Lookup for vulnerable packages by Package URL.

Purlpkg:apk/alpine/mariadb@5.5.54-r0?arch=x86_64&distroversion=v3.2&reponame=main
Typeapk
Namespacealpine
Namemariadb
Version5.5.54-r0
Qualifiers
arch x86_64
distroversion v3.2
reponame main
Subpath
Is_vulnerablefalse
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-9f48-53dz-13an
vulnerability_id VCID-9f48-53dz-13an
summary
Multiple vulnerabilities have been found in MariaDB, the worst of
    which could lead to privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3318.json
reference_id
reference_type
scores
0
value 4.0
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3318.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-3318
reference_id
reference_type
scores
0
value 0.00052
scoring_system epss
scoring_elements 0.16314
published_at 2026-04-18T12:55:00Z
1
value 0.00052
scoring_system epss
scoring_elements 0.16472
published_at 2026-04-02T12:55:00Z
2
value 0.00052
scoring_system epss
scoring_elements 0.1629
published_at 2026-04-01T12:55:00Z
3
value 0.00052
scoring_system epss
scoring_elements 0.16533
published_at 2026-04-04T12:55:00Z
4
value 0.00052
scoring_system epss
scoring_elements 0.1633
published_at 2026-04-07T12:55:00Z
5
value 0.00052
scoring_system epss
scoring_elements 0.16416
published_at 2026-04-08T12:55:00Z
6
value 0.00052
scoring_system epss
scoring_elements 0.16474
published_at 2026-04-09T12:55:00Z
7
value 0.00052
scoring_system epss
scoring_elements 0.16459
published_at 2026-04-11T12:55:00Z
8
value 0.00052
scoring_system epss
scoring_elements 0.16419
published_at 2026-04-12T12:55:00Z
9
value 0.00052
scoring_system epss
scoring_elements 0.16358
published_at 2026-04-13T12:55:00Z
10
value 0.00052
scoring_system epss
scoring_elements 0.16294
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-3318
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6664
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6664
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3238
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3238
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3243
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3243
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3244
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3244
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3257
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3257
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3258
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3258
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3265
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3265
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3291
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3291
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3312
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3312
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3313
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3313
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3317
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3317
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3318
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3318
14
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 1
scoring_system cvssv2
scoring_elements AV:L/AC:H/Au:S/C:P/I:N/A:N
1
value 4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1414357
reference_id 1414357
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1414357
16
reference_url http://www.securityfocus.com/bid/95588
reference_id 95588
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-08T20:09:30Z/
url http://www.securityfocus.com/bid/95588
17
reference_url http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
reference_id cpujan2017-2881727.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-08T20:09:30Z/
url http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
18
reference_url http://www.debian.org/security/2017/dsa-3767
reference_id dsa-3767
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-08T20:09:30Z/
url http://www.debian.org/security/2017/dsa-3767
19
reference_url http://www.debian.org/security/2017/dsa-3770
reference_id dsa-3770
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-08T20:09:30Z/
url http://www.debian.org/security/2017/dsa-3770
20
reference_url https://security.gentoo.org/glsa/201702-17
reference_id GLSA-201702-17
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-08T20:09:30Z/
url https://security.gentoo.org/glsa/201702-17
21
reference_url https://security.gentoo.org/glsa/201702-18
reference_id GLSA-201702-18
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-08T20:09:30Z/
url https://security.gentoo.org/glsa/201702-18
22
reference_url https://access.redhat.com/errata/RHSA-2017:2192
reference_id RHSA-2017:2192
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-08T20:09:30Z/
url https://access.redhat.com/errata/RHSA-2017:2192
23
reference_url https://access.redhat.com/errata/RHSA-2017:2787
reference_id RHSA-2017:2787
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-08T20:09:30Z/
url https://access.redhat.com/errata/RHSA-2017:2787
24
reference_url https://access.redhat.com/errata/RHSA-2017:2886
reference_id RHSA-2017:2886
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-08T20:09:30Z/
url https://access.redhat.com/errata/RHSA-2017:2886
25
reference_url https://access.redhat.com/errata/RHSA-2018:0279
reference_id RHSA-2018:0279
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-08T20:09:30Z/
url https://access.redhat.com/errata/RHSA-2018:0279
26
reference_url https://access.redhat.com/errata/RHSA-2018:0574
reference_id RHSA-2018:0574
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-08T20:09:30Z/
url https://access.redhat.com/errata/RHSA-2018:0574
27
reference_url https://usn.ubuntu.com/3174-1/
reference_id USN-3174-1
reference_type
scores
url https://usn.ubuntu.com/3174-1/
fixed_packages
0
url pkg:apk/alpine/mariadb@5.5.54-r0?arch=x86_64&distroversion=v3.2&reponame=main
purl pkg:apk/alpine/mariadb@5.5.54-r0?arch=x86_64&distroversion=v3.2&reponame=main
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/mariadb@5.5.54-r0%3Farch=x86_64&distroversion=v3.2&reponame=main
aliases CVE-2017-3318
risk_score 1.8
exploitability 0.5
weighted_severity 3.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9f48-53dz-13an
1
url VCID-9w98-nfg2-muh2
vulnerability_id VCID-9w98-nfg2-muh2
summary
Multiple vulnerabilities have been found in MariaDB, the worst of
    which could lead to privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3238.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3238.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-3238
reference_id
reference_type
scores
0
value 0.02525
scoring_system epss
scoring_elements 0.85455
published_at 2026-04-18T12:55:00Z
1
value 0.02525
scoring_system epss
scoring_elements 0.85385
published_at 2026-04-04T12:55:00Z
2
value 0.02525
scoring_system epss
scoring_elements 0.85387
published_at 2026-04-07T12:55:00Z
3
value 0.02525
scoring_system epss
scoring_elements 0.85409
published_at 2026-04-08T12:55:00Z
4
value 0.02525
scoring_system epss
scoring_elements 0.85417
published_at 2026-04-09T12:55:00Z
5
value 0.02525
scoring_system epss
scoring_elements 0.85432
published_at 2026-04-11T12:55:00Z
6
value 0.02525
scoring_system epss
scoring_elements 0.8543
published_at 2026-04-12T12:55:00Z
7
value 0.02525
scoring_system epss
scoring_elements 0.85427
published_at 2026-04-13T12:55:00Z
8
value 0.02525
scoring_system epss
scoring_elements 0.85451
published_at 2026-04-16T12:55:00Z
9
value 0.02525
scoring_system epss
scoring_elements 0.85366
published_at 2026-04-02T12:55:00Z
10
value 0.02525
scoring_system epss
scoring_elements 0.85353
published_at 2026-04-01T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-3238
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6664
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6664
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3238
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3238
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3243
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3243
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3244
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3244
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3257
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3257
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3258
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3258
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3265
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3265
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3291
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3291
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3312
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3312
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3313
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3313
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3317
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3317
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3318
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3318
14
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:C
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1414338
reference_id 1414338
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1414338
16
reference_url http://www.securityfocus.com/bid/95571
reference_id 95571
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:35Z/
url http://www.securityfocus.com/bid/95571
17
reference_url http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
reference_id cpujan2017-2881727.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:35Z/
url http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
18
reference_url http://www.debian.org/security/2017/dsa-3767
reference_id dsa-3767
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:35Z/
url http://www.debian.org/security/2017/dsa-3767
19
reference_url http://www.debian.org/security/2017/dsa-3770
reference_id dsa-3770
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:35Z/
url http://www.debian.org/security/2017/dsa-3770
20
reference_url https://security.gentoo.org/glsa/201702-17
reference_id GLSA-201702-17
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:35Z/
url https://security.gentoo.org/glsa/201702-17
21
reference_url https://security.gentoo.org/glsa/201702-18
reference_id GLSA-201702-18
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:35Z/
url https://security.gentoo.org/glsa/201702-18
22
reference_url https://access.redhat.com/errata/RHSA-2017:2192
reference_id RHSA-2017:2192
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:35Z/
url https://access.redhat.com/errata/RHSA-2017:2192
23
reference_url https://access.redhat.com/errata/RHSA-2017:2787
reference_id RHSA-2017:2787
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:35Z/
url https://access.redhat.com/errata/RHSA-2017:2787
24
reference_url https://access.redhat.com/errata/RHSA-2017:2886
reference_id RHSA-2017:2886
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:35Z/
url https://access.redhat.com/errata/RHSA-2017:2886
25
reference_url https://access.redhat.com/errata/RHSA-2018:0279
reference_id RHSA-2018:0279
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:35Z/
url https://access.redhat.com/errata/RHSA-2018:0279
26
reference_url https://access.redhat.com/errata/RHSA-2018:0574
reference_id RHSA-2018:0574
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:35Z/
url https://access.redhat.com/errata/RHSA-2018:0574
27
reference_url https://usn.ubuntu.com/3174-1/
reference_id USN-3174-1
reference_type
scores
url https://usn.ubuntu.com/3174-1/
fixed_packages
0
url pkg:apk/alpine/mariadb@5.5.54-r0?arch=x86_64&distroversion=v3.2&reponame=main
purl pkg:apk/alpine/mariadb@5.5.54-r0?arch=x86_64&distroversion=v3.2&reponame=main
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/mariadb@5.5.54-r0%3Farch=x86_64&distroversion=v3.2&reponame=main
aliases CVE-2017-3238
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9w98-nfg2-muh2
2
url VCID-nkdd-suwp-4ffr
vulnerability_id VCID-nkdd-suwp-4ffr
summary
Multiple vulnerabilities have been found in MariaDB, the worst of
    which could lead to privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3243.json
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3243.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-3243
reference_id
reference_type
scores
0
value 0.05555
scoring_system epss
scoring_elements 0.90293
published_at 2026-04-18T12:55:00Z
1
value 0.05555
scoring_system epss
scoring_elements 0.90233
published_at 2026-04-01T12:55:00Z
2
value 0.05555
scoring_system epss
scoring_elements 0.90236
published_at 2026-04-02T12:55:00Z
3
value 0.05555
scoring_system epss
scoring_elements 0.90249
published_at 2026-04-04T12:55:00Z
4
value 0.05555
scoring_system epss
scoring_elements 0.90253
published_at 2026-04-07T12:55:00Z
5
value 0.05555
scoring_system epss
scoring_elements 0.90269
published_at 2026-04-08T12:55:00Z
6
value 0.05555
scoring_system epss
scoring_elements 0.90275
published_at 2026-04-09T12:55:00Z
7
value 0.05555
scoring_system epss
scoring_elements 0.90284
published_at 2026-04-11T12:55:00Z
8
value 0.05555
scoring_system epss
scoring_elements 0.90283
published_at 2026-04-12T12:55:00Z
9
value 0.05555
scoring_system epss
scoring_elements 0.90277
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-3243
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6664
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6664
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3238
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3238
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3243
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3243
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3244
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3244
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3257
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3257
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3258
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3258
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3265
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3265
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3291
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3291
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3312
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3312
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3313
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3313
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3317
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3317
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3318
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3318
14
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:S/C:N/I:N/A:C
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1414340
reference_id 1414340
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1414340
16
reference_url http://www.securityfocus.com/bid/95538
reference_id 95538
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:27Z/
url http://www.securityfocus.com/bid/95538
17
reference_url http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
reference_id cpujan2017-2881727.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:27Z/
url http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
18
reference_url http://www.debian.org/security/2017/dsa-3767
reference_id dsa-3767
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:27Z/
url http://www.debian.org/security/2017/dsa-3767
19
reference_url http://www.debian.org/security/2017/dsa-3770
reference_id dsa-3770
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:27Z/
url http://www.debian.org/security/2017/dsa-3770
20
reference_url https://security.gentoo.org/glsa/201702-17
reference_id GLSA-201702-17
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:27Z/
url https://security.gentoo.org/glsa/201702-17
21
reference_url https://security.gentoo.org/glsa/201702-18
reference_id GLSA-201702-18
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:27Z/
url https://security.gentoo.org/glsa/201702-18
22
reference_url https://access.redhat.com/errata/RHSA-2017:2192
reference_id RHSA-2017:2192
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:27Z/
url https://access.redhat.com/errata/RHSA-2017:2192
23
reference_url https://access.redhat.com/errata/RHSA-2018:0279
reference_id RHSA-2018:0279
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:27Z/
url https://access.redhat.com/errata/RHSA-2018:0279
24
reference_url https://access.redhat.com/errata/RHSA-2018:0574
reference_id RHSA-2018:0574
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:27Z/
url https://access.redhat.com/errata/RHSA-2018:0574
25
reference_url https://usn.ubuntu.com/3174-1/
reference_id USN-3174-1
reference_type
scores
url https://usn.ubuntu.com/3174-1/
fixed_packages
0
url pkg:apk/alpine/mariadb@5.5.54-r0?arch=x86_64&distroversion=v3.2&reponame=main
purl pkg:apk/alpine/mariadb@5.5.54-r0?arch=x86_64&distroversion=v3.2&reponame=main
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/mariadb@5.5.54-r0%3Farch=x86_64&distroversion=v3.2&reponame=main
aliases CVE-2017-3243
risk_score 2.0
exploitability 0.5
weighted_severity 4.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-nkdd-suwp-4ffr
3
url VCID-pv92-6p9x-v7bs
vulnerability_id VCID-pv92-6p9x-v7bs
summary
Multiple vulnerabilities have been found in MariaDB, the worst of
    which could lead to privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3317.json
reference_id
reference_type
scores
0
value 4.0
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:H/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3317.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-3317
reference_id
reference_type
scores
0
value 0.00022
scoring_system epss
scoring_elements 0.05978
published_at 2026-04-18T12:55:00Z
1
value 0.00022
scoring_system epss
scoring_elements 0.05968
published_at 2026-04-04T12:55:00Z
2
value 0.00022
scoring_system epss
scoring_elements 0.05951
published_at 2026-04-07T12:55:00Z
3
value 0.00022
scoring_system epss
scoring_elements 0.0599
published_at 2026-04-08T12:55:00Z
4
value 0.00022
scoring_system epss
scoring_elements 0.06028
published_at 2026-04-09T12:55:00Z
5
value 0.00022
scoring_system epss
scoring_elements 0.06019
published_at 2026-04-11T12:55:00Z
6
value 0.00022
scoring_system epss
scoring_elements 0.0601
published_at 2026-04-12T12:55:00Z
7
value 0.00022
scoring_system epss
scoring_elements 0.06002
published_at 2026-04-13T12:55:00Z
8
value 0.00022
scoring_system epss
scoring_elements 0.05967
published_at 2026-04-16T12:55:00Z
9
value 0.00022
scoring_system epss
scoring_elements 0.05935
published_at 2026-04-02T12:55:00Z
10
value 0.00022
scoring_system epss
scoring_elements 0.05903
published_at 2026-04-01T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-3317
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6664
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6664
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3238
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3238
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3243
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3243
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3244
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3244
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3257
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3257
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3258
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3258
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3265
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3265
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3291
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3291
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3312
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3312
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3313
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3313
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3317
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3317
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3318
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3318
14
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.8
scoring_system cvssv2
scoring_elements AV:L/AC:H/Au:S/C:N/I:N/A:C
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1414355
reference_id 1414355
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1414355
16
reference_url http://www.securityfocus.com/bid/95585
reference_id 95585
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-08T20:09:31Z/
url http://www.securityfocus.com/bid/95585
17
reference_url http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
reference_id cpujan2017-2881727.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-08T20:09:31Z/
url http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
18
reference_url http://www.debian.org/security/2017/dsa-3767
reference_id dsa-3767
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-08T20:09:31Z/
url http://www.debian.org/security/2017/dsa-3767
19
reference_url http://www.debian.org/security/2017/dsa-3770
reference_id dsa-3770
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-08T20:09:31Z/
url http://www.debian.org/security/2017/dsa-3770
20
reference_url https://security.gentoo.org/glsa/201702-17
reference_id GLSA-201702-17
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-08T20:09:31Z/
url https://security.gentoo.org/glsa/201702-17
21
reference_url https://security.gentoo.org/glsa/201702-18
reference_id GLSA-201702-18
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-08T20:09:31Z/
url https://security.gentoo.org/glsa/201702-18
22
reference_url https://access.redhat.com/errata/RHSA-2017:2192
reference_id RHSA-2017:2192
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-08T20:09:31Z/
url https://access.redhat.com/errata/RHSA-2017:2192
23
reference_url https://access.redhat.com/errata/RHSA-2017:2787
reference_id RHSA-2017:2787
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-08T20:09:31Z/
url https://access.redhat.com/errata/RHSA-2017:2787
24
reference_url https://access.redhat.com/errata/RHSA-2017:2886
reference_id RHSA-2017:2886
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-08T20:09:31Z/
url https://access.redhat.com/errata/RHSA-2017:2886
25
reference_url https://access.redhat.com/errata/RHSA-2018:0279
reference_id RHSA-2018:0279
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-08T20:09:31Z/
url https://access.redhat.com/errata/RHSA-2018:0279
26
reference_url https://access.redhat.com/errata/RHSA-2018:0574
reference_id RHSA-2018:0574
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-08T20:09:31Z/
url https://access.redhat.com/errata/RHSA-2018:0574
27
reference_url https://usn.ubuntu.com/3174-1/
reference_id USN-3174-1
reference_type
scores
url https://usn.ubuntu.com/3174-1/
fixed_packages
0
url pkg:apk/alpine/mariadb@5.5.54-r0?arch=x86_64&distroversion=v3.2&reponame=main
purl pkg:apk/alpine/mariadb@5.5.54-r0?arch=x86_64&distroversion=v3.2&reponame=main
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/mariadb@5.5.54-r0%3Farch=x86_64&distroversion=v3.2&reponame=main
aliases CVE-2017-3317
risk_score 1.8
exploitability 0.5
weighted_severity 3.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pv92-6p9x-v7bs
4
url VCID-rssq-mfc2-ckaf
vulnerability_id VCID-rssq-mfc2-ckaf
summary
Multiple vulnerabilities have been found in MariaDB, the worst of
    which could lead to privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3258.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3258.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-3258
reference_id
reference_type
scores
0
value 0.00312
scoring_system epss
scoring_elements 0.5445
published_at 2026-04-18T12:55:00Z
1
value 0.00312
scoring_system epss
scoring_elements 0.54327
published_at 2026-04-01T12:55:00Z
2
value 0.00312
scoring_system epss
scoring_elements 0.54347
published_at 2026-04-02T12:55:00Z
3
value 0.00312
scoring_system epss
scoring_elements 0.54377
published_at 2026-04-04T12:55:00Z
4
value 0.00312
scoring_system epss
scoring_elements 0.54351
published_at 2026-04-07T12:55:00Z
5
value 0.00312
scoring_system epss
scoring_elements 0.54403
published_at 2026-04-08T12:55:00Z
6
value 0.00312
scoring_system epss
scoring_elements 0.54398
published_at 2026-04-09T12:55:00Z
7
value 0.00312
scoring_system epss
scoring_elements 0.54446
published_at 2026-04-16T12:55:00Z
8
value 0.00312
scoring_system epss
scoring_elements 0.54429
published_at 2026-04-12T12:55:00Z
9
value 0.00312
scoring_system epss
scoring_elements 0.54407
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-3258
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6664
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6664
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3238
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3238
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3243
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3243
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3244
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3244
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3257
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3257
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3258
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3258
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3265
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3265
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3291
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3291
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3312
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3312
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3313
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3313
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3317
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3317
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3318
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3318
14
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:C
1
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1414351
reference_id 1414351
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1414351
16
reference_url http://www.securityfocus.com/bid/95560
reference_id 95560
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:10Z/
url http://www.securityfocus.com/bid/95560
17
reference_url http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
reference_id cpujan2017-2881727.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:10Z/
url http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
18
reference_url http://www.debian.org/security/2017/dsa-3767
reference_id dsa-3767
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:10Z/
url http://www.debian.org/security/2017/dsa-3767
19
reference_url http://www.debian.org/security/2017/dsa-3770
reference_id dsa-3770
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:10Z/
url http://www.debian.org/security/2017/dsa-3770
20
reference_url https://security.gentoo.org/glsa/201702-17
reference_id GLSA-201702-17
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:10Z/
url https://security.gentoo.org/glsa/201702-17
21
reference_url https://security.gentoo.org/glsa/201702-18
reference_id GLSA-201702-18
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:10Z/
url https://security.gentoo.org/glsa/201702-18
22
reference_url https://access.redhat.com/errata/RHSA-2017:2192
reference_id RHSA-2017:2192
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:10Z/
url https://access.redhat.com/errata/RHSA-2017:2192
23
reference_url https://access.redhat.com/errata/RHSA-2017:2787
reference_id RHSA-2017:2787
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:10Z/
url https://access.redhat.com/errata/RHSA-2017:2787
24
reference_url https://access.redhat.com/errata/RHSA-2017:2886
reference_id RHSA-2017:2886
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:10Z/
url https://access.redhat.com/errata/RHSA-2017:2886
25
reference_url https://access.redhat.com/errata/RHSA-2018:0279
reference_id RHSA-2018:0279
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:10Z/
url https://access.redhat.com/errata/RHSA-2018:0279
26
reference_url https://access.redhat.com/errata/RHSA-2018:0574
reference_id RHSA-2018:0574
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:10Z/
url https://access.redhat.com/errata/RHSA-2018:0574
27
reference_url https://usn.ubuntu.com/3174-1/
reference_id USN-3174-1
reference_type
scores
url https://usn.ubuntu.com/3174-1/
fixed_packages
0
url pkg:apk/alpine/mariadb@5.5.54-r0?arch=x86_64&distroversion=v3.2&reponame=main
purl pkg:apk/alpine/mariadb@5.5.54-r0?arch=x86_64&distroversion=v3.2&reponame=main
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/mariadb@5.5.54-r0%3Farch=x86_64&distroversion=v3.2&reponame=main
aliases CVE-2017-3258
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rssq-mfc2-ckaf
5
url VCID-un5y-y9sq-1ufb
vulnerability_id VCID-un5y-y9sq-1ufb
summary
Multiple vulnerabilities have been found in MariaDB, the worst of
    which could lead to privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3244.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3244.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-3244
reference_id
reference_type
scores
0
value 0.00314
scoring_system epss
scoring_elements 0.54598
published_at 2026-04-18T12:55:00Z
1
value 0.00314
scoring_system epss
scoring_elements 0.54572
published_at 2026-04-04T12:55:00Z
2
value 0.00314
scoring_system epss
scoring_elements 0.54541
published_at 2026-04-07T12:55:00Z
3
value 0.00314
scoring_system epss
scoring_elements 0.54592
published_at 2026-04-08T12:55:00Z
4
value 0.00314
scoring_system epss
scoring_elements 0.54587
published_at 2026-04-09T12:55:00Z
5
value 0.00314
scoring_system epss
scoring_elements 0.54599
published_at 2026-04-11T12:55:00Z
6
value 0.00314
scoring_system epss
scoring_elements 0.54581
published_at 2026-04-12T12:55:00Z
7
value 0.00314
scoring_system epss
scoring_elements 0.54559
published_at 2026-04-13T12:55:00Z
8
value 0.00314
scoring_system epss
scoring_elements 0.54596
published_at 2026-04-16T12:55:00Z
9
value 0.00314
scoring_system epss
scoring_elements 0.54548
published_at 2026-04-02T12:55:00Z
10
value 0.00314
scoring_system epss
scoring_elements 0.54473
published_at 2026-04-01T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-3244
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6664
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6664
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3238
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3238
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3243
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3243
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3244
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3244
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3257
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3257
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3258
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3258
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3265
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3265
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3291
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3291
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3312
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3312
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3313
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3313
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3317
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3317
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3318
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3318
14
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:C
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1414342
reference_id 1414342
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1414342
16
reference_url http://www.securityfocus.com/bid/95565
reference_id 95565
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:25Z/
url http://www.securityfocus.com/bid/95565
17
reference_url http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
reference_id cpujan2017-2881727.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:25Z/
url http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
18
reference_url http://www.debian.org/security/2017/dsa-3767
reference_id dsa-3767
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:25Z/
url http://www.debian.org/security/2017/dsa-3767
19
reference_url http://www.debian.org/security/2017/dsa-3770
reference_id dsa-3770
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:25Z/
url http://www.debian.org/security/2017/dsa-3770
20
reference_url https://security.gentoo.org/glsa/201702-17
reference_id GLSA-201702-17
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:25Z/
url https://security.gentoo.org/glsa/201702-17
21
reference_url https://security.gentoo.org/glsa/201702-18
reference_id GLSA-201702-18
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:25Z/
url https://security.gentoo.org/glsa/201702-18
22
reference_url https://access.redhat.com/errata/RHSA-2017:2192
reference_id RHSA-2017:2192
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:25Z/
url https://access.redhat.com/errata/RHSA-2017:2192
23
reference_url https://access.redhat.com/errata/RHSA-2017:2787
reference_id RHSA-2017:2787
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:25Z/
url https://access.redhat.com/errata/RHSA-2017:2787
24
reference_url https://access.redhat.com/errata/RHSA-2017:2886
reference_id RHSA-2017:2886
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:25Z/
url https://access.redhat.com/errata/RHSA-2017:2886
25
reference_url https://access.redhat.com/errata/RHSA-2018:0279
reference_id RHSA-2018:0279
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:25Z/
url https://access.redhat.com/errata/RHSA-2018:0279
26
reference_url https://access.redhat.com/errata/RHSA-2018:0574
reference_id RHSA-2018:0574
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:25Z/
url https://access.redhat.com/errata/RHSA-2018:0574
27
reference_url https://usn.ubuntu.com/3174-1/
reference_id USN-3174-1
reference_type
scores
url https://usn.ubuntu.com/3174-1/
fixed_packages
0
url pkg:apk/alpine/mariadb@5.5.54-r0?arch=x86_64&distroversion=v3.2&reponame=main
purl pkg:apk/alpine/mariadb@5.5.54-r0?arch=x86_64&distroversion=v3.2&reponame=main
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/mariadb@5.5.54-r0%3Farch=x86_64&distroversion=v3.2&reponame=main
aliases CVE-2017-3244
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-un5y-y9sq-1ufb
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:apk/alpine/mariadb@5.5.54-r0%3Farch=x86_64&distroversion=v3.2&reponame=main