Lookup for vulnerable packages by Package URL.

Purlpkg:rpm/redhat/rh-mysql56-mysql@5.6.26-1?arch=el7
Typerpm
Namespaceredhat
Namerh-mysql56-mysql
Version5.6.26-1
Qualifiers
arch el7
Subpath
Is_vulnerabletrue
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
0
url VCID-1fu7-83tn-5qdt
vulnerability_id VCID-1fu7-83tn-5qdt
summary
Multiple vulnerabilities have been found in MySQL and MariaDB, the
    worst of which could allow remote attackers to cause a Denial of Service
    condition or obtain sensitive information.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2611.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2611.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-2611
reference_id
reference_type
scores
0
value 0.00595
scoring_system epss
scoring_elements 0.69241
published_at 2026-04-01T12:55:00Z
1
value 0.00595
scoring_system epss
scoring_elements 0.69256
published_at 2026-04-02T12:55:00Z
2
value 0.00595
scoring_system epss
scoring_elements 0.69276
published_at 2026-04-04T12:55:00Z
3
value 0.00595
scoring_system epss
scoring_elements 0.69258
published_at 2026-04-07T12:55:00Z
4
value 0.00595
scoring_system epss
scoring_elements 0.69307
published_at 2026-04-08T12:55:00Z
5
value 0.00595
scoring_system epss
scoring_elements 0.69325
published_at 2026-04-09T12:55:00Z
6
value 0.00595
scoring_system epss
scoring_elements 0.69347
published_at 2026-04-11T12:55:00Z
7
value 0.00595
scoring_system epss
scoring_elements 0.69331
published_at 2026-04-21T12:55:00Z
8
value 0.00595
scoring_system epss
scoring_elements 0.69302
published_at 2026-04-13T12:55:00Z
9
value 0.00595
scoring_system epss
scoring_elements 0.69341
published_at 2026-04-16T12:55:00Z
10
value 0.00595
scoring_system epss
scoring_elements 0.69351
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-2611
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1244769
reference_id 1244769
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1244769
3
reference_url https://security.gentoo.org/glsa/201610-06
reference_id GLSA-201610-06
reference_type
scores
url https://security.gentoo.org/glsa/201610-06
4
reference_url https://access.redhat.com/errata/RHSA-2015:1630
reference_id RHSA-2015:1630
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1630
5
reference_url https://access.redhat.com/errata/RHSA-2015:1646
reference_id RHSA-2015:1646
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1646
6
reference_url https://usn.ubuntu.com/2674-1/
reference_id USN-2674-1
reference_type
scores
url https://usn.ubuntu.com/2674-1/
fixed_packages
aliases CVE-2015-2611
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1fu7-83tn-5qdt
1
url VCID-1k52-9nbh-1qdj
vulnerability_id VCID-1k52-9nbh-1qdj
summary
Multiple vulnerabilities have been found in MySQL and MariaDB, the
    worst of which could allow remote attackers to cause a Denial of Service
    condition or obtain sensitive information.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2648.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2648.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-2648
reference_id
reference_type
scores
0
value 0.00598
scoring_system epss
scoring_elements 0.69334
published_at 2026-04-01T12:55:00Z
1
value 0.00598
scoring_system epss
scoring_elements 0.69347
published_at 2026-04-02T12:55:00Z
2
value 0.00598
scoring_system epss
scoring_elements 0.69363
published_at 2026-04-04T12:55:00Z
3
value 0.00598
scoring_system epss
scoring_elements 0.69343
published_at 2026-04-07T12:55:00Z
4
value 0.00598
scoring_system epss
scoring_elements 0.69393
published_at 2026-04-08T12:55:00Z
5
value 0.00598
scoring_system epss
scoring_elements 0.69409
published_at 2026-04-09T12:55:00Z
6
value 0.00598
scoring_system epss
scoring_elements 0.69432
published_at 2026-04-11T12:55:00Z
7
value 0.00598
scoring_system epss
scoring_elements 0.69417
published_at 2026-04-12T12:55:00Z
8
value 0.00598
scoring_system epss
scoring_elements 0.69402
published_at 2026-04-13T12:55:00Z
9
value 0.00598
scoring_system epss
scoring_elements 0.69442
published_at 2026-04-16T12:55:00Z
10
value 0.00598
scoring_system epss
scoring_elements 0.69452
published_at 2026-04-18T12:55:00Z
11
value 0.00598
scoring_system epss
scoring_elements 0.69434
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-2648
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0433
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0433
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0441
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0441
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0499
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0499
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0501
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0501
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0505
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0505
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2568
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2568
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2571
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2571
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2573
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2573
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2582
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2582
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2620
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2620
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2643
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2643
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2648
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2648
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3152
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3152
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4737
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4737
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4752
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4752
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4757
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4757
18
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1244775
reference_id 1244775
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1244775
19
reference_url https://security.gentoo.org/glsa/201610-06
reference_id GLSA-201610-06
reference_type
scores
url https://security.gentoo.org/glsa/201610-06
20
reference_url https://access.redhat.com/errata/RHSA-2015:1628
reference_id RHSA-2015:1628
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1628
21
reference_url https://access.redhat.com/errata/RHSA-2015:1629
reference_id RHSA-2015:1629
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1629
22
reference_url https://access.redhat.com/errata/RHSA-2015:1630
reference_id RHSA-2015:1630
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1630
23
reference_url https://access.redhat.com/errata/RHSA-2015:1646
reference_id RHSA-2015:1646
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1646
24
reference_url https://access.redhat.com/errata/RHSA-2015:1647
reference_id RHSA-2015:1647
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1647
25
reference_url https://access.redhat.com/errata/RHSA-2015:1665
reference_id RHSA-2015:1665
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1665
26
reference_url https://usn.ubuntu.com/2674-1/
reference_id USN-2674-1
reference_type
scores
url https://usn.ubuntu.com/2674-1/
fixed_packages
aliases CVE-2015-2648
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1k52-9nbh-1qdj
2
url VCID-2k6h-11xu-3bat
vulnerability_id VCID-2k6h-11xu-3bat
summary mysql: unspecified vulnerability related to Server:Memcached (CPU July 2015)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4761.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4761.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-4761
reference_id
reference_type
scores
0
value 0.00863
scoring_system epss
scoring_elements 0.75025
published_at 2026-04-01T12:55:00Z
1
value 0.00863
scoring_system epss
scoring_elements 0.75027
published_at 2026-04-02T12:55:00Z
2
value 0.00863
scoring_system epss
scoring_elements 0.75056
published_at 2026-04-04T12:55:00Z
3
value 0.00863
scoring_system epss
scoring_elements 0.75032
published_at 2026-04-07T12:55:00Z
4
value 0.00863
scoring_system epss
scoring_elements 0.75066
published_at 2026-04-08T12:55:00Z
5
value 0.00863
scoring_system epss
scoring_elements 0.75078
published_at 2026-04-09T12:55:00Z
6
value 0.00863
scoring_system epss
scoring_elements 0.751
published_at 2026-04-11T12:55:00Z
7
value 0.00863
scoring_system epss
scoring_elements 0.75079
published_at 2026-04-12T12:55:00Z
8
value 0.00863
scoring_system epss
scoring_elements 0.75068
published_at 2026-04-13T12:55:00Z
9
value 0.00863
scoring_system epss
scoring_elements 0.75106
published_at 2026-04-16T12:55:00Z
10
value 0.00863
scoring_system epss
scoring_elements 0.75113
published_at 2026-04-18T12:55:00Z
11
value 0.00863
scoring_system epss
scoring_elements 0.75103
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-4761
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1244782
reference_id 1244782
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1244782
3
reference_url https://access.redhat.com/errata/RHSA-2015:1630
reference_id RHSA-2015:1630
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1630
4
reference_url https://access.redhat.com/errata/RHSA-2015:1646
reference_id RHSA-2015:1646
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1646
5
reference_url https://usn.ubuntu.com/2674-1/
reference_id USN-2674-1
reference_type
scores
url https://usn.ubuntu.com/2674-1/
fixed_packages
aliases CVE-2015-4761
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2k6h-11xu-3bat
3
url VCID-34h2-5ygu-6fdc
vulnerability_id VCID-34h2-5ygu-6fdc
summary
Multiple vulnerabilities have been found in MySQL and MariaDB, the
    worst of which could allow remote attackers to cause a Denial of Service
    condition or obtain sensitive information.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4752.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4752.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-4752
reference_id
reference_type
scores
0
value 0.00598
scoring_system epss
scoring_elements 0.69334
published_at 2026-04-01T12:55:00Z
1
value 0.00598
scoring_system epss
scoring_elements 0.69347
published_at 2026-04-02T12:55:00Z
2
value 0.00598
scoring_system epss
scoring_elements 0.69363
published_at 2026-04-04T12:55:00Z
3
value 0.00598
scoring_system epss
scoring_elements 0.69343
published_at 2026-04-07T12:55:00Z
4
value 0.00598
scoring_system epss
scoring_elements 0.69393
published_at 2026-04-08T12:55:00Z
5
value 0.00598
scoring_system epss
scoring_elements 0.69409
published_at 2026-04-09T12:55:00Z
6
value 0.00598
scoring_system epss
scoring_elements 0.69432
published_at 2026-04-11T12:55:00Z
7
value 0.00598
scoring_system epss
scoring_elements 0.69417
published_at 2026-04-12T12:55:00Z
8
value 0.00598
scoring_system epss
scoring_elements 0.69402
published_at 2026-04-13T12:55:00Z
9
value 0.00598
scoring_system epss
scoring_elements 0.69442
published_at 2026-04-16T12:55:00Z
10
value 0.00598
scoring_system epss
scoring_elements 0.69452
published_at 2026-04-18T12:55:00Z
11
value 0.00598
scoring_system epss
scoring_elements 0.69434
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-4752
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0433
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0433
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0441
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0441
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0499
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0499
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0501
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0501
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0505
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0505
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2568
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2568
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2571
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2571
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2573
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2573
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2582
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2582
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2620
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2620
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2643
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2643
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2648
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2648
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3152
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3152
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4737
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4737
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4752
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4752
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4757
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4757
18
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1244779
reference_id 1244779
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1244779
19
reference_url https://security.gentoo.org/glsa/201610-06
reference_id GLSA-201610-06
reference_type
scores
url https://security.gentoo.org/glsa/201610-06
20
reference_url https://access.redhat.com/errata/RHSA-2015:1628
reference_id RHSA-2015:1628
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1628
21
reference_url https://access.redhat.com/errata/RHSA-2015:1629
reference_id RHSA-2015:1629
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1629
22
reference_url https://access.redhat.com/errata/RHSA-2015:1630
reference_id RHSA-2015:1630
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1630
23
reference_url https://access.redhat.com/errata/RHSA-2015:1646
reference_id RHSA-2015:1646
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1646
24
reference_url https://access.redhat.com/errata/RHSA-2015:1647
reference_id RHSA-2015:1647
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1647
25
reference_url https://access.redhat.com/errata/RHSA-2015:1665
reference_id RHSA-2015:1665
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1665
26
reference_url https://usn.ubuntu.com/2674-1/
reference_id USN-2674-1
reference_type
scores
url https://usn.ubuntu.com/2674-1/
fixed_packages
aliases CVE-2015-4752
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-34h2-5ygu-6fdc
4
url VCID-4dta-v8h2-nqch
vulnerability_id VCID-4dta-v8h2-nqch
summary
Multiple vulnerabilities have been found in MySQL and MariaDB, the
    worst of which could allow remote attackers to cause a Denial of Service
    condition or obtain sensitive information.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4769.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4769.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-4769
reference_id
reference_type
scores
0
value 0.00769
scoring_system epss
scoring_elements 0.73458
published_at 2026-04-01T12:55:00Z
1
value 0.00769
scoring_system epss
scoring_elements 0.73466
published_at 2026-04-02T12:55:00Z
2
value 0.00769
scoring_system epss
scoring_elements 0.73489
published_at 2026-04-04T12:55:00Z
3
value 0.00769
scoring_system epss
scoring_elements 0.7346
published_at 2026-04-07T12:55:00Z
4
value 0.00769
scoring_system epss
scoring_elements 0.73497
published_at 2026-04-08T12:55:00Z
5
value 0.00769
scoring_system epss
scoring_elements 0.7351
published_at 2026-04-09T12:55:00Z
6
value 0.00769
scoring_system epss
scoring_elements 0.73534
published_at 2026-04-11T12:55:00Z
7
value 0.00769
scoring_system epss
scoring_elements 0.73515
published_at 2026-04-12T12:55:00Z
8
value 0.00769
scoring_system epss
scoring_elements 0.73507
published_at 2026-04-13T12:55:00Z
9
value 0.00769
scoring_system epss
scoring_elements 0.7355
published_at 2026-04-16T12:55:00Z
10
value 0.00769
scoring_system epss
scoring_elements 0.73559
published_at 2026-04-18T12:55:00Z
11
value 0.00769
scoring_system epss
scoring_elements 0.73553
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-4769
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1244785
reference_id 1244785
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1244785
3
reference_url https://security.gentoo.org/glsa/201610-06
reference_id GLSA-201610-06
reference_type
scores
url https://security.gentoo.org/glsa/201610-06
4
reference_url https://access.redhat.com/errata/RHSA-2015:1630
reference_id RHSA-2015:1630
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1630
5
reference_url https://access.redhat.com/errata/RHSA-2015:1646
reference_id RHSA-2015:1646
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1646
6
reference_url https://usn.ubuntu.com/2674-1/
reference_id USN-2674-1
reference_type
scores
url https://usn.ubuntu.com/2674-1/
fixed_packages
aliases CVE-2015-4769
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4dta-v8h2-nqch
5
url VCID-6q17-t984-4uhd
vulnerability_id VCID-6q17-t984-4uhd
summary
Multiple vulnerabilities have been found in MySQL and MariaDB, the
    worst of which could allow remote attackers to cause a Denial of Service
    condition or obtain sensitive information.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4737.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4737.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-4737
reference_id
reference_type
scores
0
value 0.00428
scoring_system epss
scoring_elements 0.62334
published_at 2026-04-01T12:55:00Z
1
value 0.00428
scoring_system epss
scoring_elements 0.62392
published_at 2026-04-02T12:55:00Z
2
value 0.00428
scoring_system epss
scoring_elements 0.62423
published_at 2026-04-04T12:55:00Z
3
value 0.00428
scoring_system epss
scoring_elements 0.62388
published_at 2026-04-07T12:55:00Z
4
value 0.00428
scoring_system epss
scoring_elements 0.62437
published_at 2026-04-08T12:55:00Z
5
value 0.00428
scoring_system epss
scoring_elements 0.62454
published_at 2026-04-09T12:55:00Z
6
value 0.00428
scoring_system epss
scoring_elements 0.62473
published_at 2026-04-21T12:55:00Z
7
value 0.00428
scoring_system epss
scoring_elements 0.62462
published_at 2026-04-12T12:55:00Z
8
value 0.00428
scoring_system epss
scoring_elements 0.6244
published_at 2026-04-13T12:55:00Z
9
value 0.00428
scoring_system epss
scoring_elements 0.62484
published_at 2026-04-16T12:55:00Z
10
value 0.00428
scoring_system epss
scoring_elements 0.6249
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-4737
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2582
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2582
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2620
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2620
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2643
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2643
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2648
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2648
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4737
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4737
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4752
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4752
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1244778
reference_id 1244778
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1244778
9
reference_url https://security.gentoo.org/glsa/201610-06
reference_id GLSA-201610-06
reference_type
scores
url https://security.gentoo.org/glsa/201610-06
10
reference_url https://access.redhat.com/errata/RHSA-2015:1628
reference_id RHSA-2015:1628
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1628
11
reference_url https://access.redhat.com/errata/RHSA-2015:1629
reference_id RHSA-2015:1629
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1629
12
reference_url https://access.redhat.com/errata/RHSA-2015:1630
reference_id RHSA-2015:1630
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1630
13
reference_url https://access.redhat.com/errata/RHSA-2015:1646
reference_id RHSA-2015:1646
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1646
14
reference_url https://access.redhat.com/errata/RHSA-2015:1647
reference_id RHSA-2015:1647
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1647
15
reference_url https://access.redhat.com/errata/RHSA-2015:1665
reference_id RHSA-2015:1665
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1665
16
reference_url https://usn.ubuntu.com/2674-1/
reference_id USN-2674-1
reference_type
scores
url https://usn.ubuntu.com/2674-1/
fixed_packages
aliases CVE-2015-4737
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6q17-t984-4uhd
6
url VCID-7qj2-atsh-pub4
vulnerability_id VCID-7qj2-atsh-pub4
summary security update
references
0
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177539.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177539.html
1
reference_url http://rhn.redhat.com/errata/RHSA-2015-1628.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-1628.html
2
reference_url http://rhn.redhat.com/errata/RHSA-2016-0534.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0534.html
3
reference_url http://rhn.redhat.com/errata/RHSA-2016-1481.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-1481.html
4
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4879.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4879.json
5
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-4879
reference_id
reference_type
scores
0
value 0.00327
scoring_system epss
scoring_elements 0.55712
published_at 2026-04-21T12:55:00Z
1
value 0.00327
scoring_system epss
scoring_elements 0.5555
published_at 2026-04-01T12:55:00Z
2
value 0.00327
scoring_system epss
scoring_elements 0.55662
published_at 2026-04-02T12:55:00Z
3
value 0.00327
scoring_system epss
scoring_elements 0.55686
published_at 2026-04-04T12:55:00Z
4
value 0.00327
scoring_system epss
scoring_elements 0.55664
published_at 2026-04-07T12:55:00Z
5
value 0.00327
scoring_system epss
scoring_elements 0.55715
published_at 2026-04-08T12:55:00Z
6
value 0.00327
scoring_system epss
scoring_elements 0.55718
published_at 2026-04-09T12:55:00Z
7
value 0.00327
scoring_system epss
scoring_elements 0.55727
published_at 2026-04-11T12:55:00Z
8
value 0.00327
scoring_system epss
scoring_elements 0.55707
published_at 2026-04-12T12:55:00Z
9
value 0.00327
scoring_system epss
scoring_elements 0.5569
published_at 2026-04-13T12:55:00Z
10
value 0.00327
scoring_system epss
scoring_elements 0.55729
published_at 2026-04-16T12:55:00Z
11
value 0.00327
scoring_system epss
scoring_elements 0.55733
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-4879
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4792
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4792
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4802
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4802
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4815
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4815
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4816
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4816
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4819
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4819
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4826
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4826
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4830
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4830
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4836
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4836
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4858
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4858
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4861
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4861
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4870
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4870
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4879
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4879
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4895
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4895
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4913
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4913
20
reference_url http://www.debian.org/security/2015/dsa-3377
reference_id
reference_type
scores
url http://www.debian.org/security/2015/dsa-3377
21
reference_url http://www.debian.org/security/2015/dsa-3385
reference_id
reference_type
scores
url http://www.debian.org/security/2015/dsa-3385
22
reference_url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
23
reference_url http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
24
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
25
reference_url http://www.securityfocus.com/bid/77140
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/77140
26
reference_url http://www.securitytracker.com/id/1033894
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1033894
27
reference_url http://www.ubuntu.com/usn/USN-2781-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2781-1
28
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1274783
reference_id 1274783
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1274783
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:-:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:linux:7:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:-:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-4879
reference_id CVE-2015-4879
reference_type
scores
0
value 4.6
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:S/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2015-4879
59
reference_url https://access.redhat.com/errata/RHSA-2015:1628
reference_id RHSA-2015:1628
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1628
60
reference_url https://access.redhat.com/errata/RHSA-2015:1629
reference_id RHSA-2015:1629
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1629
61
reference_url https://access.redhat.com/errata/RHSA-2015:1630
reference_id RHSA-2015:1630
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1630
62
reference_url https://access.redhat.com/errata/RHSA-2016:0534
reference_id RHSA-2016:0534
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0534
63
reference_url https://access.redhat.com/errata/RHSA-2016:1132
reference_id RHSA-2016:1132
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1132
64
reference_url https://access.redhat.com/errata/RHSA-2016:1481
reference_id RHSA-2016:1481
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1481
65
reference_url https://usn.ubuntu.com/2781-1/
reference_id USN-2781-1
reference_type
scores
url https://usn.ubuntu.com/2781-1/
fixed_packages
aliases CVE-2015-4879
risk_score 2.0
exploitability 0.5
weighted_severity 4.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7qj2-atsh-pub4
7
url VCID-9qd9-48p8-nyey
vulnerability_id VCID-9qd9-48p8-nyey
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4819.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4819.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-4819
reference_id
reference_type
scores
0
value 0.00089
scoring_system epss
scoring_elements 0.25406
published_at 2026-04-01T12:55:00Z
1
value 0.00089
scoring_system epss
scoring_elements 0.2547
published_at 2026-04-02T12:55:00Z
2
value 0.00089
scoring_system epss
scoring_elements 0.25506
published_at 2026-04-04T12:55:00Z
3
value 0.00089
scoring_system epss
scoring_elements 0.25278
published_at 2026-04-07T12:55:00Z
4
value 0.00089
scoring_system epss
scoring_elements 0.25346
published_at 2026-04-08T12:55:00Z
5
value 0.00089
scoring_system epss
scoring_elements 0.2539
published_at 2026-04-09T12:55:00Z
6
value 0.00089
scoring_system epss
scoring_elements 0.25402
published_at 2026-04-11T12:55:00Z
7
value 0.00089
scoring_system epss
scoring_elements 0.2536
published_at 2026-04-12T12:55:00Z
8
value 0.00089
scoring_system epss
scoring_elements 0.25307
published_at 2026-04-13T12:55:00Z
9
value 0.00089
scoring_system epss
scoring_elements 0.25314
published_at 2026-04-16T12:55:00Z
10
value 0.00089
scoring_system epss
scoring_elements 0.25305
published_at 2026-04-18T12:55:00Z
11
value 0.00089
scoring_system epss
scoring_elements 0.25276
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-4819
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4792
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4792
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4802
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4802
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4815
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4815
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4816
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4816
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4819
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4819
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4826
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4826
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4830
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4830
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4836
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4836
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4858
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4858
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4861
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4861
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4870
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4870
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4879
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4879
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4895
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4895
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4913
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4913
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1274764
reference_id 1274764
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1274764
17
reference_url https://access.redhat.com/errata/RHSA-2015:1628
reference_id RHSA-2015:1628
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1628
18
reference_url https://access.redhat.com/errata/RHSA-2015:1629
reference_id RHSA-2015:1629
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1629
19
reference_url https://access.redhat.com/errata/RHSA-2015:1630
reference_id RHSA-2015:1630
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1630
20
reference_url https://access.redhat.com/errata/RHSA-2016:0534
reference_id RHSA-2016:0534
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0534
21
reference_url https://access.redhat.com/errata/RHSA-2016:1132
reference_id RHSA-2016:1132
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1132
22
reference_url https://access.redhat.com/errata/RHSA-2016:1481
reference_id RHSA-2016:1481
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1481
23
reference_url https://usn.ubuntu.com/2781-1/
reference_id USN-2781-1
reference_type
scores
url https://usn.ubuntu.com/2781-1/
fixed_packages
aliases CVE-2015-4819
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9qd9-48p8-nyey
8
url VCID-aee5-r83r-afb8
vulnerability_id VCID-aee5-r83r-afb8
summary
Multiple vulnerabilities have been found in MySQL and MariaDB, the
    worst of which could allow remote attackers to cause a Denial of Service
    condition or obtain sensitive information.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2639.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2639.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-2639
reference_id
reference_type
scores
0
value 0.00294
scoring_system epss
scoring_elements 0.52634
published_at 2026-04-01T12:55:00Z
1
value 0.00294
scoring_system epss
scoring_elements 0.52678
published_at 2026-04-02T12:55:00Z
2
value 0.00294
scoring_system epss
scoring_elements 0.52704
published_at 2026-04-04T12:55:00Z
3
value 0.00294
scoring_system epss
scoring_elements 0.52669
published_at 2026-04-07T12:55:00Z
4
value 0.00294
scoring_system epss
scoring_elements 0.52719
published_at 2026-04-08T12:55:00Z
5
value 0.00294
scoring_system epss
scoring_elements 0.52714
published_at 2026-04-09T12:55:00Z
6
value 0.00294
scoring_system epss
scoring_elements 0.52764
published_at 2026-04-11T12:55:00Z
7
value 0.00294
scoring_system epss
scoring_elements 0.52747
published_at 2026-04-12T12:55:00Z
8
value 0.00294
scoring_system epss
scoring_elements 0.52731
published_at 2026-04-13T12:55:00Z
9
value 0.00294
scoring_system epss
scoring_elements 0.5277
published_at 2026-04-16T12:55:00Z
10
value 0.00294
scoring_system epss
scoring_elements 0.52777
published_at 2026-04-18T12:55:00Z
11
value 0.00294
scoring_system epss
scoring_elements 0.5276
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-2639
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1244772
reference_id 1244772
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1244772
3
reference_url https://security.gentoo.org/glsa/201610-06
reference_id GLSA-201610-06
reference_type
scores
url https://security.gentoo.org/glsa/201610-06
4
reference_url https://access.redhat.com/errata/RHSA-2015:1630
reference_id RHSA-2015:1630
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1630
5
reference_url https://access.redhat.com/errata/RHSA-2015:1646
reference_id RHSA-2015:1646
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1646
6
reference_url https://usn.ubuntu.com/2674-1/
reference_id USN-2674-1
reference_type
scores
url https://usn.ubuntu.com/2674-1/
fixed_packages
aliases CVE-2015-2639
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-aee5-r83r-afb8
9
url VCID-av7z-e5x6-7uhm
vulnerability_id VCID-av7z-e5x6-7uhm
summary mysql: unspecified vulnerability related to Server:Security:Privileges (CPU October 2015)
references
0
reference_url http://rhn.redhat.com/errata/RHSA-2015-1628.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-1628.html
1
reference_url http://rhn.redhat.com/errata/RHSA-2015-1665.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-1665.html
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4864.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4864.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-4864
reference_id
reference_type
scores
0
value 0.00332
scoring_system epss
scoring_elements 0.56123
published_at 2026-04-21T12:55:00Z
1
value 0.00332
scoring_system epss
scoring_elements 0.55978
published_at 2026-04-01T12:55:00Z
2
value 0.00332
scoring_system epss
scoring_elements 0.56088
published_at 2026-04-02T12:55:00Z
3
value 0.00332
scoring_system epss
scoring_elements 0.56109
published_at 2026-04-04T12:55:00Z
4
value 0.00332
scoring_system epss
scoring_elements 0.56089
published_at 2026-04-07T12:55:00Z
5
value 0.00332
scoring_system epss
scoring_elements 0.5614
published_at 2026-04-08T12:55:00Z
6
value 0.00332
scoring_system epss
scoring_elements 0.56145
published_at 2026-04-09T12:55:00Z
7
value 0.00332
scoring_system epss
scoring_elements 0.56157
published_at 2026-04-11T12:55:00Z
8
value 0.00332
scoring_system epss
scoring_elements 0.56133
published_at 2026-04-12T12:55:00Z
9
value 0.00332
scoring_system epss
scoring_elements 0.56116
published_at 2026-04-13T12:55:00Z
10
value 0.00332
scoring_system epss
scoring_elements 0.56151
published_at 2026-04-16T12:55:00Z
11
value 0.00332
scoring_system epss
scoring_elements 0.56153
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-4864
4
reference_url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
5
reference_url http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
6
reference_url http://www.securityfocus.com/bid/77187
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/77187
7
reference_url http://www.securitytracker.com/id/1033894
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1033894
8
reference_url http://www.ubuntu.com/usn/USN-2781-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2781-1
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1274779
reference_id 1274779
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1274779
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.1:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-4864
reference_id CVE-2015-4864
reference_type
scores
0
value 3.5
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:S/C:N/I:P/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2015-4864
38
reference_url https://access.redhat.com/errata/RHSA-2015:1628
reference_id RHSA-2015:1628
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1628
39
reference_url https://access.redhat.com/errata/RHSA-2015:1629
reference_id RHSA-2015:1629
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1629
40
reference_url https://access.redhat.com/errata/RHSA-2015:1630
reference_id RHSA-2015:1630
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1630
41
reference_url https://access.redhat.com/errata/RHSA-2015:1646
reference_id RHSA-2015:1646
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1646
42
reference_url https://access.redhat.com/errata/RHSA-2015:1647
reference_id RHSA-2015:1647
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1647
43
reference_url https://access.redhat.com/errata/RHSA-2015:1665
reference_id RHSA-2015:1665
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1665
44
reference_url https://usn.ubuntu.com/2781-1/
reference_id USN-2781-1
reference_type
scores
url https://usn.ubuntu.com/2781-1/
fixed_packages
aliases CVE-2015-4864
risk_score 1.6
exploitability 0.5
weighted_severity 3.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-av7z-e5x6-7uhm
10
url VCID-bah9-w9jf-9bda
vulnerability_id VCID-bah9-w9jf-9bda
summary mysql: unspecified vulnerability related to libmysqld (CPU October 2015)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4904.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4904.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-4904
reference_id
reference_type
scores
0
value 0.00892
scoring_system epss
scoring_elements 0.75613
published_at 2026-04-18T12:55:00Z
1
value 0.00892
scoring_system epss
scoring_elements 0.75506
published_at 2026-04-01T12:55:00Z
2
value 0.00892
scoring_system epss
scoring_elements 0.75509
published_at 2026-04-02T12:55:00Z
3
value 0.00892
scoring_system epss
scoring_elements 0.75538
published_at 2026-04-04T12:55:00Z
4
value 0.00892
scoring_system epss
scoring_elements 0.75519
published_at 2026-04-07T12:55:00Z
5
value 0.00892
scoring_system epss
scoring_elements 0.75562
published_at 2026-04-08T12:55:00Z
6
value 0.00892
scoring_system epss
scoring_elements 0.75572
published_at 2026-04-13T12:55:00Z
7
value 0.00892
scoring_system epss
scoring_elements 0.75597
published_at 2026-04-21T12:55:00Z
8
value 0.00892
scoring_system epss
scoring_elements 0.75578
published_at 2026-04-12T12:55:00Z
9
value 0.00892
scoring_system epss
scoring_elements 0.75609
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-4904
2
reference_url http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
3
reference_url http://www.securityfocus.com/bid/77219
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/77219
4
reference_url http://www.securitytracker.com/id/1033894
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1033894
5
reference_url http://www.ubuntu.com/usn/USN-2781-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2781-1
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1274787
reference_id 1274787
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1274787
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
8
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-4904
reference_id CVE-2015-4904
reference_type
scores
0
value 4.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2015-4904
9
reference_url https://access.redhat.com/errata/RHSA-2015:1630
reference_id RHSA-2015:1630
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1630
10
reference_url https://usn.ubuntu.com/2781-1/
reference_id USN-2781-1
reference_type
scores
url https://usn.ubuntu.com/2781-1/
fixed_packages
aliases CVE-2015-4904
risk_score 1.8
exploitability 0.5
weighted_severity 3.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bah9-w9jf-9bda
11
url VCID-dvjd-g5eh-2uh8
vulnerability_id VCID-dvjd-g5eh-2uh8
summary
Multiple vulnerabilities have been found in MySQL and MariaDB, the
    worst of which could allow remote attackers to cause a Denial of Service
    condition or obtain sensitive information.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2582.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2582.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-2582
reference_id
reference_type
scores
0
value 0.00811
scoring_system epss
scoring_elements 0.74185
published_at 2026-04-01T12:55:00Z
1
value 0.00811
scoring_system epss
scoring_elements 0.7419
published_at 2026-04-07T12:55:00Z
2
value 0.00811
scoring_system epss
scoring_elements 0.74217
published_at 2026-04-04T12:55:00Z
3
value 0.00811
scoring_system epss
scoring_elements 0.74223
published_at 2026-04-08T12:55:00Z
4
value 0.00811
scoring_system epss
scoring_elements 0.74238
published_at 2026-04-09T12:55:00Z
5
value 0.00811
scoring_system epss
scoring_elements 0.74259
published_at 2026-04-11T12:55:00Z
6
value 0.00811
scoring_system epss
scoring_elements 0.7424
published_at 2026-04-12T12:55:00Z
7
value 0.00811
scoring_system epss
scoring_elements 0.74233
published_at 2026-04-13T12:55:00Z
8
value 0.00811
scoring_system epss
scoring_elements 0.74271
published_at 2026-04-16T12:55:00Z
9
value 0.00811
scoring_system epss
scoring_elements 0.74281
published_at 2026-04-18T12:55:00Z
10
value 0.00811
scoring_system epss
scoring_elements 0.74272
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-2582
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0433
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0433
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0441
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0441
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0499
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0499
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0501
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0501
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0505
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0505
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2568
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2568
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2571
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2571
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2573
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2573
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2582
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2582
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2620
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2620
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2643
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2643
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2648
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2648
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3152
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3152
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4737
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4737
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4752
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4752
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4757
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4757
18
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1244768
reference_id 1244768
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1244768
19
reference_url https://security.gentoo.org/glsa/201610-06
reference_id GLSA-201610-06
reference_type
scores
url https://security.gentoo.org/glsa/201610-06
20
reference_url https://access.redhat.com/errata/RHSA-2015:1628
reference_id RHSA-2015:1628
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1628
21
reference_url https://access.redhat.com/errata/RHSA-2015:1629
reference_id RHSA-2015:1629
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1629
22
reference_url https://access.redhat.com/errata/RHSA-2015:1630
reference_id RHSA-2015:1630
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1630
23
reference_url https://access.redhat.com/errata/RHSA-2015:1646
reference_id RHSA-2015:1646
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1646
24
reference_url https://access.redhat.com/errata/RHSA-2015:1647
reference_id RHSA-2015:1647
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1647
25
reference_url https://access.redhat.com/errata/RHSA-2015:1665
reference_id RHSA-2015:1665
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1665
26
reference_url https://usn.ubuntu.com/2674-1/
reference_id USN-2674-1
reference_type
scores
url https://usn.ubuntu.com/2674-1/
fixed_packages
aliases CVE-2015-2582
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dvjd-g5eh-2uh8
12
url VCID-hxy6-zux1-4fbe
vulnerability_id VCID-hxy6-zux1-4fbe
summary
Multiple vulnerabilities have been found in MySQL and MariaDB, the
    worst of which could allow remote attackers to cause a Denial of Service
    condition or obtain sensitive information.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2617.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2617.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-2617
reference_id
reference_type
scores
0
value 0.00814
scoring_system epss
scoring_elements 0.74221
published_at 2026-04-01T12:55:00Z
1
value 0.00814
scoring_system epss
scoring_elements 0.74226
published_at 2026-04-02T12:55:00Z
2
value 0.00814
scoring_system epss
scoring_elements 0.74252
published_at 2026-04-04T12:55:00Z
3
value 0.00814
scoring_system epss
scoring_elements 0.74225
published_at 2026-04-07T12:55:00Z
4
value 0.00814
scoring_system epss
scoring_elements 0.74258
published_at 2026-04-08T12:55:00Z
5
value 0.00814
scoring_system epss
scoring_elements 0.74273
published_at 2026-04-09T12:55:00Z
6
value 0.00814
scoring_system epss
scoring_elements 0.74295
published_at 2026-04-11T12:55:00Z
7
value 0.00814
scoring_system epss
scoring_elements 0.74275
published_at 2026-04-12T12:55:00Z
8
value 0.00814
scoring_system epss
scoring_elements 0.74268
published_at 2026-04-13T12:55:00Z
9
value 0.00814
scoring_system epss
scoring_elements 0.74305
published_at 2026-04-21T12:55:00Z
10
value 0.00814
scoring_system epss
scoring_elements 0.74314
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-2617
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1244770
reference_id 1244770
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1244770
3
reference_url https://security.gentoo.org/glsa/201610-06
reference_id GLSA-201610-06
reference_type
scores
url https://security.gentoo.org/glsa/201610-06
4
reference_url https://access.redhat.com/errata/RHSA-2015:1630
reference_id RHSA-2015:1630
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1630
5
reference_url https://access.redhat.com/errata/RHSA-2015:1646
reference_id RHSA-2015:1646
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1646
6
reference_url https://usn.ubuntu.com/2674-1/
reference_id USN-2674-1
reference_type
scores
url https://usn.ubuntu.com/2674-1/
fixed_packages
aliases CVE-2015-2617
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hxy6-zux1-4fbe
13
url VCID-nbfn-ank3-mfh8
vulnerability_id VCID-nbfn-ank3-mfh8
summary
Multiple vulnerabilities have been found in MySQL and MariaDB, the
    worst of which could allow remote attackers to cause a Denial of Service
    condition or obtain sensitive information.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4767.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4767.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-4767
reference_id
reference_type
scores
0
value 0.00965
scoring_system epss
scoring_elements 0.765
published_at 2026-04-01T12:55:00Z
1
value 0.00965
scoring_system epss
scoring_elements 0.76505
published_at 2026-04-02T12:55:00Z
2
value 0.00965
scoring_system epss
scoring_elements 0.76534
published_at 2026-04-04T12:55:00Z
3
value 0.00965
scoring_system epss
scoring_elements 0.76517
published_at 2026-04-07T12:55:00Z
4
value 0.00965
scoring_system epss
scoring_elements 0.76549
published_at 2026-04-08T12:55:00Z
5
value 0.00965
scoring_system epss
scoring_elements 0.7656
published_at 2026-04-09T12:55:00Z
6
value 0.00965
scoring_system epss
scoring_elements 0.76586
published_at 2026-04-11T12:55:00Z
7
value 0.00965
scoring_system epss
scoring_elements 0.76565
published_at 2026-04-12T12:55:00Z
8
value 0.00965
scoring_system epss
scoring_elements 0.76558
published_at 2026-04-13T12:55:00Z
9
value 0.00965
scoring_system epss
scoring_elements 0.766
published_at 2026-04-16T12:55:00Z
10
value 0.00965
scoring_system epss
scoring_elements 0.76604
published_at 2026-04-18T12:55:00Z
11
value 0.00965
scoring_system epss
scoring_elements 0.76592
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-4767
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1244784
reference_id 1244784
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1244784
3
reference_url https://security.gentoo.org/glsa/201610-06
reference_id GLSA-201610-06
reference_type
scores
url https://security.gentoo.org/glsa/201610-06
4
reference_url https://access.redhat.com/errata/RHSA-2015:1630
reference_id RHSA-2015:1630
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1630
5
reference_url https://access.redhat.com/errata/RHSA-2015:1646
reference_id RHSA-2015:1646
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1646
6
reference_url https://usn.ubuntu.com/2674-1/
reference_id USN-2674-1
reference_type
scores
url https://usn.ubuntu.com/2674-1/
fixed_packages
aliases CVE-2015-4767
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-nbfn-ank3-mfh8
14
url VCID-nmb9-vz7b-h3bk
vulnerability_id VCID-nmb9-vz7b-h3bk
summary mysql: unspecified vulnerability related to Server:Partition (CPU October 2015)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4833.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4833.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-4833
reference_id
reference_type
scores
0
value 0.00892
scoring_system epss
scoring_elements 0.75613
published_at 2026-04-18T12:55:00Z
1
value 0.00892
scoring_system epss
scoring_elements 0.75506
published_at 2026-04-01T12:55:00Z
2
value 0.00892
scoring_system epss
scoring_elements 0.75509
published_at 2026-04-02T12:55:00Z
3
value 0.00892
scoring_system epss
scoring_elements 0.75538
published_at 2026-04-04T12:55:00Z
4
value 0.00892
scoring_system epss
scoring_elements 0.75519
published_at 2026-04-07T12:55:00Z
5
value 0.00892
scoring_system epss
scoring_elements 0.75562
published_at 2026-04-08T12:55:00Z
6
value 0.00892
scoring_system epss
scoring_elements 0.75572
published_at 2026-04-13T12:55:00Z
7
value 0.00892
scoring_system epss
scoring_elements 0.75597
published_at 2026-04-21T12:55:00Z
8
value 0.00892
scoring_system epss
scoring_elements 0.75578
published_at 2026-04-12T12:55:00Z
9
value 0.00892
scoring_system epss
scoring_elements 0.75609
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-4833
2
reference_url http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
3
reference_url http://www.securityfocus.com/bid/77170
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/77170
4
reference_url http://www.securitytracker.com/id/1033894
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1033894
5
reference_url http://www.ubuntu.com/usn/USN-2781-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2781-1
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1274770
reference_id 1274770
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1274770
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
8
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-4833
reference_id CVE-2015-4833
reference_type
scores
0
value 4.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2015-4833
9
reference_url https://access.redhat.com/errata/RHSA-2015:1630
reference_id RHSA-2015:1630
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1630
10
reference_url https://usn.ubuntu.com/2781-1/
reference_id USN-2781-1
reference_type
scores
url https://usn.ubuntu.com/2781-1/
fixed_packages
aliases CVE-2015-4833
risk_score 1.8
exploitability 0.5
weighted_severity 3.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-nmb9-vz7b-h3bk
15
url VCID-nxma-cse5-pke8
vulnerability_id VCID-nxma-cse5-pke8
summary security update
references
0
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177539.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177539.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4895.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4895.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-4895
reference_id
reference_type
scores
0
value 0.00459
scoring_system epss
scoring_elements 0.64123
published_at 2026-04-21T12:55:00Z
1
value 0.00459
scoring_system epss
scoring_elements 0.64005
published_at 2026-04-01T12:55:00Z
2
value 0.00459
scoring_system epss
scoring_elements 0.64063
published_at 2026-04-02T12:55:00Z
3
value 0.00459
scoring_system epss
scoring_elements 0.6409
published_at 2026-04-04T12:55:00Z
4
value 0.00459
scoring_system epss
scoring_elements 0.6405
published_at 2026-04-07T12:55:00Z
5
value 0.00459
scoring_system epss
scoring_elements 0.64101
published_at 2026-04-08T12:55:00Z
6
value 0.00459
scoring_system epss
scoring_elements 0.64117
published_at 2026-04-09T12:55:00Z
7
value 0.00459
scoring_system epss
scoring_elements 0.64129
published_at 2026-04-11T12:55:00Z
8
value 0.00459
scoring_system epss
scoring_elements 0.64118
published_at 2026-04-12T12:55:00Z
9
value 0.00459
scoring_system epss
scoring_elements 0.64089
published_at 2026-04-13T12:55:00Z
10
value 0.00459
scoring_system epss
scoring_elements 0.64125
published_at 2026-04-16T12:55:00Z
11
value 0.00459
scoring_system epss
scoring_elements 0.64136
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-4895
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4792
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4792
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4802
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4802
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4815
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4815
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4816
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4816
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4819
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4819
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4826
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4826
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4830
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4830
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4836
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4836
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4858
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4858
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4861
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4861
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4870
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4870
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4879
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4879
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4895
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4895
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4913
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4913
17
reference_url http://www.debian.org/security/2015/dsa-3385
reference_id
reference_type
scores
url http://www.debian.org/security/2015/dsa-3385
18
reference_url http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
19
reference_url http://www.securityfocus.com/bid/77136
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/77136
20
reference_url http://www.securitytracker.com/id/1033894
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1033894
21
reference_url http://www.ubuntu.com/usn/USN-2781-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2781-1
22
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1274786
reference_id 1274786
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1274786
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-4895
reference_id CVE-2015-4895
reference_type
scores
0
value 3.5
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:S/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2015-4895
32
reference_url https://access.redhat.com/errata/RHSA-2015:1630
reference_id RHSA-2015:1630
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1630
33
reference_url https://access.redhat.com/errata/RHSA-2016:1132
reference_id RHSA-2016:1132
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1132
34
reference_url https://usn.ubuntu.com/2781-1/
reference_id USN-2781-1
reference_type
scores
url https://usn.ubuntu.com/2781-1/
fixed_packages
aliases CVE-2015-4895
risk_score 1.6
exploitability 0.5
weighted_severity 3.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-nxma-cse5-pke8
16
url VCID-nywb-kfpq-n7bq
vulnerability_id VCID-nywb-kfpq-n7bq
summary
Multiple vulnerabilities have been found in MySQL and MariaDB, the
    worst of which could allow remote attackers to cause a Denial of Service
    condition or obtain sensitive information.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4772.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4772.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-4772
reference_id
reference_type
scores
0
value 0.01114
scoring_system epss
scoring_elements 0.78115
published_at 2026-04-01T12:55:00Z
1
value 0.01114
scoring_system epss
scoring_elements 0.78124
published_at 2026-04-02T12:55:00Z
2
value 0.01114
scoring_system epss
scoring_elements 0.78153
published_at 2026-04-04T12:55:00Z
3
value 0.01114
scoring_system epss
scoring_elements 0.78136
published_at 2026-04-07T12:55:00Z
4
value 0.01114
scoring_system epss
scoring_elements 0.78162
published_at 2026-04-08T12:55:00Z
5
value 0.01114
scoring_system epss
scoring_elements 0.78168
published_at 2026-04-09T12:55:00Z
6
value 0.01114
scoring_system epss
scoring_elements 0.78194
published_at 2026-04-11T12:55:00Z
7
value 0.01114
scoring_system epss
scoring_elements 0.78176
published_at 2026-04-12T12:55:00Z
8
value 0.01114
scoring_system epss
scoring_elements 0.78173
published_at 2026-04-13T12:55:00Z
9
value 0.01114
scoring_system epss
scoring_elements 0.78205
published_at 2026-04-16T12:55:00Z
10
value 0.01114
scoring_system epss
scoring_elements 0.78204
published_at 2026-04-18T12:55:00Z
11
value 0.01114
scoring_system epss
scoring_elements 0.78199
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-4772
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1244787
reference_id 1244787
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1244787
3
reference_url https://security.gentoo.org/glsa/201610-06
reference_id GLSA-201610-06
reference_type
scores
url https://security.gentoo.org/glsa/201610-06
4
reference_url https://access.redhat.com/errata/RHSA-2015:1630
reference_id RHSA-2015:1630
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1630
5
reference_url https://access.redhat.com/errata/RHSA-2015:1646
reference_id RHSA-2015:1646
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1646
6
reference_url https://usn.ubuntu.com/2674-1/
reference_id USN-2674-1
reference_type
scores
url https://usn.ubuntu.com/2674-1/
fixed_packages
aliases CVE-2015-4772
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-nywb-kfpq-n7bq
17
url VCID-p9xn-27dm-nfhg
vulnerability_id VCID-p9xn-27dm-nfhg
summary
Multiple vulnerabilities have been found in MySQL and MariaDB, the
    worst of which could allow remote attackers to cause a Denial of Service
    condition or obtain sensitive information.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2620.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2620.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-2620
reference_id
reference_type
scores
0
value 0.00774
scoring_system epss
scoring_elements 0.73535
published_at 2026-04-01T12:55:00Z
1
value 0.00774
scoring_system epss
scoring_elements 0.73544
published_at 2026-04-02T12:55:00Z
2
value 0.00774
scoring_system epss
scoring_elements 0.73567
published_at 2026-04-04T12:55:00Z
3
value 0.00774
scoring_system epss
scoring_elements 0.73539
published_at 2026-04-07T12:55:00Z
4
value 0.00774
scoring_system epss
scoring_elements 0.73575
published_at 2026-04-08T12:55:00Z
5
value 0.00774
scoring_system epss
scoring_elements 0.73588
published_at 2026-04-09T12:55:00Z
6
value 0.00774
scoring_system epss
scoring_elements 0.73611
published_at 2026-04-11T12:55:00Z
7
value 0.00774
scoring_system epss
scoring_elements 0.73593
published_at 2026-04-12T12:55:00Z
8
value 0.00774
scoring_system epss
scoring_elements 0.73585
published_at 2026-04-13T12:55:00Z
9
value 0.00774
scoring_system epss
scoring_elements 0.73629
published_at 2026-04-16T12:55:00Z
10
value 0.00774
scoring_system epss
scoring_elements 0.73638
published_at 2026-04-18T12:55:00Z
11
value 0.00774
scoring_system epss
scoring_elements 0.7363
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-2620
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2582
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2582
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2620
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2620
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2643
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2643
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2648
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2648
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4737
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4737
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4752
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4752
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1244771
reference_id 1244771
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1244771
9
reference_url https://security.gentoo.org/glsa/201610-06
reference_id GLSA-201610-06
reference_type
scores
url https://security.gentoo.org/glsa/201610-06
10
reference_url https://access.redhat.com/errata/RHSA-2015:1628
reference_id RHSA-2015:1628
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1628
11
reference_url https://access.redhat.com/errata/RHSA-2015:1629
reference_id RHSA-2015:1629
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1629
12
reference_url https://access.redhat.com/errata/RHSA-2015:1630
reference_id RHSA-2015:1630
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1630
13
reference_url https://access.redhat.com/errata/RHSA-2015:1646
reference_id RHSA-2015:1646
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1646
14
reference_url https://access.redhat.com/errata/RHSA-2015:1647
reference_id RHSA-2015:1647
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1647
15
reference_url https://access.redhat.com/errata/RHSA-2015:1665
reference_id RHSA-2015:1665
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1665
16
reference_url https://usn.ubuntu.com/2674-1/
reference_id USN-2674-1
reference_type
scores
url https://usn.ubuntu.com/2674-1/
fixed_packages
aliases CVE-2015-2620
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-p9xn-27dm-nfhg
18
url VCID-pgrq-udns-6uca
vulnerability_id VCID-pgrq-udns-6uca
summary
Multiple vulnerabilities have been found in MySQL and MariaDB, the
    worst of which could allow remote attackers to cause a Denial of Service
    condition or obtain sensitive information.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2641.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2641.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-2641
reference_id
reference_type
scores
0
value 0.00769
scoring_system epss
scoring_elements 0.73458
published_at 2026-04-01T12:55:00Z
1
value 0.00769
scoring_system epss
scoring_elements 0.73466
published_at 2026-04-02T12:55:00Z
2
value 0.00769
scoring_system epss
scoring_elements 0.73489
published_at 2026-04-04T12:55:00Z
3
value 0.00769
scoring_system epss
scoring_elements 0.7346
published_at 2026-04-07T12:55:00Z
4
value 0.00769
scoring_system epss
scoring_elements 0.73497
published_at 2026-04-08T12:55:00Z
5
value 0.00769
scoring_system epss
scoring_elements 0.7351
published_at 2026-04-09T12:55:00Z
6
value 0.00769
scoring_system epss
scoring_elements 0.73534
published_at 2026-04-11T12:55:00Z
7
value 0.00769
scoring_system epss
scoring_elements 0.73515
published_at 2026-04-12T12:55:00Z
8
value 0.00769
scoring_system epss
scoring_elements 0.73507
published_at 2026-04-13T12:55:00Z
9
value 0.00769
scoring_system epss
scoring_elements 0.7355
published_at 2026-04-16T12:55:00Z
10
value 0.00769
scoring_system epss
scoring_elements 0.73559
published_at 2026-04-18T12:55:00Z
11
value 0.00769
scoring_system epss
scoring_elements 0.73553
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-2641
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1244773
reference_id 1244773
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1244773
3
reference_url https://security.gentoo.org/glsa/201610-06
reference_id GLSA-201610-06
reference_type
scores
url https://security.gentoo.org/glsa/201610-06
4
reference_url https://access.redhat.com/errata/RHSA-2015:1630
reference_id RHSA-2015:1630
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1630
5
reference_url https://access.redhat.com/errata/RHSA-2015:1646
reference_id RHSA-2015:1646
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1646
6
reference_url https://usn.ubuntu.com/2674-1/
reference_id USN-2674-1
reference_type
scores
url https://usn.ubuntu.com/2674-1/
fixed_packages
aliases CVE-2015-2641
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pgrq-udns-6uca
19
url VCID-pvwn-1168-rbec
vulnerability_id VCID-pvwn-1168-rbec
summary
Multiple vulnerabilities have been found in MySQL and MariaDB, the
    worst of which could allow remote attackers to cause a Denial of Service
    condition or obtain sensitive information.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4771.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4771.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-4771
reference_id
reference_type
scores
0
value 0.00769
scoring_system epss
scoring_elements 0.73458
published_at 2026-04-01T12:55:00Z
1
value 0.00769
scoring_system epss
scoring_elements 0.73466
published_at 2026-04-02T12:55:00Z
2
value 0.00769
scoring_system epss
scoring_elements 0.73489
published_at 2026-04-04T12:55:00Z
3
value 0.00769
scoring_system epss
scoring_elements 0.7346
published_at 2026-04-07T12:55:00Z
4
value 0.00769
scoring_system epss
scoring_elements 0.73497
published_at 2026-04-08T12:55:00Z
5
value 0.00769
scoring_system epss
scoring_elements 0.7351
published_at 2026-04-09T12:55:00Z
6
value 0.00769
scoring_system epss
scoring_elements 0.73534
published_at 2026-04-11T12:55:00Z
7
value 0.00769
scoring_system epss
scoring_elements 0.73515
published_at 2026-04-12T12:55:00Z
8
value 0.00769
scoring_system epss
scoring_elements 0.73507
published_at 2026-04-13T12:55:00Z
9
value 0.00769
scoring_system epss
scoring_elements 0.7355
published_at 2026-04-16T12:55:00Z
10
value 0.00769
scoring_system epss
scoring_elements 0.73559
published_at 2026-04-18T12:55:00Z
11
value 0.00769
scoring_system epss
scoring_elements 0.73553
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-4771
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1244786
reference_id 1244786
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1244786
3
reference_url https://security.gentoo.org/glsa/201610-06
reference_id GLSA-201610-06
reference_type
scores
url https://security.gentoo.org/glsa/201610-06
4
reference_url https://access.redhat.com/errata/RHSA-2015:1630
reference_id RHSA-2015:1630
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1630
5
reference_url https://access.redhat.com/errata/RHSA-2015:1646
reference_id RHSA-2015:1646
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1646
6
reference_url https://usn.ubuntu.com/2674-1/
reference_id USN-2674-1
reference_type
scores
url https://usn.ubuntu.com/2674-1/
fixed_packages
aliases CVE-2015-4771
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pvwn-1168-rbec
20
url VCID-qvae-5ytw-dbcy
vulnerability_id VCID-qvae-5ytw-dbcy
summary
Multiple vulnerabilities have been found in MySQL and MariaDB, the
    worst of which could allow remote attackers to cause a Denial of Service
    condition or obtain sensitive information.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4757.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4757.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-4757
reference_id
reference_type
scores
0
value 0.04287
scoring_system epss
scoring_elements 0.88799
published_at 2026-04-01T12:55:00Z
1
value 0.04287
scoring_system epss
scoring_elements 0.88807
published_at 2026-04-02T12:55:00Z
2
value 0.04287
scoring_system epss
scoring_elements 0.88823
published_at 2026-04-04T12:55:00Z
3
value 0.04287
scoring_system epss
scoring_elements 0.88826
published_at 2026-04-07T12:55:00Z
4
value 0.04287
scoring_system epss
scoring_elements 0.88843
published_at 2026-04-08T12:55:00Z
5
value 0.04287
scoring_system epss
scoring_elements 0.88849
published_at 2026-04-09T12:55:00Z
6
value 0.04287
scoring_system epss
scoring_elements 0.8886
published_at 2026-04-11T12:55:00Z
7
value 0.04287
scoring_system epss
scoring_elements 0.88856
published_at 2026-04-12T12:55:00Z
8
value 0.04287
scoring_system epss
scoring_elements 0.88855
published_at 2026-04-13T12:55:00Z
9
value 0.04287
scoring_system epss
scoring_elements 0.88869
published_at 2026-04-16T12:55:00Z
10
value 0.04287
scoring_system epss
scoring_elements 0.88867
published_at 2026-04-18T12:55:00Z
11
value 0.04287
scoring_system epss
scoring_elements 0.88864
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-4757
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0433
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0433
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0441
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0441
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0499
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0499
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0501
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0501
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0505
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0505
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2568
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2568
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2571
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2571
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2573
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2573
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2582
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2582
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2643
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2643
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2648
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2648
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3152
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3152
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4752
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4752
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4757
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4757
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1244781
reference_id 1244781
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1244781
17
reference_url https://security.gentoo.org/glsa/201610-06
reference_id GLSA-201610-06
reference_type
scores
url https://security.gentoo.org/glsa/201610-06
18
reference_url https://access.redhat.com/errata/RHSA-2015:1628
reference_id RHSA-2015:1628
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1628
19
reference_url https://access.redhat.com/errata/RHSA-2015:1629
reference_id RHSA-2015:1629
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1629
20
reference_url https://access.redhat.com/errata/RHSA-2015:1630
reference_id RHSA-2015:1630
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1630
21
reference_url https://access.redhat.com/errata/RHSA-2015:1646
reference_id RHSA-2015:1646
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1646
22
reference_url https://access.redhat.com/errata/RHSA-2015:1647
reference_id RHSA-2015:1647
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1647
23
reference_url https://access.redhat.com/errata/RHSA-2015:1665
reference_id RHSA-2015:1665
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1665
24
reference_url https://usn.ubuntu.com/2674-1/
reference_id USN-2674-1
reference_type
scores
url https://usn.ubuntu.com/2674-1/
fixed_packages
aliases CVE-2015-4757
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qvae-5ytw-dbcy
21
url VCID-r3kw-ufpz-aqft
vulnerability_id VCID-r3kw-ufpz-aqft
summary
Multiple vulnerabilities have been found in MySQL and MariaDB, the
    worst of which could allow remote attackers to cause a Denial of Service
    condition or obtain sensitive information.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2643.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2643.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-2643
reference_id
reference_type
scores
0
value 0.00598
scoring_system epss
scoring_elements 0.69334
published_at 2026-04-01T12:55:00Z
1
value 0.00598
scoring_system epss
scoring_elements 0.69347
published_at 2026-04-02T12:55:00Z
2
value 0.00598
scoring_system epss
scoring_elements 0.69363
published_at 2026-04-04T12:55:00Z
3
value 0.00598
scoring_system epss
scoring_elements 0.69343
published_at 2026-04-07T12:55:00Z
4
value 0.00598
scoring_system epss
scoring_elements 0.69393
published_at 2026-04-08T12:55:00Z
5
value 0.00598
scoring_system epss
scoring_elements 0.69409
published_at 2026-04-09T12:55:00Z
6
value 0.00598
scoring_system epss
scoring_elements 0.69432
published_at 2026-04-11T12:55:00Z
7
value 0.00598
scoring_system epss
scoring_elements 0.69417
published_at 2026-04-12T12:55:00Z
8
value 0.00598
scoring_system epss
scoring_elements 0.69402
published_at 2026-04-13T12:55:00Z
9
value 0.00598
scoring_system epss
scoring_elements 0.69442
published_at 2026-04-16T12:55:00Z
10
value 0.00598
scoring_system epss
scoring_elements 0.69452
published_at 2026-04-18T12:55:00Z
11
value 0.00598
scoring_system epss
scoring_elements 0.69434
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-2643
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0433
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0433
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0441
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0441
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0499
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0499
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0501
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0501
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0505
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0505
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2568
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2568
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2571
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2571
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2573
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2573
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2582
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2582
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2620
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2620
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2643
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2643
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2648
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2648
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3152
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3152
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4737
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4737
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4752
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4752
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4757
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4757
18
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1244774
reference_id 1244774
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1244774
19
reference_url https://security.gentoo.org/glsa/201610-06
reference_id GLSA-201610-06
reference_type
scores
url https://security.gentoo.org/glsa/201610-06
20
reference_url https://access.redhat.com/errata/RHSA-2015:1628
reference_id RHSA-2015:1628
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1628
21
reference_url https://access.redhat.com/errata/RHSA-2015:1629
reference_id RHSA-2015:1629
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1629
22
reference_url https://access.redhat.com/errata/RHSA-2015:1630
reference_id RHSA-2015:1630
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1630
23
reference_url https://access.redhat.com/errata/RHSA-2015:1646
reference_id RHSA-2015:1646
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1646
24
reference_url https://access.redhat.com/errata/RHSA-2015:1647
reference_id RHSA-2015:1647
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1647
25
reference_url https://access.redhat.com/errata/RHSA-2015:1665
reference_id RHSA-2015:1665
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1665
26
reference_url https://usn.ubuntu.com/2674-1/
reference_id USN-2674-1
reference_type
scores
url https://usn.ubuntu.com/2674-1/
fixed_packages
aliases CVE-2015-2643
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-r3kw-ufpz-aqft
22
url VCID-s8bx-yhg5-g7gx
vulnerability_id VCID-s8bx-yhg5-g7gx
summary mysql: unspecified vulnerability related to Server:Security:Firewall (CPU October 2015)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4766.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4766.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-4766
reference_id
reference_type
scores
0
value 0.00162
scoring_system epss
scoring_elements 0.37072
published_at 2026-04-01T12:55:00Z
1
value 0.00162
scoring_system epss
scoring_elements 0.37238
published_at 2026-04-02T12:55:00Z
2
value 0.00162
scoring_system epss
scoring_elements 0.37266
published_at 2026-04-04T12:55:00Z
3
value 0.00162
scoring_system epss
scoring_elements 0.37096
published_at 2026-04-07T12:55:00Z
4
value 0.00162
scoring_system epss
scoring_elements 0.37147
published_at 2026-04-08T12:55:00Z
5
value 0.00162
scoring_system epss
scoring_elements 0.37161
published_at 2026-04-09T12:55:00Z
6
value 0.00162
scoring_system epss
scoring_elements 0.37172
published_at 2026-04-11T12:55:00Z
7
value 0.00162
scoring_system epss
scoring_elements 0.37138
published_at 2026-04-12T12:55:00Z
8
value 0.00162
scoring_system epss
scoring_elements 0.3711
published_at 2026-04-13T12:55:00Z
9
value 0.00162
scoring_system epss
scoring_elements 0.37158
published_at 2026-04-16T12:55:00Z
10
value 0.00162
scoring_system epss
scoring_elements 0.3714
published_at 2026-04-18T12:55:00Z
11
value 0.00162
scoring_system epss
scoring_elements 0.37084
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-4766
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1274748
reference_id 1274748
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1274748
3
reference_url https://access.redhat.com/errata/RHSA-2015:1630
reference_id RHSA-2015:1630
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1630
4
reference_url https://usn.ubuntu.com/2781-1/
reference_id USN-2781-1
reference_type
scores
url https://usn.ubuntu.com/2781-1/
fixed_packages
aliases CVE-2015-4766
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-s8bx-yhg5-g7gx
23
url VCID-uzud-6w7c-pqg9
vulnerability_id VCID-uzud-6w7c-pqg9
summary
Multiple vulnerabilities have been found in MySQL and MariaDB, the
    worst of which could allow remote attackers to cause a Denial of Service
    condition or obtain sensitive information.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2661.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2661.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-2661
reference_id
reference_type
scores
0
value 0.00171
scoring_system epss
scoring_elements 0.38292
published_at 2026-04-01T12:55:00Z
1
value 0.00171
scoring_system epss
scoring_elements 0.3843
published_at 2026-04-02T12:55:00Z
2
value 0.00171
scoring_system epss
scoring_elements 0.38454
published_at 2026-04-04T12:55:00Z
3
value 0.00171
scoring_system epss
scoring_elements 0.38318
published_at 2026-04-07T12:55:00Z
4
value 0.00171
scoring_system epss
scoring_elements 0.38369
published_at 2026-04-08T12:55:00Z
5
value 0.00171
scoring_system epss
scoring_elements 0.38377
published_at 2026-04-09T12:55:00Z
6
value 0.00171
scoring_system epss
scoring_elements 0.38393
published_at 2026-04-11T12:55:00Z
7
value 0.00171
scoring_system epss
scoring_elements 0.38356
published_at 2026-04-12T12:55:00Z
8
value 0.00171
scoring_system epss
scoring_elements 0.38332
published_at 2026-04-13T12:55:00Z
9
value 0.00171
scoring_system epss
scoring_elements 0.3838
published_at 2026-04-16T12:55:00Z
10
value 0.00171
scoring_system epss
scoring_elements 0.38359
published_at 2026-04-18T12:55:00Z
11
value 0.00171
scoring_system epss
scoring_elements 0.38295
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-2661
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1244776
reference_id 1244776
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1244776
3
reference_url https://security.gentoo.org/glsa/201610-06
reference_id GLSA-201610-06
reference_type
scores
url https://security.gentoo.org/glsa/201610-06
4
reference_url https://access.redhat.com/errata/RHSA-2015:1630
reference_id RHSA-2015:1630
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1630
5
reference_url https://access.redhat.com/errata/RHSA-2015:1646
reference_id RHSA-2015:1646
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1646
6
reference_url https://usn.ubuntu.com/2674-1/
reference_id USN-2674-1
reference_type
scores
url https://usn.ubuntu.com/2674-1/
fixed_packages
aliases CVE-2015-2661
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-uzud-6w7c-pqg9
24
url VCID-ygwk-7ags-2bgk
vulnerability_id VCID-ygwk-7ags-2bgk
summary
Multiple vulnerabilities have been found in MySQL and MariaDB, the
    worst of which could allow remote attackers to cause a Denial of Service
    condition or obtain sensitive information.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4756.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4756.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-4756
reference_id
reference_type
scores
0
value 0.00821
scoring_system epss
scoring_elements 0.74349
published_at 2026-04-01T12:55:00Z
1
value 0.00821
scoring_system epss
scoring_elements 0.74353
published_at 2026-04-02T12:55:00Z
2
value 0.00821
scoring_system epss
scoring_elements 0.7438
published_at 2026-04-04T12:55:00Z
3
value 0.00821
scoring_system epss
scoring_elements 0.74355
published_at 2026-04-07T12:55:00Z
4
value 0.00821
scoring_system epss
scoring_elements 0.74387
published_at 2026-04-08T12:55:00Z
5
value 0.00821
scoring_system epss
scoring_elements 0.74403
published_at 2026-04-09T12:55:00Z
6
value 0.00821
scoring_system epss
scoring_elements 0.74424
published_at 2026-04-11T12:55:00Z
7
value 0.00821
scoring_system epss
scoring_elements 0.74404
published_at 2026-04-12T12:55:00Z
8
value 0.00821
scoring_system epss
scoring_elements 0.74396
published_at 2026-04-13T12:55:00Z
9
value 0.00821
scoring_system epss
scoring_elements 0.74433
published_at 2026-04-16T12:55:00Z
10
value 0.00821
scoring_system epss
scoring_elements 0.74442
published_at 2026-04-18T12:55:00Z
11
value 0.00821
scoring_system epss
scoring_elements 0.74432
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-4756
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1244780
reference_id 1244780
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1244780
3
reference_url https://security.gentoo.org/glsa/201610-06
reference_id GLSA-201610-06
reference_type
scores
url https://security.gentoo.org/glsa/201610-06
4
reference_url https://access.redhat.com/errata/RHSA-2015:1630
reference_id RHSA-2015:1630
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1630
5
reference_url https://access.redhat.com/errata/RHSA-2015:1646
reference_id RHSA-2015:1646
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1646
fixed_packages
aliases CVE-2015-4756
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ygwk-7ags-2bgk
Fixing_vulnerabilities
Risk_score2.0
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:rpm/redhat/rh-mysql56-mysql@5.6.26-1%3Farch=el7