.org/security/2016/dsa-3557
32
reference_url http://www.debian.org/security/2016/dsa-3595
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:24Z/
url http://www.debian.org/security/2016/dsa-3595
33
reference_url http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:24Z/
url http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
34
reference_url http://www.securityfocus.com/bid/86486
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:24Z/
url http://www.securityfocus.com/bid/86486
35
reference_url http://www.securitytracker.com/id/1035606
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:24Z/
url http://www.securitytracker.com/id/1035606
36
reference_url http://www.ubuntu.com/usn/USN-2953-1
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:24Z/
url http://www.ubuntu.com/usn/USN-2953-1
37
reference_url http://www.ubuntu.com/usn/USN-2954-1
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:24Z/
url http://www.ubuntu.com/usn/USN-2954-1
38
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1329245
reference_id 1329245
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1329245
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:powerkvm:2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ibm:powerkvm:2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:powerkvm:2.1:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:powerkvm:3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ibm:powerkvm:3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:powerkvm:3.1:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-0643
reference_id CVE-2016-0643
reference_type
scores
0
value 4.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:P/I:N/A:N
1
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2016-0643
48
reference_url https://access.redhat.com/errata/RHSA-2016:0705
reference_id RHSA-2016:0705
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0705
49
reference_url https://access.redhat.com/errata/RHSA-2016:1132
reference_id RHSA-2016:1132
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:24Z/
url https://access.redhat.com/errata/RHSA-2016:1132
50
reference_url https://access.redhat.com/errata/RHSA-2016:1480
reference_id RHSA-2016:1480
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1480
51
reference_url https://access.redhat.com/errata/RHSA-2016:1481
reference_id RHSA-2016:1481
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1481
52
reference_url https://access.redhat.com/errata/RHSA-2016:1602
reference_id RHSA-2016:1602
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1602
53
reference_url https://usn.ubuntu.com/2953-1/
reference_id USN-2953-1
reference_type
scores
url https://usn.ubuntu.com/2953-1/
54
reference_url https://usn.ubuntu.com/2954-1/
reference_id USN-2954-1
reference_type
scores
url https://usn.ubuntu.com/2954-1/
fixed_packages
aliases CVE-2016-0643
risk_score 1.8
exploitability 0.5
weighted_severity 3.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-cyqa-e362-yyaf
25
url VCID-dfts-4w3d-huc3
vulnerability_id VCID-dfts-4w3d-huc3
summary
Multiple vulnerabilities have been found in libpcre, the worst of
    which could lead to arbitrary code execution, or cause a Denial of Service
    condition.
references
0
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2016-January/174931.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2016-January/174931.html
1
reference_url http://rhn.redhat.com/errata/RHSA-2016-1025.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-1025.html
2
reference_url http://rhn.redhat.com/errata/RHSA-2016-2750.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-2750.html
3
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8391.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8391.json
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-8391
reference_id
reference_type
scores
0
value 0.06404
scoring_system epss
scoring_elements 0.91061
published_at 2026-04-21T12:55:00Z
1
value 0.06404
scoring_system epss
scoring_elements 0.91058
published_at 2026-04-18T12:55:00Z
2
value 0.06404
scoring_system epss
scoring_elements 0.90986
published_at 2026-04-01T12:55:00Z
3
value 0.06404
scoring_system epss
scoring_elements 0.90991
published_at 2026-04-02T12:55:00Z
4
value 0.06404
scoring_system epss
scoring_elements 0.91
published_at 2026-04-04T12:55:00Z
5
value 0.06404
scoring_system epss
scoring_elements 0.9101
published_at 2026-04-07T12:55:00Z
6
value 0.06404
scoring_system epss
scoring_elements 0.91023
published_at 2026-04-08T12:55:00Z
7
value 0.06404
scoring_system epss
scoring_elements 0.91028
published_at 2026-04-09T12:55:00Z
8
value 0.06404
scoring_system epss
scoring_elements 0.91037
published_at 2026-04-11T12:55:00Z
9
value 0.06404
scoring_system epss
scoring_elements 0.91036
published_at 2026-04-13T12:55:00Z
10
value 0.06404
scoring_system epss
scoring_elements 0.9106
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-8391
5
reference_url https://bto.bluecoat.com/security-advisory/sa128
reference_id
reference_type
scores
url https://bto.bluecoat.com/security-advisory/sa128
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8391
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8391
7
reference_url https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731
reference_id
reference_type
scores
url https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731
8
reference_url https://security.netapp.com/advisory/ntap-20230216-0002/
reference_id
reference_type
scores
url https://security.netapp.com/advisory/ntap-20230216-0002/
9
reference_url http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup
reference_id
reference_type
scores
url http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup
10
reference_url http://www-01.ibm.com/support/docview.wss?uid=isg3T1023886
reference_id
reference_type
scores
url http://www-01.ibm.com/support/docview.wss?uid=isg3T1023886
11
reference_url http://www.openwall.com/lists/oss-security/2015/11/29/1
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2015/11/29/1
12
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
13
reference_url http://www.securityfocus.com/bid/82990
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/82990
14
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1287671
reference_id 1287671
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1287671
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:pcre:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pcre:pcre:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:pcre:*:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:php:php:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:*:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:-:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:linux:7:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:-:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-8391
reference_id CVE-2015-8391
reference_type
scores
0
value 9.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:C
1
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2015-8391
38
reference_url https://security.gentoo.org/glsa/201607-02
reference_id GLSA-201607-02
reference_type
scores
url https://security.gentoo.org/glsa/201607-02
39
reference_url https://access.redhat.com/errata/RHSA-2016:1025
reference_id RHSA-2016:1025
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1025
40
reference_url https://access.redhat.com/errata/RHSA-2016:1132
reference_id RHSA-2016:1132
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1132
41
reference_url https://access.redhat.com/errata/RHSA-2016:2750
reference_id RHSA-2016:2750
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2750
42
reference_url https://usn.ubuntu.com/2943-1/
reference_id USN-2943-1
reference_type
scores
url https://usn.ubuntu.com/2943-1/
fixed_packages
aliases CVE-2015-8391
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dfts-4w3d-huc3
26
url VCID-dqg6-2gmj-judy
vulnerability_id VCID-dqg6-2gmj-judy
summary security update
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00015.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00015.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00016.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00016.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html
6
reference_url http://rhn.redhat.com/errata/RHSA-2016-0534.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0534.html
7
reference_url http://rhn.redhat.com/errata/RHSA-2016-0705.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0705.html
8
reference_url http://rhn.redhat.com/errata/RHSA-2016-1480.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-1480.html
9
reference_url http://rhn.redhat.com/errata/RHSA-2016-1481.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-1481.html
10
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0546.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0546.json
11
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-0546
reference_id
reference_type
scores
0
value 0.0018
scoring_system epss
scoring_elements 0.39546
published_at 2026-04-21T12:55:00Z
1
value 0.0018
scoring_system epss
scoring_elements 0.39629
published_at 2026-04-18T12:55:00Z
2
value 0.0018
scoring_system epss
scoring_elements 0.39493
published_at 2026-04-01T12:55:00Z
3
value 0.0018
scoring_system epss
scoring_elements 0.39643
published_at 2026-04-02T12:55:00Z
4
value 0.0018
scoring_system epss
scoring_elements 0.39665
published_at 2026-04-04T12:55:00Z
5
value 0.0018
scoring_system epss
scoring_elements 0.39582
published_at 2026-04-07T12:55:00Z
6
value 0.0018
scoring_system epss
scoring_elements 0.39637
published_at 2026-04-08T12:55:00Z
7
value 0.0018
scoring_system epss
scoring_elements 0.39651
published_at 2026-04-09T12:55:00Z
8
value 0.0018
scoring_system epss
scoring_elements 0.3966
published_at 2026-04-11T12:55:00Z
9
value 0.0018
scoring_system epss
scoring_elements 0.39624
published_at 2026-04-12T12:55:00Z
10
value 0.0018
scoring_system epss
scoring_elements 0.39607
published_at 2026-04-13T12:55:00Z
11
value 0.0018
scoring_system epss
scoring_elements 0.39658
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-0546
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0505
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0505
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0546
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0546
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0596
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0596
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0597
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0597
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0598
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0598
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0600
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0600
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0606
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0606
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0608
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0608
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0609
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0609
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0616
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0616
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2047
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2047
23
reference_url https://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-47.html
reference_id
reference_type
scores
url https://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-47.html
24
reference_url https://dev.mysql.com/doc/relnotes/mysql/5.6/en/news-5-6-28.html
reference_id
reference_type
scores
url https://dev.mysql.com/doc/relnotes/mysql/5.6/en/news-5-6-28.html
25
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.2
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:C/I:C/A:C
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
26
reference_url https://github.com/mysql/mysql-server/commit/0dbd5a8797ed4bd18e8b883988fb62177eb0f73f
reference_id
reference_type
scores
url https://github.com/mysql/mysql-server/commit/0dbd5a8797ed4bd18e8b883988fb62177eb0f73f
27
reference_url https://mariadb.com/kb/en/mariadb/mariadb-10110-release-notes/
reference_id
reference_type
scores
url https://mariadb.com/kb/en/mariadb/mariadb-10110-release-notes/
28
reference_url https://mariadb.com/kb/en/mariadb/mariadb-5547-release-notes/
reference_id
reference_type
scores
url https://mariadb.com/kb/en/mariadb/mariadb-5547-release-notes/
29
reference_url https://mariadb.com/kb/en/mdb-10023-rn/
reference_id
reference_type
scores
url https://mariadb.com/kb/en/mdb-10023-rn/
30
reference_url http://www.debian.org/security/2016/dsa-3453
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3453
31
reference_url http://www.debian.org/security/2016/dsa-3459
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3459
32
reference_url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
33
reference_url http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
34
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
35
reference_url http://www.securityfocus.com/bid/81066
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/81066
36
reference_url http://www.securitytracker.com/id/1034708
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1034708
37
reference_url http://www.ubuntu.com/usn/USN-2881-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2881-1
38
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1301493
reference_id 1301493
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1301493
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node_eus:7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_hpc_node_eus:7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node_eus:7.2:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-0546
reference_id CVE-2016-0546
reference_type
scores
0
value 7.2
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2016-0546
60
reference_url https://access.redhat.com/errata/RHSA-2016:0534
reference_id RHSA-2016:0534
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0534
61
reference_url https://access.redhat.com/errata/RHSA-2016:0705
reference_id RHSA-2016:0705
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0705
62
reference_url https://access.redhat.com/errata/RHSA-2016:1132
reference_id RHSA-2016:1132
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1132
63
reference_url https://access.redhat.com/errata/RHSA-2016:1480
reference_id RHSA-2016:1480
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1480
64
reference_url https://access.redhat.com/errata/RHSA-2016:1481
reference_id RHSA-2016:1481
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1481
65
reference_url https://usn.ubuntu.com/2881-1/
reference_id USN-2881-1
reference_type
scores
url https://usn.ubuntu.com/2881-1/
fixed_packages
aliases CVE-2016-0546
risk_score 3.2
exploitability 0.5
weighted_severity 6.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dqg6-2gmj-judy
27
url VCID-esfk-umc5-ska4
vulnerability_id VCID-esfk-umc5-ska4
summary security update
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00015.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00015.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00016.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00016.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html
6
reference_url http://rhn.redhat.com/errata/RHSA-2016-0534.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0534.html
7
reference_url http://rhn.redhat.com/errata/RHSA-2016-0705.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0705.html
8
reference_url http://rhn.redhat.com/errata/RHSA-2016-1480.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-1480.html
9
reference_url http://rhn.redhat.com/errata/RHSA-2016-1481.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-1481.html
10
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0609.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0609.json
11
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-0609
reference_id
reference_type
scores
0
value 0.00794
scoring_system epss
scoring_elements 0.73996
published_at 2026-04-21T12:55:00Z
1
value 0.00794
scoring_system epss
scoring_elements 0.74005
published_at 2026-04-18T12:55:00Z
2
value 0.00794
scoring_system epss
scoring_elements 0.73905
published_at 2026-04-01T12:55:00Z
3
value 0.00794
scoring_system epss
scoring_elements 0.73915
published_at 2026-04-02T12:55:00Z
4
value 0.00794
scoring_system epss
scoring_elements 0.73939
published_at 2026-04-04T12:55:00Z
5
value 0.00794
scoring_system epss
scoring_elements 0.73911
published_at 2026-04-07T12:55:00Z
6
value 0.00794
scoring_system epss
scoring_elements 0.73945
published_at 2026-04-08T12:55:00Z
7
value 0.00794
scoring_system epss
scoring_elements 0.73958
published_at 2026-04-09T12:55:00Z
8
value 0.00794
scoring_system epss
scoring_elements 0.73981
published_at 2026-04-11T12:55:00Z
9
value 0.00794
scoring_system epss
scoring_elements 0.73963
published_at 2026-04-12T12:55:00Z
10
value 0.00794
scoring_system epss
scoring_elements 0.73955
published_at 2026-04-13T12:55:00Z
11
value 0.00794
scoring_system epss
scoring_elements 0.73995
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-0609
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0505
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0505
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0546
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0546
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0596
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0596
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0597
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0597
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0598
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0598
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0600
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0600
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0606
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0606
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0608
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0608
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0609
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0609
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0616
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0616
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2047
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2047
23
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 1.7
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:M/C:N/I:N/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
24
reference_url https://mariadb.com/kb/en/mariadb/mariadb-10110-release-notes/
reference_id
reference_type
scores
url https://mariadb.com/kb/en/mariadb/mariadb-10110-release-notes/
25
reference_url https://mariadb.com/kb/en/mariadb/mariadb-5547-release-notes/
reference_id
reference_type
scores
url https://mariadb.com/kb/en/mariadb/mariadb-5547-release-notes/
26
reference_url https://mariadb.com/kb/en/mdb-10023-rn/
reference_id
reference_type
scores
url https://mariadb.com/kb/en/mdb-10023-rn/
27
reference_url http://www.debian.org/security/2016/dsa-3453
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3453
28
reference_url http://www.debian.org/security/2016/dsa-3459
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3459
29
reference_url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
30
reference_url http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
31
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
32
reference_url http://www.securityfocus.com/bid/81258
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/81258
33
reference_url http://www.securitytracker.com/id/1034708
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1034708
34
reference_url http://www.ubuntu.com/usn/USN-2881-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2881-1
35
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1301507
reference_id 1301507
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1301507
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node_eus:7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_hpc_node_eus:7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node_eus:7.2:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-0609
reference_id CVE-2016-0609
reference_type
scores
0
value 1.7
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:M/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2016-0609
57
reference_url https://access.redhat.com/errata/RHSA-2016:0534
reference_id RHSA-2016:0534
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0534
58
reference_url https://access.redhat.com/errata/RHSA-2016:0705
reference_id RHSA-2016:0705
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0705
59
reference_url https://access.redhat.com/errata/RHSA-2016:1132
reference_id RHSA-2016:1132
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1132
60
reference_url https://access.redhat.com/errata/RHSA-2016:1480
reference_id RHSA-2016:1480
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1480
61
reference_url https://access.redhat.com/errata/RHSA-2016:1481
reference_id RHSA-2016:1481
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1481
62
reference_url https://usn.ubuntu.com/2881-1/
reference_id USN-2881-1
reference_type
scores
url https://usn.ubuntu.com/2881-1/
fixed_packages
aliases CVE-2016-0609
risk_score 0.8
exploitability 0.5
weighted_severity 1.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-esfk-umc5-ska4
28
url VCID-f9vz-r6zv-t7ev
vulnerability_id VCID-f9vz-r6zv-t7ev
summary security update
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00015.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00015.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00016.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00016.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html
6
reference_url http://rhn.redhat.com/errata/RHSA-2016-0534.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0534.html
7
reference_url http://rhn.redhat.com/errata/RHSA-2016-0705.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0705.html
8
reference_url http://rhn.redhat.com/errata/RHSA-2016-1480.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-1480.html
9
reference_url http://rhn.redhat.com/errata/RHSA-2016-1481.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-1481.html
10
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0596.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0596.json
11
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-0596
reference_id
reference_type
scores
0
value 0.00361
scoring_system epss
scoring_elements 0.58275
published_at 2026-04-21T12:55:00Z
1
value 0.00361
scoring_system epss
scoring_elements 0.58298
published_at 2026-04-18T12:55:00Z
2
value 0.00361
scoring_system epss
scoring_elements 0.58149
published_at 2026-04-01T12:55:00Z
3
value 0.00361
scoring_system epss
scoring_elements 0.58235
published_at 2026-04-02T12:55:00Z
4
value 0.00361
scoring_system epss
scoring_elements 0.58255
published_at 2026-04-04T12:55:00Z
5
value 0.00361
scoring_system epss
scoring_elements 0.58229
published_at 2026-04-07T12:55:00Z
6
value 0.00361
scoring_system epss
scoring_elements 0.58283
published_at 2026-04-08T12:55:00Z
7
value 0.00361
scoring_system epss
scoring_elements 0.58288
published_at 2026-04-09T12:55:00Z
8
value 0.00361
scoring_system epss
scoring_elements 0.58307
published_at 2026-04-11T12:55:00Z
9
value 0.00361
scoring_system epss
scoring_elements 0.58284
published_at 2026-04-12T12:55:00Z
10
value 0.00361
scoring_system epss
scoring_elements 0.58264
published_at 2026-04-13T12:55:00Z
11
value 0.00361
scoring_system epss
scoring_elements 0.58296
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-0596
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0505
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0505
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0546
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0546
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0596
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0596
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0597
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0597
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0598
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0598
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0600
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0600
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0606
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0606
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0608
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0608
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0609
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0609
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0616
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0616
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2047
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2047
23
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
24
reference_url https://mariadb.com/kb/en/mariadb/mariadb-10110-release-notes/
reference_id
reference_type
scores
url https://mariadb.com/kb/en/mariadb/mariadb-10110-release-notes/
25
reference_url https://mariadb.com/kb/en/mariadb/mariadb-5547-release-notes/
reference_id
reference_type
scores
url https://mariadb.com/kb/en/mariadb/mariadb-5547-release-notes/
26
reference_url https://mariadb.com/kb/en/mdb-10023-rn/
reference_id
reference_type
scores
url https://mariadb.com/kb/en/mdb-10023-rn/
27
reference_url http://www.debian.org/security/2016/dsa-3453
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3453
28
reference_url http://www.debian.org/security/2016/dsa-3459
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3459
29
reference_url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
30
reference_url http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
31
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
32
reference_url http://www.securityfocus.com/bid/81130
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/81130
33
reference_url http://www.securitytracker.com/id/1034708
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1034708
34
reference_url http://www.ubuntu.com/usn/USN-2881-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2881-1
35
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1301496
reference_id 1301496
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1301496
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node_eus:7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_hpc_node_eus:7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node_eus:7.2:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-0596
reference_id CVE-2016-0596
reference_type
scores
0
value 4.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2016-0596
57
reference_url https://access.redhat.com/errata/RHSA-2016:0534
reference_id RHSA-2016:0534
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0534
58
reference_url https://access.redhat.com/errata/RHSA-2016:0705
reference_id RHSA-2016:0705
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0705
59
reference_url https://access.redhat.com/errata/RHSA-2016:1132
reference_id RHSA-2016:1132
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1132
60
reference_url https://access.redhat.com/errata/RHSA-2016:1480
reference_id RHSA-2016:1480
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1480
61
reference_url https://access.redhat.com/errata/RHSA-2016:1481
reference_id RHSA-2016:1481
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1481
62
reference_url https://usn.ubuntu.com/2881-1/
reference_id USN-2881-1
reference_type
scores
url https://usn.ubuntu.com/2881-1/
fixed_packages
aliases CVE-2016-0596
risk_score 1.8
exploitability 0.5
weighted_severity 3.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-f9vz-r6zv-t7ev
29
url VCID-fnks-p4e9-13es
vulnerability_id VCID-fnks-p4e9-13es
summary security update
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00015.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00015.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00016.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00016.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html
6
reference_url http://rhn.redhat.com/errata/RHSA-2016-0534.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0534.html
7
reference_url http://rhn.redhat.com/errata/RHSA-2016-0705.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0705.html
8
reference_url http://rhn.redhat.com/errata/RHSA-2016-1480.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-1480.html
9
reference_url http://rhn.redhat.com/errata/RHSA-2016-1481.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-1481.html
10
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0505.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0505.json
11
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-0505
reference_id
reference_type
scores
0
value 0.06492
scoring_system epss
scoring_elements 0.91124
published_at 2026-04-21T12:55:00Z
1
value 0.06492
scoring_system epss
scoring_elements 0.91121
published_at 2026-04-18T12:55:00Z
2
value 0.06492
scoring_system epss
scoring_elements 0.91047
published_at 2026-04-01T12:55:00Z
3
value 0.06492
scoring_system epss
scoring_elements 0.91051
published_at 2026-04-02T12:55:00Z
4
value 0.06492
scoring_system epss
scoring_elements 0.91061
published_at 2026-04-04T12:55:00Z
5
value 0.06492
scoring_system epss
scoring_elements 0.91069
published_at 2026-04-07T12:55:00Z
6
value 0.06492
scoring_system epss
scoring_elements 0.91082
published_at 2026-04-08T12:55:00Z
7
value 0.06492
scoring_system epss
scoring_elements 0.91088
published_at 2026-04-09T12:55:00Z
8
value 0.06492
scoring_system epss
scoring_elements 0.91096
published_at 2026-04-11T12:55:00Z
9
value 0.06492
scoring_system epss
scoring_elements 0.91097
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-0505
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0505
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0505
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0546
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0546
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0596
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0596
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0597
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0597
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0598
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0598
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0600
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0600
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0606
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0606
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0608
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0608
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0609
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0609
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0616
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0616
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2047
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2047
23
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:C
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
24
reference_url https://mariadb.com/kb/en/mariadb/mariadb-10110-release-notes/
reference_id
reference_type
scores
url https://mariadb.com/kb/en/mariadb/mariadb-10110-release-notes/
25
reference_url https://mariadb.com/kb/en/mariadb/mariadb-5547-release-notes/
reference_id
reference_type
scores
url https://mariadb.com/kb/en/mariadb/mariadb-5547-release-notes/
26
reference_url https://mariadb.com/kb/en/mdb-10023-rn/
reference_id
reference_type
scores
url https://mariadb.com/kb/en/mdb-10023-rn/
27
reference_url http://www.debian.org/security/2016/dsa-3453
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3453
28
reference_url http://www.debian.org/security/2016/dsa-3459
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3459
29
reference_url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
30
reference_url http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
31
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
32
reference_url http://www.securityfocus.com/bid/81088
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/81088
33
reference_url http://www.securitytracker.com/id/1034708
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1034708
34
reference_url http://www.ubuntu.com/usn/USN-2881-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2881-1
35
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1301492
reference_id 1301492
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1301492
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node_eus:7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_hpc_node_eus:7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node_eus:7.2:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-0505
reference_id CVE-2016-0505
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2016-0505
57
reference_url https://access.redhat.com/errata/RHSA-2016:0534
reference_id RHSA-2016:0534
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0534
58
reference_url https://access.redhat.com/errata/RHSA-2016:0705
reference_id RHSA-2016:0705
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0705
59
reference_url https://access.redhat.com/errata/RHSA-2016:1132
reference_id RHSA-2016:1132
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1132
60
reference_url https://access.redhat.com/errata/RHSA-2016:1480
reference_id RHSA-2016:1480
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1480
61
reference_url https://access.redhat.com/errata/RHSA-2016:1481
reference_id RHSA-2016:1481
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1481
62
reference_url https://usn.ubuntu.com/2881-1/
reference_id USN-2881-1
reference_type
scores
url https://usn.ubuntu.com/2881-1/
fixed_packages
aliases CVE-2016-0505
risk_score 3.0
exploitability 0.5
weighted_severity 6.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fnks-p4e9-13es
30
url VCID-fuyw-1y1c-fkfp
vulnerability_id VCID-fuyw-1y1c-fkfp
summary security update
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html
4
reference_url http://rhn.redhat.com/errata/RHSA-2016-0534.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0534.html
5
reference_url http://rhn.redhat.com/errata/RHSA-2016-1480.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-1480.html
6
reference_url http://rhn.redhat.com/errata/RHSA-2016-1481.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-1481.html
7
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0616.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0616.json
8
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-0616
reference_id
reference_type
scores
0
value 0.00472
scoring_system epss
scoring_elements 0.64708
published_at 2026-04-21T12:55:00Z
1
value 0.00472
scoring_system epss
scoring_elements 0.64722
published_at 2026-04-18T12:55:00Z
2
value 0.00472
scoring_system epss
scoring_elements 0.64596
published_at 2026-04-01T12:55:00Z
3
value 0.00472
scoring_system epss
scoring_elements 0.64648
published_at 2026-04-02T12:55:00Z
4
value 0.00472
scoring_system epss
scoring_elements 0.64676
published_at 2026-04-04T12:55:00Z
5
value 0.00472
scoring_system epss
scoring_elements 0.64634
published_at 2026-04-07T12:55:00Z
6
value 0.00472
scoring_system epss
scoring_elements 0.64682
published_at 2026-04-08T12:55:00Z
7
value 0.00472
scoring_system epss
scoring_elements 0.64698
published_at 2026-04-09T12:55:00Z
8
value 0.00472
scoring_system epss
scoring_elements 0.64715
published_at 2026-04-11T12:55:00Z
9
value 0.00472
scoring_system epss
scoring_elements 0.64703
published_at 2026-04-12T12:55:00Z
10
value 0.00472
scoring_system epss
scoring_elements 0.64674
published_at 2026-04-13T12:55:00Z
11
value 0.00472
scoring_system epss
scoring_elements 0.6471
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-0616
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0505
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0505
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0546
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0546
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0596
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0596
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0597
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0597
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0598
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0598
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0600
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0600
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0606
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0606
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0608
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0608
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0609
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0609
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0616
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0616
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2047
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2047
20
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
21
reference_url https://mariadb.com/kb/en/mariadb/mariadb-10110-release-notes/
reference_id
reference_type
scores
url https://mariadb.com/kb/en/mariadb/mariadb-10110-release-notes/
22
reference_url https://mariadb.com/kb/en/mariadb/mariadb-5547-release-notes/
reference_id
reference_type
scores
url https://mariadb.com/kb/en/mariadb/mariadb-5547-release-notes/
23
reference_url https://mariadb.com/kb/en/mdb-10023-rn/
reference_id
reference_type
scores
url https://mariadb.com/kb/en/mdb-10023-rn/
24
reference_url http://www.debian.org/security/2016/dsa-3453
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3453
25
reference_url http://www.debian.org/security/2016/dsa-3459
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3459
26
reference_url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
27
reference_url http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
28
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
29
reference_url http://www.securityfocus.com/bid/81176
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/81176
30
reference_url http://www.securitytracker.com/id/1034708
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1034708
31
reference_url http://www.ubuntu.com/usn/USN-2881-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2881-1
32
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1301510
reference_id 1301510
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1301510
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:10.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.0.0:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:10.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.0.1:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.0.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:10.0.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.0.10:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.0.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:10.0.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.0.11:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.0.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:10.0.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.0.12:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.0.13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:10.0.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.0.13:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.0.14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:10.0.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.0.14:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.0.15:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:10.0.15:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.0.15:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.0.16:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:10.0.16:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.0.16:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.0.17:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:10.0.17:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.0.17:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.0.18:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:10.0.18:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.0.18:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.0.19:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:10.0.19:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.0.19:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:10.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.0.2:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.0.20:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:10.0.20:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.0.20:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.0.21:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:10.0.21:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.0.21:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.0.22:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:10.0.22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.0.22:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:10.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.0.3:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:10.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.0.4:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:10.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.0.5:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:10.0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.0.6:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.0.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:10.0.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.0.7:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.0.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:10.0.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.0.8:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.0.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:10.0.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.0.9:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:10.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.1.0:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:10.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.1.1:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:10.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.1.2:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:10.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.1.3:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.1.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:10.1.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.1.4:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.1.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:10.1.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.1.5:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.1.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:10.1.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.1.6:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.1.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:10.1.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.1.7:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.1.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:10.1.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.1.8:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.1.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:10.1.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.1.9:*:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
71
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
72
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
73
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
74
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
75
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
76
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
77
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*
78
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node_eus:7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_hpc_node_eus:7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node_eus:7.2:*:*:*:*:*:*:*
79
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
80
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
81
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*
82
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
83
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-0616
reference_id CVE-2016-0616
reference_type
scores
0
value 4.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2016-0616
84
reference_url https://access.redhat.com/errata/RHSA-2016:0534
reference_id RHSA-2016:0534
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0534
85
reference_url https://access.redhat.com/errata/RHSA-2016:1132
reference_id RHSA-2016:1132
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1132
86
reference_url https://access.redhat.com/errata/RHSA-2016:1480
reference_id RHSA-2016:1480
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1480
87
reference_url https://access.redhat.com/errata/RHSA-2016:1481
reference_id RHSA-2016:1481
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1481
88
reference_url https://usn.ubuntu.com/2881-1/
reference_id USN-2881-1
reference_type
scores
url https://usn.ubuntu.com/2881-1/
fixed_packages
aliases CVE-2016-0616
risk_score 1.8
exploitability 0.5
weighted_severity 3.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fuyw-1y1c-fkfp
31
url VCID-h5ur-uuwn-ukbz
vulnerability_id VCID-h5ur-uuwn-ukbz
summary mysql: unspecified vulnerability in subcomponent: Server: Security: Encryption (CPU July 2016)
references
0
reference_url http://rhn.redhat.com/errata/RHSA-2016-0705.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:50:14Z/
url http://rhn.redhat.com/errata/RHSA-2016-0705.html
1
reference_url http://rhn.redhat.com/errata/RHSA-2016-1480.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:50:14Z/
url http://rhn.redhat.com/errata/RHSA-2016-1480.html
2
reference_url http://rhn.redhat.com/errata/RHSA-2016-1481.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:50:14Z/
url http://rhn.redhat.com/errata/RHSA-2016-1481.html
3
reference_url http://rhn.redhat.com/errata/RHSA-2016-1602.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:50:14Z/
url http://rhn.redhat.com/errata/RHSA-2016-1602.html
4
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3452.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3452.json
5
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-3452
reference_id
reference_type
scores
0
value 0.03269
scoring_system epss
scoring_elements 0.87114
published_at 2026-04-02T12:55:00Z
1
value 0.03269
scoring_system epss
scoring_elements 0.87175
published_at 2026-04-18T12:55:00Z
2
value 0.03269
scoring_system epss
scoring_elements 0.8717
published_at 2026-04-21T12:55:00Z
3
value 0.03269
scoring_system epss
scoring_elements 0.87154
published_at 2026-04-13T12:55:00Z
4
value 0.03269
scoring_system epss
scoring_elements 0.87159
published_at 2026-04-12T12:55:00Z
5
value 0.03269
scoring_system epss
scoring_elements 0.87165
published_at 2026-04-11T12:55:00Z
6
value 0.03269
scoring_system epss
scoring_elements 0.87152
published_at 2026-04-09T12:55:00Z
7
value 0.03269
scoring_system epss
scoring_elements 0.87144
published_at 2026-04-08T12:55:00Z
8
value 0.03269
scoring_system epss
scoring_elements 0.87124
published_at 2026-04-07T12:55:00Z
9
value 0.03269
scoring_system epss
scoring_elements 0.8713
published_at 2026-04-04T12:55:00Z
10
value 0.03269
scoring_system epss
scoring_elements 0.87103
published_at 2026-04-01T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-3452
6
reference_url https://mariadb.com/kb/en/mariadb/mariadb-10025-release-notes/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:50:14Z/
url https://mariadb.com/kb/en/mariadb/mariadb-10025-release-notes/
7
reference_url https://mariadb.com/kb/en/mariadb/mariadb-10114-release-notes/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:50:14Z/
url https://mariadb.com/kb/en/mariadb/mariadb-10114-release-notes/
8
reference_url https://mariadb.com/kb/en/mariadb/mariadb-5549-release-notes/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:50:14Z/
url https://mariadb.com/kb/en/mariadb/mariadb-5549-release-notes/
9
reference_url http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:50:14Z/
url http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168
10
reference_url http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:50:14Z/
url http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
11
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:50:14Z/
url http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
12
reference_url http://www.securityfocus.com/bid/91787
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:50:14Z/
url http://www.securityfocus.com/bid/91787
13
reference_url http://www.securityfocus.com/bid/91999
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:50:14Z/
url http://www.securityfocus.com/bid/91999
14
reference_url http://www.securitytracker.com/id/1036362
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:50:14Z/
url http://www.securitytracker.com/id/1036362
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1358201
reference_id 1358201
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1358201
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:powerkvm:2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ibm:powerkvm:2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:powerkvm:2.1:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:powerkvm:3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ibm:powerkvm:3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:powerkvm:3.1:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-3452
reference_id CVE-2016-3452
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:N/A:N
1
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2016-3452
24
reference_url https://access.redhat.com/errata/RHSA-2016:0705
reference_id RHSA-2016:0705
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0705
25
reference_url https://access.redhat.com/errata/RHSA-2016:1132
reference_id RHSA-2016:1132
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:50:14Z/
url https://access.redhat.com/errata/RHSA-2016:1132
26
reference_url https://access.redhat.com/errata/RHSA-2016:1480
reference_id RHSA-2016:1480
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1480
27
reference_url https://access.redhat.com/errata/RHSA-2016:1481
reference_id RHSA-2016:1481
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1481
28
reference_url https://access.redhat.com/errata/RHSA-2016:1602
reference_id RHSA-2016:1602
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1602
fixed_packages
aliases CVE-2016-3452
risk_score 1.9
exploitability 0.5
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-h5ur-uuwn-ukbz
32
url VCID-hg16-rg46-4fe3
vulnerability_id VCID-hg16-rg46-4fe3
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4815.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4815.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-4815
reference_id
reference_type
scores
0
value 0.00413
scoring_system epss
scoring_elements 0.61354
published_at 2026-04-01T12:55:00Z
1
value 0.00413
scoring_system epss
scoring_elements 0.61431
published_at 2026-04-02T12:55:00Z
2
value 0.00413
scoring_system epss
scoring_elements 0.61459
published_at 2026-04-04T12:55:00Z
3
value 0.00413
scoring_system epss
scoring_elements 0.61429
published_at 2026-04-07T12:55:00Z
4
value 0.00413
scoring_system epss
scoring_elements 0.61477
published_at 2026-04-08T12:55:00Z
5
value 0.00413
scoring_system epss
scoring_elements 0.61492
published_at 2026-04-09T12:55:00Z
6
value 0.00413
scoring_system epss
scoring_elements 0.61513
published_at 2026-04-11T12:55:00Z
7
value 0.00413
scoring_system epss
scoring_elements 0.615
published_at 2026-04-12T12:55:00Z
8
value 0.00413
scoring_system epss
scoring_elements 0.6148
published_at 2026-04-13T12:55:00Z
9
value 0.00413
scoring_system epss
scoring_elements 0.61519
published_at 2026-04-16T12:55:00Z
10
value 0.00413
scoring_system epss
scoring_elements 0.61523
published_at 2026-04-18T12:55:00Z
11
value 0.00413
scoring_system epss
scoring_elements 0.61507
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-4815
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4792
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4792
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4802
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4802
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4815
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4815
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4816
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4816
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4819
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4819
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4826
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4826
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4830
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4830
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4836
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4836
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4858
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4858
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4861
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4861
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4870
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4870
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4879
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4879
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4895
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4895
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4913
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4913
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1274759
reference_id 1274759
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1274759
17
reference_url https://access.redhat.com/errata/RHSA-2016:0534
reference_id RHSA-2016:0534
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0534
18
reference_url https://access.redhat.com/errata/RHSA-2016:0705
reference_id RHSA-2016:0705
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0705
19
reference_url https://access.redhat.com/errata/RHSA-2016:1132
reference_id RHSA-2016:1132
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1132
20
reference_url https://access.redhat.com/errata/RHSA-2016:1480
reference_id RHSA-2016:1480
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1480
21
reference_url https://access.redhat.com/errata/RHSA-2016:1481
reference_id RHSA-2016:1481
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1481
22
reference_url https://usn.ubuntu.com/2781-1/
reference_id USN-2781-1
reference_type
scores
url https://usn.ubuntu.com/2781-1/
fixed_packages
aliases CVE-2015-4815
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hg16-rg46-4fe3
33
url VCID-jh3h-4hdd-kufm
vulnerability_id VCID-jh3h-4hdd-kufm
summary mysql: unspecified vulnerability in subcomponent: Server: InnoDB (CPU July 2016)
references
0
reference_url http://rhn.redhat.com/errata/RHSA-2016-1601.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:50:04Z/
url http://rhn.redhat.com/errata/RHSA-2016-1601.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3459.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3459.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-3459
reference_id
reference_type
scores
0
value 0.00878
scoring_system epss
scoring_elements 0.75359
published_at 2026-04-21T12:55:00Z
1
value 0.00878
scoring_system epss
scoring_elements 0.75267
published_at 2026-04-01T12:55:00Z
2
value 0.00878
scoring_system epss
scoring_elements 0.75271
published_at 2026-04-02T12:55:00Z
3
value 0.00878
scoring_system epss
scoring_elements 0.75303
published_at 2026-04-04T12:55:00Z
4
value 0.00878
scoring_system epss
scoring_elements 0.75281
published_at 2026-04-07T12:55:00Z
5
value 0.00878
scoring_system epss
scoring_elements 0.75324
published_at 2026-04-08T12:55:00Z
6
value 0.00878
scoring_system epss
scoring_elements 0.75334
published_at 2026-04-12T12:55:00Z
7
value 0.00878
scoring_system epss
scoring_elements 0.75355
published_at 2026-04-11T12:55:00Z
8
value 0.00878
scoring_system epss
scoring_elements 0.75323
published_at 2026-04-13T12:55:00Z
9
value 0.00878
scoring_system epss
scoring_elements 0.75363
published_at 2026-04-16T12:55:00Z
10
value 0.00878
scoring_system epss
scoring_elements 0.75369
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-3459
3
reference_url https://mariadb.com/kb/en/mariadb/mariadb-10025-release-notes/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:50:04Z/
url https://mariadb.com/kb/en/mariadb/mariadb-10025-release-notes/
4
reference_url https://mariadb.com/kb/en/mariadb/mariadb-10114-release-notes/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:50:04Z/
url https://mariadb.com/kb/en/mariadb/mariadb-10114-release-notes/
5
reference_url http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:50:04Z/
url http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
6
reference_url http://www.securityfocus.com/bid/91787
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:50:04Z/
url http://www.securityfocus.com/bid/91787
7
reference_url http://www.securityfocus.com/bid/91943
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:50:04Z/
url http://www.securityfocus.com/bid/91943
8
reference_url http://www.securitytracker.com/id/1036362
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:50:04Z/
url http://www.securitytracker.com/id/1036362
9
reference_url http://www.ubuntu.com/usn/USN-3040-1
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:50:04Z/
url http://www.ubuntu.com/usn/USN-3040-1
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1358202
reference_id 1358202
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1358202
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-3459
reference_id CVE-2016-3459
reference_type
scores
0
value 4.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:P
1
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2016-3459
14
reference_url https://access.redhat.com/errata/RHSA-2016:1132
reference_id RHSA-2016:1132
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:50:04Z/
url https://access.redhat.com/errata/RHSA-2016:1132
15
reference_url https://access.redhat.com/errata/RHSA-2016:1601
reference_id RHSA-2016:1601
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1601
16
reference_url https://usn.ubuntu.com/3040-1/
reference_id USN-3040-1
reference_type
scores
url https://usn.ubuntu.com/3040-1/
fixed_packages
aliases CVE-2016-3459
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jh3h-4hdd-kufm
34
url VCID-jkr1-gvjw-wkcx
vulnerability_id VCID-jkr1-gvjw-wkcx
summary
Improper Restriction of Operations within the Bounds of a Memory Buffer
Heap-based buffer overflow in PCRE and PCRE2 allows remote attackers to execute arbitrary code via a crafted regular expression.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3210.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3210.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-3210
reference_id
reference_type
scores
0
value 0.0573
scoring_system epss
scoring_elements 0.90401
published_at 2026-04-01T12:55:00Z
1
value 0.0573
scoring_system epss
scoring_elements 0.90404
published_at 2026-04-02T12:55:00Z
2
value 0.0573
scoring_system epss
scoring_elements 0.90416
published_at 2026-04-04T12:55:00Z
3
value 0.0573
scoring_system epss
scoring_elements 0.9042
published_at 2026-04-07T12:55:00Z
4
value 0.0573
scoring_system epss
scoring_elements 0.90434
published_at 2026-04-08T12:55:00Z
5
value 0.0573
scoring_system epss
scoring_elements 0.9044
published_at 2026-04-13T12:55:00Z
6
value 0.0573
scoring_system epss
scoring_elements 0.90448
published_at 2026-04-12T12:55:00Z
7
value 0.0573
scoring_system epss
scoring_elements 0.90456
published_at 2026-04-18T12:55:00Z
8
value 0.0573
scoring_system epss
scoring_elements 0.90453
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-3210
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3210
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3210
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1287623
reference_id 1287623
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1287623
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=787433
reference_id 787433
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=787433
5
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-3210
reference_id CVE-2015-3210
reference_type
scores
url https://nvd.nist.gov/vuln/detail/CVE-2015-3210
6
reference_url https://access.redhat.com/errata/RHSA-2016:1132
reference_id RHSA-2016:1132
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1132
7
reference_url https://access.redhat.com/errata/RHSA-2016:2750
reference_id RHSA-2016:2750
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2750
8
reference_url https://usn.ubuntu.com/2694-1/
reference_id USN-2694-1
reference_type
scores
url https://usn.ubuntu.com/2694-1/
9
reference_url https://usn.ubuntu.com/2943-1/
reference_id USN-2943-1
reference_type
scores
url https://usn.ubuntu.com/2943-1/
fixed_packages
aliases CVE-2015-3210
risk_score 0.1
exploitability 0.5
weighted_severity 0.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jkr1-gvjw-wkcx
35
url VCID-jqmx-5tfh-qqff
vulnerability_id VCID-jqmx-5tfh-qqff
summary security update
references
0
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177539.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177539.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00010.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00010.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00011.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00011.html
3
reference_url http://lists.opensuse.org/opensuse-updates/2016-02/msg00039.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2016-02/msg00039.html
4
reference_url http://rhn.redhat.com/errata/RHSA-2016-0534.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0534.html
5
reference_url http://rhn.redhat.com/errata/RHSA-2016-0705.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0705.html
6
reference_url http://rhn.redhat.com/errata/RHSA-2016-1480.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-1480.html
7
reference_url http://rhn.redhat.com/errata/RHSA-2016-1481.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-1481.html
8
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4836.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4836.json
9
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-4836
reference_id
reference_type
scores
0
value 0.00861
scoring_system epss
scoring_elements 0.75087
published_at 2026-04-21T12:55:00Z
1
value 0.00861
scoring_system epss
scoring_elements 0.75008
published_at 2026-04-01T12:55:00Z
2
value 0.00861
scoring_system epss
scoring_elements 0.75011
published_at 2026-04-02T12:55:00Z
3
value 0.00861
scoring_system epss
scoring_elements 0.7504
published_at 2026-04-04T12:55:00Z
4
value 0.00861
scoring_system epss
scoring_elements 0.75016
published_at 2026-04-07T12:55:00Z
5
value 0.00861
scoring_system epss
scoring_elements 0.7505
published_at 2026-04-08T12:55:00Z
6
value 0.00861
scoring_system epss
scoring_elements 0.75061
published_at 2026-04-09T12:55:00Z
7
value 0.00861
scoring_system epss
scoring_elements 0.75084
published_at 2026-04-11T12:55:00Z
8
value 0.00861
scoring_system epss
scoring_elements 0.75063
published_at 2026-04-12T12:55:00Z
9
value 0.00861
scoring_system epss
scoring_elements 0.75052
published_at 2026-04-13T12:55:00Z
10
value 0.00861
scoring_system epss
scoring_elements 0.7509
published_at 2026-04-16T12:55:00Z
11
value 0.00861
scoring_system epss
scoring_elements 0.75097
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-4836
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4792
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4792
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4802
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4802
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4815
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4815
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4816
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4816
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4819
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4819
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4826
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4826
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4830
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4830
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4836
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4836
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4858
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4858
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4861
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4861
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4870
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4870
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4879
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4879
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4895
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4895
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4913
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4913
24
reference_url https://www.suse.com/support/update/announcement/2016/suse-su-20160296-1.html
reference_id
reference_type
scores
url https://www.suse.com/support/update/announcement/2016/suse-su-20160296-1.html
25
reference_url http://www.debian.org/security/2015/dsa-3377
reference_id
reference_type
scores
url http://www.debian.org/security/2015/dsa-3377
26
reference_url http://www.debian.org/security/2015/dsa-3385
reference_id
reference_type
scores
url http://www.debian.org/security/2015/dsa-3385
27
reference_url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
28
reference_url http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
29
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
30
reference_url http://www.securityfocus.com/bid/77190
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/77190
31
reference_url http://www.securitytracker.com/id/1033894
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1033894
32
reference_url http://www.ubuntu.com/usn/USN-2781-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2781-1
33
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1274771
reference_id 1274771
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1274771
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:-:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:linux:7:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:-:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-4836
reference_id CVE-2015-4836
reference_type
scores
0
value 2.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:M/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2015-4836
67
reference_url https://access.redhat.com/errata/RHSA-2016:0534
reference_id RHSA-2016:0534
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0534
68
reference_url https://access.redhat.com/errata/RHSA-2016:0705
reference_id RHSA-2016:0705
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0705
69
reference_url https://access.redhat.com/errata/RHSA-2016:1132
reference_id RHSA-2016:1132
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1132
70
reference_url https://access.redhat.com/errata/RHSA-2016:1480
reference_id RHSA-2016:1480
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1480
71
reference_url https://access.redhat.com/errata/RHSA-2016:1481
reference_id RHSA-2016:1481
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1481
72
reference_url https://usn.ubuntu.com/2781-1/
reference_id USN-2781-1
reference_type
scores
url https://usn.ubuntu.com/2781-1/
fixed_packages
aliases CVE-2015-4836
risk_score 1.2
exploitability 0.5
weighted_severity 2.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jqmx-5tfh-qqff
36
url VCID-k8sz-12hn-akfk
vulnerability_id VCID-k8sz-12hn-akfk
summary mysql: unspecified vulnerability in subcomponent: Server: Option (CPU July 2016)
references
0
reference_url http://rhn.redhat.com/errata/RHSA-2016-0534.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:29Z/
url http://rhn.redhat.com/errata/RHSA-2016-0534.html
1
reference_url http://rhn.redhat.com/errata/RHSA-2016-0705.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:29Z/
url http://rhn.redhat.com/errata/RHSA-2016-0705.html
2
reference_url http://rhn.redhat.com/errata/RHSA-2016-1480.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:29Z/
url http://rhn.redhat.com/errata/RHSA-2016-1480.html
3
reference_url http://rhn.redhat.com/errata/RHSA-2016-1481.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:29Z/
url http://rhn.redhat.com/errata/RHSA-2016-1481.html
4
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3471.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3471.json
5
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-3471
reference_id
reference_type
scores
0
value 0.0009
scoring_system epss
scoring_elements 0.25362
published_at 2026-04-21T12:55:00Z
1
value 0.0009
scoring_system epss
scoring_elements 0.25479
published_at 2026-04-09T12:55:00Z
2
value 0.0009
scoring_system epss
scoring_elements 0.25491
published_at 2026-04-11T12:55:00Z
3
value 0.0009
scoring_system epss
scoring_elements 0.25449
published_at 2026-04-12T12:55:00Z
4
value 0.0009
scoring_system epss
scoring_elements 0.25395
published_at 2026-04-13T12:55:00Z
5
value 0.0009
scoring_system epss
scoring_elements 0.25402
published_at 2026-04-16T12:55:00Z
6
value 0.0009
scoring_system epss
scoring_elements 0.25392
published_at 2026-04-18T12:55:00Z
7
value 0.0009
scoring_system epss
scoring_elements 0.25486
published_at 2026-04-01T12:55:00Z
8
value 0.0009
scoring_system epss
scoring_elements 0.25554
published_at 2026-04-02T12:55:00Z
9
value 0.0009
scoring_system epss
scoring_elements 0.25591
published_at 2026-04-04T12:55:00Z
10
value 0.0009
scoring_system epss
scoring_elements 0.25363
published_at 2026-04-07T12:55:00Z
11
value 0.0009
scoring_system epss
scoring_elements 0.25431
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-3471
6
reference_url http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:29Z/
url http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
7
reference_url http://www.securityfocus.com/bid/91787
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:29Z/
url http://www.securityfocus.com/bid/91787
8
reference_url http://www.securityfocus.com/bid/91913
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:29Z/
url http://www.securityfocus.com/bid/91913
9
reference_url http://www.securitytracker.com/id/1036362
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:29Z/
url http://www.securitytracker.com/id/1036362
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1358203
reference_id 1358203
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1358203
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-3471
reference_id CVE-2016-3471
reference_type
scores
0
value 6.2
scoring_system cvssv2
scoring_elements AV:L/AC:H/Au:N/C:C/I:C/A:C
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2016-3471
16
reference_url https://access.redhat.com/errata/RHSA-2016:0534
reference_id RHSA-2016:0534
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0534
17
reference_url https://access.redhat.com/errata/RHSA-2016:0705
reference_id RHSA-2016:0705
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0705
18
reference_url https://access.redhat.com/errata/RHSA-2016:1132
reference_id RHSA-2016:1132
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:29Z/
url https://access.redhat.com/errata/RHSA-2016:1132
19
reference_url https://access.redhat.com/errata/RHSA-2016:1480
reference_id RHSA-2016:1480
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1480
20
reference_url https://access.redhat.com/errata/RHSA-2016:1481
reference_id RHSA-2016:1481
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1481
fixed_packages
aliases CVE-2016-3471
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-k8sz-12hn-akfk
37
url VCID-kwfj-9bb2-dqcb
vulnerability_id VCID-kwfj-9bb2-dqcb
summary
Multiple vulnerabilities have been found in libpcre, the worst of
    which could lead to arbitrary code execution, or cause a Denial of Service
    condition.
references
0
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2016-January/174931.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2016-January/174931.html
1
reference_url http://rhn.redhat.com/errata/RHSA-2016-1025.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-1025.html
2
reference_url http://rhn.redhat.com/errata/RHSA-2016-2750.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-2750.html
3
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8386.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8386.json
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-8386
reference_id
reference_type
scores
0
value 0.0752
scoring_system epss
scoring_elements 0.91825
published_at 2026-04-21T12:55:00Z
1
value 0.0752
scoring_system epss
scoring_elements 0.9183
published_at 2026-04-16T12:55:00Z
2
value 0.0752
scoring_system epss
scoring_elements 0.91768
published_at 2026-04-01T12:55:00Z
3
value 0.0752
scoring_system epss
scoring_elements 0.91776
published_at 2026-04-02T12:55:00Z
4
value 0.0752
scoring_system epss
scoring_elements 0.91782
published_at 2026-04-04T12:55:00Z
5
value 0.0752
scoring_system epss
scoring_elements 0.9179
published_at 2026-04-07T12:55:00Z
6
value 0.0752
scoring_system epss
scoring_elements 0.91803
published_at 2026-04-08T12:55:00Z
7
value 0.0752
scoring_system epss
scoring_elements 0.91809
published_at 2026-04-09T12:55:00Z
8
value 0.0752
scoring_system epss
scoring_elements 0.91812
published_at 2026-04-11T12:55:00Z
9
value 0.0752
scoring_system epss
scoring_elements 0.91814
published_at 2026-04-12T12:55:00Z
10
value 0.0752
scoring_system epss
scoring_elements 0.9181
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-8386
5
reference_url https://bto.bluecoat.com/security-advisory/sa128
reference_id
reference_type
scores
url https://bto.bluecoat.com/security-advisory/sa128
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8386
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8386
7
reference_url https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731
reference_id
reference_type
scores
url https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731
8
reference_url https://security.netapp.com/advisory/ntap-20230216-0002/
reference_id
reference_type
scores
url https://security.netapp.com/advisory/ntap-20230216-0002/
9
reference_url http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup
reference_id
reference_type
scores
url http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup
10
reference_url http://www-01.ibm.com/support/docview.wss?uid=isg3T1023886
reference_id
reference_type
scores
url http://www-01.ibm.com/support/docview.wss?uid=isg3T1023886
11
reference_url http://www.openwall.com/lists/oss-security/2015/11/29/1
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2015/11/29/1
12
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
13
reference_url http://www.securityfocus.com/bid/82990
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/82990
14
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1287636
reference_id 1287636
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1287636
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:perl_compatible_regular_expression_library:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pcre:perl_compatible_regular_expression_library:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:perl_compatible_regular_expression_library:*:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:php:php:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:*:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-8386
reference_id CVE-2015-8386
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
1
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2015-8386
20
reference_url https://security.gentoo.org/glsa/201607-02
reference_id GLSA-201607-02
reference_type
scores
url https://security.gentoo.org/glsa/201607-02
21
reference_url https://access.redhat.com/errata/RHSA-2016:1025
reference_id RHSA-2016:1025
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1025
22
reference_url https://access.redhat.com/errata/RHSA-2016:1132
reference_id RHSA-2016:1132
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1132
23
reference_url https://access.redhat.com/errata/RHSA-2016:2750
reference_id RHSA-2016:2750
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2750
24
reference_url https://usn.ubuntu.com/2943-1/
reference_id USN-2943-1
reference_type
scores
url https://usn.ubuntu.com/2943-1/
fixed_packages
aliases CVE-2015-8386
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-kwfj-9bb2-dqcb
38
url VCID-kwrj-3fxz-g7c6
vulnerability_id VCID-kwrj-3fxz-g7c6
summary security update
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:22Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:22Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:22Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:22Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:22Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:22Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html
6
reference_url http://rhn.redhat.com/errata/RHSA-2016-0705.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:22Z/
url http://rhn.redhat.com/errata/RHSA-2016-0705.html
7
reference_url http://rhn.redhat.com/errata/RHSA-2016-1480.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:22Z/
url http://rhn.redhat.com/errata/RHSA-2016-1480.html
8
reference_url http://rhn.redhat.com/errata/RHSA-2016-1481.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:22Z/
url http://rhn.redhat.com/errata/RHSA-2016-1481.html
9
reference_url http://rhn.redhat.com/errata/RHSA-2016-1602.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:22Z/
url http://rhn.redhat.com/errata/RHSA-2016-1602.html
10
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0644.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0644.json
11
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-0644
reference_id
reference_type
scores
0
value 0.00214
scoring_system epss
scoring_elements 0.43877
published_at 2026-04-01T12:55:00Z
1
value 0.00214
scoring_system epss
scoring_elements 0.43921
published_at 2026-04-02T12:55:00Z
2
value 0.00214
scoring_system epss
scoring_elements 0.43944
published_at 2026-04-11T12:55:00Z
3
value 0.00214
scoring_system epss
scoring_elements 0.43874
published_at 2026-04-07T12:55:00Z
4
value 0.00214
scoring_system epss
scoring_elements 0.43924
published_at 2026-04-08T12:55:00Z
5
value 0.00214
scoring_system epss
scoring_elements 0.43926
published_at 2026-04-09T12:55:00Z
6
value 0.00214
scoring_system epss
scoring_elements 0.43911
published_at 2026-04-12T12:55:00Z
7
value 0.00214
scoring_system epss
scoring_elements 0.43895
published_at 2026-04-13T12:55:00Z
8
value 0.00214
scoring_system epss
scoring_elements 0.43957
published_at 2026-04-16T12:55:00Z
9
value 0.00214
scoring_system epss
scoring_elements 0.43948
published_at 2026-04-18T12:55:00Z
10
value 0.00214
scoring_system epss
scoring_elements 0.4388
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-0644
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0640
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0640
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0641
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0641
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0642
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0642
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0643
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0643
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0644
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0644
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0646
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0646
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0647
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0647
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0648
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0648
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0649
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0649
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0650
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0650
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0655
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0655
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0666
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0666
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0668
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0668
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2047
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2047
26
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.6
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:S/C:N/I:N/A:C
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
27
reference_url https://mariadb.com/kb/en/mariadb/mariadb-10024-release-notes/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:22Z/
url https://mariadb.com/kb/en/mariadb/mariadb-10024-release-notes/
28
reference_url https://mariadb.com/kb/en/mariadb/mariadb-10112-release-notes/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:22Z/
url https://mariadb.com/kb/en/mariadb/mariadb-10112-release-notes/
29
reference_url https://mariadb.com/kb/en/mariadb/mariadb-5548-release-notes/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:22Z/
url https://mariadb.com/kb/en/mariadb/mariadb-5548-release-notes/
30
reference_url http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:22Z/
url http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168
31
reference_url http://www.debian.org/security/2016/dsa-3557
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:22Z/
url http://www.debian.org/security/2016/dsa-3557
32
reference_url http://www.debian.org/security/2016/dsa-3595
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:22Z/
url http://www.debian.org/security/2016/dsa-3595
33
reference_url http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:22Z/
url http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
34
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:22Z/
url http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
35
reference_url http://www.securityfocus.com/bid/86442
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:22Z/
url http://www.securityfocus.com/bid/86442
36
reference_url http://www.securitytracker.com/id/1035606
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:22Z/
url http://www.securitytracker.com/id/1035606
37
reference_url http://www.ubuntu.com/usn/USN-2953-1
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:22Z/
url http://www.ubuntu.com/usn/USN-2953-1
38
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1329247
reference_id 1329247
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1329247
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:powerkvm:2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ibm:powerkvm:2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:powerkvm:2.1:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:powerkvm:3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ibm:powerkvm:3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:powerkvm:3.1:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-0644
reference_id CVE-2016-0644
reference_type
scores
0
value 4.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:P
1
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2016-0644
49
reference_url https://access.redhat.com/errata/RHSA-2016:0705
reference_id RHSA-2016:0705
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0705
50
reference_url https://access.redhat.com/errata/RHSA-2016:1132
reference_id RHSA-2016:1132
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:22Z/
url https://access.redhat.com/errata/RHSA-2016:1132
51
reference_url https://access.redhat.com/errata/RHSA-2016:1480
reference_id RHSA-2016:1480
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1480
52
reference_url https://access.redhat.com/errata/RHSA-2016:1481
reference_id RHSA-2016:1481
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1481
53
reference_url https://access.redhat.com/errata/RHSA-2016:1602
reference_id RHSA-2016:1602
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1602
54
reference_url https://usn.ubuntu.com/2953-1/
reference_id USN-2953-1
reference_type
scores
url https://usn.ubuntu.com/2953-1/
fixed_packages
aliases CVE-2016-0644
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-kwrj-3fxz-g7c6
39
url VCID-ngne-yedb-j3d9
vulnerability_id VCID-ngne-yedb-j3d9
summary mysql: unspecified vulnerability in subcomponent: Server: Optimizer (CPU April 2016)
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:09Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:09Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:09Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:09Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:09Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html
5
reference_url http://rhn.redhat.com/errata/RHSA-2016-0534.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:09Z/
url http://rhn.redhat.com/errata/RHSA-2016-0534.html
6
reference_url http://rhn.redhat.com/errata/RHSA-2016-1480.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:09Z/
url http://rhn.redhat.com/errata/RHSA-2016-1480.html
7
reference_url http://rhn.redhat.com/errata/RHSA-2016-1481.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:09Z/
url http://rhn.redhat.com/errata/RHSA-2016-1481.html
8
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0651.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0651.json
9
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-0651
reference_id
reference_type
scores
0
value 0.00246
scoring_system epss
scoring_elements 0.4787
published_at 2026-04-21T12:55:00Z
1
value 0.00246
scoring_system epss
scoring_elements 0.4786
published_at 2026-04-12T12:55:00Z
2
value 0.00246
scoring_system epss
scoring_elements 0.47869
published_at 2026-04-13T12:55:00Z
3
value 0.00246
scoring_system epss
scoring_elements 0.47923
published_at 2026-04-16T12:55:00Z
4
value 0.00246
scoring_system epss
scoring_elements 0.47917
published_at 2026-04-18T12:55:00Z
5
value 0.00246
scoring_system epss
scoring_elements 0.47802
published_at 2026-04-01T12:55:00Z
6
value 0.00246
scoring_system epss
scoring_elements 0.4784
published_at 2026-04-02T12:55:00Z
7
value 0.00246
scoring_system epss
scoring_elements 0.47861
published_at 2026-04-04T12:55:00Z
8
value 0.00246
scoring_system epss
scoring_elements 0.4781
published_at 2026-04-07T12:55:00Z
9
value 0.00246
scoring_system epss
scoring_elements 0.47862
published_at 2026-04-08T12:55:00Z
10
value 0.00246
scoring_system epss
scoring_elements 0.47859
published_at 2026-04-09T12:55:00Z
11
value 0.00246
scoring_system epss
scoring_elements 0.47883
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-0651
10
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.6
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:S/C:N/I:N/A:C
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
11
reference_url http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:09Z/
url http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
12
reference_url http://www.securitytracker.com/id/1035606
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:09Z/
url http://www.securitytracker.com/id/1035606
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1329254
reference_id 1329254
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1329254
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp4:*:*:*:*:*:*
reference_id cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp4:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:12:-:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_desktop:12:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:12:-:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:12:sp1:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_desktop:12:sp1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:12:sp1:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp4:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:11:sp4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp4:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:12:-:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:12:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:12:-:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:12:sp1:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:12:sp1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:12:sp1:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp4:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp4:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:-:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:-:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:sp1:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:sp1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:sp1:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_workstation_extension:12:*:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_workstation_extension:12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_workstation_extension:12:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_workstation_extension:12:sp1:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_workstation_extension:12:sp1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_workstation_extension:12:sp1:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-0651
reference_id CVE-2016-0651
reference_type
scores
0
value 3.5
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:S/C:N/I:N/A:P
1
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2016-0651
48
reference_url https://access.redhat.com/errata/RHSA-2016:0534
reference_id RHSA-2016:0534
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0534
49
reference_url https://access.redhat.com/errata/RHSA-2016:1132
reference_id RHSA-2016:1132
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:09Z/
url https://access.redhat.com/errata/RHSA-2016:1132
50
reference_url https://access.redhat.com/errata/RHSA-2016:1480
reference_id RHSA-2016:1480
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1480
51
reference_url https://access.redhat.com/errata/RHSA-2016:1481
reference_id RHSA-2016:1481
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1481
fixed_packages
aliases CVE-2016-0651
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ngne-yedb-j3d9
40
url VCID-nw5h-p35b-2khv
vulnerability_id VCID-nw5h-p35b-2khv
summary security update
references
0
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177539.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177539.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00010.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00010.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00011.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00011.html
3
reference_url http://lists.opensuse.org/opensuse-updates/2016-02/msg00039.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2016-02/msg00039.html
4
reference_url http://rhn.redhat.com/errata/RHSA-2016-0534.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0534.html
5
reference_url http://rhn.redhat.com/errata/RHSA-2016-0705.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0705.html
6
reference_url http://rhn.redhat.com/errata/RHSA-2016-1480.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-1480.html
7
reference_url http://rhn.redhat.com/errata/RHSA-2016-1481.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-1481.html
8
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4830.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4830.json
9
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-4830
reference_id
reference_type
scores
0
value 0.0027
scoring_system epss
scoring_elements 0.50554
published_at 2026-04-21T12:55:00Z
1
value 0.0027
scoring_system epss
scoring_elements 0.50436
published_at 2026-04-01T12:55:00Z
2
value 0.0027
scoring_system epss
scoring_elements 0.50493
published_at 2026-04-02T12:55:00Z
3
value 0.0027
scoring_system epss
scoring_elements 0.5052
published_at 2026-04-04T12:55:00Z
4
value 0.0027
scoring_system epss
scoring_elements 0.50474
published_at 2026-04-07T12:55:00Z
5
value 0.0027
scoring_system epss
scoring_elements 0.50528
published_at 2026-04-13T12:55:00Z
6
value 0.0027
scoring_system epss
scoring_elements 0.50524
published_at 2026-04-09T12:55:00Z
7
value 0.0027
scoring_system epss
scoring_elements 0.50566
published_at 2026-04-11T12:55:00Z
8
value 0.0027
scoring_system epss
scoring_elements 0.50542
published_at 2026-04-12T12:55:00Z
9
value 0.0027
scoring_system epss
scoring_elements 0.50571
published_at 2026-04-16T12:55:00Z
10
value 0.0027
scoring_system epss
scoring_elements 0.50576
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-4830
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4792
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4792
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4802
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4802
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4815
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4815
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4816
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4816
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4819
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4819
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4826
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4826
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4830
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4830
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4836
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4836
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4858
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4858
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4861
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4861
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4870
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4870
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4879
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4879
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4895
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4895
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4913
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4913
24
reference_url https://www.suse.com/support/update/announcement/2016/suse-su-20160296-1.html
reference_id
reference_type
scores
url https://www.suse.com/support/update/announcement/2016/suse-su-20160296-1.html
25
reference_url http://www.debian.org/security/2015/dsa-3377
reference_id
reference_type
scores
url http://www.debian.org/security/2015/dsa-3377
26
reference_url http://www.debian.org/security/2015/dsa-3385
reference_id
reference_type
scores
url http://www.debian.org/security/2015/dsa-3385
27
reference_url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
28
reference_url http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
29
reference_url http://www.securityfocus.com/bid/77228
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/77228
30
reference_url http://www.securitytracker.com/id/1033894
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1033894
31
reference_url http://www.ubuntu.com/usn/USN-2781-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2781-1
32
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1274767
reference_id 1274767
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1274767
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.1:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11:sp3:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_desktop:11:sp3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11:sp3:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:-:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:-:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:-:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:vmware:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:vmware:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:vmware:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp3:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp3:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-4830
reference_id CVE-2015-4830
reference_type
scores
0
value 4.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:P/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2015-4830
68
reference_url https://access.redhat.com/errata/RHSA-2016:0534
reference_id RHSA-2016:0534
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0534
69
reference_url https://access.redhat.com/errata/RHSA-2016:0705
reference_id RHSA-2016:0705
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0705
70
reference_url https://access.redhat.com/errata/RHSA-2016:1132
reference_id RHSA-2016:1132
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1132
71
reference_url https://access.redhat.com/errata/RHSA-2016:1480
reference_id RHSA-2016:1480
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1480
72
reference_url https://access.redhat.com/errata/RHSA-2016:1481
reference_id RHSA-2016:1481
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1481
73
reference_url https://usn.ubuntu.com/2781-1/
reference_id USN-2781-1
reference_type
scores
url https://usn.ubuntu.com/2781-1/
fixed_packages
aliases CVE-2015-4830
risk_score 1.8
exploitability 0.5
weighted_severity 3.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-nw5h-p35b-2khv
41
url VCID-nxma-cse5-pke8
vulnerability_id VCID-nxma-cse5-pke8
summary security update
references
0
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177539.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177539.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4895.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4895.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-4895
reference_id
reference_type
scores
0
value 0.00459
scoring_system epss
scoring_elements 0.64123
published_at 2026-04-21T12:55:00Z
1
value 0.00459
scoring_system epss
scoring_elements 0.64005
published_at 2026-04-01T12:55:00Z
2
value 0.00459
scoring_system epss
scoring_elements 0.64063
published_at 2026-04-02T12:55:00Z
3
value 0.00459
scoring_system epss
scoring_elements 0.6409
published_at 2026-04-04T12:55:00Z
4
value 0.00459
scoring_system epss
scoring_elements 0.6405
published_at 2026-04-07T12:55:00Z
5
value 0.00459
scoring_system epss
scoring_elements 0.64101
published_at 2026-04-08T12:55:00Z
6
value 0.00459
scoring_system epss
scoring_elements 0.64117
published_at 2026-04-09T12:55:00Z
7
value 0.00459
scoring_system epss
scoring_elements 0.64129
published_at 2026-04-11T12:55:00Z
8
value 0.00459
scoring_system epss
scoring_elements 0.64118
published_at 2026-04-12T12:55:00Z
9
value 0.00459
scoring_system epss
scoring_elements 0.64089
published_at 2026-04-13T12:55:00Z
10
value 0.00459
scoring_system epss
scoring_elements 0.64125
published_at 2026-04-16T12:55:00Z
11
value 0.00459
scoring_system epss
scoring_elements 0.64136
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-4895
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4792
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4792
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4802
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4802
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4815
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4815
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4816
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4816
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4819
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4819
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4826
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4826
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4830
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4830
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4836
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4836
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4858
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4858
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4861
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4861
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4870
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4870
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4879
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4879
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4895
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4895
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4913
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4913
17
reference_url http://www.debian.org/security/2015/dsa-3385
reference_id
reference_type
scores
url http://www.debian.org/security/2015/dsa-3385
18
reference_url http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
19
reference_url http://www.securityfocus.com/bid/77136
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/77136
20
reference_url http://www.securitytracker.com/id/1033894
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1033894
21
reference_url http://www.ubuntu.com/usn/USN-2781-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2781-1
22
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1274786
reference_id 1274786
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1274786
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-4895
reference_id CVE-2015-4895
reference_type
scores
0
value 3.5
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:S/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2015-4895
32
reference_url https://access.redhat.com/errata/RHSA-2015:1630
reference_id RHSA-2015:1630
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1630
33
reference_url https://access.redhat.com/errata/RHSA-2016:1132
reference_id RHSA-2016:1132
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1132
34
reference_url https://usn.ubuntu.com/2781-1/
reference_id USN-2781-1
reference_type
scores
url https://usn.ubuntu.com/2781-1/
fixed_packages
aliases CVE-2015-4895
risk_score 1.6
exploitability 0.5
weighted_severity 3.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-nxma-cse5-pke8
42
url VCID-pejf-33ba-h3c1
vulnerability_id VCID-pejf-33ba-h3c1
summary
Improper Restriction of Operations within the Bounds of a Memory Buffer
PCRE, and PCRE2 mishandle group empty matches, which might allow remote attackers to cause a denial of service (stack-based buffer overflow) via a crafted regular expression.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3217.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3217.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-3217
reference_id
reference_type
scores
0
value 0.00861
scoring_system epss
scoring_elements 0.75005
published_at 2026-04-01T12:55:00Z
1
value 0.00861
scoring_system epss
scoring_elements 0.75008
published_at 2026-04-02T12:55:00Z
2
value 0.00861
scoring_system epss
scoring_elements 0.75037
published_at 2026-04-04T12:55:00Z
3
value 0.00861
scoring_system epss
scoring_elements 0.75013
published_at 2026-04-07T12:55:00Z
4
value 0.00861
scoring_system epss
scoring_elements 0.75047
published_at 2026-04-08T12:55:00Z
5
value 0.00861
scoring_system epss
scoring_elements 0.75059
published_at 2026-04-09T12:55:00Z
6
value 0.00861
scoring_system epss
scoring_elements 0.75081
published_at 2026-04-11T12:55:00Z
7
value 0.00861
scoring_system epss
scoring_elements 0.7506
published_at 2026-04-12T12:55:00Z
8
value 0.00861
scoring_system epss
scoring_elements 0.75049
published_at 2026-04-13T12:55:00Z
9
value 0.00861
scoring_system epss
scoring_elements 0.75087
published_at 2026-04-16T12:55:00Z
10
value 0.00861
scoring_system epss
scoring_elements 0.75094
published_at 2026-04-18T12:55:00Z
11
value 0.00861
scoring_system epss
scoring_elements 0.75084
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-3217
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3217
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3217
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1228283
reference_id 1228283
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1228283
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=787641
reference_id 787641
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=787641
5
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-3217
reference_id CVE-2015-3217
reference_type
scores
url https://nvd.nist.gov/vuln/detail/CVE-2015-3217
6
reference_url https://access.redhat.com/errata/RHSA-2016:1025
reference_id RHSA-2016:1025
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1025
7
reference_url https://access.redhat.com/errata/RHSA-2016:1132
reference_id RHSA-2016:1132
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1132
8
reference_url https://access.redhat.com/errata/RHSA-2016:2750
reference_id RHSA-2016:2750
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2750
fixed_packages
aliases CVE-2015-3217
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pejf-33ba-h3c1
43
url VCID-q1vh-jwcy-87cz
vulnerability_id VCID-q1vh-jwcy-87cz
summary security update
references
0
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177539.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177539.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00010.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00010.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00011.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00011.html
3
reference_url http://lists.opensuse.org/opensuse-updates/2016-02/msg00039.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2016-02/msg00039.html
4
reference_url http://rhn.redhat.com/errata/RHSA-2016-0534.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0534.html
5
reference_url http://rhn.redhat.com/errata/RHSA-2016-0705.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0705.html
6
reference_url http://rhn.redhat.com/errata/RHSA-2016-1480.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-1480.html
7
reference_url http://rhn.redhat.com/errata/RHSA-2016-1481.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-1481.html
8
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4858.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4858.json
9
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-4858
reference_id
reference_type
scores
0
value 0.00419
scoring_system epss
scoring_elements 0.61921
published_at 2026-04-21T12:55:00Z
1
value 0.00419
scoring_system epss
scoring_elements 0.6176
published_at 2026-04-01T12:55:00Z
2
value 0.00419
scoring_system epss
scoring_elements 0.61834
published_at 2026-04-02T12:55:00Z
3
value 0.00419
scoring_system epss
scoring_elements 0.61865
published_at 2026-04-04T12:55:00Z
4
value 0.00419
scoring_system epss
scoring_elements 0.61837
published_at 2026-04-07T12:55:00Z
5
value 0.00419
scoring_system epss
scoring_elements 0.61886
published_at 2026-04-08T12:55:00Z
6
value 0.00419
scoring_system epss
scoring_elements 0.61902
published_at 2026-04-09T12:55:00Z
7
value 0.00419
scoring_system epss
scoring_elements 0.61923
published_at 2026-04-11T12:55:00Z
8
value 0.00419
scoring_system epss
scoring_elements 0.61911
published_at 2026-04-12T12:55:00Z
9
value 0.00419
scoring_system epss
scoring_elements 0.61891
published_at 2026-04-13T12:55:00Z
10
value 0.00419
scoring_system epss
scoring_elements 0.61934
published_at 2026-04-16T12:55:00Z
11
value 0.00419
scoring_system epss
scoring_elements 0.61939
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-4858
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4792
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4792
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4802
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4802
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4815
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4815
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4816
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4816
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4819
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4819
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4826
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4826
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4830
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4830
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4836
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4836
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4858
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4858
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4861
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4861
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4870
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4870
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4879
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4879
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4895
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4895
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4913
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4913
24
reference_url https://www.suse.com/support/update/announcement/2016/suse-su-20160296-1.html
reference_id
reference_type
scores
url https://www.suse.com/support/update/announcement/2016/suse-su-20160296-1.html
25
reference_url http://www.debian.org/security/2015/dsa-3377
reference_id
reference_type
scores
url http://www.debian.org/security/2015/dsa-3377
26
reference_url http://www.debian.org/security/2015/dsa-3385
reference_id
reference_type
scores
url http://www.debian.org/security/2015/dsa-3385
27
reference_url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
28
reference_url http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
29
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
30
reference_url http://www.securityfocus.com/bid/77145
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/77145
31
reference_url http://www.securitytracker.com/id/1033894
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1033894
32
reference_url http://www.ubuntu.com/usn/USN-2781-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2781-1
33
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1274773
reference_id 1274773
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1274773
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:-:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:linux:7:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:-:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.1:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-4858
reference_id CVE-2015-4858
reference_type
scores
0
value 4.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2015-4858
66
reference_url https://access.redhat.com/errata/RHSA-2016:0534
reference_id RHSA-2016:0534
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0534
67
reference_url https://access.redhat.com/errata/RHSA-2016:0705
reference_id RHSA-2016:0705
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0705
68
reference_url https://access.redhat.com/errata/RHSA-2016:1132
reference_id RHSA-2016:1132
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1132
69
reference_url https://access.redhat.com/errata/RHSA-2016:1480
reference_id RHSA-2016:1480
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1480
70
reference_url https://access.redhat.com/errata/RHSA-2016:1481
reference_id RHSA-2016:1481
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1481
71
reference_url https://usn.ubuntu.com/2781-1/
reference_id USN-2781-1
reference_type
scores
url https://usn.ubuntu.com/2781-1/
fixed_packages
aliases CVE-2015-4858
risk_score 1.8
exploitability 0.5
weighted_severity 3.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-q1vh-jwcy-87cz
44
url VCID-qyb6-7ees-ukcm
vulnerability_id VCID-qyb6-7ees-ukcm
summary security update
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00015.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00015.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00016.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00016.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html
6
reference_url http://rhn.redhat.com/errata/RHSA-2016-0534.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0534.html
7
reference_url http://rhn.redhat.com/errata/RHSA-2016-0705.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0705.html
8
reference_url http://rhn.redhat.com/errata/RHSA-2016-1480.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-1480.html
9
reference_url http://rhn.redhat.com/errata/RHSA-2016-1481.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-1481.html
10
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0608.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0608.json
11
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-0608
reference_id
reference_type
scores
0
value 0.00338
scoring_system epss
scoring_elements 0.5664
published_at 2026-04-21T12:55:00Z
1
value 0.00338
scoring_system epss
scoring_elements 0.56668
published_at 2026-04-18T12:55:00Z
2
value 0.00338
scoring_system epss
scoring_elements 0.56522
published_at 2026-04-01T12:55:00Z
3
value 0.00338
scoring_system epss
scoring_elements 0.56618
published_at 2026-04-07T12:55:00Z
4
value 0.00338
scoring_system epss
scoring_elements 0.56639
published_at 2026-04-04T12:55:00Z
5
value 0.00338
scoring_system epss
scoring_elements 0.56669
published_at 2026-04-16T12:55:00Z
6
value 0.00338
scoring_system epss
scoring_elements 0.56675
published_at 2026-04-09T12:55:00Z
7
value 0.00338
scoring_system epss
scoring_elements 0.56683
published_at 2026-04-11T12:55:00Z
8
value 0.00338
scoring_system epss
scoring_elements 0.56658
published_at 2026-04-12T12:55:00Z
9
value 0.00338
scoring_system epss
scoring_elements 0.56638
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-0608
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0505
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0505
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0546
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0546
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0596
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0596
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0597
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0597
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0598
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0598
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0600
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0600
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0606
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0606
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0608
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0608
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0609
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0609
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0616
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0616
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2047
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2047
23
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.5
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:S/C:N/I:N/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
24
reference_url https://mariadb.com/kb/en/mariadb/mariadb-10110-release-notes/
reference_id
reference_type
scores
url https://mariadb.com/kb/en/mariadb/mariadb-10110-release-notes/
25
reference_url https://mariadb.com/kb/en/mariadb/mariadb-5547-release-notes/
reference_id
reference_type
scores
url https://mariadb.com/kb/en/mariadb/mariadb-5547-release-notes/
26
reference_url https://mariadb.com/kb/en/mdb-10023-rn/
reference_id
reference_type
scores
url https://mariadb.com/kb/en/mdb-10023-rn/
27
reference_url http://www.debian.org/security/2016/dsa-3453
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3453
28
reference_url http://www.debian.org/security/2016/dsa-3459
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3459
29
reference_url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
30
reference_url http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
31
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
32
reference_url http://www.securityfocus.com/bid/81226
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/81226
33
reference_url http://www.securitytracker.com/id/1034708
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1034708
34
reference_url http://www.ubuntu.com/usn/USN-2881-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2881-1
35
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1301506
reference_id 1301506
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1301506
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node_eus:7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_hpc_node_eus:7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node_eus:7.2:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-0608
reference_id CVE-2016-0608
reference_type
scores
0
value 3.5
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:S/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2016-0608
57
reference_url https://access.redhat.com/errata/RHSA-2016:0534
reference_id RHSA-2016:0534
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0534
58
reference_url https://access.redhat.com/errata/RHSA-2016:0705
reference_id RHSA-2016:0705
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0705
59
reference_url https://access.redhat.com/errata/RHSA-2016:1132
reference_id RHSA-2016:1132
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1132
60
reference_url https://access.redhat.com/errata/RHSA-2016:1480
reference_id RHSA-2016:1480
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1480
61
reference_url https://access.redhat.com/errata/RHSA-2016:1481
reference_id RHSA-2016:1481
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1481
62
reference_url https://usn.ubuntu.com/2881-1/
reference_id USN-2881-1
reference_type
scores
url https://usn.ubuntu.com/2881-1/
fixed_packages
aliases CVE-2016-0608
risk_score 1.6
exploitability 0.5
weighted_severity 3.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qyb6-7ees-ukcm
45
url VCID-rfz7-vha1-e7gy
vulnerability_id VCID-rfz7-vha1-e7gy
summary security update
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:29Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:29Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:29Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:29Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:29Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:29Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html
6
reference_url http://rhn.redhat.com/errata/RHSA-2016-0705.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:29Z/
url http://rhn.redhat.com/errata/RHSA-2016-0705.html
7
reference_url http://rhn.redhat.com/errata/RHSA-2016-1480.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:29Z/
url http://rhn.redhat.com/errata/RHSA-2016-1480.html
8
reference_url http://rhn.redhat.com/errata/RHSA-2016-1481.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:29Z/
url http://rhn.redhat.com/errata/RHSA-2016-1481.html
9
reference_url http://rhn.redhat.com/errata/RHSA-2016-1602.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:29Z/
url http://rhn.redhat.com/errata/RHSA-2016-1602.html
10
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0641.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0641.json
11
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-0641
reference_id
reference_type
scores
0
value 0.0025
scoring_system epss
scoring_elements 0.48158
published_at 2026-04-01T12:55:00Z
1
value 0.0025
scoring_system epss
scoring_elements 0.48195
published_at 2026-04-02T12:55:00Z
2
value 0.0025
scoring_system epss
scoring_elements 0.48215
published_at 2026-04-04T12:55:00Z
3
value 0.0025
scoring_system epss
scoring_elements 0.48167
published_at 2026-04-07T12:55:00Z
4
value 0.0025
scoring_system epss
scoring_elements 0.4822
published_at 2026-04-08T12:55:00Z
5
value 0.0025
scoring_system epss
scoring_elements 0.48214
published_at 2026-04-09T12:55:00Z
6
value 0.0025
scoring_system epss
scoring_elements 0.48238
published_at 2026-04-11T12:55:00Z
7
value 0.0025
scoring_system epss
scoring_elements 0.48213
published_at 2026-04-12T12:55:00Z
8
value 0.0025
scoring_system epss
scoring_elements 0.48224
published_at 2026-04-13T12:55:00Z
9
value 0.0025
scoring_system epss
scoring_elements 0.48275
published_at 2026-04-16T12:55:00Z
10
value 0.0025
scoring_system epss
scoring_elements 0.4827
published_at 2026-04-18T12:55:00Z
11
value 0.0025
scoring_system epss
scoring_elements 0.48226
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-0641
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0640
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0640
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0641
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0641
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0642
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0642
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0643
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0643
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0644
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0644
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0646
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0646
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0647
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0647
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0648
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0648
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0649
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0649
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0650
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0650
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0655
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0655
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0666
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0666
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0668
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0668
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2047
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2047
26
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:M/C:P/I:N/A:C
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
27
reference_url https://mariadb.com/kb/en/mariadb/mariadb-10024-release-notes/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:29Z/
url https://mariadb.com/kb/en/mariadb/mariadb-10024-release-notes/
28
reference_url https://mariadb.com/kb/en/mariadb/mariadb-10112-release-notes/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:29Z/
url https://mariadb.com/kb/en/mariadb/mariadb-10112-release-notes/
29
reference_url https://mariadb.com/kb/en/mariadb/mariadb-5548-release-notes/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:29Z/
url https://mariadb.com/kb/en/mariadb/mariadb-5548-release-notes/
30
reference_url http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:29Z/
url http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168
31
reference_url http://www.debian.org/security/2016/dsa-3557
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:29Z/
url http://www.debian.org/security/2016/dsa-3557
32
reference_url http://www.debian.org/security/2016/dsa-3595
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:29Z/
url http://www.debian.org/security/2016/dsa-3595
33
reference_url http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:29Z/
url http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
34
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:29Z/
url http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
35
reference_url http://www.securityfocus.com/bid/86470
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:29Z/
url http://www.securityfocus.com/bid/86470
36
reference_url http://www.securitytracker.com/id/1035606
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:29Z/
url http://www.securitytracker.com/id/1035606
37
reference_url http://www.ubuntu.com/usn/USN-2953-1
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:29Z/
url http://www.ubuntu.com/usn/USN-2953-1
38
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1329241
reference_id 1329241
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1329241
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:powerkvm:2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ibm:powerkvm:2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:powerkvm:2.1:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:powerkvm:3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ibm:powerkvm:3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:powerkvm:3.1:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-0641
reference_id CVE-2016-0641
reference_type
scores
0
value 4.9
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:S/C:P/I:N/A:P
1
value 5.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2016-0641
49
reference_url https://access.redhat.com/errata/RHSA-2016:0705
reference_id RHSA-2016:0705
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0705
50
reference_url https://access.redhat.com/errata/RHSA-2016:1132
reference_id RHSA-2016:1132
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:29Z/
url https://access.redhat.com/errata/RHSA-2016:1132
51
reference_url https://access.redhat.com/errata/RHSA-2016:1480
reference_id RHSA-2016:1480
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1480
52
reference_url https://access.redhat.com/errata/RHSA-2016:1481
reference_id RHSA-2016:1481
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1481
53
reference_url https://access.redhat.com/errata/RHSA-2016:1602
reference_id RHSA-2016:1602
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1602
54
reference_url https://usn.ubuntu.com/2953-1/
reference_id USN-2953-1
reference_type
scores
url https://usn.ubuntu.com/2953-1/
fixed_packages
aliases CVE-2016-0641
risk_score 2.3
exploitability 0.5
weighted_severity 4.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rfz7-vha1-e7gy
46
url VCID-s5bz-57vv-b7bz
vulnerability_id VCID-s5bz-57vv-b7bz
summary security update
references
0
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177539.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177539.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00010.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00010.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00011.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00011.html
3
reference_url http://lists.opensuse.org/opensuse-updates/2016-02/msg00039.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2016-02/msg00039.html
4
reference_url http://rhn.redhat.com/errata/RHSA-2016-0534.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0534.html
5
reference_url http://rhn.redhat.com/errata/RHSA-2016-0705.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0705.html
6
reference_url http://rhn.redhat.com/errata/RHSA-2016-1480.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-1480.html
7
reference_url http://rhn.redhat.com/errata/RHSA-2016-1481.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-1481.html
8
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4913.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4913.json
9
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-4913
reference_id
reference_type
scores
0
value 0.00392
scoring_system epss
scoring_elements 0.60239
published_at 2026-04-21T12:55:00Z
1
value 0.00392
scoring_system epss
scoring_elements 0.60078
published_at 2026-04-01T12:55:00Z
2
value 0.00392
scoring_system epss
scoring_elements 0.60156
published_at 2026-04-02T12:55:00Z
3
value 0.00392
scoring_system epss
scoring_elements 0.60181
published_at 2026-04-04T12:55:00Z
4
value 0.00392
scoring_system epss
scoring_elements 0.6015
published_at 2026-04-07T12:55:00Z
5
value 0.00392
scoring_system epss
scoring_elements 0.602
published_at 2026-04-08T12:55:00Z
6
value 0.00392
scoring_system epss
scoring_elements 0.60214
published_at 2026-04-09T12:55:00Z
7
value 0.00392
scoring_system epss
scoring_elements 0.60235
published_at 2026-04-11T12:55:00Z
8
value 0.00392
scoring_system epss
scoring_elements 0.60222
published_at 2026-04-12T12:55:00Z
9
value 0.00392
scoring_system epss
scoring_elements 0.60204
published_at 2026-04-13T12:55:00Z
10
value 0.00392
scoring_system epss
scoring_elements 0.60244
published_at 2026-04-16T12:55:00Z
11
value 0.00392
scoring_system epss
scoring_elements 0.60251
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-4913
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4792
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4792
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4802
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4802
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4815
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4815
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4816
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4816
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4819
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4819
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4826
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4826
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4830
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4830
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4836
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4836
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4858
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4858
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4861
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4861
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4870
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4870
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4879
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4879
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4895
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4895
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4913
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4913
24
reference_url https://www.suse.com/support/update/announcement/2016/suse-su-20160296-1.html
reference_id
reference_type
scores
url https://www.suse.com/support/update/announcement/2016/suse-su-20160296-1.html
25
reference_url http://www.debian.org/security/2015/dsa-3377
reference_id
reference_type
scores
url http://www.debian.org/security/2015/dsa-3377
26
reference_url http://www.debian.org/security/2015/dsa-3385
reference_id
reference_type
scores
url http://www.debian.org/security/2015/dsa-3385
27
reference_url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
28
reference_url http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
29
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
30
reference_url http://www.securityfocus.com/bid/77153
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/77153
31
reference_url http://www.securitytracker.com/id/1033894
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1033894
32
reference_url http://www.ubuntu.com/usn/USN-2781-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2781-1
33
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1274794
reference_id 1274794
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1274794
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-4913
reference_id CVE-2015-4913
reference_type
scores
0
value 3.5
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:S/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2015-4913
67
reference_url https://access.redhat.com/errata/RHSA-2016:0534
reference_id RHSA-2016:0534
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0534
68
reference_url https://access.redhat.com/errata/RHSA-2016:0705
reference_id RHSA-2016:0705
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0705
69
reference_url https://access.redhat.com/errata/RHSA-2016:1132
reference_id RHSA-2016:1132
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1132
70
reference_url https://access.redhat.com/errata/RHSA-2016:1480
reference_id RHSA-2016:1480
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1480
71
reference_url https://access.redhat.com/errata/RHSA-2016:1481
reference_id RHSA-2016:1481
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1481
72
reference_url https://usn.ubuntu.com/2781-1/
reference_id USN-2781-1
reference_type
scores
url https://usn.ubuntu.com/2781-1/
fixed_packages
aliases CVE-2015-4913
risk_score 1.6
exploitability 0.5
weighted_severity 3.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-s5bz-57vv-b7bz
47
url VCID-tazb-gd49-73b4
vulnerability_id VCID-tazb-gd49-73b4
summary security update
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:15Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:15Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:15Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:15Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:15Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:15Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html
6
reference_url http://rhn.redhat.com/errata/RHSA-2016-0705.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:15Z/
url http://rhn.redhat.com/errata/RHSA-2016-0705.html
7
reference_url http://rhn.redhat.com/errata/RHSA-2016-1480.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:15Z/
url http://rhn.redhat.com/errata/RHSA-2016-1480.html
8
reference_url http://rhn.redhat.com/errata/RHSA-2016-1481.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:15Z/
url http://rhn.redhat.com/errata/RHSA-2016-1481.html
9
reference_url http://rhn.redhat.com/errata/RHSA-2016-1602.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:15Z/
url http://rhn.redhat.com/errata/RHSA-2016-1602.html
10
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0648.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0648.json
11
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-0648
reference_id
reference_type
scores
0
value 0.00243
scoring_system epss
scoring_elements 0.47524
published_at 2026-04-21T12:55:00Z
1
value 0.00243
scoring_system epss
scoring_elements 0.47494
published_at 2026-04-02T12:55:00Z
2
value 0.00243
scoring_system epss
scoring_elements 0.47515
published_at 2026-04-09T12:55:00Z
3
value 0.00243
scoring_system epss
scoring_elements 0.47518
published_at 2026-04-08T12:55:00Z
4
value 0.00243
scoring_system epss
scoring_elements 0.47537
published_at 2026-04-11T12:55:00Z
5
value 0.00243
scoring_system epss
scoring_elements 0.47513
published_at 2026-04-12T12:55:00Z
6
value 0.00243
scoring_system epss
scoring_elements 0.47521
published_at 2026-04-13T12:55:00Z
7
value 0.00243
scoring_system epss
scoring_elements 0.4758
published_at 2026-04-16T12:55:00Z
8
value 0.00243
scoring_system epss
scoring_elements 0.47573
published_at 2026-04-18T12:55:00Z
9
value 0.00243
scoring_system epss
scoring_elements 0.47464
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-0648
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0640
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0640
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0641
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0641
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0642
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0642
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0643
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0643
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0644
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0644
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0646
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0646
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0647
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0647
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0648
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0648
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0649
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0649
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0650
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0650
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0655
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0655
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0666
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0666
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0668
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0668
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2047
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2047
26
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.6
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:S/C:N/I:N/A:C
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
27
reference_url https://mariadb.com/kb/en/mariadb/mariadb-10025-release-notes/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:15Z/
url https://mariadb.com/kb/en/mariadb/mariadb-10025-release-notes/
28
reference_url https://mariadb.com/kb/en/mariadb/mariadb-10114-release-notes/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:15Z/
url https://mariadb.com/kb/en/mariadb/mariadb-10114-release-notes/
29
reference_url https://mariadb.com/kb/en/mariadb/mariadb-5549-release-notes/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:15Z/
url https://mariadb.com/kb/en/mariadb/mariadb-5549-release-notes/
30
reference_url http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:15Z/
url http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168
31
reference_url http://www.debian.org/security/2016/dsa-3557
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:15Z/
url http://www.debian.org/security/2016/dsa-3557
32
reference_url http://www.debian.org/security/2016/dsa-3595
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:15Z/
url http://www.debian.org/security/2016/dsa-3595
33
reference_url http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:15Z/
url http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
34
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:15Z/
url http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
35
reference_url http://www.securityfocus.com/bid/86457
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:15Z/
url http://www.securityfocus.com/bid/86457
36
reference_url http://www.securitytracker.com/id/1035606
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:15Z/
url http://www.securitytracker.com/id/1035606
37
reference_url http://www.ubuntu.com/usn/USN-2953-1
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:15Z/
url http://www.ubuntu.com/usn/USN-2953-1
38
reference_url http://www.ubuntu.com/usn/USN-2954-1
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:15Z/
url http://www.ubuntu.com/usn/USN-2954-1
39
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1329251
reference_id 1329251
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1329251
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:powerkvm:2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ibm:powerkvm:2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:powerkvm:2.1:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:powerkvm:3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ibm:powerkvm:3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:powerkvm:3.1:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-0648
reference_id CVE-2016-0648
reference_type
scores
0
value 4.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:P
1
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2016-0648
50
reference_url https://access.redhat.com/errata/RHSA-2016:0705
reference_id RHSA-2016:0705
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0705
51
reference_url https://access.redhat.com/errata/RHSA-2016:1132
reference_id RHSA-2016:1132
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:15Z/
url https://access.redhat.com/errata/RHSA-2016:1132
52
reference_url https://access.redhat.com/errata/RHSA-2016:1480
reference_id RHSA-2016:1480
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1480
53
reference_url https://access.redhat.com/errata/RHSA-2016:1481
reference_id RHSA-2016:1481
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1481
54
reference_url https://access.redhat.com/errata/RHSA-2016:1602
reference_id RHSA-2016:1602
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1602
55
reference_url https://usn.ubuntu.com/2953-1/
reference_id USN-2953-1
reference_type
scores
url https://usn.ubuntu.com/2953-1/
56
reference_url https://usn.ubuntu.com/2954-1/
reference_id USN-2954-1
reference_type
scores
url https://usn.ubuntu.com/2954-1/
fixed_packages
aliases CVE-2016-0648
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tazb-gd49-73b4
48
url VCID-tx1n-v7bn-7uhw
vulnerability_id VCID-tx1n-v7bn-7uhw
summary
Multiple vulnerabilities have been found in libpcre, the worst of
    which could lead to arbitrary code execution, or cause a Denial of Service
    condition.
references
0
reference_url http://rhn.redhat.com/errata/RHSA-2016-2750.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-2750.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8381.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8381.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-8381
reference_id
reference_type
scores
0
value 0.05803
scoring_system epss
scoring_elements 0.9053
published_at 2026-04-21T12:55:00Z
1
value 0.05803
scoring_system epss
scoring_elements 0.90472
published_at 2026-04-01T12:55:00Z
2
value 0.05803
scoring_system epss
scoring_elements 0.90476
published_at 2026-04-02T12:55:00Z
3
value 0.05803
scoring_system epss
scoring_elements 0.90487
published_at 2026-04-04T12:55:00Z
4
value 0.05803
scoring_system epss
scoring_elements 0.90493
published_at 2026-04-07T12:55:00Z
5
value 0.05803
scoring_system epss
scoring_elements 0.90505
published_at 2026-04-08T12:55:00Z
6
value 0.05803
scoring_system epss
scoring_elements 0.90511
published_at 2026-04-09T12:55:00Z
7
value 0.05803
scoring_system epss
scoring_elements 0.9052
published_at 2026-04-12T12:55:00Z
8
value 0.05803
scoring_system epss
scoring_elements 0.90514
published_at 2026-04-13T12:55:00Z
9
value 0.05803
scoring_system epss
scoring_elements 0.90532
published_at 2026-04-16T12:55:00Z
10
value 0.05803
scoring_system epss
scoring_elements 0.90531
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-8381
3
reference_url https://bto.bluecoat.com/security-advisory/sa128
reference_id
reference_type
scores
url https://bto.bluecoat.com/security-advisory/sa128
4
reference_url https://bugs.exim.org/show_bug.cgi?id=1667
reference_id
reference_type
scores
url https://bugs.exim.org/show_bug.cgi?id=1667
5
reference_url https://bugs.exim.org/show_bug.cgi?id=1672
reference_id
reference_type
scores
url https://bugs.exim.org/show_bug.cgi?id=1672
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8381
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8381
7
reference_url http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup
reference_id
reference_type
scores
url http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup
8
reference_url http://www.openwall.com/lists/oss-security/2015/11/29/1
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2015/11/29/1
9
reference_url http://www.securityfocus.com/bid/76187
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/76187
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1287711
reference_id 1287711
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1287711
11
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=795539
reference_id 795539
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=795539
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:perl_compatible_regular_expression_library:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pcre:perl_compatible_regular_expression_library:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:perl_compatible_regular_expression_library:*:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-8381
reference_id CVE-2015-8381
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2015-8381
14
reference_url https://security.gentoo.org/glsa/201607-02
reference_id GLSA-201607-02
reference_type
scores
url https://security.gentoo.org/glsa/201607-02
15
reference_url https://access.redhat.com/errata/RHSA-2016:1132
reference_id RHSA-2016:1132
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1132
16
reference_url https://access.redhat.com/errata/RHSA-2016:2750
reference_id RHSA-2016:2750
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2750
17
reference_url https://usn.ubuntu.com/2943-1/
reference_id USN-2943-1
reference_type
scores
url https://usn.ubuntu.com/2943-1/
fixed_packages
aliases CVE-2015-8381
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tx1n-v7bn-7uhw
49
url VCID-udse-25e2-vfeb
vulnerability_id VCID-udse-25e2-vfeb
summary
Improper Restriction of Operations within the Bounds of a Memory Buffer
The compile_branch function in pcre_compile.c in PCRE and pcre2_compile.c in PCRE2 mishandles patterns containing an (*ACCEPT) substring in conjunction with nested parentheses, which allows remote attackers to execute arbitrary code or cause a denial of service (stack-based buffer overflow) via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror, aka ZDI-CAN-3542.
references
0
reference_url http://rhn.redhat.com/errata/RHSA-2016-1025.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-1025.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3191.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3191.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-3191
reference_id
reference_type
scores
0
value 0.11337
scoring_system epss
scoring_elements 0.93574
published_at 2026-04-21T12:55:00Z
1
value 0.11337
scoring_system epss
scoring_elements 0.93562
published_at 2026-04-16T12:55:00Z
2
value 0.11337
scoring_system epss
scoring_elements 0.93567
published_at 2026-04-18T12:55:00Z
3
value 0.11337
scoring_system epss
scoring_elements 0.93509
published_at 2026-04-01T12:55:00Z
4
value 0.11337
scoring_system epss
scoring_elements 0.93518
published_at 2026-04-02T12:55:00Z
5
value 0.11337
scoring_system epss
scoring_elements 0.93526
published_at 2026-04-07T12:55:00Z
6
value 0.11337
scoring_system epss
scoring_elements 0.93534
published_at 2026-04-08T12:55:00Z
7
value 0.11337
scoring_system epss
scoring_elements 0.93537
published_at 2026-04-09T12:55:00Z
8
value 0.11337
scoring_system epss
scoring_elements 0.93543
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-3191
3
reference_url https://bto.bluecoat.com/security-advisory/sa128
reference_id
reference_type
scores
url https://bto.bluecoat.com/security-advisory/sa128
4
reference_url https://bugs.debian.org/815920
reference_id
reference_type
scores
url https://bugs.debian.org/815920
5
reference_url https://bugs.debian.org/815921
reference_id
reference_type
scores
url https://bugs.debian.org/815921
6
reference_url https://bugs.exim.org/show_bug.cgi?id=1791
reference_id
reference_type
scores
url https://bugs.exim.org/show_bug.cgi?id=1791
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3191
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3191
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url https://www.tenable.com/security/tns-2016-18
reference_id
reference_type
scores
url https://www.tenable.com/security/tns-2016-18
10
reference_url http://vcs.pcre.org/pcre2?view=revision&revision=489
reference_id
reference_type
scores
url http://vcs.pcre.org/pcre2?view=revision&revision=489
11
reference_url http://vcs.pcre.org/pcre?view=revision&revision=1631
reference_id
reference_type
scores
url http://vcs.pcre.org/pcre?view=revision&revision=1631
12
reference_url http://www-01.ibm.com/support/docview.wss?uid=isg3T1023886
reference_id
reference_type
scores
url http://www-01.ibm.com/support/docview.wss?uid=isg3T1023886
13
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
14
reference_url http://www.securityfocus.com/bid/84810
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/84810
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1311503
reference_id 1311503
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1311503
16
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=815920
reference_id 815920
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=815920
17
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=815921
reference_id 815921
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=815921
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:pcre2:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pcre:pcre2:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:pcre2:*:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:pcre:8.00:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pcre:pcre:8.00:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:pcre:8.00:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:pcre:8.01:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pcre:pcre:8.01:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:pcre:8.01:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:pcre:8.02:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pcre:pcre:8.02:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:pcre:8.02:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:pcre:8.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pcre:pcre:8.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:pcre:8.10:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:pcre:8.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pcre:pcre:8.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:pcre:8.11:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:pcre:8.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pcre:pcre:8.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:pcre:8.12:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:pcre:8.13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pcre:pcre:8.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:pcre:8.13:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:pcre:8.20:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pcre:pcre:8.20:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:pcre:8.20:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:pcre:8.21:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pcre:pcre:8.21:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:pcre:8.21:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:pcre:8.30:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pcre:pcre:8.30:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:pcre:8.30:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:pcre:8.31:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pcre:pcre:8.31:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:pcre:8.31:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:pcre:8.32:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pcre:pcre:8.32:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:pcre:8.32:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:pcre:8.33:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pcre:pcre:8.33:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:pcre:8.33:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:pcre:8.34:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pcre:pcre:8.34:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:pcre:8.34:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:pcre:8.35:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pcre:pcre:8.35:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:pcre:8.35:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:pcre:8.36:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pcre:pcre:8.36:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:pcre:8.36:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:pcre:8.37:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pcre:pcre:8.37:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:pcre:8.37:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:pcre:8.38:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pcre:pcre:8.38:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:pcre:8.38:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-3191
reference_id CVE-2016-3191
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
1
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2016-3191
38
reference_url https://access.redhat.com/errata/RHSA-2016:1025
reference_id RHSA-2016:1025
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1025
39
reference_url https://access.redhat.com/errata/RHSA-2016:1132
reference_id RHSA-2016:1132
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1132
40
reference_url https://usn.ubuntu.com/2943-1/
reference_id USN-2943-1
reference_type
scores
url https://usn.ubuntu.com/2943-1/
fixed_packages
aliases CVE-2016-3191
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-udse-25e2-vfeb
50
url VCID-v18v-kyda-sye9
vulnerability_id VCID-v18v-kyda-sye9
summary mysql: unspecified vulnerability in subcomponent: Server: InnoDB (CPU January 2016)
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00015.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00015.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00016.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00016.html
2
reference_url http://rhn.redhat.com/errata/RHSA-2016-0705.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0705.html
3
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0610.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0610.json
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-0610
reference_id
reference_type
scores
0
value 0.00716
scoring_system epss
scoring_elements 0.72403
published_at 2026-04-21T12:55:00Z
1
value 0.00716
scoring_system epss
scoring_elements 0.72415
published_at 2026-04-18T12:55:00Z
2
value 0.00716
scoring_system epss
scoring_elements 0.72318
published_at 2026-04-01T12:55:00Z
3
value 0.00716
scoring_system epss
scoring_elements 0.72324
published_at 2026-04-02T12:55:00Z
4
value 0.00716
scoring_system epss
scoring_elements 0.72343
published_at 2026-04-04T12:55:00Z
5
value 0.00716
scoring_system epss
scoring_elements 0.72319
published_at 2026-04-07T12:55:00Z
6
value 0.00716
scoring_system epss
scoring_elements 0.72358
published_at 2026-04-08T12:55:00Z
7
value 0.00716
scoring_system epss
scoring_elements 0.7237
published_at 2026-04-09T12:55:00Z
8
value 0.00716
scoring_system epss
scoring_elements 0.72393
published_at 2026-04-11T12:55:00Z
9
value 0.00716
scoring_system epss
scoring_elements 0.72377
published_at 2026-04-12T12:55:00Z
10
value 0.00716
scoring_system epss
scoring_elements 0.72364
published_at 2026-04-13T12:55:00Z
11
value 0.00716
scoring_system epss
scoring_elements 0.72405
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-0610
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.5
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:S/C:N/I:N/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://mariadb.com/kb/en/mariadb/mariadb-10022-release-notes/
reference_id
reference_type
scores
url https://mariadb.com/kb/en/mariadb/mariadb-10022-release-notes/
7
reference_url https://mariadb.com/kb/en/mariadb/mariadb-1019-release-notes/
reference_id
reference_type
scores
url https://mariadb.com/kb/en/mariadb/mariadb-1019-release-notes/
8
reference_url http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
9
reference_url http://www.securityfocus.com/bid/81198
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/81198
10
reference_url http://www.securitytracker.com/id/1034708
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1034708
11
reference_url http://www.ubuntu.com/usn/USN-2881-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2881-1
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1301508
reference_id 1301508
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1301508
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:10.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.0.0:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:10.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.0.1:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.0.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:10.0.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.0.10:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.0.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:10.0.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.0.11:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.0.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:10.0.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.0.12:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.0.13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:10.0.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.0.13:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.0.14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:10.0.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.0.14:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.0.15:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:10.0.15:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.0.15:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.0.16:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:10.0.16:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.0.16:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.0.17:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:10.0.17:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.0.17:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.0.18:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:10.0.18:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.0.18:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.0.19:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:10.0.19:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.0.19:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:10.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.0.2:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.0.20:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:10.0.20:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.0.20:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.0.21:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:10.0.21:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.0.21:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:10.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.0.3:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:10.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.0.4:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:10.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.0.5:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:10.0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.0.6:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.0.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:10.0.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.0.7:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.0.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:10.0.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.0.8:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.0.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:10.0.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.0.9:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:10.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.1.0:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:10.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.1.1:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:10.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.1.2:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:10.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.1.3:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.1.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:10.1.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.1.4:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.1.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:10.1.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.1.5:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.1.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:10.1.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.1.6:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.1.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:10.1.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.1.7:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.1.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:10.1.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.1.8:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-0610
reference_id CVE-2016-0610
reference_type
scores
0
value 3.5
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:S/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2016-0610
56
reference_url https://access.redhat.com/errata/RHSA-2016:0705
reference_id RHSA-2016:0705
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0705
57
reference_url https://access.redhat.com/errata/RHSA-2016:1132
reference_id RHSA-2016:1132
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1132
58
reference_url https://usn.ubuntu.com/2881-1/
reference_id USN-2881-1
reference_type
scores
url https://usn.ubuntu.com/2881-1/
fixed_packages
aliases CVE-2016-0610
risk_score 1.6
exploitability 0.5
weighted_severity 3.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-v18v-kyda-sye9
51
url VCID-wx7q-7bp6-bybq
vulnerability_id VCID-wx7q-7bp6-bybq
summary
Multiple vulnerabilities have been found in libpcre, the worst of
    which could lead to arbitrary code execution, or cause a Denial of Service
    condition.
references
0
reference_url http://rhn.redhat.com/errata/RHSA-2016-2750.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-2750.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8384.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8384.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-8384
reference_id
reference_type
scores
0
value 0.01192
scoring_system epss
scoring_elements 0.78871
published_at 2026-04-21T12:55:00Z
1
value 0.01192
scoring_system epss
scoring_elements 0.788
published_at 2026-04-01T12:55:00Z
2
value 0.01192
scoring_system epss
scoring_elements 0.78807
published_at 2026-04-02T12:55:00Z
3
value 0.01192
scoring_system epss
scoring_elements 0.78836
published_at 2026-04-04T12:55:00Z
4
value 0.01192
scoring_system epss
scoring_elements 0.78819
published_at 2026-04-07T12:55:00Z
5
value 0.01192
scoring_system epss
scoring_elements 0.78845
published_at 2026-04-08T12:55:00Z
6
value 0.01192
scoring_system epss
scoring_elements 0.78851
published_at 2026-04-09T12:55:00Z
7
value 0.01192
scoring_system epss
scoring_elements 0.78874
published_at 2026-04-11T12:55:00Z
8
value 0.01192
scoring_system epss
scoring_elements 0.78857
published_at 2026-04-12T12:55:00Z
9
value 0.01192
scoring_system epss
scoring_elements 0.78848
published_at 2026-04-13T12:55:00Z
10
value 0.01192
scoring_system epss
scoring_elements 0.78876
published_at 2026-04-16T12:55:00Z
11
value 0.01192
scoring_system epss
scoring_elements 0.78873
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-8384
3
reference_url https://bto.bluecoat.com/security-advisory/sa128
reference_id
reference_type
scores
url https://bto.bluecoat.com/security-advisory/sa128
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8384
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8384
5
reference_url http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup
reference_id
reference_type
scores
url http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup
6
reference_url http://www.openwall.com/lists/oss-security/2015/11/29/1
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2015/11/29/1
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1287623
reference_id 1287623
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1287623
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:perl_compatible_regular_expression_library:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pcre:perl_compatible_regular_expression_library:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:perl_compatible_regular_expression_library:*:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-8384
reference_id CVE-2015-8384
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2015-8384
10
reference_url https://security.gentoo.org/glsa/201607-02
reference_id GLSA-201607-02
reference_type
scores
url https://security.gentoo.org/glsa/201607-02
11
reference_url https://access.redhat.com/errata/RHSA-2016:1132
reference_id RHSA-2016:1132
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1132
12
reference_url https://access.redhat.com/errata/RHSA-2016:2750
reference_id RHSA-2016:2750
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2750
13
reference_url https://usn.ubuntu.com/2943-1/
reference_id USN-2943-1
reference_type
scores
url https://usn.ubuntu.com/2943-1/
fixed_packages
aliases CVE-2015-8384
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wx7q-7bp6-bybq
52
url VCID-xegm-n9yj-ckhs
vulnerability_id VCID-xegm-n9yj-ckhs
summary security update
references
0
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177539.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177539.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00010.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00010.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00011.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00011.html
3
reference_url http://lists.opensuse.org/opensuse-updates/2016-02/msg00039.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2016-02/msg00039.html
4
reference_url http://packetstormsecurity.com/files/137232/MySQL-Procedure-Analyse-Denial-Of-Service.html
reference_id
reference_type
scores
url http://packetstormsecurity.com/files/137232/MySQL-Procedure-Analyse-Denial-Of-Service.html
5
reference_url http://rhn.redhat.com/errata/RHSA-2016-0534.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0534.html
6
reference_url http://rhn.redhat.com/errata/RHSA-2016-0705.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0705.html
7
reference_url http://rhn.redhat.com/errata/RHSA-2016-1480.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-1480.html
8
reference_url http://rhn.redhat.com/errata/RHSA-2016-1481.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-1481.html
9
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4870.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4870.json
10
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-4870
reference_id
reference_type
scores
0
value 0.2214
scoring_system epss
scoring_elements 0.95811
published_at 2026-04-21T12:55:00Z
1
value 0.2214
scoring_system epss
scoring_elements 0.95759
published_at 2026-04-01T12:55:00Z
2
value 0.2214
scoring_system epss
scoring_elements 0.95768
published_at 2026-04-02T12:55:00Z
3
value 0.2214
scoring_system epss
scoring_elements 0.95775
published_at 2026-04-04T12:55:00Z
4
value 0.2214
scoring_system epss
scoring_elements 0.95778
published_at 2026-04-07T12:55:00Z
5
value 0.2214
scoring_system epss
scoring_elements 0.95786
published_at 2026-04-08T12:55:00Z
6
value 0.2214
scoring_system epss
scoring_elements 0.9579
published_at 2026-04-09T12:55:00Z
7
value 0.2214
scoring_system epss
scoring_elements 0.95793
published_at 2026-04-12T12:55:00Z
8
value 0.2214
scoring_system epss
scoring_elements 0.95795
published_at 2026-04-13T12:55:00Z
9
value 0.2214
scoring_system epss
scoring_elements 0.95805
published_at 2026-04-16T12:55:00Z
10
value 0.2214
scoring_system epss
scoring_elements 0.9581
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-4870
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4792
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4792
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4802
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4802
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4815
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4815
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4816
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4816
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4819
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4819
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4826
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4826
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4830
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4830
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4836
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4836
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4858
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4858
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4861
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4861
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4870
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4870
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4879
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4879
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4895
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4895
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4913
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4913
25
reference_url https://www.exploit-db.com/exploits/39867/
reference_id
reference_type
scores
url https://www.exploit-db.com/exploits/39867/
26
reference_url https://www.suse.com/support/update/announcement/2016/suse-su-20160296-1.html
reference_id
reference_type
scores
url https://www.suse.com/support/update/announcement/2016/suse-su-20160296-1.html
27
reference_url http://www.debian.org/security/2015/dsa-3377
reference_id
reference_type
scores
url http://www.debian.org/security/2015/dsa-3377
28
reference_url http://www.debian.org/security/2015/dsa-3385
reference_id
reference_type
scores
url http://www.debian.org/security/2015/dsa-3385
29
reference_url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
30
reference_url http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
31
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
32
reference_url http://www.securityfocus.com/bid/77208
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/77208
33
reference_url http://www.securitytracker.com/id/1033894
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1033894
34
reference_url http://www.ubuntu.com/usn/USN-2781-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2781-1
35
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1274781
reference_id 1274781
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1274781
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:-:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:linux:7:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:-:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.1:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
67
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/39867.py
reference_id CVE-2015-4870
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/39867.py
68
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-4870
reference_id CVE-2015-4870
reference_type
scores
0
value 4.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2015-4870
69
reference_url https://access.redhat.com/errata/RHSA-2016:0534
reference_id RHSA-2016:0534
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0534
70
reference_url https://access.redhat.com/errata/RHSA-2016:0705
reference_id RHSA-2016:0705
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0705
71
reference_url https://access.redhat.com/errata/RHSA-2016:1132
reference_id RHSA-2016:1132
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1132
72
reference_url https://access.redhat.com/errata/RHSA-2016:1480
reference_id RHSA-2016:1480
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1480
73
reference_url https://access.redhat.com/errata/RHSA-2016:1481
reference_id RHSA-2016:1481
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1481
74
reference_url https://usn.ubuntu.com/2781-1/
reference_id USN-2781-1
reference_type
scores
url https://usn.ubuntu.com/2781-1/
fixed_packages
aliases CVE-2015-4870
risk_score 7.2
exploitability 2.0
weighted_severity 3.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xegm-n9yj-ckhs
53
url VCID-xvv1-nxs6-n7ab
vulnerability_id VCID-xvv1-nxs6-n7ab
summary security update
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00015.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00015.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00016.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00016.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html
6
reference_url http://rhn.redhat.com/errata/RHSA-2016-0534.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0534.html
7
reference_url http://rhn.redhat.com/errata/RHSA-2016-0705.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0705.html
8
reference_url http://rhn.redhat.com/errata/RHSA-2016-1480.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-1480.html
9
reference_url http://rhn.redhat.com/errata/RHSA-2016-1481.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-1481.html
10
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0597.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0597.json
11
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-0597
reference_id
reference_type
scores
0
value 0.00361
scoring_system epss
scoring_elements 0.58275
published_at 2026-04-21T12:55:00Z
1
value 0.00361
scoring_system epss
scoring_elements 0.58298
published_at 2026-04-18T12:55:00Z
2
value 0.00361
scoring_system epss
scoring_elements 0.58149
published_at 2026-04-01T12:55:00Z
3
value 0.00361
scoring_system epss
scoring_elements 0.58235
published_at 2026-04-02T12:55:00Z
4
value 0.00361
scoring_system epss
scoring_elements 0.58255
published_at 2026-04-04T12:55:00Z
5
value 0.00361
scoring_system epss
scoring_elements 0.58229
published_at 2026-04-07T12:55:00Z
6
value 0.00361
scoring_system epss
scoring_elements 0.58283
published_at 2026-04-08T12:55:00Z
7
value 0.00361
scoring_system epss
scoring_elements 0.58288
published_at 2026-04-09T12:55:00Z
8
value 0.00361
scoring_system epss
scoring_elements 0.58307
published_at 2026-04-11T12:55:00Z
9
value 0.00361
scoring_system epss
scoring_elements 0.58284
published_at 2026-04-12T12:55:00Z
10
value 0.00361
scoring_system epss
scoring_elements 0.58264
published_at 2026-04-13T12:55:00Z
11
value 0.00361
scoring_system epss
scoring_elements 0.58296
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-0597
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0505
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0505
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0546
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0546
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0596
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0596
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0597
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0597
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0598
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0598
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0600
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0600
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0606
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0606
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0608
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0608
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0609
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0609
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0616
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0616
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2047
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2047
23
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
24
reference_url https://mariadb.com/kb/en/mariadb/mariadb-10110-release-notes/
reference_id
reference_type
scores
url https://mariadb.com/kb/en/mariadb/mariadb-10110-release-notes/
25
reference_url https://mariadb.com/kb/en/mariadb/mariadb-5547-release-notes/
reference_id
reference_type
scores
url https://mariadb.com/kb/en/mariadb/mariadb-5547-release-notes/
26
reference_url https://mariadb.com/kb/en/mdb-10023-rn/
reference_id
reference_type
scores
url https://mariadb.com/kb/en/mdb-10023-rn/
27
reference_url http://www.debian.org/security/2016/dsa-3453
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3453
28
reference_url http://www.debian.org/security/2016/dsa-3459
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3459
29
reference_url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
30
reference_url http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
31
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
32
reference_url http://www.securityfocus.com/bid/81151
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/81151
33
reference_url http://www.securitytracker.com/id/1034708
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1034708
34
reference_url http://www.ubuntu.com/usn/USN-2881-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2881-1
35
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1301497
reference_id 1301497
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1301497
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node_eus:7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_hpc_node_eus:7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node_eus:7.2:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-0597
reference_id CVE-2016-0597
reference_type
scores
0
value 4.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2016-0597
57
reference_url https://access.redhat.com/errata/RHSA-2016:0534
reference_id RHSA-2016:0534
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0534
58
reference_url https://access.redhat.com/errata/RHSA-2016:0705
reference_id RHSA-2016:0705
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0705
59
reference_url https://access.redhat.com/errata/RHSA-2016:1132
reference_id RHSA-2016:1132
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1132
60
reference_url https://access.redhat.com/errata/RHSA-2016:1480
reference_id RHSA-2016:1480
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1480
61
reference_url https://access.redhat.com/errata/RHSA-2016:1481
reference_id RHSA-2016:1481
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1481
62
reference_url https://usn.ubuntu.com/2881-1/
reference_id USN-2881-1
reference_type
scores
url https://usn.ubuntu.com/2881-1/
fixed_packages
aliases CVE-2016-0597
risk_score 1.8
exploitability 0.5
weighted_severity 3.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xvv1-nxs6-n7ab
54
url VCID-y6p4-vfkn-q7fc
vulnerability_id VCID-y6p4-vfkn-q7fc
summary security update
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00015.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00015.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00016.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00016.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html
6
reference_url http://rhn.redhat.com/errata/RHSA-2016-0534.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0534.html
7
reference_url http://rhn.redhat.com/errata/RHSA-2016-0705.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0705.html
8
reference_url http://rhn.redhat.com/errata/RHSA-2016-1480.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-1480.html
9
reference_url http://rhn.redhat.com/errata/RHSA-2016-1481.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-1481.html
10
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0598.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0598.json
11
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-0598
reference_id
reference_type
scores
0
value 0.00338
scoring_system epss
scoring_elements 0.5664
published_at 2026-04-21T12:55:00Z
1
value 0.00338
scoring_system epss
scoring_elements 0.56668
published_at 2026-04-18T12:55:00Z
2
value 0.00338
scoring_system epss
scoring_elements 0.56522
published_at 2026-04-01T12:55:00Z
3
value 0.00338
scoring_system epss
scoring_elements 0.56618
published_at 2026-04-07T12:55:00Z
4
value 0.00338
scoring_system epss
scoring_elements 0.56639
published_at 2026-04-04T12:55:00Z
5
value 0.00338
scoring_system epss
scoring_elements 0.56669
published_at 2026-04-16T12:55:00Z
6
value 0.00338
scoring_system epss
scoring_elements 0.56675
published_at 2026-04-09T12:55:00Z
7
value 0.00338
scoring_system epss
scoring_elements 0.56683
published_at 2026-04-11T12:55:00Z
8
value 0.00338
scoring_system epss
scoring_elements 0.56658
published_at 2026-04-12T12:55:00Z
9
value 0.00338
scoring_system epss
scoring_elements 0.56638
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-0598
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0505
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0505
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0546
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0546
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0596
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0596
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0597
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0597
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0598
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0598
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0600
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0600
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0606
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0606
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0608
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0608
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0609
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0609
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0616
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0616
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2047
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2047
23
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.5
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:S/C:N/I:N/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
24
reference_url https://mariadb.com/kb/en/mariadb/mariadb-10110-release-notes/
reference_id
reference_type
scores
url https://mariadb.com/kb/en/mariadb/mariadb-10110-release-notes/
25
reference_url https://mariadb.com/kb/en/mariadb/mariadb-5547-release-notes/
reference_id
reference_type
scores
url https://mariadb.com/kb/en/mariadb/mariadb-5547-release-notes/
26
reference_url https://mariadb.com/kb/en/mdb-10023-rn/
reference_id
reference_type
scores
url https://mariadb.com/kb/en/mdb-10023-rn/
27
reference_url http://www.debian.org/security/2016/dsa-3453
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3453
28
reference_url http://www.debian.org/security/2016/dsa-3459
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3459
29
reference_url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
30
reference_url http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
31
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
32
reference_url http://www.securityfocus.com/bid/81182
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/81182
33
reference_url http://www.securitytracker.com/id/1034708
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1034708
34
reference_url http://www.ubuntu.com/usn/USN-2881-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2881-1
35
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1301498
reference_id 1301498
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1301498
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node_eus:7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_hpc_node_eus:7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node_eus:7.2:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-0598
reference_id CVE-2016-0598
reference_type
scores
0
value 3.5
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:S/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2016-0598
57
reference_url https://access.redhat.com/errata/RHSA-2016:0534
reference_id RHSA-2016:0534
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0534
58
reference_url https://access.redhat.com/errata/RHSA-2016:0705
reference_id RHSA-2016:0705
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0705
59
reference_url https://access.redhat.com/errata/RHSA-2016:1132
reference_id RHSA-2016:1132
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1132
60
reference_url https://access.redhat.com/errata/RHSA-2016:1480
reference_id RHSA-2016:1480
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1480
61
reference_url https://access.redhat.com/errata/RHSA-2016:1481
reference_id RHSA-2016:1481
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1481
62
reference_url https://usn.ubuntu.com/2881-1/
reference_id USN-2881-1
reference_type
scores
url https://usn.ubuntu.com/2881-1/
fixed_packages
aliases CVE-2016-0598
risk_score 1.6
exploitability 0.5
weighted_severity 3.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-y6p4-vfkn-q7fc
55
url VCID-yztb-bavc-kkgt
vulnerability_id VCID-yztb-bavc-kkgt
summary
Multiple vulnerabilities have been found in libpcre, the worst of
    which could lead to arbitrary code execution, or cause a Denial of Service
    condition.
references
0
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2016-January/174931.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2016-January/174931.html
1
reference_url http://rhn.redhat.com/errata/RHSA-2016-2750.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-2750.html
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8383.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8383.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-8383
reference_id
reference_type
scores
0
value 0.02335
scoring_system epss
scoring_elements 0.84866
published_at 2026-04-21T12:55:00Z
1
value 0.02335
scoring_system epss
scoring_elements 0.84868
published_at 2026-04-18T12:55:00Z
2
value 0.02335
scoring_system epss
scoring_elements 0.84771
published_at 2026-04-01T12:55:00Z
3
value 0.02335
scoring_system epss
scoring_elements 0.84786
published_at 2026-04-02T12:55:00Z
4
value 0.02335
scoring_system epss
scoring_elements 0.84806
published_at 2026-04-04T12:55:00Z
5
value 0.02335
scoring_system epss
scoring_elements 0.84807
published_at 2026-04-07T12:55:00Z
6
value 0.02335
scoring_system epss
scoring_elements 0.8483
published_at 2026-04-08T12:55:00Z
7
value 0.02335
scoring_system epss
scoring_elements 0.84836
published_at 2026-04-09T12:55:00Z
8
value 0.02335
scoring_system epss
scoring_elements 0.84854
published_at 2026-04-11T12:55:00Z
9
value 0.02335
scoring_system epss
scoring_elements 0.84851
published_at 2026-04-12T12:55:00Z
10
value 0.02335
scoring_system epss
scoring_elements 0.84846
published_at 2026-04-13T12:55:00Z
11
value 0.02335
scoring_system epss
scoring_elements 0.84867
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-8383
4
reference_url https://bto.bluecoat.com/security-advisory/sa128
reference_id
reference_type
scores
url https://bto.bluecoat.com/security-advisory/sa128
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8383
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8383
6
reference_url https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731
reference_id
reference_type
scores
url https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731
7
reference_url https://security.netapp.com/advisory/ntap-20230216-0002/
reference_id
reference_type
scores
url https://security.netapp.com/advisory/ntap-20230216-0002/
8
reference_url http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup
reference_id
reference_type
scores
url http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup
9
reference_url http://www.openwall.com/lists/oss-security/2015/11/29/1
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2015/11/29/1
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1287614
reference_id 1287614
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1287614
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:perl_compatible_regular_expression_library:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pcre:perl_compatible_regular_expression_library:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pcre:perl_compatible_regular_expression_library:*:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:php:php:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:*:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-8383
reference_id CVE-2015-8383
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
1
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2015-8383
15
reference_url https://security.gentoo.org/glsa/201607-02
reference_id GLSA-201607-02
reference_type
scores
url https://security.gentoo.org/glsa/201607-02
16
reference_url https://access.redhat.com/errata/RHSA-2016:1132
reference_id RHSA-2016:1132
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1132
17
reference_url https://access.redhat.com/errata/RHSA-2016:2750
reference_id RHSA-2016:2750
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2750
18
reference_url https://usn.ubuntu.com/2943-1/
reference_id USN-2943-1
reference_type
scores
url https://usn.ubuntu.com/2943-1/
fixed_packages
aliases CVE-2015-8383
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-yztb-bavc-kkgt
56
url VCID-yzzc-qh9x-pfd6
vulnerability_id VCID-yzzc-qh9x-pfd6
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4802.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4802.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-4802
reference_id
reference_type
scores
0
value 0.00419
scoring_system epss
scoring_elements 0.6176
published_at 2026-04-01T12:55:00Z
1
value 0.00419
scoring_system epss
scoring_elements 0.61834
published_at 2026-04-02T12:55:00Z
2
value 0.00419
scoring_system epss
scoring_elements 0.61865
published_at 2026-04-04T12:55:00Z
3
value 0.00419
scoring_system epss
scoring_elements 0.61837
published_at 2026-04-07T12:55:00Z
4
value 0.00419
scoring_system epss
scoring_elements 0.61886
published_at 2026-04-08T12:55:00Z
5
value 0.00419
scoring_system epss
scoring_elements 0.61902
published_at 2026-04-09T12:55:00Z
6
value 0.00419
scoring_system epss
scoring_elements 0.61923
published_at 2026-04-11T12:55:00Z
7
value 0.00419
scoring_system epss
scoring_elements 0.61911
published_at 2026-04-12T12:55:00Z
8
value 0.00419
scoring_system epss
scoring_elements 0.61891
published_at 2026-04-13T12:55:00Z
9
value 0.00419
scoring_system epss
scoring_elements 0.61934
published_at 2026-04-16T12:55:00Z
10
value 0.00419
scoring_system epss
scoring_elements 0.61939
published_at 2026-04-18T12:55:00Z
11
value 0.00419
scoring_system epss
scoring_elements 0.61921
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-4802
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4792
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4792
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4802
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4802
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4815
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4815
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4816
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4816
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4819
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4819
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4826
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4826
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4830
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4830
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4836
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4836
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4858
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4858
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4861
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4861
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4870
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4870
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4879
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4879
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4895
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4895
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4913
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4913
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1274756
reference_id 1274756
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1274756
17
reference_url https://access.redhat.com/errata/RHSA-2016:0534
reference_id RHSA-2016:0534
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0534
18
reference_url https://access.redhat.com/errata/RHSA-2016:0705
reference_id RHSA-2016:0705
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0705
19
reference_url https://access.redhat.com/errata/RHSA-2016:1132
reference_id RHSA-2016:1132
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1132
20
reference_url https://access.redhat.com/errata/RHSA-2016:1480
reference_id RHSA-2016:1480
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1480
21
reference_url https://access.redhat.com/errata/RHSA-2016:1481
reference_id RHSA-2016:1481
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1481
22
reference_url https://usn.ubuntu.com/2781-1/
reference_id USN-2781-1
reference_type
scores
url https://usn.ubuntu.com/2781-1/
fixed_packages
aliases CVE-2015-4802
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-yzzc-qh9x-pfd6
57
url VCID-zb4s-9rj3-ebea
vulnerability_id VCID-zb4s-9rj3-ebea
summary security update
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:31Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:31Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:31Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:31Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:31Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:31Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html
6
reference_url http://rhn.redhat.com/errata/RHSA-2016-0705.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:31Z/
url http://rhn.redhat.com/errata/RHSA-2016-0705.html
7
reference_url http://rhn.redhat.com/errata/RHSA-2016-1480.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:31Z/
url http://rhn.redhat.com/errata/RHSA-2016-1480.html
8
reference_url http://rhn.redhat.com/errata/RHSA-2016-1481.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:31Z/
url http://rhn.redhat.com/errata/RHSA-2016-1481.html
9
reference_url http://rhn.redhat.com/errata/RHSA-2016-1602.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:31Z/
url http://rhn.redhat.com/errata/RHSA-2016-1602.html
10
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0640.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0640.json
11
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-0640
reference_id
reference_type
scores
0
value 0.00225
scoring_system epss
scoring_elements 0.45224
published_at 2026-04-01T12:55:00Z
1
value 0.00225
scoring_system epss
scoring_elements 0.45304
published_at 2026-04-02T12:55:00Z
2
value 0.00225
scoring_system epss
scoring_elements 0.45326
published_at 2026-04-04T12:55:00Z
3
value 0.00225
scoring_system epss
scoring_elements 0.45268
published_at 2026-04-07T12:55:00Z
4
value 0.00225
scoring_system epss
scoring_elements 0.45324
published_at 2026-04-08T12:55:00Z
5
value 0.00225
scoring_system epss
scoring_elements 0.45323
published_at 2026-04-09T12:55:00Z
6
value 0.00225
scoring_system epss
scoring_elements 0.45345
published_at 2026-04-11T12:55:00Z
7
value 0.00225
scoring_system epss
scoring_elements 0.45313
published_at 2026-04-12T12:55:00Z
8
value 0.00225
scoring_system epss
scoring_elements 0.45315
published_at 2026-04-13T12:55:00Z
9
value 0.00225
scoring_system epss
scoring_elements 0.45366
published_at 2026-04-16T12:55:00Z
10
value 0.00225
scoring_system epss
scoring_elements 0.4536
published_at 2026-04-18T12:55:00Z
11
value 0.00225
scoring_system epss
scoring_elements 0.45308
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-0640
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0640
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0640
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0641
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0641
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0642
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0642
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0643
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0643
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0644
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0644
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0646
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0646
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0647
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0647
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0648
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0648
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0649
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0649
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0650
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0650
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0655
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0655
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0666
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0666
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0668
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0668
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2047
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2047
26
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.2
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:S/C:N/I:P/A:C
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
27
reference_url https://mariadb.com/kb/en/mariadb/mariadb-10024-release-notes/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:31Z/
url https://mariadb.com/kb/en/mariadb/mariadb-10024-release-notes/
28
reference_url https://mariadb.com/kb/en/mariadb/mariadb-10112-release-notes/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:31Z/
url https://mariadb.com/kb/en/mariadb/mariadb-10112-release-notes/
29
reference_url https://mariadb.com/kb/en/mariadb/mariadb-5548-release-notes/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:31Z/
url https://mariadb.com/kb/en/mariadb/mariadb-5548-release-notes/
30
reference_url http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:31Z/
url http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168
31
reference_url http://www.debian.org/security/2016/dsa-3557
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:31Z/
url http://www.debian.org/security/2016/dsa-3557
32
reference_url http://www.debian.org/security/2016/dsa-3595
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:31Z/
url http://www.debian.org/security/2016/dsa-3595
33
reference_url http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:31Z/
url http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
34
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:31Z/
url http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
35
reference_url http://www.securityfocus.com/bid/86427
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:31Z/
url http://www.securityfocus.com/bid/86427
36
reference_url http://www.securitytracker.com/id/1035606
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:31Z/
url http://www.securitytracker.com/id/1035606
37
reference_url http://www.ubuntu.com/usn/USN-2953-1
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:31Z/
url http://www.ubuntu.com/usn/USN-2953-1
38
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1329239
reference_id 1329239
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1329239
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:powerkvm:2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ibm:powerkvm:2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:powerkvm:2.1:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:powerkvm:3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ibm:powerkvm:3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:powerkvm:3.1:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-0640
reference_id CVE-2016-0640
reference_type
scores
0
value 4.9
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:S/C:N/I:P/A:P
1
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2016-0640
49
reference_url https://access.redhat.com/errata/RHSA-2016:0705
reference_id RHSA-2016:0705
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0705
50
reference_url https://access.redhat.com/errata/RHSA-2016:1132
reference_id RHSA-2016:1132
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:31Z/
url https://access.redhat.com/errata/RHSA-2016:1132
51
reference_url https://access.redhat.com/errata/RHSA-2016:1480
reference_id RHSA-2016:1480
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1480
52
reference_url https://access.redhat.com/errata/RHSA-2016:1481
reference_id RHSA-2016:1481
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1481
53
reference_url https://access.redhat.com/errata/RHSA-2016:1602
reference_id RHSA-2016:1602
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1602
54
reference_url https://usn.ubuntu.com/2953-1/
reference_id USN-2953-1
reference_type
scores
url https://usn.ubuntu.com/2953-1/
fixed_packages
aliases CVE-2016-0640
risk_score 2.8
exploitability 0.5
weighted_severity 5.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zb4s-9rj3-ebea
Fixing_vulnerabilities
Risk_score7.2
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:rpm/redhat/rh-mariadb100-mariadb@1:10.0.25-4%3Farch=el7