Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/mysql-5.5@5.5.42-1
Typedeb
Namespacedebian
Namemysql-5.5
Version5.5.42-1
Qualifiers
Subpath
Is_vulnerabletrue
Next_non_vulnerable_version5.5.60-0+deb8u1
Latest_non_vulnerable_version5.5.60-0+deb8u1
Affected_by_vulnerabilities
0
url VCID-1gmc-pj6y-rkfx
vulnerability_id VCID-1gmc-pj6y-rkfx
summary
Multiple vulnerabilities were found in MySQL, the worst of which
    may allow remote execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3636.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3636.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-3636
reference_id
reference_type
scores
0
value 0.00075
scoring_system epss
scoring_elements 0.22632
published_at 2026-04-02T12:55:00Z
1
value 0.00075
scoring_system epss
scoring_elements 0.22465
published_at 2026-04-07T12:55:00Z
2
value 0.00075
scoring_system epss
scoring_elements 0.22547
published_at 2026-04-08T12:55:00Z
3
value 0.00075
scoring_system epss
scoring_elements 0.22601
published_at 2026-04-09T12:55:00Z
4
value 0.00075
scoring_system epss
scoring_elements 0.22617
published_at 2026-04-11T12:55:00Z
5
value 0.00075
scoring_system epss
scoring_elements 0.22576
published_at 2026-04-12T12:55:00Z
6
value 0.00075
scoring_system epss
scoring_elements 0.22522
published_at 2026-04-13T12:55:00Z
7
value 0.00075
scoring_system epss
scoring_elements 0.22536
published_at 2026-04-16T12:55:00Z
8
value 0.00075
scoring_system epss
scoring_elements 0.22531
published_at 2026-04-18T12:55:00Z
9
value 0.00075
scoring_system epss
scoring_elements 0.22458
published_at 2026-04-01T12:55:00Z
10
value 0.00075
scoring_system epss
scoring_elements 0.22675
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-3636
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10286
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10286
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10379
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10379
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10384
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10384
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3308
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3308
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3309
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3309
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3453
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3453
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3456
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3456
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3464
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3464
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3635
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3635
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3636
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3636
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3641
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3641
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3648
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3648
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3651
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3651
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3652
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3652
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3653
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3653
17
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:S/C:P/I:P/A:P
1
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
18
reference_url http://www.securitytracker.com/id/1038928
reference_id 1038928
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:48:23Z/
url http://www.securitytracker.com/id/1038928
19
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1472686
reference_id 1472686
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1472686
20
reference_url http://www.securityfocus.com/bid/99736
reference_id 99736
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:48:23Z/
url http://www.securityfocus.com/bid/99736
21
reference_url http://www.debian.org/security/2017/dsa-3922
reference_id dsa-3922
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:48:23Z/
url http://www.debian.org/security/2017/dsa-3922
22
reference_url https://www.debian.org/security/2017/dsa-3955
reference_id dsa-3955
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:48:23Z/
url https://www.debian.org/security/2017/dsa-3955
23
reference_url https://security.gentoo.org/glsa/201802-04
reference_id GLSA-201802-04
reference_type
scores
url https://security.gentoo.org/glsa/201802-04
24
reference_url https://access.redhat.com/errata/RHSA-2017:2787
reference_id RHSA-2017:2787
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:48:23Z/
url https://access.redhat.com/errata/RHSA-2017:2787
25
reference_url https://access.redhat.com/errata/RHSA-2018:0279
reference_id RHSA-2018:0279
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:48:23Z/
url https://access.redhat.com/errata/RHSA-2018:0279
26
reference_url https://access.redhat.com/errata/RHSA-2018:0574
reference_id RHSA-2018:0574
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:48:23Z/
url https://access.redhat.com/errata/RHSA-2018:0574
27
reference_url https://access.redhat.com/errata/RHSA-2018:2439
reference_id RHSA-2018:2439
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:48:23Z/
url https://access.redhat.com/errata/RHSA-2018:2439
28
reference_url https://access.redhat.com/errata/RHSA-2018:2729
reference_id RHSA-2018:2729
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:48:23Z/
url https://access.redhat.com/errata/RHSA-2018:2729
29
reference_url https://usn.ubuntu.com/3357-1/
reference_id USN-3357-1
reference_type
scores
url https://usn.ubuntu.com/3357-1/
30
reference_url https://usn.ubuntu.com/3357-2/
reference_id USN-3357-2
reference_type
scores
url https://usn.ubuntu.com/3357-2/
fixed_packages
0
url pkg:deb/debian/mysql-5.5@5.5.60-0%2Bdeb8u1
purl pkg:deb/debian/mysql-5.5@5.5.60-0%2Bdeb8u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-5.5@5.5.60-0%252Bdeb8u1
aliases CVE-2017-3636
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1gmc-pj6y-rkfx
1
url VCID-1k52-9nbh-1qdj
vulnerability_id VCID-1k52-9nbh-1qdj
summary
Multiple vulnerabilities have been found in MySQL and MariaDB, the
    worst of which could allow remote attackers to cause a Denial of Service
    condition or obtain sensitive information.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2648.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2648.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-2648
reference_id
reference_type
scores
0
value 0.00598
scoring_system epss
scoring_elements 0.69334
published_at 2026-04-01T12:55:00Z
1
value 0.00598
scoring_system epss
scoring_elements 0.69347
published_at 2026-04-02T12:55:00Z
2
value 0.00598
scoring_system epss
scoring_elements 0.69363
published_at 2026-04-04T12:55:00Z
3
value 0.00598
scoring_system epss
scoring_elements 0.69343
published_at 2026-04-07T12:55:00Z
4
value 0.00598
scoring_system epss
scoring_elements 0.69393
published_at 2026-04-08T12:55:00Z
5
value 0.00598
scoring_system epss
scoring_elements 0.69409
published_at 2026-04-09T12:55:00Z
6
value 0.00598
scoring_system epss
scoring_elements 0.69432
published_at 2026-04-11T12:55:00Z
7
value 0.00598
scoring_system epss
scoring_elements 0.69417
published_at 2026-04-12T12:55:00Z
8
value 0.00598
scoring_system epss
scoring_elements 0.69402
published_at 2026-04-13T12:55:00Z
9
value 0.00598
scoring_system epss
scoring_elements 0.69442
published_at 2026-04-16T12:55:00Z
10
value 0.00598
scoring_system epss
scoring_elements 0.69452
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-2648
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0433
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0433
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0441
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0441
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0499
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0499
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0501
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0501
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0505
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0505
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2568
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2568
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2571
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2571
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2573
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2573
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2582
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2582
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2620
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2620
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2643
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2643
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2648
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2648
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3152
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3152
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4737
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4737
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4752
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4752
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4757
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4757
18
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1244775
reference_id 1244775
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1244775
19
reference_url https://security.gentoo.org/glsa/201610-06
reference_id GLSA-201610-06
reference_type
scores
url https://security.gentoo.org/glsa/201610-06
20
reference_url https://access.redhat.com/errata/RHSA-2015:1628
reference_id RHSA-2015:1628
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1628
21
reference_url https://access.redhat.com/errata/RHSA-2015:1629
reference_id RHSA-2015:1629
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1629
22
reference_url https://access.redhat.com/errata/RHSA-2015:1630
reference_id RHSA-2015:1630
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1630
23
reference_url https://access.redhat.com/errata/RHSA-2015:1646
reference_id RHSA-2015:1646
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1646
24
reference_url https://access.redhat.com/errata/RHSA-2015:1647
reference_id RHSA-2015:1647
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1647
25
reference_url https://access.redhat.com/errata/RHSA-2015:1665
reference_id RHSA-2015:1665
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1665
26
reference_url https://usn.ubuntu.com/2674-1/
reference_id USN-2674-1
reference_type
scores
url https://usn.ubuntu.com/2674-1/
fixed_packages
0
url pkg:deb/debian/mysql-5.5@5.5.47-0%2Bdeb6u1
purl pkg:deb/debian/mysql-5.5@5.5.47-0%2Bdeb6u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1gmc-pj6y-rkfx
1
vulnerability VCID-1nvb-xd5n-gkh8
2
vulnerability VCID-2gyq-q761-h3br
3
vulnerability VCID-2jer-ss8p-7kbg
4
vulnerability VCID-2uxe-ep8b-y7b9
5
vulnerability VCID-2vp1-j324-dkat
6
vulnerability VCID-2yqz-qtv5-47hh
7
vulnerability VCID-2za2-cnwx-hbbw
8
vulnerability VCID-39gt-6dgh-wyar
9
vulnerability VCID-3qjy-4cen-7qev
10
vulnerability VCID-45hn-ezks-j7br
11
vulnerability VCID-4cnj-7fur-3qe3
12
vulnerability VCID-4yz4-vxnh-b3dp
13
vulnerability VCID-52w9-bgxr-nkba
14
vulnerability VCID-55fg-6c2c-6bg8
15
vulnerability VCID-5p65-gfsg-1ugq
16
vulnerability VCID-5q89-vg9j-k3as
17
vulnerability VCID-5sjj-599v-vybg
18
vulnerability VCID-64st-u4xn-z7g3
19
vulnerability VCID-6g4n-3xfu-hfee
20
vulnerability VCID-6gvj-hy6a-3qdx
21
vulnerability VCID-7tj3-dfxj-bke7
22
vulnerability VCID-7w3v-5s98-a7ec
23
vulnerability VCID-7yc3-7bkr-jfc9
24
vulnerability VCID-8krv-jqjg-uqc8
25
vulnerability VCID-8kvb-5u8c-zbc4
26
vulnerability VCID-8sya-wktg-dqa5
27
vulnerability VCID-9f48-53dz-13an
28
vulnerability VCID-9ff2-43rk-2ydj
29
vulnerability VCID-9w98-nfg2-muh2
30
vulnerability VCID-a3hx-qz7x-7ybk
31
vulnerability VCID-bfnh-7k45-nkg2
32
vulnerability VCID-bhxk-8byp-eyap
33
vulnerability VCID-ca85-vx8c-huht
34
vulnerability VCID-cnb3-dy3a-8bdp
35
vulnerability VCID-cyqa-e362-yyaf
36
vulnerability VCID-dfbz-5n6w-syd9
37
vulnerability VCID-dgtc-a2t2-k7f5
38
vulnerability VCID-dqg6-2gmj-judy
39
vulnerability VCID-ej67-ayfh-sqdt
40
vulnerability VCID-esfk-umc5-ska4
41
vulnerability VCID-f8p4-hpsh-2fcw
42
vulnerability VCID-f9vz-r6zv-t7ev
43
vulnerability VCID-fabc-rma2-myab
44
vulnerability VCID-fnks-p4e9-13es
45
vulnerability VCID-fuyw-1y1c-fkfp
46
vulnerability VCID-j2wu-2rx7-3yf2
47
vulnerability VCID-jgff-4jyp-9fgr
48
vulnerability VCID-kwrj-3fxz-g7c6
49
vulnerability VCID-mde2-1ynu-auh2
50
vulnerability VCID-mz71-vku8-ckbm
51
vulnerability VCID-nj41-1zpw-gkh9
52
vulnerability VCID-nkdd-suwp-4ffr
53
vulnerability VCID-p623-gxyv-g7fs
54
vulnerability VCID-pk7e-t26d-aqdm
55
vulnerability VCID-pv92-6p9x-v7bs
56
vulnerability VCID-qyb6-7ees-ukcm
57
vulnerability VCID-r2cz-9kjz-zbgu
58
vulnerability VCID-rfz7-vha1-e7gy
59
vulnerability VCID-rssq-mfc2-ckaf
60
vulnerability VCID-skzt-r7sx-1ucv
61
vulnerability VCID-sy6p-5km4-1kcy
62
vulnerability VCID-tazb-gd49-73b4
63
vulnerability VCID-u2c7-p86x-5bgf
64
vulnerability VCID-un5y-y9sq-1ufb
65
vulnerability VCID-v165-afmm-w3er
66
vulnerability VCID-v4gv-g9n5-ukgc
67
vulnerability VCID-wrna-cc9g-sqbe
68
vulnerability VCID-xuhv-wrut-wuez
69
vulnerability VCID-xvv1-nxs6-n7ab
70
vulnerability VCID-xyuf-au4f-57fr
71
vulnerability VCID-y6p4-vfkn-q7fc
72
vulnerability VCID-yx79-3g2x-pqex
73
vulnerability VCID-zb4s-9rj3-ebea
74
vulnerability VCID-zkvk-538h-w3b9
75
vulnerability VCID-zuxd-n3wn-s7hg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-5.5@5.5.47-0%252Bdeb6u1
aliases CVE-2015-2648
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1k52-9nbh-1qdj
2
url VCID-1nvb-xd5n-gkh8
vulnerability_id VCID-1nvb-xd5n-gkh8
summary
Multiple vulnerabilities have been found in MariaDB and MySQL, the
    worst of which could result in privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2755.json
reference_id
reference_type
scores
0
value 7.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2755.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-2755
reference_id
reference_type
scores
0
value 0.00159
scoring_system epss
scoring_elements 0.36762
published_at 2026-04-18T12:55:00Z
1
value 0.00159
scoring_system epss
scoring_elements 0.36735
published_at 2026-04-13T12:55:00Z
2
value 0.00159
scoring_system epss
scoring_elements 0.36779
published_at 2026-04-16T12:55:00Z
3
value 0.00208
scoring_system epss
scoring_elements 0.43169
published_at 2026-04-09T12:55:00Z
4
value 0.00208
scoring_system epss
scoring_elements 0.43139
published_at 2026-04-02T12:55:00Z
5
value 0.00208
scoring_system epss
scoring_elements 0.4308
published_at 2026-04-01T12:55:00Z
6
value 0.00208
scoring_system epss
scoring_elements 0.43158
published_at 2026-04-12T12:55:00Z
7
value 0.00208
scoring_system epss
scoring_elements 0.43191
published_at 2026-04-11T12:55:00Z
8
value 0.00208
scoring_system epss
scoring_elements 0.43166
published_at 2026-04-04T12:55:00Z
9
value 0.00208
scoring_system epss
scoring_elements 0.43104
published_at 2026-04-07T12:55:00Z
10
value 0.00208
scoring_system epss
scoring_elements 0.43157
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-2755
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10268
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10268
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10378
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10378
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15365
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15365
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2562
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2562
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2612
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2612
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2622
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2622
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2640
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2640
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2665
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2665
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2668
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2668
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2755
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2755
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2761
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2761
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2766
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2766
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2767
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2767
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2771
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2771
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2773
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2773
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2781
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2781
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2782
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2782
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2784
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2784
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2787
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2787
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2813
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2813
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2817
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2817
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2818
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2818
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2819
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2819
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3058
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3058
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3063
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3063
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3064
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3064
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3066
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3066
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3081
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3081
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3143
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3143
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3156
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3156
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3174
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3174
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3251
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3251
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3282
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3282
35
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2503
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2503
36
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
37
reference_url https://lists.debian.org/debian-lts-announce/2018/04/msg00020.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:20:29Z/
url https://lists.debian.org/debian-lts-announce/2018/04/msg00020.html
38
reference_url https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:20:29Z/
url https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html
39
reference_url https://security.netapp.com/advisory/ntap-20180419-0002/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:20:29Z/
url https://security.netapp.com/advisory/ntap-20180419-0002/
40
reference_url https://www.debian.org/security/2018/dsa-4176
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:20:29Z/
url https://www.debian.org/security/2018/dsa-4176
41
reference_url https://www.debian.org/security/2018/dsa-4341
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:20:29Z/
url https://www.debian.org/security/2018/dsa-4341
42
reference_url http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:20:29Z/
url http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
43
reference_url http://www.securityfocus.com/bid/103807
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:20:29Z/
url http://www.securityfocus.com/bid/103807
44
reference_url http://www.securitytracker.com/id/1040698
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:20:29Z/
url http://www.securitytracker.com/id/1040698
45
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1568921
reference_id 1568921
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1568921
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
reference_id cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
reference_id cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openstack:12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:openstack:12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openstack:12:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
71
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
72
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-2755
reference_id CVE-2018-2755
reference_type
scores
0
value 3.7
scoring_system cvssv2
scoring_elements AV:L/AC:H/Au:N/C:P/I:P/A:P
1
value 7.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2018-2755
73
reference_url https://security.gentoo.org/glsa/201908-24
reference_id GLSA-201908-24
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:20:29Z/
url https://security.gentoo.org/glsa/201908-24
74
reference_url https://access.redhat.com/errata/RHSA-2018:1254
reference_id RHSA-2018:1254
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:20:29Z/
url https://access.redhat.com/errata/RHSA-2018:1254
75
reference_url https://access.redhat.com/errata/RHSA-2018:2439
reference_id RHSA-2018:2439
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:20:29Z/
url https://access.redhat.com/errata/RHSA-2018:2439
76
reference_url https://access.redhat.com/errata/RHSA-2018:2729
reference_id RHSA-2018:2729
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:20:29Z/
url https://access.redhat.com/errata/RHSA-2018:2729
77
reference_url https://access.redhat.com/errata/RHSA-2018:3655
reference_id RHSA-2018:3655
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:20:29Z/
url https://access.redhat.com/errata/RHSA-2018:3655
78
reference_url https://access.redhat.com/errata/RHSA-2019:1258
reference_id RHSA-2019:1258
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:20:29Z/
url https://access.redhat.com/errata/RHSA-2019:1258
79
reference_url https://usn.ubuntu.com/3629-1/
reference_id USN-3629-1
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:20:29Z/
url https://usn.ubuntu.com/3629-1/
80
reference_url https://usn.ubuntu.com/3629-2/
reference_id USN-3629-2
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:20:29Z/
url https://usn.ubuntu.com/3629-2/
81
reference_url https://usn.ubuntu.com/3629-3/
reference_id USN-3629-3
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:20:29Z/
url https://usn.ubuntu.com/3629-3/
fixed_packages
0
url pkg:deb/debian/mysql-5.5@5.5.60-0%2Bdeb8u1
purl pkg:deb/debian/mysql-5.5@5.5.60-0%2Bdeb8u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-5.5@5.5.60-0%252Bdeb8u1
aliases CVE-2018-2755
risk_score 3.5
exploitability 0.5
weighted_severity 6.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1nvb-xd5n-gkh8
3
url VCID-1xy7-2n6j-jfdq
vulnerability_id VCID-1xy7-2n6j-jfdq
summary
Multiple vulnerabilities have been found in MySQL, allowing
    attackers to execute arbitrary code or cause Denial of Service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0501.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0501.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-0501
reference_id
reference_type
scores
0
value 0.0172
scoring_system epss
scoring_elements 0.82324
published_at 2026-04-01T12:55:00Z
1
value 0.0172
scoring_system epss
scoring_elements 0.82338
published_at 2026-04-02T12:55:00Z
2
value 0.0172
scoring_system epss
scoring_elements 0.82356
published_at 2026-04-04T12:55:00Z
3
value 0.0172
scoring_system epss
scoring_elements 0.8235
published_at 2026-04-07T12:55:00Z
4
value 0.0172
scoring_system epss
scoring_elements 0.82378
published_at 2026-04-08T12:55:00Z
5
value 0.0172
scoring_system epss
scoring_elements 0.82385
published_at 2026-04-09T12:55:00Z
6
value 0.0172
scoring_system epss
scoring_elements 0.82404
published_at 2026-04-11T12:55:00Z
7
value 0.0172
scoring_system epss
scoring_elements 0.824
published_at 2026-04-12T12:55:00Z
8
value 0.0172
scoring_system epss
scoring_elements 0.82395
published_at 2026-04-13T12:55:00Z
9
value 0.0172
scoring_system epss
scoring_elements 0.82429
published_at 2026-04-16T12:55:00Z
10
value 0.0172
scoring_system epss
scoring_elements 0.8243
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-0501
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0433
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0433
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0441
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0441
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0499
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0499
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0501
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0501
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0505
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0505
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2568
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2568
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2571
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2571
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2573
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2573
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2582
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2582
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2643
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2643
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2648
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2648
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3152
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3152
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4752
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4752
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4757
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4757
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1212758
reference_id 1212758
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1212758
17
reference_url https://security.gentoo.org/glsa/201507-19
reference_id GLSA-201507-19
reference_type
scores
url https://security.gentoo.org/glsa/201507-19
18
reference_url https://access.redhat.com/errata/RHSA-2015:1628
reference_id RHSA-2015:1628
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1628
19
reference_url https://access.redhat.com/errata/RHSA-2015:1629
reference_id RHSA-2015:1629
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1629
20
reference_url https://access.redhat.com/errata/RHSA-2015:1646
reference_id RHSA-2015:1646
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1646
21
reference_url https://access.redhat.com/errata/RHSA-2015:1647
reference_id RHSA-2015:1647
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1647
22
reference_url https://access.redhat.com/errata/RHSA-2015:1665
reference_id RHSA-2015:1665
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1665
23
reference_url https://usn.ubuntu.com/2575-1/
reference_id USN-2575-1
reference_type
scores
url https://usn.ubuntu.com/2575-1/
fixed_packages
0
url pkg:deb/debian/mysql-5.5@5.5.47-0%2Bdeb6u1
purl pkg:deb/debian/mysql-5.5@5.5.47-0%2Bdeb6u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1gmc-pj6y-rkfx
1
vulnerability VCID-1nvb-xd5n-gkh8
2
vulnerability VCID-2gyq-q761-h3br
3
vulnerability VCID-2jer-ss8p-7kbg
4
vulnerability VCID-2uxe-ep8b-y7b9
5
vulnerability VCID-2vp1-j324-dkat
6
vulnerability VCID-2yqz-qtv5-47hh
7
vulnerability VCID-2za2-cnwx-hbbw
8
vulnerability VCID-39gt-6dgh-wyar
9
vulnerability VCID-3qjy-4cen-7qev
10
vulnerability VCID-45hn-ezks-j7br
11
vulnerability VCID-4cnj-7fur-3qe3
12
vulnerability VCID-4yz4-vxnh-b3dp
13
vulnerability VCID-52w9-bgxr-nkba
14
vulnerability VCID-55fg-6c2c-6bg8
15
vulnerability VCID-5p65-gfsg-1ugq
16
vulnerability VCID-5q89-vg9j-k3as
17
vulnerability VCID-5sjj-599v-vybg
18
vulnerability VCID-64st-u4xn-z7g3
19
vulnerability VCID-6g4n-3xfu-hfee
20
vulnerability VCID-6gvj-hy6a-3qdx
21
vulnerability VCID-7tj3-dfxj-bke7
22
vulnerability VCID-7w3v-5s98-a7ec
23
vulnerability VCID-7yc3-7bkr-jfc9
24
vulnerability VCID-8krv-jqjg-uqc8
25
vulnerability VCID-8kvb-5u8c-zbc4
26
vulnerability VCID-8sya-wktg-dqa5
27
vulnerability VCID-9f48-53dz-13an
28
vulnerability VCID-9ff2-43rk-2ydj
29
vulnerability VCID-9w98-nfg2-muh2
30
vulnerability VCID-a3hx-qz7x-7ybk
31
vulnerability VCID-bfnh-7k45-nkg2
32
vulnerability VCID-bhxk-8byp-eyap
33
vulnerability VCID-ca85-vx8c-huht
34
vulnerability VCID-cnb3-dy3a-8bdp
35
vulnerability VCID-cyqa-e362-yyaf
36
vulnerability VCID-dfbz-5n6w-syd9
37
vulnerability VCID-dgtc-a2t2-k7f5
38
vulnerability VCID-dqg6-2gmj-judy
39
vulnerability VCID-ej67-ayfh-sqdt
40
vulnerability VCID-esfk-umc5-ska4
41
vulnerability VCID-f8p4-hpsh-2fcw
42
vulnerability VCID-f9vz-r6zv-t7ev
43
vulnerability VCID-fabc-rma2-myab
44
vulnerability VCID-fnks-p4e9-13es
45
vulnerability VCID-fuyw-1y1c-fkfp
46
vulnerability VCID-j2wu-2rx7-3yf2
47
vulnerability VCID-jgff-4jyp-9fgr
48
vulnerability VCID-kwrj-3fxz-g7c6
49
vulnerability VCID-mde2-1ynu-auh2
50
vulnerability VCID-mz71-vku8-ckbm
51
vulnerability VCID-nj41-1zpw-gkh9
52
vulnerability VCID-nkdd-suwp-4ffr
53
vulnerability VCID-p623-gxyv-g7fs
54
vulnerability VCID-pk7e-t26d-aqdm
55
vulnerability VCID-pv92-6p9x-v7bs
56
vulnerability VCID-qyb6-7ees-ukcm
57
vulnerability VCID-r2cz-9kjz-zbgu
58
vulnerability VCID-rfz7-vha1-e7gy
59
vulnerability VCID-rssq-mfc2-ckaf
60
vulnerability VCID-skzt-r7sx-1ucv
61
vulnerability VCID-sy6p-5km4-1kcy
62
vulnerability VCID-tazb-gd49-73b4
63
vulnerability VCID-u2c7-p86x-5bgf
64
vulnerability VCID-un5y-y9sq-1ufb
65
vulnerability VCID-v165-afmm-w3er
66
vulnerability VCID-v4gv-g9n5-ukgc
67
vulnerability VCID-wrna-cc9g-sqbe
68
vulnerability VCID-xuhv-wrut-wuez
69
vulnerability VCID-xvv1-nxs6-n7ab
70
vulnerability VCID-xyuf-au4f-57fr
71
vulnerability VCID-y6p4-vfkn-q7fc
72
vulnerability VCID-yx79-3g2x-pqex
73
vulnerability VCID-zb4s-9rj3-ebea
74
vulnerability VCID-zkvk-538h-w3b9
75
vulnerability VCID-zuxd-n3wn-s7hg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-5.5@5.5.47-0%252Bdeb6u1
aliases CVE-2015-0501
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1xy7-2n6j-jfdq
4
url VCID-2gyq-q761-h3br
vulnerability_id VCID-2gyq-q761-h3br
summary
Multiple vulnerabilities have been found in MariaDB, the worst of
    which could lead to privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3312.json
reference_id
reference_type
scores
0
value 6.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3312.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-3312
reference_id
reference_type
scores
0
value 0.00123
scoring_system epss
scoring_elements 0.31395
published_at 2026-04-18T12:55:00Z
1
value 0.00123
scoring_system epss
scoring_elements 0.31376
published_at 2026-04-01T12:55:00Z
2
value 0.00123
scoring_system epss
scoring_elements 0.31555
published_at 2026-04-04T12:55:00Z
3
value 0.00123
scoring_system epss
scoring_elements 0.31373
published_at 2026-04-07T12:55:00Z
4
value 0.00123
scoring_system epss
scoring_elements 0.31426
published_at 2026-04-08T12:55:00Z
5
value 0.00123
scoring_system epss
scoring_elements 0.31457
published_at 2026-04-09T12:55:00Z
6
value 0.00123
scoring_system epss
scoring_elements 0.3146
published_at 2026-04-11T12:55:00Z
7
value 0.00123
scoring_system epss
scoring_elements 0.31417
published_at 2026-04-12T12:55:00Z
8
value 0.00123
scoring_system epss
scoring_elements 0.31381
published_at 2026-04-13T12:55:00Z
9
value 0.00123
scoring_system epss
scoring_elements 0.31415
published_at 2026-04-16T12:55:00Z
10
value 0.00123
scoring_system epss
scoring_elements 0.31513
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-3312
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6664
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6664
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3238
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3238
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3243
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3243
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3244
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3244
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3257
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3257
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3258
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3258
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3265
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3265
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3291
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3291
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3312
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3312
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3313
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3313
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3317
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3317
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3318
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3318
14
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.2
scoring_system cvssv2
scoring_elements AV:L/AC:H/Au:N/C:C/I:C/A:C
1
value 6.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1414133
reference_id 1414133
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1414133
16
reference_url http://www.securityfocus.com/bid/95491
reference_id 95491
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:06:01Z/
url http://www.securityfocus.com/bid/95491
17
reference_url http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
reference_id cpujan2017-2881727.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:06:01Z/
url http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
18
reference_url http://www.debian.org/security/2017/dsa-3767
reference_id dsa-3767
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:06:01Z/
url http://www.debian.org/security/2017/dsa-3767
19
reference_url http://www.debian.org/security/2017/dsa-3770
reference_id dsa-3770
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:06:01Z/
url http://www.debian.org/security/2017/dsa-3770
20
reference_url https://security.gentoo.org/glsa/201702-17
reference_id GLSA-201702-17
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:06:01Z/
url https://security.gentoo.org/glsa/201702-17
21
reference_url https://security.gentoo.org/glsa/201702-18
reference_id GLSA-201702-18
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:06:01Z/
url https://security.gentoo.org/glsa/201702-18
22
reference_url https://access.redhat.com/errata/RHSA-2017:2192
reference_id RHSA-2017:2192
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:06:01Z/
url https://access.redhat.com/errata/RHSA-2017:2192
23
reference_url https://access.redhat.com/errata/RHSA-2017:2787
reference_id RHSA-2017:2787
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:06:01Z/
url https://access.redhat.com/errata/RHSA-2017:2787
24
reference_url https://access.redhat.com/errata/RHSA-2017:2886
reference_id RHSA-2017:2886
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:06:01Z/
url https://access.redhat.com/errata/RHSA-2017:2886
25
reference_url https://access.redhat.com/errata/RHSA-2018:0279
reference_id RHSA-2018:0279
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:06:01Z/
url https://access.redhat.com/errata/RHSA-2018:0279
26
reference_url https://access.redhat.com/errata/RHSA-2018:0574
reference_id RHSA-2018:0574
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:06:01Z/
url https://access.redhat.com/errata/RHSA-2018:0574
27
reference_url https://usn.ubuntu.com/3174-1/
reference_id USN-3174-1
reference_type
scores
url https://usn.ubuntu.com/3174-1/
fixed_packages
0
url pkg:deb/debian/mysql-5.5@5.5.60-0%2Bdeb8u1
purl pkg:deb/debian/mysql-5.5@5.5.60-0%2Bdeb8u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-5.5@5.5.60-0%252Bdeb8u1
aliases CVE-2017-3312
risk_score 3.0
exploitability 0.5
weighted_severity 6.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2gyq-q761-h3br
5
url VCID-2jer-ss8p-7kbg
vulnerability_id VCID-2jer-ss8p-7kbg
summary security update
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:27Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:27Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:27Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:27Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:27Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:27Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html
6
reference_url http://rhn.redhat.com/errata/RHSA-2016-0534.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:27Z/
url http://rhn.redhat.com/errata/RHSA-2016-0534.html
7
reference_url http://rhn.redhat.com/errata/RHSA-2016-0705.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:27Z/
url http://rhn.redhat.com/errata/RHSA-2016-0705.html
8
reference_url http://rhn.redhat.com/errata/RHSA-2016-1480.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:27Z/
url http://rhn.redhat.com/errata/RHSA-2016-1480.html
9
reference_url http://rhn.redhat.com/errata/RHSA-2016-1481.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:27Z/
url http://rhn.redhat.com/errata/RHSA-2016-1481.html
10
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0642.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0642.json
11
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-0642
reference_id
reference_type
scores
0
value 0.00377
scoring_system epss
scoring_elements 0.59151
published_at 2026-04-01T12:55:00Z
1
value 0.00377
scoring_system epss
scoring_elements 0.59249
published_at 2026-04-04T12:55:00Z
2
value 0.00377
scoring_system epss
scoring_elements 0.59213
published_at 2026-04-07T12:55:00Z
3
value 0.00377
scoring_system epss
scoring_elements 0.59266
published_at 2026-04-08T12:55:00Z
4
value 0.00377
scoring_system epss
scoring_elements 0.59279
published_at 2026-04-09T12:55:00Z
5
value 0.00377
scoring_system epss
scoring_elements 0.59299
published_at 2026-04-11T12:55:00Z
6
value 0.00377
scoring_system epss
scoring_elements 0.59282
published_at 2026-04-12T12:55:00Z
7
value 0.00377
scoring_system epss
scoring_elements 0.59264
published_at 2026-04-13T12:55:00Z
8
value 0.00377
scoring_system epss
scoring_elements 0.59301
published_at 2026-04-16T12:55:00Z
9
value 0.00377
scoring_system epss
scoring_elements 0.59308
published_at 2026-04-18T12:55:00Z
10
value 0.00377
scoring_system epss
scoring_elements 0.59225
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-0642
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0640
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0640
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0641
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0641
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0642
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0642
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0643
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0643
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0644
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0644
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0646
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0646
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0647
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0647
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0648
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0648
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0649
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0649
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0650
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0650
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0666
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0666
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2047
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2047
24
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv2
scoring_elements AV:L/AC:H/Au:M/C:N/I:P/A:C
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
25
reference_url http://www.debian.org/security/2016/dsa-3557
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:27Z/
url http://www.debian.org/security/2016/dsa-3557
26
reference_url http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:27Z/
url http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
27
reference_url http://www.securityfocus.com/bid/86445
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:27Z/
url http://www.securityfocus.com/bid/86445
28
reference_url http://www.securitytracker.com/id/1035606
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:27Z/
url http://www.securitytracker.com/id/1035606
29
reference_url http://www.ubuntu.com/usn/USN-2953-1
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:27Z/
url http://www.ubuntu.com/usn/USN-2953-1
30
reference_url http://www.ubuntu.com/usn/USN-2954-1
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:27Z/
url http://www.ubuntu.com/usn/USN-2954-1
31
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1329243
reference_id 1329243
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1329243
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp4:*:*:*:*:*:*
reference_id cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp4:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:12:-:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_desktop:12:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:12:-:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:12:sp1:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_desktop:12:sp1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:12:sp1:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp4:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:11:sp4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp4:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:12:-:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:12:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:12:-:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:12:sp1:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:12:sp1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:12:sp1:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp4:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp4:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:-:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:-:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:sp1:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:sp1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:sp1:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_workstation_extension:12:*:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_workstation_extension:12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_workstation_extension:12:*:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_workstation_extension:12:sp1:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_workstation_extension:12:sp1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_workstation_extension:12:sp1:*:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-0642
reference_id CVE-2016-0642
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:M/C:N/I:P/A:P
1
value 4.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2016-0642
71
reference_url https://access.redhat.com/errata/RHSA-2016:0534
reference_id RHSA-2016:0534
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0534
72
reference_url https://access.redhat.com/errata/RHSA-2016:0705
reference_id RHSA-2016:0705
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0705
73
reference_url https://access.redhat.com/errata/RHSA-2016:1132
reference_id RHSA-2016:1132
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:27Z/
url https://access.redhat.com/errata/RHSA-2016:1132
74
reference_url https://access.redhat.com/errata/RHSA-2016:1480
reference_id RHSA-2016:1480
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1480
75
reference_url https://access.redhat.com/errata/RHSA-2016:1481
reference_id RHSA-2016:1481
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1481
76
reference_url https://usn.ubuntu.com/2953-1/
reference_id USN-2953-1
reference_type
scores
url https://usn.ubuntu.com/2953-1/
77
reference_url https://usn.ubuntu.com/2954-1/
reference_id USN-2954-1
reference_type
scores
url https://usn.ubuntu.com/2954-1/
fixed_packages
0
url pkg:deb/debian/mysql-5.5@5.5.60-0%2Bdeb8u1
purl pkg:deb/debian/mysql-5.5@5.5.60-0%2Bdeb8u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-5.5@5.5.60-0%252Bdeb8u1
aliases CVE-2016-0642
risk_score 2.1
exploitability 0.5
weighted_severity 4.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2jer-ss8p-7kbg
6
url VCID-2t35-z6yq-uyg9
vulnerability_id VCID-2t35-z6yq-uyg9
summary
Multiple vulnerabilities have been found in MySQL, allowing
    attackers to execute arbitrary code or cause Denial of Service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2573.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2573.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-2573
reference_id
reference_type
scores
0
value 0.00406
scoring_system epss
scoring_elements 0.60959
published_at 2026-04-01T12:55:00Z
1
value 0.00406
scoring_system epss
scoring_elements 0.61036
published_at 2026-04-02T12:55:00Z
2
value 0.00406
scoring_system epss
scoring_elements 0.61064
published_at 2026-04-04T12:55:00Z
3
value 0.00406
scoring_system epss
scoring_elements 0.6103
published_at 2026-04-07T12:55:00Z
4
value 0.00406
scoring_system epss
scoring_elements 0.61078
published_at 2026-04-08T12:55:00Z
5
value 0.00406
scoring_system epss
scoring_elements 0.61094
published_at 2026-04-09T12:55:00Z
6
value 0.00406
scoring_system epss
scoring_elements 0.61115
published_at 2026-04-11T12:55:00Z
7
value 0.00406
scoring_system epss
scoring_elements 0.61102
published_at 2026-04-12T12:55:00Z
8
value 0.00406
scoring_system epss
scoring_elements 0.61083
published_at 2026-04-13T12:55:00Z
9
value 0.00406
scoring_system epss
scoring_elements 0.61125
published_at 2026-04-16T12:55:00Z
10
value 0.00406
scoring_system epss
scoring_elements 0.61131
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-2573
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0433
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0433
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0441
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0441
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0499
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0499
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0501
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0501
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0505
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0505
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2568
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2568
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2571
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2571
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2573
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2573
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2582
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2582
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2643
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2643
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2648
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2648
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3152
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3152
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4752
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4752
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4757
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4757
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1212783
reference_id 1212783
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1212783
17
reference_url https://security.gentoo.org/glsa/201507-19
reference_id GLSA-201507-19
reference_type
scores
url https://security.gentoo.org/glsa/201507-19
18
reference_url https://access.redhat.com/errata/RHSA-2015:1628
reference_id RHSA-2015:1628
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1628
19
reference_url https://access.redhat.com/errata/RHSA-2015:1629
reference_id RHSA-2015:1629
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1629
20
reference_url https://access.redhat.com/errata/RHSA-2015:1647
reference_id RHSA-2015:1647
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1647
21
reference_url https://access.redhat.com/errata/RHSA-2015:1665
reference_id RHSA-2015:1665
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1665
22
reference_url https://usn.ubuntu.com/2575-1/
reference_id USN-2575-1
reference_type
scores
url https://usn.ubuntu.com/2575-1/
fixed_packages
0
url pkg:deb/debian/mysql-5.5@5.5.47-0%2Bdeb6u1
purl pkg:deb/debian/mysql-5.5@5.5.47-0%2Bdeb6u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1gmc-pj6y-rkfx
1
vulnerability VCID-1nvb-xd5n-gkh8
2
vulnerability VCID-2gyq-q761-h3br
3
vulnerability VCID-2jer-ss8p-7kbg
4
vulnerability VCID-2uxe-ep8b-y7b9
5
vulnerability VCID-2vp1-j324-dkat
6
vulnerability VCID-2yqz-qtv5-47hh
7
vulnerability VCID-2za2-cnwx-hbbw
8
vulnerability VCID-39gt-6dgh-wyar
9
vulnerability VCID-3qjy-4cen-7qev
10
vulnerability VCID-45hn-ezks-j7br
11
vulnerability VCID-4cnj-7fur-3qe3
12
vulnerability VCID-4yz4-vxnh-b3dp
13
vulnerability VCID-52w9-bgxr-nkba
14
vulnerability VCID-55fg-6c2c-6bg8
15
vulnerability VCID-5p65-gfsg-1ugq
16
vulnerability VCID-5q89-vg9j-k3as
17
vulnerability VCID-5sjj-599v-vybg
18
vulnerability VCID-64st-u4xn-z7g3
19
vulnerability VCID-6g4n-3xfu-hfee
20
vulnerability VCID-6gvj-hy6a-3qdx
21
vulnerability VCID-7tj3-dfxj-bke7
22
vulnerability VCID-7w3v-5s98-a7ec
23
vulnerability VCID-7yc3-7bkr-jfc9
24
vulnerability VCID-8krv-jqjg-uqc8
25
vulnerability VCID-8kvb-5u8c-zbc4
26
vulnerability VCID-8sya-wktg-dqa5
27
vulnerability VCID-9f48-53dz-13an
28
vulnerability VCID-9ff2-43rk-2ydj
29
vulnerability VCID-9w98-nfg2-muh2
30
vulnerability VCID-a3hx-qz7x-7ybk
31
vulnerability VCID-bfnh-7k45-nkg2
32
vulnerability VCID-bhxk-8byp-eyap
33
vulnerability VCID-ca85-vx8c-huht
34
vulnerability VCID-cnb3-dy3a-8bdp
35
vulnerability VCID-cyqa-e362-yyaf
36
vulnerability VCID-dfbz-5n6w-syd9
37
vulnerability VCID-dgtc-a2t2-k7f5
38
vulnerability VCID-dqg6-2gmj-judy
39
vulnerability VCID-ej67-ayfh-sqdt
40
vulnerability VCID-esfk-umc5-ska4
41
vulnerability VCID-f8p4-hpsh-2fcw
42
vulnerability VCID-f9vz-r6zv-t7ev
43
vulnerability VCID-fabc-rma2-myab
44
vulnerability VCID-fnks-p4e9-13es
45
vulnerability VCID-fuyw-1y1c-fkfp
46
vulnerability VCID-j2wu-2rx7-3yf2
47
vulnerability VCID-jgff-4jyp-9fgr
48
vulnerability VCID-kwrj-3fxz-g7c6
49
vulnerability VCID-mde2-1ynu-auh2
50
vulnerability VCID-mz71-vku8-ckbm
51
vulnerability VCID-nj41-1zpw-gkh9
52
vulnerability VCID-nkdd-suwp-4ffr
53
vulnerability VCID-p623-gxyv-g7fs
54
vulnerability VCID-pk7e-t26d-aqdm
55
vulnerability VCID-pv92-6p9x-v7bs
56
vulnerability VCID-qyb6-7ees-ukcm
57
vulnerability VCID-r2cz-9kjz-zbgu
58
vulnerability VCID-rfz7-vha1-e7gy
59
vulnerability VCID-rssq-mfc2-ckaf
60
vulnerability VCID-skzt-r7sx-1ucv
61
vulnerability VCID-sy6p-5km4-1kcy
62
vulnerability VCID-tazb-gd49-73b4
63
vulnerability VCID-u2c7-p86x-5bgf
64
vulnerability VCID-un5y-y9sq-1ufb
65
vulnerability VCID-v165-afmm-w3er
66
vulnerability VCID-v4gv-g9n5-ukgc
67
vulnerability VCID-wrna-cc9g-sqbe
68
vulnerability VCID-xuhv-wrut-wuez
69
vulnerability VCID-xvv1-nxs6-n7ab
70
vulnerability VCID-xyuf-au4f-57fr
71
vulnerability VCID-y6p4-vfkn-q7fc
72
vulnerability VCID-yx79-3g2x-pqex
73
vulnerability VCID-zb4s-9rj3-ebea
74
vulnerability VCID-zkvk-538h-w3b9
75
vulnerability VCID-zuxd-n3wn-s7hg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-5.5@5.5.47-0%252Bdeb6u1
aliases CVE-2015-2573
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2t35-z6yq-uyg9
7
url VCID-2uxe-ep8b-y7b9
vulnerability_id VCID-2uxe-ep8b-y7b9
summary
Multiple vulnerabilities have been found in MariaDB and MySQL, the
    worst of which could result in privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2781.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2781.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-2781
reference_id
reference_type
scores
0
value 0.00144
scoring_system epss
scoring_elements 0.34781
published_at 2026-04-09T12:55:00Z
1
value 0.00144
scoring_system epss
scoring_elements 0.34752
published_at 2026-04-08T12:55:00Z
2
value 0.00144
scoring_system epss
scoring_elements 0.34746
published_at 2026-04-12T12:55:00Z
3
value 0.00144
scoring_system epss
scoring_elements 0.34708
published_at 2026-04-07T12:55:00Z
4
value 0.00144
scoring_system epss
scoring_elements 0.34833
published_at 2026-04-04T12:55:00Z
5
value 0.00144
scoring_system epss
scoring_elements 0.34785
published_at 2026-04-11T12:55:00Z
6
value 0.00144
scoring_system epss
scoring_elements 0.34593
published_at 2026-04-01T12:55:00Z
7
value 0.00144
scoring_system epss
scoring_elements 0.34806
published_at 2026-04-02T12:55:00Z
8
value 0.0015
scoring_system epss
scoring_elements 0.3554
published_at 2026-04-18T12:55:00Z
9
value 0.0015
scoring_system epss
scoring_elements 0.35511
published_at 2026-04-13T12:55:00Z
10
value 0.0015
scoring_system epss
scoring_elements 0.3555
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-2781
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10268
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10268
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10378
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10378
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15365
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15365
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2562
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2562
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2612
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2612
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2622
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2622
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2640
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2640
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2665
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2665
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2668
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2668
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2755
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2755
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2761
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2761
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2766
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2766
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2767
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2767
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2771
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2771
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2773
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2773
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2781
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2781
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2782
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2782
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2784
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2784
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2787
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2787
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2813
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2813
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2817
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2817
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2818
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2818
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2819
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2819
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3058
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3058
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3063
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3063
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3064
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3064
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3066
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3066
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3081
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3081
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3143
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3143
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3156
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3156
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3174
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3174
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3251
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3251
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3282
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3282
35
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2503
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2503
36
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
37
reference_url https://lists.debian.org/debian-lts-announce/2018/04/msg00020.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:26:11Z/
url https://lists.debian.org/debian-lts-announce/2018/04/msg00020.html
38
reference_url https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:26:11Z/
url https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html
39
reference_url https://security.netapp.com/advisory/ntap-20180419-0002/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:26:11Z/
url https://security.netapp.com/advisory/ntap-20180419-0002/
40
reference_url https://www.debian.org/security/2018/dsa-4176
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:26:11Z/
url https://www.debian.org/security/2018/dsa-4176
41
reference_url https://www.debian.org/security/2018/dsa-4341
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:26:11Z/
url https://www.debian.org/security/2018/dsa-4341
42
reference_url http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:26:11Z/
url http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
43
reference_url http://www.securityfocus.com/bid/103825
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:26:11Z/
url http://www.securityfocus.com/bid/103825
44
reference_url http://www.securitytracker.com/id/1040698
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:26:11Z/
url http://www.securitytracker.com/id/1040698
45
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1568942
reference_id 1568942
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1568942
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
reference_id cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
reference_id cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openstack:12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:openstack:12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openstack:12:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
71
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
72
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-2781
reference_id CVE-2018-2781
reference_type
scores
0
value 4.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:P
1
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2018-2781
73
reference_url https://security.gentoo.org/glsa/201908-24
reference_id GLSA-201908-24
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:26:11Z/
url https://security.gentoo.org/glsa/201908-24
74
reference_url https://access.redhat.com/errata/RHSA-2018:1254
reference_id RHSA-2018:1254
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:26:11Z/
url https://access.redhat.com/errata/RHSA-2018:1254
75
reference_url https://access.redhat.com/errata/RHSA-2018:2439
reference_id RHSA-2018:2439
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:26:11Z/
url https://access.redhat.com/errata/RHSA-2018:2439
76
reference_url https://access.redhat.com/errata/RHSA-2018:2729
reference_id RHSA-2018:2729
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:26:11Z/
url https://access.redhat.com/errata/RHSA-2018:2729
77
reference_url https://access.redhat.com/errata/RHSA-2018:3655
reference_id RHSA-2018:3655
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:26:11Z/
url https://access.redhat.com/errata/RHSA-2018:3655
78
reference_url https://access.redhat.com/errata/RHSA-2019:1258
reference_id RHSA-2019:1258
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:26:11Z/
url https://access.redhat.com/errata/RHSA-2019:1258
79
reference_url https://usn.ubuntu.com/3629-1/
reference_id USN-3629-1
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:26:11Z/
url https://usn.ubuntu.com/3629-1/
80
reference_url https://usn.ubuntu.com/3629-2/
reference_id USN-3629-2
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:26:11Z/
url https://usn.ubuntu.com/3629-2/
81
reference_url https://usn.ubuntu.com/3629-3/
reference_id USN-3629-3
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:26:11Z/
url https://usn.ubuntu.com/3629-3/
fixed_packages
0
url pkg:deb/debian/mysql-5.5@5.5.60-0%2Bdeb8u1
purl pkg:deb/debian/mysql-5.5@5.5.60-0%2Bdeb8u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-5.5@5.5.60-0%252Bdeb8u1
aliases CVE-2018-2781
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2uxe-ep8b-y7b9
8
url VCID-2vp1-j324-dkat
vulnerability_id VCID-2vp1-j324-dkat
summary security update
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:58:48Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:58:48Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:58:48Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:58:48Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:58:48Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:58:48Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html
6
reference_url http://rhn.redhat.com/errata/RHSA-2016-0705.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:58:48Z/
url http://rhn.redhat.com/errata/RHSA-2016-0705.html
7
reference_url http://rhn.redhat.com/errata/RHSA-2016-1480.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:58:48Z/
url http://rhn.redhat.com/errata/RHSA-2016-1480.html
8
reference_url http://rhn.redhat.com/errata/RHSA-2016-1481.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:58:48Z/
url http://rhn.redhat.com/errata/RHSA-2016-1481.html
9
reference_url http://rhn.redhat.com/errata/RHSA-2016-1602.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:58:48Z/
url http://rhn.redhat.com/errata/RHSA-2016-1602.html
10
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0666.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0666.json
11
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-0666
reference_id
reference_type
scores
0
value 0.00243
scoring_system epss
scoring_elements 0.47464
published_at 2026-04-07T12:55:00Z
1
value 0.00243
scoring_system epss
scoring_elements 0.47494
published_at 2026-04-02T12:55:00Z
2
value 0.00243
scoring_system epss
scoring_elements 0.47515
published_at 2026-04-09T12:55:00Z
3
value 0.00243
scoring_system epss
scoring_elements 0.47518
published_at 2026-04-08T12:55:00Z
4
value 0.00243
scoring_system epss
scoring_elements 0.47537
published_at 2026-04-11T12:55:00Z
5
value 0.00243
scoring_system epss
scoring_elements 0.47513
published_at 2026-04-12T12:55:00Z
6
value 0.00243
scoring_system epss
scoring_elements 0.47521
published_at 2026-04-13T12:55:00Z
7
value 0.00243
scoring_system epss
scoring_elements 0.4758
published_at 2026-04-16T12:55:00Z
8
value 0.00243
scoring_system epss
scoring_elements 0.47573
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-0666
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0640
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0640
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0641
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0641
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0642
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0642
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0643
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0643
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0644
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0644
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0646
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0646
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0647
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0647
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0648
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0648
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0649
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0649
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0650
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0650
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0655
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0655
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0666
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0666
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0668
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0668
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2047
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2047
26
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.6
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:S/C:N/I:N/A:C
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
27
reference_url https://mariadb.com/kb/en/mariadb/mariadb-10025-release-notes/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:58:48Z/
url https://mariadb.com/kb/en/mariadb/mariadb-10025-release-notes/
28
reference_url https://mariadb.com/kb/en/mariadb/mariadb-10114-release-notes/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:58:48Z/
url https://mariadb.com/kb/en/mariadb/mariadb-10114-release-notes/
29
reference_url https://mariadb.com/kb/en/mariadb/mariadb-5549-release-notes/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:58:48Z/
url https://mariadb.com/kb/en/mariadb/mariadb-5549-release-notes/
30
reference_url http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:58:48Z/
url http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168
31
reference_url http://www.debian.org/security/2016/dsa-3557
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:58:48Z/
url http://www.debian.org/security/2016/dsa-3557
32
reference_url http://www.debian.org/security/2016/dsa-3595
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:58:48Z/
url http://www.debian.org/security/2016/dsa-3595
33
reference_url http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:58:48Z/
url http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
34
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:58:48Z/
url http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
35
reference_url http://www.securityfocus.com/bid/86509
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:58:48Z/
url http://www.securityfocus.com/bid/86509
36
reference_url http://www.securitytracker.com/id/1035606
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:58:48Z/
url http://www.securitytracker.com/id/1035606
37
reference_url http://www.ubuntu.com/usn/USN-2953-1
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:58:48Z/
url http://www.ubuntu.com/usn/USN-2953-1
38
reference_url http://www.ubuntu.com/usn/USN-2954-1
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:58:48Z/
url http://www.ubuntu.com/usn/USN-2954-1
39
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1329270
reference_id 1329270
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1329270
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:powerkvm:2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ibm:powerkvm:2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:powerkvm:2.1:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:powerkvm:3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ibm:powerkvm:3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:powerkvm:3.1:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-0666
reference_id CVE-2016-0666
reference_type
scores
0
value 3.5
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:S/C:N/I:N/A:P
1
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2016-0666
50
reference_url https://access.redhat.com/errata/RHSA-2016:0705
reference_id RHSA-2016:0705
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0705
51
reference_url https://access.redhat.com/errata/RHSA-2016:1132
reference_id RHSA-2016:1132
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:58:48Z/
url https://access.redhat.com/errata/RHSA-2016:1132
52
reference_url https://access.redhat.com/errata/RHSA-2016:1480
reference_id RHSA-2016:1480
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1480
53
reference_url https://access.redhat.com/errata/RHSA-2016:1481
reference_id RHSA-2016:1481
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1481
54
reference_url https://access.redhat.com/errata/RHSA-2016:1602
reference_id RHSA-2016:1602
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1602
55
reference_url https://usn.ubuntu.com/2953-1/
reference_id USN-2953-1
reference_type
scores
url https://usn.ubuntu.com/2953-1/
56
reference_url https://usn.ubuntu.com/2954-1/
reference_id USN-2954-1
reference_type
scores
url https://usn.ubuntu.com/2954-1/
fixed_packages
0
url pkg:deb/debian/mysql-5.5@5.5.60-0%2Bdeb8u1
purl pkg:deb/debian/mysql-5.5@5.5.60-0%2Bdeb8u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-5.5@5.5.60-0%252Bdeb8u1
aliases CVE-2016-0666
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2vp1-j324-dkat
9
url VCID-2yqz-qtv5-47hh
vulnerability_id VCID-2yqz-qtv5-47hh
summary mysql: Server: Security: Privileges unspecified vulnerability (CPU Apr 2018)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2818.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2818.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-2818
reference_id
reference_type
scores
0
value 0.00984
scoring_system epss
scoring_elements 0.76856
published_at 2026-04-18T12:55:00Z
1
value 0.00984
scoring_system epss
scoring_elements 0.76751
published_at 2026-04-01T12:55:00Z
2
value 0.00984
scoring_system epss
scoring_elements 0.76755
published_at 2026-04-02T12:55:00Z
3
value 0.00984
scoring_system epss
scoring_elements 0.76784
published_at 2026-04-04T12:55:00Z
4
value 0.00984
scoring_system epss
scoring_elements 0.76764
published_at 2026-04-07T12:55:00Z
5
value 0.00984
scoring_system epss
scoring_elements 0.76796
published_at 2026-04-08T12:55:00Z
6
value 0.00984
scoring_system epss
scoring_elements 0.76806
published_at 2026-04-09T12:55:00Z
7
value 0.00984
scoring_system epss
scoring_elements 0.76835
published_at 2026-04-11T12:55:00Z
8
value 0.00984
scoring_system epss
scoring_elements 0.76815
published_at 2026-04-12T12:55:00Z
9
value 0.00984
scoring_system epss
scoring_elements 0.76808
published_at 2026-04-13T12:55:00Z
10
value 0.00984
scoring_system epss
scoring_elements 0.76851
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-2818
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2755
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2755
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2761
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2761
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2771
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2771
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2773
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2773
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2781
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2781
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2813
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2813
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2817
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2817
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2818
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2818
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2819
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2819
11
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
12
reference_url https://lists.debian.org/debian-lts-announce/2018/04/msg00020.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:32Z/
url https://lists.debian.org/debian-lts-announce/2018/04/msg00020.html
13
reference_url https://security.netapp.com/advisory/ntap-20180419-0002/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:32Z/
url https://security.netapp.com/advisory/ntap-20180419-0002/
14
reference_url https://www.debian.org/security/2018/dsa-4176
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:32Z/
url https://www.debian.org/security/2018/dsa-4176
15
reference_url http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:32Z/
url http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
16
reference_url http://www.securityfocus.com/bid/103824
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:32Z/
url http://www.securityfocus.com/bid/103824
17
reference_url http://www.securitytracker.com/id/1040698
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:32Z/
url http://www.securitytracker.com/id/1040698
18
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1568955
reference_id 1568955
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1568955
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vsphere:*:*
reference_id cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vsphere:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vsphere:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:windows:*:*
reference_id cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:windows:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:windows:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_automation_store:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:storage_automation_store:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_automation_store:-:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-2818
reference_id CVE-2018-2818
reference_type
scores
0
value 4.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:P
1
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2018-2818
34
reference_url https://access.redhat.com/errata/RHSA-2018:1254
reference_id RHSA-2018:1254
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:32Z/
url https://access.redhat.com/errata/RHSA-2018:1254
35
reference_url https://access.redhat.com/errata/RHSA-2018:3655
reference_id RHSA-2018:3655
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:32Z/
url https://access.redhat.com/errata/RHSA-2018:3655
36
reference_url https://usn.ubuntu.com/3629-1/
reference_id USN-3629-1
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:32Z/
url https://usn.ubuntu.com/3629-1/
37
reference_url https://usn.ubuntu.com/3629-2/
reference_id USN-3629-2
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:32Z/
url https://usn.ubuntu.com/3629-2/
38
reference_url https://usn.ubuntu.com/3629-3/
reference_id USN-3629-3
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:32Z/
url https://usn.ubuntu.com/3629-3/
fixed_packages
0
url pkg:deb/debian/mysql-5.5@5.5.60-0%2Bdeb8u1
purl pkg:deb/debian/mysql-5.5@5.5.60-0%2Bdeb8u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-5.5@5.5.60-0%252Bdeb8u1
aliases CVE-2018-2818
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2yqz-qtv5-47hh
10
url VCID-2za2-cnwx-hbbw
vulnerability_id VCID-2za2-cnwx-hbbw
summary
Multiple vulnerabilities were found in MySQL, the worst of which
    may allow remote execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3463.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3463.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-3463
reference_id
reference_type
scores
0
value 0.00543
scoring_system epss
scoring_elements 0.67751
published_at 2026-04-16T12:55:00Z
1
value 0.00543
scoring_system epss
scoring_elements 0.67638
published_at 2026-04-01T12:55:00Z
2
value 0.00543
scoring_system epss
scoring_elements 0.67673
published_at 2026-04-07T12:55:00Z
3
value 0.00543
scoring_system epss
scoring_elements 0.67693
published_at 2026-04-04T12:55:00Z
4
value 0.00543
scoring_system epss
scoring_elements 0.67725
published_at 2026-04-08T12:55:00Z
5
value 0.00543
scoring_system epss
scoring_elements 0.67739
published_at 2026-04-09T12:55:00Z
6
value 0.00543
scoring_system epss
scoring_elements 0.67763
published_at 2026-04-18T12:55:00Z
7
value 0.00543
scoring_system epss
scoring_elements 0.67748
published_at 2026-04-12T12:55:00Z
8
value 0.00543
scoring_system epss
scoring_elements 0.67715
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-3463
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3302
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3302
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3305
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3305
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3308
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3308
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3309
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3309
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3329
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3329
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3453
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3453
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3456
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3456
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3461
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3461
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3462
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3462
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3463
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3463
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3464
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3464
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3600
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3600
14
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 2.1
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:S/C:N/I:N/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
15
reference_url http://www.debian.org/security/2017/dsa-3834
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:56Z/
url http://www.debian.org/security/2017/dsa-3834
16
reference_url http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:56Z/
url http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
17
reference_url http://www.securityfocus.com/bid/97849
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:56Z/
url http://www.securityfocus.com/bid/97849
18
reference_url http://www.securitytracker.com/id/1038287
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:56Z/
url http://www.securitytracker.com/id/1038287
19
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1443378
reference_id 1443378
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1443378
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-3463
reference_id CVE-2017-3463
reference_type
scores
0
value 4.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:P
1
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-3463
23
reference_url https://security.gentoo.org/glsa/201802-04
reference_id GLSA-201802-04
reference_type
scores
url https://security.gentoo.org/glsa/201802-04
24
reference_url https://access.redhat.com/errata/RHSA-2017:2787
reference_id RHSA-2017:2787
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:56Z/
url https://access.redhat.com/errata/RHSA-2017:2787
25
reference_url https://access.redhat.com/errata/RHSA-2017:2886
reference_id RHSA-2017:2886
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:56Z/
url https://access.redhat.com/errata/RHSA-2017:2886
26
reference_url https://usn.ubuntu.com/3269-1/
reference_id USN-3269-1
reference_type
scores
url https://usn.ubuntu.com/3269-1/
27
reference_url https://usn.ubuntu.com/3357-2/
reference_id USN-3357-2
reference_type
scores
url https://usn.ubuntu.com/3357-2/
fixed_packages
0
url pkg:deb/debian/mysql-5.5@5.5.60-0%2Bdeb8u1
purl pkg:deb/debian/mysql-5.5@5.5.60-0%2Bdeb8u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-5.5@5.5.60-0%252Bdeb8u1
aliases CVE-2017-3463
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2za2-cnwx-hbbw
11
url VCID-31ay-j78r-5ybm
vulnerability_id VCID-31ay-j78r-5ybm
summary
Multiple vulnerabilities have been found in MySQL, allowing
    attackers to execute arbitrary code or cause Denial of Service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2568.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2568.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-2568
reference_id
reference_type
scores
0
value 0.03957
scoring_system epss
scoring_elements 0.88306
published_at 2026-04-01T12:55:00Z
1
value 0.03957
scoring_system epss
scoring_elements 0.88314
published_at 2026-04-02T12:55:00Z
2
value 0.03957
scoring_system epss
scoring_elements 0.88328
published_at 2026-04-04T12:55:00Z
3
value 0.03957
scoring_system epss
scoring_elements 0.88333
published_at 2026-04-07T12:55:00Z
4
value 0.03957
scoring_system epss
scoring_elements 0.88352
published_at 2026-04-08T12:55:00Z
5
value 0.03957
scoring_system epss
scoring_elements 0.88359
published_at 2026-04-09T12:55:00Z
6
value 0.03957
scoring_system epss
scoring_elements 0.88369
published_at 2026-04-11T12:55:00Z
7
value 0.03957
scoring_system epss
scoring_elements 0.88361
published_at 2026-04-13T12:55:00Z
8
value 0.03957
scoring_system epss
scoring_elements 0.88376
published_at 2026-04-16T12:55:00Z
9
value 0.03957
scoring_system epss
scoring_elements 0.88373
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-2568
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0433
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0433
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0441
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0441
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0499
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0499
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0501
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0501
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0505
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0505
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2568
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2568
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2571
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2571
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2573
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2573
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2582
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2582
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2643
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2643
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2648
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2648
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3152
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3152
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4752
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4752
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4757
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4757
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1212763
reference_id 1212763
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1212763
17
reference_url https://security.gentoo.org/glsa/201507-19
reference_id GLSA-201507-19
reference_type
scores
url https://security.gentoo.org/glsa/201507-19
18
reference_url https://access.redhat.com/errata/RHSA-2015:1628
reference_id RHSA-2015:1628
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1628
19
reference_url https://access.redhat.com/errata/RHSA-2015:1629
reference_id RHSA-2015:1629
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1629
20
reference_url https://access.redhat.com/errata/RHSA-2015:1647
reference_id RHSA-2015:1647
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1647
21
reference_url https://access.redhat.com/errata/RHSA-2015:1665
reference_id RHSA-2015:1665
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1665
22
reference_url https://usn.ubuntu.com/2575-1/
reference_id USN-2575-1
reference_type
scores
url https://usn.ubuntu.com/2575-1/
fixed_packages
0
url pkg:deb/debian/mysql-5.5@5.5.47-0%2Bdeb6u1
purl pkg:deb/debian/mysql-5.5@5.5.47-0%2Bdeb6u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1gmc-pj6y-rkfx
1
vulnerability VCID-1nvb-xd5n-gkh8
2
vulnerability VCID-2gyq-q761-h3br
3
vulnerability VCID-2jer-ss8p-7kbg
4
vulnerability VCID-2uxe-ep8b-y7b9
5
vulnerability VCID-2vp1-j324-dkat
6
vulnerability VCID-2yqz-qtv5-47hh
7
vulnerability VCID-2za2-cnwx-hbbw
8
vulnerability VCID-39gt-6dgh-wyar
9
vulnerability VCID-3qjy-4cen-7qev
10
vulnerability VCID-45hn-ezks-j7br
11
vulnerability VCID-4cnj-7fur-3qe3
12
vulnerability VCID-4yz4-vxnh-b3dp
13
vulnerability VCID-52w9-bgxr-nkba
14
vulnerability VCID-55fg-6c2c-6bg8
15
vulnerability VCID-5p65-gfsg-1ugq
16
vulnerability VCID-5q89-vg9j-k3as
17
vulnerability VCID-5sjj-599v-vybg
18
vulnerability VCID-64st-u4xn-z7g3
19
vulnerability VCID-6g4n-3xfu-hfee
20
vulnerability VCID-6gvj-hy6a-3qdx
21
vulnerability VCID-7tj3-dfxj-bke7
22
vulnerability VCID-7w3v-5s98-a7ec
23
vulnerability VCID-7yc3-7bkr-jfc9
24
vulnerability VCID-8krv-jqjg-uqc8
25
vulnerability VCID-8kvb-5u8c-zbc4
26
vulnerability VCID-8sya-wktg-dqa5
27
vulnerability VCID-9f48-53dz-13an
28
vulnerability VCID-9ff2-43rk-2ydj
29
vulnerability VCID-9w98-nfg2-muh2
30
vulnerability VCID-a3hx-qz7x-7ybk
31
vulnerability VCID-bfnh-7k45-nkg2
32
vulnerability VCID-bhxk-8byp-eyap
33
vulnerability VCID-ca85-vx8c-huht
34
vulnerability VCID-cnb3-dy3a-8bdp
35
vulnerability VCID-cyqa-e362-yyaf
36
vulnerability VCID-dfbz-5n6w-syd9
37
vulnerability VCID-dgtc-a2t2-k7f5
38
vulnerability VCID-dqg6-2gmj-judy
39
vulnerability VCID-ej67-ayfh-sqdt
40
vulnerability VCID-esfk-umc5-ska4
41
vulnerability VCID-f8p4-hpsh-2fcw
42
vulnerability VCID-f9vz-r6zv-t7ev
43
vulnerability VCID-fabc-rma2-myab
44
vulnerability VCID-fnks-p4e9-13es
45
vulnerability VCID-fuyw-1y1c-fkfp
46
vulnerability VCID-j2wu-2rx7-3yf2
47
vulnerability VCID-jgff-4jyp-9fgr
48
vulnerability VCID-kwrj-3fxz-g7c6
49
vulnerability VCID-mde2-1ynu-auh2
50
vulnerability VCID-mz71-vku8-ckbm
51
vulnerability VCID-nj41-1zpw-gkh9
52
vulnerability VCID-nkdd-suwp-4ffr
53
vulnerability VCID-p623-gxyv-g7fs
54
vulnerability VCID-pk7e-t26d-aqdm
55
vulnerability VCID-pv92-6p9x-v7bs
56
vulnerability VCID-qyb6-7ees-ukcm
57
vulnerability VCID-r2cz-9kjz-zbgu
58
vulnerability VCID-rfz7-vha1-e7gy
59
vulnerability VCID-rssq-mfc2-ckaf
60
vulnerability VCID-skzt-r7sx-1ucv
61
vulnerability VCID-sy6p-5km4-1kcy
62
vulnerability VCID-tazb-gd49-73b4
63
vulnerability VCID-u2c7-p86x-5bgf
64
vulnerability VCID-un5y-y9sq-1ufb
65
vulnerability VCID-v165-afmm-w3er
66
vulnerability VCID-v4gv-g9n5-ukgc
67
vulnerability VCID-wrna-cc9g-sqbe
68
vulnerability VCID-xuhv-wrut-wuez
69
vulnerability VCID-xvv1-nxs6-n7ab
70
vulnerability VCID-xyuf-au4f-57fr
71
vulnerability VCID-y6p4-vfkn-q7fc
72
vulnerability VCID-yx79-3g2x-pqex
73
vulnerability VCID-zb4s-9rj3-ebea
74
vulnerability VCID-zkvk-538h-w3b9
75
vulnerability VCID-zuxd-n3wn-s7hg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-5.5@5.5.47-0%252Bdeb6u1
aliases CVE-2015-2568
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-31ay-j78r-5ybm
12
url VCID-34h2-5ygu-6fdc
vulnerability_id VCID-34h2-5ygu-6fdc
summary
Multiple vulnerabilities have been found in MySQL and MariaDB, the
    worst of which could allow remote attackers to cause a Denial of Service
    condition or obtain sensitive information.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4752.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4752.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-4752
reference_id
reference_type
scores
0
value 0.00598
scoring_system epss
scoring_elements 0.69334
published_at 2026-04-01T12:55:00Z
1
value 0.00598
scoring_system epss
scoring_elements 0.69347
published_at 2026-04-02T12:55:00Z
2
value 0.00598
scoring_system epss
scoring_elements 0.69363
published_at 2026-04-04T12:55:00Z
3
value 0.00598
scoring_system epss
scoring_elements 0.69343
published_at 2026-04-07T12:55:00Z
4
value 0.00598
scoring_system epss
scoring_elements 0.69393
published_at 2026-04-08T12:55:00Z
5
value 0.00598
scoring_system epss
scoring_elements 0.69409
published_at 2026-04-09T12:55:00Z
6
value 0.00598
scoring_system epss
scoring_elements 0.69432
published_at 2026-04-11T12:55:00Z
7
value 0.00598
scoring_system epss
scoring_elements 0.69417
published_at 2026-04-12T12:55:00Z
8
value 0.00598
scoring_system epss
scoring_elements 0.69402
published_at 2026-04-13T12:55:00Z
9
value 0.00598
scoring_system epss
scoring_elements 0.69442
published_at 2026-04-16T12:55:00Z
10
value 0.00598
scoring_system epss
scoring_elements 0.69452
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-4752
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0433
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0433
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0441
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0441
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0499
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0499
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0501
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0501
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0505
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0505
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2568
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2568
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2571
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2571
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2573
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2573
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2582
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2582
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2620
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2620
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2643
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2643
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2648
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2648
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3152
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3152
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4737
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4737
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4752
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4752
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4757
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4757
18
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1244779
reference_id 1244779
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1244779
19
reference_url https://security.gentoo.org/glsa/201610-06
reference_id GLSA-201610-06
reference_type
scores
url https://security.gentoo.org/glsa/201610-06
20
reference_url https://access.redhat.com/errata/RHSA-2015:1628
reference_id RHSA-2015:1628
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1628
21
reference_url https://access.redhat.com/errata/RHSA-2015:1629
reference_id RHSA-2015:1629
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1629
22
reference_url https://access.redhat.com/errata/RHSA-2015:1630
reference_id RHSA-2015:1630
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1630
23
reference_url https://access.redhat.com/errata/RHSA-2015:1646
reference_id RHSA-2015:1646
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1646
24
reference_url https://access.redhat.com/errata/RHSA-2015:1647
reference_id RHSA-2015:1647
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1647
25
reference_url https://access.redhat.com/errata/RHSA-2015:1665
reference_id RHSA-2015:1665
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1665
26
reference_url https://usn.ubuntu.com/2674-1/
reference_id USN-2674-1
reference_type
scores
url https://usn.ubuntu.com/2674-1/
fixed_packages
0
url pkg:deb/debian/mysql-5.5@5.5.47-0%2Bdeb6u1
purl pkg:deb/debian/mysql-5.5@5.5.47-0%2Bdeb6u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1gmc-pj6y-rkfx
1
vulnerability VCID-1nvb-xd5n-gkh8
2
vulnerability VCID-2gyq-q761-h3br
3
vulnerability VCID-2jer-ss8p-7kbg
4
vulnerability VCID-2uxe-ep8b-y7b9
5
vulnerability VCID-2vp1-j324-dkat
6
vulnerability VCID-2yqz-qtv5-47hh
7
vulnerability VCID-2za2-cnwx-hbbw
8
vulnerability VCID-39gt-6dgh-wyar
9
vulnerability VCID-3qjy-4cen-7qev
10
vulnerability VCID-45hn-ezks-j7br
11
vulnerability VCID-4cnj-7fur-3qe3
12
vulnerability VCID-4yz4-vxnh-b3dp
13
vulnerability VCID-52w9-bgxr-nkba
14
vulnerability VCID-55fg-6c2c-6bg8
15
vulnerability VCID-5p65-gfsg-1ugq
16
vulnerability VCID-5q89-vg9j-k3as
17
vulnerability VCID-5sjj-599v-vybg
18
vulnerability VCID-64st-u4xn-z7g3
19
vulnerability VCID-6g4n-3xfu-hfee
20
vulnerability VCID-6gvj-hy6a-3qdx
21
vulnerability VCID-7tj3-dfxj-bke7
22
vulnerability VCID-7w3v-5s98-a7ec
23
vulnerability VCID-7yc3-7bkr-jfc9
24
vulnerability VCID-8krv-jqjg-uqc8
25
vulnerability VCID-8kvb-5u8c-zbc4
26
vulnerability VCID-8sya-wktg-dqa5
27
vulnerability VCID-9f48-53dz-13an
28
vulnerability VCID-9ff2-43rk-2ydj
29
vulnerability VCID-9w98-nfg2-muh2
30
vulnerability VCID-a3hx-qz7x-7ybk
31
vulnerability VCID-bfnh-7k45-nkg2
32
vulnerability VCID-bhxk-8byp-eyap
33
vulnerability VCID-ca85-vx8c-huht
34
vulnerability VCID-cnb3-dy3a-8bdp
35
vulnerability VCID-cyqa-e362-yyaf
36
vulnerability VCID-dfbz-5n6w-syd9
37
vulnerability VCID-dgtc-a2t2-k7f5
38
vulnerability VCID-dqg6-2gmj-judy
39
vulnerability VCID-ej67-ayfh-sqdt
40
vulnerability VCID-esfk-umc5-ska4
41
vulnerability VCID-f8p4-hpsh-2fcw
42
vulnerability VCID-f9vz-r6zv-t7ev
43
vulnerability VCID-fabc-rma2-myab
44
vulnerability VCID-fnks-p4e9-13es
45
vulnerability VCID-fuyw-1y1c-fkfp
46
vulnerability VCID-j2wu-2rx7-3yf2
47
vulnerability VCID-jgff-4jyp-9fgr
48
vulnerability VCID-kwrj-3fxz-g7c6
49
vulnerability VCID-mde2-1ynu-auh2
50
vulnerability VCID-mz71-vku8-ckbm
51
vulnerability VCID-nj41-1zpw-gkh9
52
vulnerability VCID-nkdd-suwp-4ffr
53
vulnerability VCID-p623-gxyv-g7fs
54
vulnerability VCID-pk7e-t26d-aqdm
55
vulnerability VCID-pv92-6p9x-v7bs
56
vulnerability VCID-qyb6-7ees-ukcm
57
vulnerability VCID-r2cz-9kjz-zbgu
58
vulnerability VCID-rfz7-vha1-e7gy
59
vulnerability VCID-rssq-mfc2-ckaf
60
vulnerability VCID-skzt-r7sx-1ucv
61
vulnerability VCID-sy6p-5km4-1kcy
62
vulnerability VCID-tazb-gd49-73b4
63
vulnerability VCID-u2c7-p86x-5bgf
64
vulnerability VCID-un5y-y9sq-1ufb
65
vulnerability VCID-v165-afmm-w3er
66
vulnerability VCID-v4gv-g9n5-ukgc
67
vulnerability VCID-wrna-cc9g-sqbe
68
vulnerability VCID-xuhv-wrut-wuez
69
vulnerability VCID-xvv1-nxs6-n7ab
70
vulnerability VCID-xyuf-au4f-57fr
71
vulnerability VCID-y6p4-vfkn-q7fc
72
vulnerability VCID-yx79-3g2x-pqex
73
vulnerability VCID-zb4s-9rj3-ebea
74
vulnerability VCID-zkvk-538h-w3b9
75
vulnerability VCID-zuxd-n3wn-s7hg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-5.5@5.5.47-0%252Bdeb6u1
aliases CVE-2015-4752
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-34h2-5ygu-6fdc
13
url VCID-39gt-6dgh-wyar
vulnerability_id VCID-39gt-6dgh-wyar
summary
Multiple vulnerabilities were found in MySQL, the worst of which
    may allow remote execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2665.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2665.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-2665
reference_id
reference_type
scores
0
value 0.00338
scoring_system epss
scoring_elements 0.5666
published_at 2026-04-18T12:55:00Z
1
value 0.00338
scoring_system epss
scoring_elements 0.56629
published_at 2026-04-13T12:55:00Z
2
value 0.00338
scoring_system epss
scoring_elements 0.56661
published_at 2026-04-16T12:55:00Z
3
value 0.00441
scoring_system epss
scoring_elements 0.6321
published_at 2026-04-07T12:55:00Z
4
value 0.00441
scoring_system epss
scoring_elements 0.63296
published_at 2026-04-11T12:55:00Z
5
value 0.00441
scoring_system epss
scoring_elements 0.63279
published_at 2026-04-09T12:55:00Z
6
value 0.00441
scoring_system epss
scoring_elements 0.63244
published_at 2026-04-04T12:55:00Z
7
value 0.00441
scoring_system epss
scoring_elements 0.63261
published_at 2026-04-08T12:55:00Z
8
value 0.00441
scoring_system epss
scoring_elements 0.63156
published_at 2026-04-01T12:55:00Z
9
value 0.00441
scoring_system epss
scoring_elements 0.63215
published_at 2026-04-02T12:55:00Z
10
value 0.00441
scoring_system epss
scoring_elements 0.6328
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-2665
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10268
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10268
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10378
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10378
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15365
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15365
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2562
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2562
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2612
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2612
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2622
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2622
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2640
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2640
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2665
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2665
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2668
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2668
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2755
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2755
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2761
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2761
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2766
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2766
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2767
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2767
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2771
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2771
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2781
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2781
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2782
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2782
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2784
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2784
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2787
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2787
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2813
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2813
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2817
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2817
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2819
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2819
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3058
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3058
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3063
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3063
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3064
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3064
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3066
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3066
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3081
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3081
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3143
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3143
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3156
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3156
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3174
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3174
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3251
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3251
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3282
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3282
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2503
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2503
34
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
35
reference_url http://www.securityfocus.com/bid/102681
reference_id 102681
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:57Z/
url http://www.securityfocus.com/bid/102681
36
reference_url http://www.securitytracker.com/id/1040216
reference_id 1040216
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:57Z/
url http://www.securitytracker.com/id/1040216
37
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1535504
reference_id 1535504
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1535504
38
reference_url https://www.debian.org/security/2018/dsa-4091
reference_id dsa-4091
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:57Z/
url https://www.debian.org/security/2018/dsa-4091
39
reference_url https://security.gentoo.org/glsa/201802-04
reference_id GLSA-201802-04
reference_type
scores
url https://security.gentoo.org/glsa/201802-04
40
reference_url https://lists.debian.org/debian-lts-announce/2018/01/msg00024.html
reference_id msg00024.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:57Z/
url https://lists.debian.org/debian-lts-announce/2018/01/msg00024.html
41
reference_url https://access.redhat.com/errata/RHSA-2018:0586
reference_id RHSA-2018:0586
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:57Z/
url https://access.redhat.com/errata/RHSA-2018:0586
42
reference_url https://access.redhat.com/errata/RHSA-2018:0587
reference_id RHSA-2018:0587
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:57Z/
url https://access.redhat.com/errata/RHSA-2018:0587
43
reference_url https://access.redhat.com/errata/RHSA-2018:2439
reference_id RHSA-2018:2439
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:57Z/
url https://access.redhat.com/errata/RHSA-2018:2439
44
reference_url https://access.redhat.com/errata/RHSA-2018:2729
reference_id RHSA-2018:2729
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:57Z/
url https://access.redhat.com/errata/RHSA-2018:2729
45
reference_url https://access.redhat.com/errata/RHSA-2019:1258
reference_id RHSA-2019:1258
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:57Z/
url https://access.redhat.com/errata/RHSA-2019:1258
46
reference_url https://usn.ubuntu.com/3537-1/
reference_id USN-3537-1
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:57Z/
url https://usn.ubuntu.com/3537-1/
47
reference_url https://usn.ubuntu.com/3537-2/
reference_id USN-3537-2
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:57Z/
url https://usn.ubuntu.com/3537-2/
fixed_packages
0
url pkg:deb/debian/mysql-5.5@5.5.60-0%2Bdeb8u1
purl pkg:deb/debian/mysql-5.5@5.5.60-0%2Bdeb8u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-5.5@5.5.60-0%252Bdeb8u1
aliases CVE-2018-2665
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-39gt-6dgh-wyar
14
url VCID-3qjy-4cen-7qev
vulnerability_id VCID-3qjy-4cen-7qev
summary security update
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00015.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00015.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00016.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00016.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html
6
reference_url http://rhn.redhat.com/errata/RHSA-2016-0534.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0534.html
7
reference_url http://rhn.redhat.com/errata/RHSA-2016-0705.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0705.html
8
reference_url http://rhn.redhat.com/errata/RHSA-2016-1480.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-1480.html
9
reference_url http://rhn.redhat.com/errata/RHSA-2016-1481.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-1481.html
10
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0606.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0606.json
11
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-0606
reference_id
reference_type
scores
0
value 0.00166
scoring_system epss
scoring_elements 0.37781
published_at 2026-04-18T12:55:00Z
1
value 0.00166
scoring_system epss
scoring_elements 0.37801
published_at 2026-04-16T12:55:00Z
2
value 0.00166
scoring_system epss
scoring_elements 0.3765
published_at 2026-04-01T12:55:00Z
3
value 0.00166
scoring_system epss
scoring_elements 0.37832
published_at 2026-04-02T12:55:00Z
4
value 0.00166
scoring_system epss
scoring_elements 0.37857
published_at 2026-04-04T12:55:00Z
5
value 0.00166
scoring_system epss
scoring_elements 0.37736
published_at 2026-04-07T12:55:00Z
6
value 0.00166
scoring_system epss
scoring_elements 0.37786
published_at 2026-04-08T12:55:00Z
7
value 0.00166
scoring_system epss
scoring_elements 0.37799
published_at 2026-04-09T12:55:00Z
8
value 0.00166
scoring_system epss
scoring_elements 0.37813
published_at 2026-04-11T12:55:00Z
9
value 0.00166
scoring_system epss
scoring_elements 0.37778
published_at 2026-04-12T12:55:00Z
10
value 0.00166
scoring_system epss
scoring_elements 0.37753
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-0606
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0505
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0505
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0546
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0546
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0596
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0596
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0597
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0597
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0598
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0598
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0600
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0600
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0606
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0606
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0608
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0608
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0609
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0609
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0616
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0616
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2047
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2047
23
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.5
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:S/C:N/I:P/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
24
reference_url https://mariadb.com/kb/en/mariadb/mariadb-10110-release-notes/
reference_id
reference_type
scores
url https://mariadb.com/kb/en/mariadb/mariadb-10110-release-notes/
25
reference_url https://mariadb.com/kb/en/mariadb/mariadb-5547-release-notes/
reference_id
reference_type
scores
url https://mariadb.com/kb/en/mariadb/mariadb-5547-release-notes/
26
reference_url https://mariadb.com/kb/en/mdb-10023-rn/
reference_id
reference_type
scores
url https://mariadb.com/kb/en/mdb-10023-rn/
27
reference_url http://www.debian.org/security/2016/dsa-3453
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3453
28
reference_url http://www.debian.org/security/2016/dsa-3459
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3459
29
reference_url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
30
reference_url http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
31
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
32
reference_url http://www.securitytracker.com/id/1034708
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1034708
33
reference_url http://www.ubuntu.com/usn/USN-2881-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2881-1
34
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1301504
reference_id 1301504
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1301504
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node_eus:7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_hpc_node_eus:7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node_eus:7.2:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-0606
reference_id CVE-2016-0606
reference_type
scores
0
value 3.5
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:S/C:N/I:P/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2016-0606
56
reference_url https://access.redhat.com/errata/RHSA-2016:0534
reference_id RHSA-2016:0534
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0534
57
reference_url https://access.redhat.com/errata/RHSA-2016:0705
reference_id RHSA-2016:0705
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0705
58
reference_url https://access.redhat.com/errata/RHSA-2016:1132
reference_id RHSA-2016:1132
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1132
59
reference_url https://access.redhat.com/errata/RHSA-2016:1480
reference_id RHSA-2016:1480
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1480
60
reference_url https://access.redhat.com/errata/RHSA-2016:1481
reference_id RHSA-2016:1481
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1481
61
reference_url https://usn.ubuntu.com/2881-1/
reference_id USN-2881-1
reference_type
scores
url https://usn.ubuntu.com/2881-1/
fixed_packages
0
url pkg:deb/debian/mysql-5.5@5.5.47-0%2Bdeb7u1
purl pkg:deb/debian/mysql-5.5@5.5.47-0%2Bdeb7u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1gmc-pj6y-rkfx
1
vulnerability VCID-1nvb-xd5n-gkh8
2
vulnerability VCID-2gyq-q761-h3br
3
vulnerability VCID-2jer-ss8p-7kbg
4
vulnerability VCID-2uxe-ep8b-y7b9
5
vulnerability VCID-2vp1-j324-dkat
6
vulnerability VCID-2yqz-qtv5-47hh
7
vulnerability VCID-2za2-cnwx-hbbw
8
vulnerability VCID-39gt-6dgh-wyar
9
vulnerability VCID-3qjy-4cen-7qev
10
vulnerability VCID-45hn-ezks-j7br
11
vulnerability VCID-4cnj-7fur-3qe3
12
vulnerability VCID-4yz4-vxnh-b3dp
13
vulnerability VCID-52w9-bgxr-nkba
14
vulnerability VCID-55fg-6c2c-6bg8
15
vulnerability VCID-5p65-gfsg-1ugq
16
vulnerability VCID-5q89-vg9j-k3as
17
vulnerability VCID-5sjj-599v-vybg
18
vulnerability VCID-64st-u4xn-z7g3
19
vulnerability VCID-6g4n-3xfu-hfee
20
vulnerability VCID-6gvj-hy6a-3qdx
21
vulnerability VCID-7tj3-dfxj-bke7
22
vulnerability VCID-7w3v-5s98-a7ec
23
vulnerability VCID-7yc3-7bkr-jfc9
24
vulnerability VCID-8krv-jqjg-uqc8
25
vulnerability VCID-8kvb-5u8c-zbc4
26
vulnerability VCID-8sya-wktg-dqa5
27
vulnerability VCID-9f48-53dz-13an
28
vulnerability VCID-9ff2-43rk-2ydj
29
vulnerability VCID-9w98-nfg2-muh2
30
vulnerability VCID-a3hx-qz7x-7ybk
31
vulnerability VCID-bfnh-7k45-nkg2
32
vulnerability VCID-bhxk-8byp-eyap
33
vulnerability VCID-ca85-vx8c-huht
34
vulnerability VCID-cnb3-dy3a-8bdp
35
vulnerability VCID-cyqa-e362-yyaf
36
vulnerability VCID-dfbz-5n6w-syd9
37
vulnerability VCID-dgtc-a2t2-k7f5
38
vulnerability VCID-dqg6-2gmj-judy
39
vulnerability VCID-ej67-ayfh-sqdt
40
vulnerability VCID-esfk-umc5-ska4
41
vulnerability VCID-f8p4-hpsh-2fcw
42
vulnerability VCID-f9vz-r6zv-t7ev
43
vulnerability VCID-fabc-rma2-myab
44
vulnerability VCID-fnks-p4e9-13es
45
vulnerability VCID-fuyw-1y1c-fkfp
46
vulnerability VCID-j2wu-2rx7-3yf2
47
vulnerability VCID-jgff-4jyp-9fgr
48
vulnerability VCID-kwrj-3fxz-g7c6
49
vulnerability VCID-mde2-1ynu-auh2
50
vulnerability VCID-mz71-vku8-ckbm
51
vulnerability VCID-nj41-1zpw-gkh9
52
vulnerability VCID-nkdd-suwp-4ffr
53
vulnerability VCID-p623-gxyv-g7fs
54
vulnerability VCID-pk7e-t26d-aqdm
55
vulnerability VCID-pv92-6p9x-v7bs
56
vulnerability VCID-qyb6-7ees-ukcm
57
vulnerability VCID-r2cz-9kjz-zbgu
58
vulnerability VCID-rfz7-vha1-e7gy
59
vulnerability VCID-rssq-mfc2-ckaf
60
vulnerability VCID-skzt-r7sx-1ucv
61
vulnerability VCID-sy6p-5km4-1kcy
62
vulnerability VCID-tazb-gd49-73b4
63
vulnerability VCID-u2c7-p86x-5bgf
64
vulnerability VCID-un5y-y9sq-1ufb
65
vulnerability VCID-v165-afmm-w3er
66
vulnerability VCID-v4gv-g9n5-ukgc
67
vulnerability VCID-wrna-cc9g-sqbe
68
vulnerability VCID-xuhv-wrut-wuez
69
vulnerability VCID-xvv1-nxs6-n7ab
70
vulnerability VCID-xyuf-au4f-57fr
71
vulnerability VCID-y6p4-vfkn-q7fc
72
vulnerability VCID-yx79-3g2x-pqex
73
vulnerability VCID-zb4s-9rj3-ebea
74
vulnerability VCID-zkvk-538h-w3b9
75
vulnerability VCID-zuxd-n3wn-s7hg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-5.5@5.5.47-0%252Bdeb7u1
1
url pkg:deb/debian/mysql-5.5@5.5.60-0%2Bdeb8u1
purl pkg:deb/debian/mysql-5.5@5.5.60-0%2Bdeb8u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-5.5@5.5.60-0%252Bdeb8u1
aliases CVE-2016-0606
risk_score 1.6
exploitability 0.5
weighted_severity 3.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3qjy-4cen-7qev
15
url VCID-45hn-ezks-j7br
vulnerability_id VCID-45hn-ezks-j7br
summary security update
references
0
reference_url http://lists.opensuse.org/opensuse-updates/2016-09/msg00042.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:47:47Z/
url http://lists.opensuse.org/opensuse-updates/2016-09/msg00042.html
1
reference_url http://rhn.redhat.com/errata/RHSA-2016-1480.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:47:47Z/
url http://rhn.redhat.com/errata/RHSA-2016-1480.html
2
reference_url http://rhn.redhat.com/errata/RHSA-2016-1601.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:47:47Z/
url http://rhn.redhat.com/errata/RHSA-2016-1601.html
3
reference_url http://rhn.redhat.com/errata/RHSA-2016-1602.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:47:47Z/
url http://rhn.redhat.com/errata/RHSA-2016-1602.html
4
reference_url http://rhn.redhat.com/errata/RHSA-2016-1603.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:47:47Z/
url http://rhn.redhat.com/errata/RHSA-2016-1603.html
5
reference_url http://rhn.redhat.com/errata/RHSA-2016-1604.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:47:47Z/
url http://rhn.redhat.com/errata/RHSA-2016-1604.html
6
reference_url http://rhn.redhat.com/errata/RHSA-2016-1637.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:47:47Z/
url http://rhn.redhat.com/errata/RHSA-2016-1637.html
7
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3615.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3615.json
8
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-3615
reference_id
reference_type
scores
0
value 0.01847
scoring_system epss
scoring_elements 0.82919
published_at 2026-04-01T12:55:00Z
1
value 0.01847
scoring_system epss
scoring_elements 0.83022
published_at 2026-04-18T12:55:00Z
2
value 0.01847
scoring_system epss
scoring_elements 0.82945
published_at 2026-04-07T12:55:00Z
3
value 0.01847
scoring_system epss
scoring_elements 0.82948
published_at 2026-04-04T12:55:00Z
4
value 0.01847
scoring_system epss
scoring_elements 0.82935
published_at 2026-04-02T12:55:00Z
5
value 0.01847
scoring_system epss
scoring_elements 0.82983
published_at 2026-04-13T12:55:00Z
6
value 0.01847
scoring_system epss
scoring_elements 0.82987
published_at 2026-04-12T12:55:00Z
7
value 0.01847
scoring_system epss
scoring_elements 0.82992
published_at 2026-04-11T12:55:00Z
8
value 0.01847
scoring_system epss
scoring_elements 0.82977
published_at 2026-04-09T12:55:00Z
9
value 0.01847
scoring_system epss
scoring_elements 0.8297
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-3615
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3477
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3477
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3521
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3521
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3615
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3615
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5440
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5440
13
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:S/C:N/I:N/A:C
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
14
reference_url https://mariadb.com/kb/en/mariadb/mariadb-10026-release-notes/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:47:47Z/
url https://mariadb.com/kb/en/mariadb/mariadb-10026-release-notes/
15
reference_url https://mariadb.com/kb/en/mariadb/mariadb-10115-release-notes/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:47:47Z/
url https://mariadb.com/kb/en/mariadb/mariadb-10115-release-notes/
16
reference_url https://mariadb.com/kb/en/mariadb/mariadb-5550-release-notes/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:47:47Z/
url https://mariadb.com/kb/en/mariadb/mariadb-5550-release-notes/
17
reference_url http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:47:47Z/
url http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168
18
reference_url http://www.debian.org/security/2016/dsa-3624
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:47:47Z/
url http://www.debian.org/security/2016/dsa-3624
19
reference_url http://www.debian.org/security/2016/dsa-3632
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:47:47Z/
url http://www.debian.org/security/2016/dsa-3632
20
reference_url http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:47:47Z/
url http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
21
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:47:47Z/
url http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
22
reference_url http://www.securityfocus.com/bid/91787
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:47:47Z/
url http://www.securityfocus.com/bid/91787
23
reference_url http://www.securityfocus.com/bid/91960
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:47:47Z/
url http://www.securityfocus.com/bid/91960
24
reference_url http://www.securitytracker.com/id/1036362
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:47:47Z/
url http://www.securitytracker.com/id/1036362
25
reference_url http://www.ubuntu.com/usn/USN-3040-1
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:47:47Z/
url http://www.ubuntu.com/usn/USN-3040-1
26
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1358212
reference_id 1358212
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1358212
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:powerkvm:2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ibm:powerkvm:2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:powerkvm:2.1:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:powerkvm:3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ibm:powerkvm:3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:powerkvm:3.1:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-3615
reference_id CVE-2016-3615
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
1
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2016-3615
38
reference_url https://access.redhat.com/errata/RHSA-2016:1480
reference_id RHSA-2016:1480
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1480
39
reference_url https://access.redhat.com/errata/RHSA-2016:1601
reference_id RHSA-2016:1601
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1601
40
reference_url https://access.redhat.com/errata/RHSA-2016:1602
reference_id RHSA-2016:1602
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1602
41
reference_url https://access.redhat.com/errata/RHSA-2016:1603
reference_id RHSA-2016:1603
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1603
42
reference_url https://access.redhat.com/errata/RHSA-2016:1604
reference_id RHSA-2016:1604
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1604
43
reference_url https://access.redhat.com/errata/RHSA-2016:1637
reference_id RHSA-2016:1637
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1637
44
reference_url https://usn.ubuntu.com/3040-1/
reference_id USN-3040-1
reference_type
scores
url https://usn.ubuntu.com/3040-1/
fixed_packages
0
url pkg:deb/debian/mysql-5.5@5.5.60-0%2Bdeb8u1
purl pkg:deb/debian/mysql-5.5@5.5.60-0%2Bdeb8u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-5.5@5.5.60-0%252Bdeb8u1
aliases CVE-2016-3615
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-45hn-ezks-j7br
16
url VCID-4cnj-7fur-3qe3
vulnerability_id VCID-4cnj-7fur-3qe3
summary
Multiple vulnerabilities have been found in MariaDB, the worst of
    which could lead to privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3265.json
reference_id
reference_type
scores
0
value 5.6
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3265.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-3265
reference_id
reference_type
scores
0
value 0.00225
scoring_system epss
scoring_elements 0.45254
published_at 2026-04-18T12:55:00Z
1
value 0.00225
scoring_system epss
scoring_elements 0.45118
published_at 2026-04-01T12:55:00Z
2
value 0.00225
scoring_system epss
scoring_elements 0.452
published_at 2026-04-02T12:55:00Z
3
value 0.00225
scoring_system epss
scoring_elements 0.45222
published_at 2026-04-04T12:55:00Z
4
value 0.00225
scoring_system epss
scoring_elements 0.45164
published_at 2026-04-07T12:55:00Z
5
value 0.00225
scoring_system epss
scoring_elements 0.45218
published_at 2026-04-09T12:55:00Z
6
value 0.00225
scoring_system epss
scoring_elements 0.45239
published_at 2026-04-11T12:55:00Z
7
value 0.00225
scoring_system epss
scoring_elements 0.45207
published_at 2026-04-12T12:55:00Z
8
value 0.00225
scoring_system epss
scoring_elements 0.45209
published_at 2026-04-13T12:55:00Z
9
value 0.00225
scoring_system epss
scoring_elements 0.4526
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-3265
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6664
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6664
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3238
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3238
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3243
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3243
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3244
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3244
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3257
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3257
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3258
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3258
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3265
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3265
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3291
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3291
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3312
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3312
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3313
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3313
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3317
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3317
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3318
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3318
14
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv2
scoring_elements AV:L/AC:H/Au:S/C:C/I:N/A:C
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1414423
reference_id 1414423
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1414423
16
reference_url http://www.securityfocus.com/bid/95520
reference_id 95520
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:05Z/
url http://www.securityfocus.com/bid/95520
17
reference_url http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
reference_id cpujan2017-2881727.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:05Z/
url http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
18
reference_url http://www.debian.org/security/2017/dsa-3767
reference_id dsa-3767
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:05Z/
url http://www.debian.org/security/2017/dsa-3767
19
reference_url http://www.debian.org/security/2017/dsa-3770
reference_id dsa-3770
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:05Z/
url http://www.debian.org/security/2017/dsa-3770
20
reference_url https://security.gentoo.org/glsa/201702-17
reference_id GLSA-201702-17
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:05Z/
url https://security.gentoo.org/glsa/201702-17
21
reference_url https://security.gentoo.org/glsa/201702-18
reference_id GLSA-201702-18
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:05Z/
url https://security.gentoo.org/glsa/201702-18
22
reference_url https://access.redhat.com/errata/RHSA-2017:2192
reference_id RHSA-2017:2192
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:05Z/
url https://access.redhat.com/errata/RHSA-2017:2192
23
reference_url https://access.redhat.com/errata/RHSA-2017:2787
reference_id RHSA-2017:2787
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:05Z/
url https://access.redhat.com/errata/RHSA-2017:2787
24
reference_url https://access.redhat.com/errata/RHSA-2018:0279
reference_id RHSA-2018:0279
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:05Z/
url https://access.redhat.com/errata/RHSA-2018:0279
25
reference_url https://access.redhat.com/errata/RHSA-2018:0574
reference_id RHSA-2018:0574
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:05Z/
url https://access.redhat.com/errata/RHSA-2018:0574
26
reference_url https://usn.ubuntu.com/3174-1/
reference_id USN-3174-1
reference_type
scores
url https://usn.ubuntu.com/3174-1/
fixed_packages
0
url pkg:deb/debian/mysql-5.5@5.5.60-0%2Bdeb8u1
purl pkg:deb/debian/mysql-5.5@5.5.60-0%2Bdeb8u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-5.5@5.5.60-0%252Bdeb8u1
aliases CVE-2017-3265
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4cnj-7fur-3qe3
17
url VCID-4yz4-vxnh-b3dp
vulnerability_id VCID-4yz4-vxnh-b3dp
summary
Multiple vulnerabilities were found in MySQL, the worst of which
    may allow remote execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3464.json
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3464.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-3464
reference_id
reference_type
scores
0
value 0.00217
scoring_system epss
scoring_elements 0.44307
published_at 2026-04-18T12:55:00Z
1
value 0.00217
scoring_system epss
scoring_elements 0.44283
published_at 2026-04-04T12:55:00Z
2
value 0.00217
scoring_system epss
scoring_elements 0.44216
published_at 2026-04-07T12:55:00Z
3
value 0.00217
scoring_system epss
scoring_elements 0.44268
published_at 2026-04-08T12:55:00Z
4
value 0.00217
scoring_system epss
scoring_elements 0.44272
published_at 2026-04-09T12:55:00Z
5
value 0.00217
scoring_system epss
scoring_elements 0.4429
published_at 2026-04-11T12:55:00Z
6
value 0.00217
scoring_system epss
scoring_elements 0.44258
published_at 2026-04-13T12:55:00Z
7
value 0.00217
scoring_system epss
scoring_elements 0.44316
published_at 2026-04-16T12:55:00Z
8
value 0.00217
scoring_system epss
scoring_elements 0.4426
published_at 2026-04-02T12:55:00Z
9
value 0.00217
scoring_system epss
scoring_elements 0.44193
published_at 2026-04-01T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-3464
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10286
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10286
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10379
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10379
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10384
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10384
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3302
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3302
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3305
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3305
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3308
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3308
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3309
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3309
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3329
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3329
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3453
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3453
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3456
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3456
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3461
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3461
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3462
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3462
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3463
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3463
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3464
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3464
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3600
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3600
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3636
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3636
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3641
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3641
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3653
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3653
20
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 2.1
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:S/C:N/I:P/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
21
reference_url http://www.debian.org/security/2017/dsa-3834
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:55Z/
url http://www.debian.org/security/2017/dsa-3834
22
reference_url http://www.debian.org/security/2017/dsa-3944
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:55Z/
url http://www.debian.org/security/2017/dsa-3944
23
reference_url http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:55Z/
url http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
24
reference_url http://www.securityfocus.com/bid/97818
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:55Z/
url http://www.securityfocus.com/bid/97818
25
reference_url http://www.securitytracker.com/id/1038287
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:55Z/
url http://www.securitytracker.com/id/1038287
26
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1443379
reference_id 1443379
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1443379
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-3464
reference_id CVE-2017-3464
reference_type
scores
0
value 4.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:P/A:N
1
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2017-3464
40
reference_url https://security.gentoo.org/glsa/201802-04
reference_id GLSA-201802-04
reference_type
scores
url https://security.gentoo.org/glsa/201802-04
41
reference_url https://access.redhat.com/errata/RHSA-2017:2192
reference_id RHSA-2017:2192
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:55Z/
url https://access.redhat.com/errata/RHSA-2017:2192
42
reference_url https://access.redhat.com/errata/RHSA-2017:2787
reference_id RHSA-2017:2787
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:55Z/
url https://access.redhat.com/errata/RHSA-2017:2787
43
reference_url https://access.redhat.com/errata/RHSA-2017:2886
reference_id RHSA-2017:2886
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:55Z/
url https://access.redhat.com/errata/RHSA-2017:2886
44
reference_url https://access.redhat.com/errata/RHSA-2018:0279
reference_id RHSA-2018:0279
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:55Z/
url https://access.redhat.com/errata/RHSA-2018:0279
45
reference_url https://access.redhat.com/errata/RHSA-2018:0574
reference_id RHSA-2018:0574
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:55Z/
url https://access.redhat.com/errata/RHSA-2018:0574
46
reference_url https://usn.ubuntu.com/3269-1/
reference_id USN-3269-1
reference_type
scores
url https://usn.ubuntu.com/3269-1/
47
reference_url https://usn.ubuntu.com/3357-2/
reference_id USN-3357-2
reference_type
scores
url https://usn.ubuntu.com/3357-2/
fixed_packages
0
url pkg:deb/debian/mysql-5.5@5.5.60-0%2Bdeb8u1
purl pkg:deb/debian/mysql-5.5@5.5.60-0%2Bdeb8u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-5.5@5.5.60-0%252Bdeb8u1
aliases CVE-2017-3464
risk_score 1.9
exploitability 0.5
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4yz4-vxnh-b3dp
18
url VCID-52w9-bgxr-nkba
vulnerability_id VCID-52w9-bgxr-nkba
summary mysql: incorrect enforcement of ssl-mode=REQUIRED in MySQL 5.5 and 5.6
references
0
reference_url http://riddle.link/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:46:21Z/
url http://riddle.link/
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3305.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3305.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-3305
reference_id
reference_type
scores
0
value 0.00105
scoring_system epss
scoring_elements 0.28555
published_at 2026-04-18T12:55:00Z
1
value 0.00105
scoring_system epss
scoring_elements 0.28606
published_at 2026-04-01T12:55:00Z
2
value 0.00105
scoring_system epss
scoring_elements 0.28689
published_at 2026-04-02T12:55:00Z
3
value 0.00105
scoring_system epss
scoring_elements 0.28738
published_at 2026-04-04T12:55:00Z
4
value 0.00105
scoring_system epss
scoring_elements 0.28544
published_at 2026-04-07T12:55:00Z
5
value 0.00105
scoring_system epss
scoring_elements 0.28609
published_at 2026-04-08T12:55:00Z
6
value 0.00105
scoring_system epss
scoring_elements 0.2865
published_at 2026-04-09T12:55:00Z
7
value 0.00105
scoring_system epss
scoring_elements 0.28651
published_at 2026-04-11T12:55:00Z
8
value 0.00105
scoring_system epss
scoring_elements 0.28607
published_at 2026-04-12T12:55:00Z
9
value 0.00105
scoring_system epss
scoring_elements 0.28559
published_at 2026-04-13T12:55:00Z
10
value 0.00105
scoring_system epss
scoring_elements 0.28579
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-3305
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3302
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3302
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3305
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3305
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3308
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3308
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3309
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3309
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3329
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3329
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3453
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3453
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3456
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3456
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3461
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3461
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3462
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3462
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3463
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3463
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3464
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3464
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3600
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3600
15
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.1
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:P/I:P/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
16
reference_url http://www.debian.org/security/2017/dsa-3834
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:46:21Z/
url http://www.debian.org/security/2017/dsa-3834
17
reference_url http://www.openwall.com/lists/oss-security/2017/03/17/3
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:46:21Z/
url http://www.openwall.com/lists/oss-security/2017/03/17/3
18
reference_url http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:46:21Z/
url http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
19
reference_url http://www.securityfocus.com/bid/97023
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:46:21Z/
url http://www.securityfocus.com/bid/97023
20
reference_url http://www.securitytracker.com/id/1038287
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:46:21Z/
url http://www.securitytracker.com/id/1038287
21
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1431690
reference_id 1431690
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1431690
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-3305
reference_id CVE-2017-3305
reference_type
scores
0
value 6.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:S/C:C/I:N/A:N
1
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2017-3305
25
reference_url https://access.redhat.com/errata/RHSA-2017:2787
reference_id RHSA-2017:2787
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:46:21Z/
url https://access.redhat.com/errata/RHSA-2017:2787
26
reference_url https://usn.ubuntu.com/3269-1/
reference_id USN-3269-1
reference_type
scores
url https://usn.ubuntu.com/3269-1/
27
reference_url https://usn.ubuntu.com/3357-2/
reference_id USN-3357-2
reference_type
scores
url https://usn.ubuntu.com/3357-2/
fixed_packages
0
url pkg:deb/debian/mysql-5.5@5.5.60-0%2Bdeb8u1
purl pkg:deb/debian/mysql-5.5@5.5.60-0%2Bdeb8u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-5.5@5.5.60-0%252Bdeb8u1
aliases CVE-2017-3305
risk_score 2.9
exploitability 0.5
weighted_severity 5.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-52w9-bgxr-nkba
19
url VCID-55fg-6c2c-6bg8
vulnerability_id VCID-55fg-6c2c-6bg8
summary security update
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00015.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00015.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00016.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00016.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html
6
reference_url http://rhn.redhat.com/errata/RHSA-2016-0534.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0534.html
7
reference_url http://rhn.redhat.com/errata/RHSA-2016-0705.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0705.html
8
reference_url http://rhn.redhat.com/errata/RHSA-2016-1480.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-1480.html
9
reference_url http://rhn.redhat.com/errata/RHSA-2016-1481.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-1481.html
10
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0600.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0600.json
11
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-0600
reference_id
reference_type
scores
0
value 0.00338
scoring_system epss
scoring_elements 0.56668
published_at 2026-04-18T12:55:00Z
1
value 0.00338
scoring_system epss
scoring_elements 0.56638
published_at 2026-04-13T12:55:00Z
2
value 0.00338
scoring_system epss
scoring_elements 0.56522
published_at 2026-04-01T12:55:00Z
3
value 0.00338
scoring_system epss
scoring_elements 0.56618
published_at 2026-04-07T12:55:00Z
4
value 0.00338
scoring_system epss
scoring_elements 0.56639
published_at 2026-04-04T12:55:00Z
5
value 0.00338
scoring_system epss
scoring_elements 0.56669
published_at 2026-04-16T12:55:00Z
6
value 0.00338
scoring_system epss
scoring_elements 0.56675
published_at 2026-04-09T12:55:00Z
7
value 0.00338
scoring_system epss
scoring_elements 0.56683
published_at 2026-04-11T12:55:00Z
8
value 0.00338
scoring_system epss
scoring_elements 0.56658
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-0600
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0505
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0505
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0546
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0546
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0596
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0596
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0597
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0597
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0598
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0598
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0600
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0600
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0606
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0606
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0608
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0608
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0609
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0609
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0616
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0616
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2047
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2047
23
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.5
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:S/C:N/I:N/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
24
reference_url https://mariadb.com/kb/en/mariadb/mariadb-10110-release-notes/
reference_id
reference_type
scores
url https://mariadb.com/kb/en/mariadb/mariadb-10110-release-notes/
25
reference_url https://mariadb.com/kb/en/mariadb/mariadb-5547-release-notes/
reference_id
reference_type
scores
url https://mariadb.com/kb/en/mariadb/mariadb-5547-release-notes/
26
reference_url https://mariadb.com/kb/en/mdb-10023-rn/
reference_id
reference_type
scores
url https://mariadb.com/kb/en/mdb-10023-rn/
27
reference_url http://www.debian.org/security/2016/dsa-3453
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3453
28
reference_url http://www.debian.org/security/2016/dsa-3459
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3459
29
reference_url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
30
reference_url http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
31
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
32
reference_url http://www.securityfocus.com/bid/81188
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/81188
33
reference_url http://www.securitytracker.com/id/1034708
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1034708
34
reference_url http://www.ubuntu.com/usn/USN-2881-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2881-1
35
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1301501
reference_id 1301501
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1301501
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node_eus:7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_hpc_node_eus:7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node_eus:7.2:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-0600
reference_id CVE-2016-0600
reference_type
scores
0
value 3.5
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:S/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2016-0600
57
reference_url https://access.redhat.com/errata/RHSA-2016:0534
reference_id RHSA-2016:0534
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0534
58
reference_url https://access.redhat.com/errata/RHSA-2016:0705
reference_id RHSA-2016:0705
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0705
59
reference_url https://access.redhat.com/errata/RHSA-2016:1132
reference_id RHSA-2016:1132
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1132
60
reference_url https://access.redhat.com/errata/RHSA-2016:1480
reference_id RHSA-2016:1480
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1480
61
reference_url https://access.redhat.com/errata/RHSA-2016:1481
reference_id RHSA-2016:1481
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1481
62
reference_url https://usn.ubuntu.com/2881-1/
reference_id USN-2881-1
reference_type
scores
url https://usn.ubuntu.com/2881-1/
fixed_packages
0
url pkg:deb/debian/mysql-5.5@5.5.47-0%2Bdeb7u1
purl pkg:deb/debian/mysql-5.5@5.5.47-0%2Bdeb7u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1gmc-pj6y-rkfx
1
vulnerability VCID-1nvb-xd5n-gkh8
2
vulnerability VCID-2gyq-q761-h3br
3
vulnerability VCID-2jer-ss8p-7kbg
4
vulnerability VCID-2uxe-ep8b-y7b9
5
vulnerability VCID-2vp1-j324-dkat
6
vulnerability VCID-2yqz-qtv5-47hh
7
vulnerability VCID-2za2-cnwx-hbbw
8
vulnerability VCID-39gt-6dgh-wyar
9
vulnerability VCID-3qjy-4cen-7qev
10
vulnerability VCID-45hn-ezks-j7br
11
vulnerability VCID-4cnj-7fur-3qe3
12
vulnerability VCID-4yz4-vxnh-b3dp
13
vulnerability VCID-52w9-bgxr-nkba
14
vulnerability VCID-55fg-6c2c-6bg8
15
vulnerability VCID-5p65-gfsg-1ugq
16
vulnerability VCID-5q89-vg9j-k3as
17
vulnerability VCID-5sjj-599v-vybg
18
vulnerability VCID-64st-u4xn-z7g3
19
vulnerability VCID-6g4n-3xfu-hfee
20
vulnerability VCID-6gvj-hy6a-3qdx
21
vulnerability VCID-7tj3-dfxj-bke7
22
vulnerability VCID-7w3v-5s98-a7ec
23
vulnerability VCID-7yc3-7bkr-jfc9
24
vulnerability VCID-8krv-jqjg-uqc8
25
vulnerability VCID-8kvb-5u8c-zbc4
26
vulnerability VCID-8sya-wktg-dqa5
27
vulnerability VCID-9f48-53dz-13an
28
vulnerability VCID-9ff2-43rk-2ydj
29
vulnerability VCID-9w98-nfg2-muh2
30
vulnerability VCID-a3hx-qz7x-7ybk
31
vulnerability VCID-bfnh-7k45-nkg2
32
vulnerability VCID-bhxk-8byp-eyap
33
vulnerability VCID-ca85-vx8c-huht
34
vulnerability VCID-cnb3-dy3a-8bdp
35
vulnerability VCID-cyqa-e362-yyaf
36
vulnerability VCID-dfbz-5n6w-syd9
37
vulnerability VCID-dgtc-a2t2-k7f5
38
vulnerability VCID-dqg6-2gmj-judy
39
vulnerability VCID-ej67-ayfh-sqdt
40
vulnerability VCID-esfk-umc5-ska4
41
vulnerability VCID-f8p4-hpsh-2fcw
42
vulnerability VCID-f9vz-r6zv-t7ev
43
vulnerability VCID-fabc-rma2-myab
44
vulnerability VCID-fnks-p4e9-13es
45
vulnerability VCID-fuyw-1y1c-fkfp
46
vulnerability VCID-j2wu-2rx7-3yf2
47
vulnerability VCID-jgff-4jyp-9fgr
48
vulnerability VCID-kwrj-3fxz-g7c6
49
vulnerability VCID-mde2-1ynu-auh2
50
vulnerability VCID-mz71-vku8-ckbm
51
vulnerability VCID-nj41-1zpw-gkh9
52
vulnerability VCID-nkdd-suwp-4ffr
53
vulnerability VCID-p623-gxyv-g7fs
54
vulnerability VCID-pk7e-t26d-aqdm
55
vulnerability VCID-pv92-6p9x-v7bs
56
vulnerability VCID-qyb6-7ees-ukcm
57
vulnerability VCID-r2cz-9kjz-zbgu
58
vulnerability VCID-rfz7-vha1-e7gy
59
vulnerability VCID-rssq-mfc2-ckaf
60
vulnerability VCID-skzt-r7sx-1ucv
61
vulnerability VCID-sy6p-5km4-1kcy
62
vulnerability VCID-tazb-gd49-73b4
63
vulnerability VCID-u2c7-p86x-5bgf
64
vulnerability VCID-un5y-y9sq-1ufb
65
vulnerability VCID-v165-afmm-w3er
66
vulnerability VCID-v4gv-g9n5-ukgc
67
vulnerability VCID-wrna-cc9g-sqbe
68
vulnerability VCID-xuhv-wrut-wuez
69
vulnerability VCID-xvv1-nxs6-n7ab
70
vulnerability VCID-xyuf-au4f-57fr
71
vulnerability VCID-y6p4-vfkn-q7fc
72
vulnerability VCID-yx79-3g2x-pqex
73
vulnerability VCID-zb4s-9rj3-ebea
74
vulnerability VCID-zkvk-538h-w3b9
75
vulnerability VCID-zuxd-n3wn-s7hg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-5.5@5.5.47-0%252Bdeb7u1
1
url pkg:deb/debian/mysql-5.5@5.5.60-0%2Bdeb8u1
purl pkg:deb/debian/mysql-5.5@5.5.60-0%2Bdeb8u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-5.5@5.5.60-0%252Bdeb8u1
aliases CVE-2016-0600
risk_score 1.6
exploitability 0.5
weighted_severity 3.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-55fg-6c2c-6bg8
20
url VCID-5p65-gfsg-1ugq
vulnerability_id VCID-5p65-gfsg-1ugq
summary
Multiple vulnerabilities were found in MySQL, the worst of which
    may allow remote execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2562.json
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2562.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-2562
reference_id
reference_type
scores
0
value 0.00784
scoring_system epss
scoring_elements 0.73762
published_at 2026-04-12T12:55:00Z
1
value 0.00784
scoring_system epss
scoring_elements 0.73753
published_at 2026-04-13T12:55:00Z
2
value 0.00784
scoring_system epss
scoring_elements 0.73705
published_at 2026-04-01T12:55:00Z
3
value 0.00784
scoring_system epss
scoring_elements 0.73738
published_at 2026-04-04T12:55:00Z
4
value 0.00784
scoring_system epss
scoring_elements 0.7371
published_at 2026-04-07T12:55:00Z
5
value 0.00784
scoring_system epss
scoring_elements 0.73745
published_at 2026-04-08T12:55:00Z
6
value 0.00784
scoring_system epss
scoring_elements 0.73758
published_at 2026-04-09T12:55:00Z
7
value 0.00784
scoring_system epss
scoring_elements 0.7378
published_at 2026-04-11T12:55:00Z
8
value 0.00784
scoring_system epss
scoring_elements 0.73803
published_at 2026-04-18T12:55:00Z
9
value 0.00784
scoring_system epss
scoring_elements 0.73714
published_at 2026-04-02T12:55:00Z
10
value 0.00784
scoring_system epss
scoring_elements 0.73795
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-2562
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10268
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10268
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10378
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10378
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15365
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15365
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2562
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2562
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2612
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2612
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2622
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2622
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2640
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2640
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2665
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2665
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2668
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2668
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2755
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2755
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2761
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2761
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2766
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2766
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2767
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2767
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2771
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2771
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2781
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2781
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2782
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2782
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2784
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2784
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2787
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2787
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2813
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2813
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2817
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2817
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2819
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2819
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3058
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3058
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3063
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3063
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3064
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3064
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3066
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3066
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3081
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3081
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3143
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3143
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3156
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3156
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3174
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3174
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3251
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3251
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3282
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3282
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2503
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2503
34
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
35
reference_url http://www.securityfocus.com/bid/102713
reference_id 102713
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:22:39Z/
url http://www.securityfocus.com/bid/102713
36
reference_url http://www.securitytracker.com/id/1040216
reference_id 1040216
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:22:39Z/
url http://www.securitytracker.com/id/1040216
37
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1535484
reference_id 1535484
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1535484
38
reference_url https://www.debian.org/security/2018/dsa-4091
reference_id dsa-4091
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:22:39Z/
url https://www.debian.org/security/2018/dsa-4091
39
reference_url https://security.gentoo.org/glsa/201802-04
reference_id GLSA-201802-04
reference_type
scores
url https://security.gentoo.org/glsa/201802-04
40
reference_url https://lists.debian.org/debian-lts-announce/2018/01/msg00024.html
reference_id msg00024.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:22:39Z/
url https://lists.debian.org/debian-lts-announce/2018/01/msg00024.html
41
reference_url https://access.redhat.com/errata/RHSA-2017:3442
reference_id RHSA-2017:3442
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:3442
42
reference_url https://access.redhat.com/errata/RHSA-2018:0587
reference_id RHSA-2018:0587
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:22:39Z/
url https://access.redhat.com/errata/RHSA-2018:0587
43
reference_url https://access.redhat.com/errata/RHSA-2018:2439
reference_id RHSA-2018:2439
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:22:39Z/
url https://access.redhat.com/errata/RHSA-2018:2439
44
reference_url https://access.redhat.com/errata/RHSA-2018:2729
reference_id RHSA-2018:2729
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:22:39Z/
url https://access.redhat.com/errata/RHSA-2018:2729
45
reference_url https://access.redhat.com/errata/RHSA-2019:1258
reference_id RHSA-2019:1258
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:22:39Z/
url https://access.redhat.com/errata/RHSA-2019:1258
46
reference_url https://usn.ubuntu.com/3537-1/
reference_id USN-3537-1
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:22:39Z/
url https://usn.ubuntu.com/3537-1/
47
reference_url https://usn.ubuntu.com/3537-2/
reference_id USN-3537-2
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:22:39Z/
url https://usn.ubuntu.com/3537-2/
fixed_packages
0
url pkg:deb/debian/mysql-5.5@5.5.60-0%2Bdeb8u1
purl pkg:deb/debian/mysql-5.5@5.5.60-0%2Bdeb8u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-5.5@5.5.60-0%252Bdeb8u1
aliases CVE-2018-2562
risk_score 3.2
exploitability 0.5
weighted_severity 6.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5p65-gfsg-1ugq
21
url VCID-5q89-vg9j-k3as
vulnerability_id VCID-5q89-vg9j-k3as
summary
Multiple vulnerabilities were found in MySQL, the worst of which
    may allow remote execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2668.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2668.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-2668
reference_id
reference_type
scores
0
value 0.00355
scoring_system epss
scoring_elements 0.57849
published_at 2026-04-18T12:55:00Z
1
value 0.00355
scoring_system epss
scoring_elements 0.57713
published_at 2026-04-01T12:55:00Z
2
value 0.00355
scoring_system epss
scoring_elements 0.57797
published_at 2026-04-02T12:55:00Z
3
value 0.00355
scoring_system epss
scoring_elements 0.57817
published_at 2026-04-04T12:55:00Z
4
value 0.00355
scoring_system epss
scoring_elements 0.57791
published_at 2026-04-07T12:55:00Z
5
value 0.00355
scoring_system epss
scoring_elements 0.57846
published_at 2026-04-08T12:55:00Z
6
value 0.00355
scoring_system epss
scoring_elements 0.57847
published_at 2026-04-09T12:55:00Z
7
value 0.00355
scoring_system epss
scoring_elements 0.57864
published_at 2026-04-11T12:55:00Z
8
value 0.00355
scoring_system epss
scoring_elements 0.57842
published_at 2026-04-12T12:55:00Z
9
value 0.00355
scoring_system epss
scoring_elements 0.57821
published_at 2026-04-13T12:55:00Z
10
value 0.00355
scoring_system epss
scoring_elements 0.5785
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-2668
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10268
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10268
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10378
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10378
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15365
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15365
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2562
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2562
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2612
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2612
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2622
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2622
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2640
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2640
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2665
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2665
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2668
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2668
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2755
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2755
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2761
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2761
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2766
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2766
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2767
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2767
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2771
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2771
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2781
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2781
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2782
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2782
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2784
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2784
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2787
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2787
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2813
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2813
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2817
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2817
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2819
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2819
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3058
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3058
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3063
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3063
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3064
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3064
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3066
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3066
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3081
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3081
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3143
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3143
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3156
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3156
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3174
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3174
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3251
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3251
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3282
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3282
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2503
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2503
34
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
35
reference_url http://www.securityfocus.com/bid/102682
reference_id 102682
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:24:09Z/
url http://www.securityfocus.com/bid/102682
36
reference_url http://www.securitytracker.com/id/1040216
reference_id 1040216
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:24:09Z/
url http://www.securitytracker.com/id/1040216
37
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1535506
reference_id 1535506
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1535506
38
reference_url https://www.debian.org/security/2018/dsa-4091
reference_id dsa-4091
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:24:09Z/
url https://www.debian.org/security/2018/dsa-4091
39
reference_url https://security.gentoo.org/glsa/201802-04
reference_id GLSA-201802-04
reference_type
scores
url https://security.gentoo.org/glsa/201802-04
40
reference_url https://lists.debian.org/debian-lts-announce/2018/01/msg00024.html
reference_id msg00024.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:24:09Z/
url https://lists.debian.org/debian-lts-announce/2018/01/msg00024.html
41
reference_url https://access.redhat.com/errata/RHSA-2018:0586
reference_id RHSA-2018:0586
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:24:09Z/
url https://access.redhat.com/errata/RHSA-2018:0586
42
reference_url https://access.redhat.com/errata/RHSA-2018:0587
reference_id RHSA-2018:0587
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:24:09Z/
url https://access.redhat.com/errata/RHSA-2018:0587
43
reference_url https://access.redhat.com/errata/RHSA-2018:2439
reference_id RHSA-2018:2439
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:24:09Z/
url https://access.redhat.com/errata/RHSA-2018:2439
44
reference_url https://access.redhat.com/errata/RHSA-2018:2729
reference_id RHSA-2018:2729
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:24:09Z/
url https://access.redhat.com/errata/RHSA-2018:2729
45
reference_url https://access.redhat.com/errata/RHSA-2019:1258
reference_id RHSA-2019:1258
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:24:09Z/
url https://access.redhat.com/errata/RHSA-2019:1258
46
reference_url https://usn.ubuntu.com/3537-1/
reference_id USN-3537-1
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:24:09Z/
url https://usn.ubuntu.com/3537-1/
47
reference_url https://usn.ubuntu.com/3537-2/
reference_id USN-3537-2
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:24:09Z/
url https://usn.ubuntu.com/3537-2/
fixed_packages
0
url pkg:deb/debian/mysql-5.5@5.5.60-0%2Bdeb8u1
purl pkg:deb/debian/mysql-5.5@5.5.60-0%2Bdeb8u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-5.5@5.5.60-0%252Bdeb8u1
aliases CVE-2018-2668
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5q89-vg9j-k3as
22
url VCID-5sjj-599v-vybg
vulnerability_id VCID-5sjj-599v-vybg
summary
Multiple vulnerabilities were found in MySQL, the worst of which
    may allow remote execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3653.json
reference_id
reference_type
scores
0
value 3.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3653.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-3653
reference_id
reference_type
scores
0
value 0.0027
scoring_system epss
scoring_elements 0.5054
published_at 2026-04-18T12:55:00Z
1
value 0.0027
scoring_system epss
scoring_elements 0.50399
published_at 2026-04-01T12:55:00Z
2
value 0.0027
scoring_system epss
scoring_elements 0.50454
published_at 2026-04-02T12:55:00Z
3
value 0.0027
scoring_system epss
scoring_elements 0.50483
published_at 2026-04-04T12:55:00Z
4
value 0.0027
scoring_system epss
scoring_elements 0.50436
published_at 2026-04-07T12:55:00Z
5
value 0.0027
scoring_system epss
scoring_elements 0.5049
published_at 2026-04-08T12:55:00Z
6
value 0.0027
scoring_system epss
scoring_elements 0.50487
published_at 2026-04-09T12:55:00Z
7
value 0.0027
scoring_system epss
scoring_elements 0.5053
published_at 2026-04-11T12:55:00Z
8
value 0.0027
scoring_system epss
scoring_elements 0.50507
published_at 2026-04-12T12:55:00Z
9
value 0.0027
scoring_system epss
scoring_elements 0.50492
published_at 2026-04-13T12:55:00Z
10
value 0.0027
scoring_system epss
scoring_elements 0.50534
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-3653
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10286
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10286
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10379
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10379
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10384
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10384
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3308
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3308
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3309
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3309
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3453
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3453
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3456
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3456
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3464
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3464
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3635
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3635
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3636
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3636
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3641
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3641
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3648
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3648
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3651
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3651
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3652
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3652
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3653
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3653
17
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 2.1
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:S/C:N/I:P/A:N
1
value 3.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
18
reference_url http://www.securitytracker.com/id/1038928
reference_id 1038928
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:47:41Z/
url http://www.securitytracker.com/id/1038928
19
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1472711
reference_id 1472711
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1472711
20
reference_url http://www.securityfocus.com/bid/99810
reference_id 99810
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:47:41Z/
url http://www.securityfocus.com/bid/99810
21
reference_url http://www.debian.org/security/2017/dsa-3922
reference_id dsa-3922
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:47:41Z/
url http://www.debian.org/security/2017/dsa-3922
22
reference_url https://www.debian.org/security/2017/dsa-3955
reference_id dsa-3955
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:47:41Z/
url https://www.debian.org/security/2017/dsa-3955
23
reference_url https://security.gentoo.org/glsa/201802-04
reference_id GLSA-201802-04
reference_type
scores
url https://security.gentoo.org/glsa/201802-04
24
reference_url https://access.redhat.com/errata/RHSA-2017:2787
reference_id RHSA-2017:2787
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:47:41Z/
url https://access.redhat.com/errata/RHSA-2017:2787
25
reference_url https://access.redhat.com/errata/RHSA-2017:2886
reference_id RHSA-2017:2886
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:47:41Z/
url https://access.redhat.com/errata/RHSA-2017:2886
26
reference_url https://access.redhat.com/errata/RHSA-2018:0279
reference_id RHSA-2018:0279
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:47:41Z/
url https://access.redhat.com/errata/RHSA-2018:0279
27
reference_url https://access.redhat.com/errata/RHSA-2018:0574
reference_id RHSA-2018:0574
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:47:41Z/
url https://access.redhat.com/errata/RHSA-2018:0574
28
reference_url https://access.redhat.com/errata/RHSA-2018:2439
reference_id RHSA-2018:2439
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:47:41Z/
url https://access.redhat.com/errata/RHSA-2018:2439
29
reference_url https://access.redhat.com/errata/RHSA-2018:2729
reference_id RHSA-2018:2729
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:47:41Z/
url https://access.redhat.com/errata/RHSA-2018:2729
30
reference_url https://usn.ubuntu.com/3357-1/
reference_id USN-3357-1
reference_type
scores
url https://usn.ubuntu.com/3357-1/
31
reference_url https://usn.ubuntu.com/3357-2/
reference_id USN-3357-2
reference_type
scores
url https://usn.ubuntu.com/3357-2/
fixed_packages
0
url pkg:deb/debian/mysql-5.5@5.5.60-0%2Bdeb8u1
purl pkg:deb/debian/mysql-5.5@5.5.60-0%2Bdeb8u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-5.5@5.5.60-0%252Bdeb8u1
aliases CVE-2017-3653
risk_score 1.4
exploitability 0.5
weighted_severity 2.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5sjj-599v-vybg
23
url VCID-5yzf-3vz6-9yhu
vulnerability_id VCID-5yzf-3vz6-9yhu
summary security update
references
0
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177539.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177539.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00010.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00010.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00011.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00011.html
3
reference_url http://lists.opensuse.org/opensuse-updates/2016-02/msg00039.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2016-02/msg00039.html
4
reference_url http://rhn.redhat.com/errata/RHSA-2016-0534.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0534.html
5
reference_url http://rhn.redhat.com/errata/RHSA-2016-0705.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0705.html
6
reference_url http://rhn.redhat.com/errata/RHSA-2016-1480.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-1480.html
7
reference_url http://rhn.redhat.com/errata/RHSA-2016-1481.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-1481.html
8
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4861.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4861.json
9
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-4861
reference_id
reference_type
scores
0
value 0.00392
scoring_system epss
scoring_elements 0.60251
published_at 2026-04-18T12:55:00Z
1
value 0.00392
scoring_system epss
scoring_elements 0.60078
published_at 2026-04-01T12:55:00Z
2
value 0.00392
scoring_system epss
scoring_elements 0.60156
published_at 2026-04-02T12:55:00Z
3
value 0.00392
scoring_system epss
scoring_elements 0.60181
published_at 2026-04-04T12:55:00Z
4
value 0.00392
scoring_system epss
scoring_elements 0.6015
published_at 2026-04-07T12:55:00Z
5
value 0.00392
scoring_system epss
scoring_elements 0.602
published_at 2026-04-08T12:55:00Z
6
value 0.00392
scoring_system epss
scoring_elements 0.60214
published_at 2026-04-09T12:55:00Z
7
value 0.00392
scoring_system epss
scoring_elements 0.60235
published_at 2026-04-11T12:55:00Z
8
value 0.00392
scoring_system epss
scoring_elements 0.60222
published_at 2026-04-12T12:55:00Z
9
value 0.00392
scoring_system epss
scoring_elements 0.60204
published_at 2026-04-13T12:55:00Z
10
value 0.00392
scoring_system epss
scoring_elements 0.60244
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-4861
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4792
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4792
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4802
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4802
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4815
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4815
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4816
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4816
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4819
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4819
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4826
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4826
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4830
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4830
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4836
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4836
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4858
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4858
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4861
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4861
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4870
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4870
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4879
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4879
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4895
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4895
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4913
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4913
24
reference_url https://www.suse.com/support/update/announcement/2016/suse-su-20160296-1.html
reference_id
reference_type
scores
url https://www.suse.com/support/update/announcement/2016/suse-su-20160296-1.html
25
reference_url http://www.debian.org/security/2015/dsa-3377
reference_id
reference_type
scores
url http://www.debian.org/security/2015/dsa-3377
26
reference_url http://www.debian.org/security/2015/dsa-3385
reference_id
reference_type
scores
url http://www.debian.org/security/2015/dsa-3385
27
reference_url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
28
reference_url http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
29
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
30
reference_url http://www.securityfocus.com/bid/77137
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/77137
31
reference_url http://www.securitytracker.com/id/1033894
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1033894
32
reference_url http://www.ubuntu.com/usn/USN-2781-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2781-1
33
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1274776
reference_id 1274776
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1274776
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-4861
reference_id CVE-2015-4861
reference_type
scores
0
value 3.5
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:S/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2015-4861
67
reference_url https://access.redhat.com/errata/RHSA-2016:0534
reference_id RHSA-2016:0534
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0534
68
reference_url https://access.redhat.com/errata/RHSA-2016:0705
reference_id RHSA-2016:0705
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0705
69
reference_url https://access.redhat.com/errata/RHSA-2016:1132
reference_id RHSA-2016:1132
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1132
70
reference_url https://access.redhat.com/errata/RHSA-2016:1480
reference_id RHSA-2016:1480
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1480
71
reference_url https://access.redhat.com/errata/RHSA-2016:1481
reference_id RHSA-2016:1481
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1481
72
reference_url https://usn.ubuntu.com/2781-1/
reference_id USN-2781-1
reference_type
scores
url https://usn.ubuntu.com/2781-1/
fixed_packages
0
url pkg:deb/debian/mysql-5.5@5.5.47-0%2Bdeb6u1
purl pkg:deb/debian/mysql-5.5@5.5.47-0%2Bdeb6u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1gmc-pj6y-rkfx
1
vulnerability VCID-1nvb-xd5n-gkh8
2
vulnerability VCID-2gyq-q761-h3br
3
vulnerability VCID-2jer-ss8p-7kbg
4
vulnerability VCID-2uxe-ep8b-y7b9
5
vulnerability VCID-2vp1-j324-dkat
6
vulnerability VCID-2yqz-qtv5-47hh
7
vulnerability VCID-2za2-cnwx-hbbw
8
vulnerability VCID-39gt-6dgh-wyar
9
vulnerability VCID-3qjy-4cen-7qev
10
vulnerability VCID-45hn-ezks-j7br
11
vulnerability VCID-4cnj-7fur-3qe3
12
vulnerability VCID-4yz4-vxnh-b3dp
13
vulnerability VCID-52w9-bgxr-nkba
14
vulnerability VCID-55fg-6c2c-6bg8
15
vulnerability VCID-5p65-gfsg-1ugq
16
vulnerability VCID-5q89-vg9j-k3as
17
vulnerability VCID-5sjj-599v-vybg
18
vulnerability VCID-64st-u4xn-z7g3
19
vulnerability VCID-6g4n-3xfu-hfee
20
vulnerability VCID-6gvj-hy6a-3qdx
21
vulnerability VCID-7tj3-dfxj-bke7
22
vulnerability VCID-7w3v-5s98-a7ec
23
vulnerability VCID-7yc3-7bkr-jfc9
24
vulnerability VCID-8krv-jqjg-uqc8
25
vulnerability VCID-8kvb-5u8c-zbc4
26
vulnerability VCID-8sya-wktg-dqa5
27
vulnerability VCID-9f48-53dz-13an
28
vulnerability VCID-9ff2-43rk-2ydj
29
vulnerability VCID-9w98-nfg2-muh2
30
vulnerability VCID-a3hx-qz7x-7ybk
31
vulnerability VCID-bfnh-7k45-nkg2
32
vulnerability VCID-bhxk-8byp-eyap
33
vulnerability VCID-ca85-vx8c-huht
34
vulnerability VCID-cnb3-dy3a-8bdp
35
vulnerability VCID-cyqa-e362-yyaf
36
vulnerability VCID-dfbz-5n6w-syd9
37
vulnerability VCID-dgtc-a2t2-k7f5
38
vulnerability VCID-dqg6-2gmj-judy
39
vulnerability VCID-ej67-ayfh-sqdt
40
vulnerability VCID-esfk-umc5-ska4
41
vulnerability VCID-f8p4-hpsh-2fcw
42
vulnerability VCID-f9vz-r6zv-t7ev
43
vulnerability VCID-fabc-rma2-myab
44
vulnerability VCID-fnks-p4e9-13es
45
vulnerability VCID-fuyw-1y1c-fkfp
46
vulnerability VCID-j2wu-2rx7-3yf2
47
vulnerability VCID-jgff-4jyp-9fgr
48
vulnerability VCID-kwrj-3fxz-g7c6
49
vulnerability VCID-mde2-1ynu-auh2
50
vulnerability VCID-mz71-vku8-ckbm
51
vulnerability VCID-nj41-1zpw-gkh9
52
vulnerability VCID-nkdd-suwp-4ffr
53
vulnerability VCID-p623-gxyv-g7fs
54
vulnerability VCID-pk7e-t26d-aqdm
55
vulnerability VCID-pv92-6p9x-v7bs
56
vulnerability VCID-qyb6-7ees-ukcm
57
vulnerability VCID-r2cz-9kjz-zbgu
58
vulnerability VCID-rfz7-vha1-e7gy
59
vulnerability VCID-rssq-mfc2-ckaf
60
vulnerability VCID-skzt-r7sx-1ucv
61
vulnerability VCID-sy6p-5km4-1kcy
62
vulnerability VCID-tazb-gd49-73b4
63
vulnerability VCID-u2c7-p86x-5bgf
64
vulnerability VCID-un5y-y9sq-1ufb
65
vulnerability VCID-v165-afmm-w3er
66
vulnerability VCID-v4gv-g9n5-ukgc
67
vulnerability VCID-wrna-cc9g-sqbe
68
vulnerability VCID-xuhv-wrut-wuez
69
vulnerability VCID-xvv1-nxs6-n7ab
70
vulnerability VCID-xyuf-au4f-57fr
71
vulnerability VCID-y6p4-vfkn-q7fc
72
vulnerability VCID-yx79-3g2x-pqex
73
vulnerability VCID-zb4s-9rj3-ebea
74
vulnerability VCID-zkvk-538h-w3b9
75
vulnerability VCID-zuxd-n3wn-s7hg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-5.5@5.5.47-0%252Bdeb6u1
aliases CVE-2015-4861
risk_score 1.6
exploitability 0.5
weighted_severity 3.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5yzf-3vz6-9yhu
24
url VCID-64st-u4xn-z7g3
vulnerability_id VCID-64st-u4xn-z7g3
summary
Multiple vulnerabilities were found in MySQL, the worst of which
    may allow remote execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2622.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2622.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-2622
reference_id
reference_type
scores
0
value 0.00398
scoring_system epss
scoring_elements 0.60535
published_at 2026-04-07T12:55:00Z
1
value 0.00398
scoring_system epss
scoring_elements 0.606
published_at 2026-04-09T12:55:00Z
2
value 0.00398
scoring_system epss
scoring_elements 0.60464
published_at 2026-04-01T12:55:00Z
3
value 0.00398
scoring_system epss
scoring_elements 0.60565
published_at 2026-04-04T12:55:00Z
4
value 0.00398
scoring_system epss
scoring_elements 0.60584
published_at 2026-04-08T12:55:00Z
5
value 0.00398
scoring_system epss
scoring_elements 0.60634
published_at 2026-04-18T12:55:00Z
6
value 0.00398
scoring_system epss
scoring_elements 0.60628
published_at 2026-04-16T12:55:00Z
7
value 0.00398
scoring_system epss
scoring_elements 0.60539
published_at 2026-04-02T12:55:00Z
8
value 0.00398
scoring_system epss
scoring_elements 0.60587
published_at 2026-04-13T12:55:00Z
9
value 0.00398
scoring_system epss
scoring_elements 0.60609
published_at 2026-04-12T12:55:00Z
10
value 0.00398
scoring_system epss
scoring_elements 0.60624
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-2622
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10268
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10268
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10378
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10378
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15365
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15365
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2562
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2562
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2612
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2612
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2622
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2622
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2640
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2640
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2665
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2665
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2668
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2668
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2755
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2755
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2761
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2761
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2766
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2766
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2767
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2767
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2771
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2771
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2781
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2781
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2782
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2782
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2784
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2784
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2787
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2787
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2813
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2813
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2817
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2817
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2819
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2819
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3058
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3058
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3063
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3063
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3064
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3064
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3066
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3066
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3081
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3081
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3143
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3143
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3156
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3156
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3174
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3174
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3251
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3251
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3282
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3282
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2503
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2503
34
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
35
reference_url http://www.securityfocus.com/bid/102706
reference_id 102706
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:47Z/
url http://www.securityfocus.com/bid/102706
36
reference_url http://www.securitytracker.com/id/1040216
reference_id 1040216
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:47Z/
url http://www.securitytracker.com/id/1040216
37
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1535499
reference_id 1535499
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1535499
38
reference_url https://www.debian.org/security/2018/dsa-4091
reference_id dsa-4091
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:47Z/
url https://www.debian.org/security/2018/dsa-4091
39
reference_url https://security.gentoo.org/glsa/201802-04
reference_id GLSA-201802-04
reference_type
scores
url https://security.gentoo.org/glsa/201802-04
40
reference_url https://lists.debian.org/debian-lts-announce/2018/01/msg00024.html
reference_id msg00024.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:47Z/
url https://lists.debian.org/debian-lts-announce/2018/01/msg00024.html
41
reference_url https://access.redhat.com/errata/RHSA-2018:0586
reference_id RHSA-2018:0586
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:47Z/
url https://access.redhat.com/errata/RHSA-2018:0586
42
reference_url https://access.redhat.com/errata/RHSA-2018:0587
reference_id RHSA-2018:0587
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:47Z/
url https://access.redhat.com/errata/RHSA-2018:0587
43
reference_url https://access.redhat.com/errata/RHSA-2018:2439
reference_id RHSA-2018:2439
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:47Z/
url https://access.redhat.com/errata/RHSA-2018:2439
44
reference_url https://access.redhat.com/errata/RHSA-2018:2729
reference_id RHSA-2018:2729
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:47Z/
url https://access.redhat.com/errata/RHSA-2018:2729
45
reference_url https://access.redhat.com/errata/RHSA-2019:1258
reference_id RHSA-2019:1258
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:47Z/
url https://access.redhat.com/errata/RHSA-2019:1258
46
reference_url https://usn.ubuntu.com/3537-1/
reference_id USN-3537-1
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:47Z/
url https://usn.ubuntu.com/3537-1/
47
reference_url https://usn.ubuntu.com/3537-2/
reference_id USN-3537-2
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:47Z/
url https://usn.ubuntu.com/3537-2/
fixed_packages
0
url pkg:deb/debian/mysql-5.5@5.5.60-0%2Bdeb8u1
purl pkg:deb/debian/mysql-5.5@5.5.60-0%2Bdeb8u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-5.5@5.5.60-0%252Bdeb8u1
aliases CVE-2018-2622
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-64st-u4xn-z7g3
25
url VCID-6g4n-3xfu-hfee
vulnerability_id VCID-6g4n-3xfu-hfee
summary
Multiple vulnerabilities were found in MySQL, the worst of which
    may allow remote execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3308.json
reference_id
reference_type
scores
0
value 7.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3308.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-3308
reference_id
reference_type
scores
0
value 0.00321
scoring_system epss
scoring_elements 0.55162
published_at 2026-04-18T12:55:00Z
1
value 0.00321
scoring_system epss
scoring_elements 0.54995
published_at 2026-04-01T12:55:00Z
2
value 0.00321
scoring_system epss
scoring_elements 0.55096
published_at 2026-04-02T12:55:00Z
3
value 0.00321
scoring_system epss
scoring_elements 0.5512
published_at 2026-04-04T12:55:00Z
4
value 0.00321
scoring_system epss
scoring_elements 0.55095
published_at 2026-04-07T12:55:00Z
5
value 0.00321
scoring_system epss
scoring_elements 0.55146
published_at 2026-04-08T12:55:00Z
6
value 0.00321
scoring_system epss
scoring_elements 0.55145
published_at 2026-04-09T12:55:00Z
7
value 0.00321
scoring_system epss
scoring_elements 0.55157
published_at 2026-04-11T12:55:00Z
8
value 0.00321
scoring_system epss
scoring_elements 0.55137
published_at 2026-04-12T12:55:00Z
9
value 0.00321
scoring_system epss
scoring_elements 0.55119
published_at 2026-04-13T12:55:00Z
10
value 0.00321
scoring_system epss
scoring_elements 0.55158
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-3308
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10286
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10286
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10379
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10379
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10384
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10384
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3302
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3302
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3305
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3305
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3308
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3308
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3309
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3309
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3329
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3329
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3453
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3453
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3456
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3456
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3461
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3461
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3462
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3462
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3463
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3463
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3464
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3464
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3600
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3600
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3636
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3636
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3641
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3641
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3653
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3653
20
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 2.1
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:S/C:N/I:N/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
21
reference_url http://www.debian.org/security/2017/dsa-3834
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:46:18Z/
url http://www.debian.org/security/2017/dsa-3834
22
reference_url http://www.debian.org/security/2017/dsa-3944
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:46:18Z/
url http://www.debian.org/security/2017/dsa-3944
23
reference_url http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:46:18Z/
url http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
24
reference_url http://www.securityfocus.com/bid/97725
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:46:18Z/
url http://www.securityfocus.com/bid/97725
25
reference_url http://www.securitytracker.com/id/1038287
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:46:18Z/
url http://www.securitytracker.com/id/1038287
26
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1443358
reference_id 1443358
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1443358
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-3308
reference_id CVE-2017-3308
reference_type
scores
0
value 4.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:P
1
value 7.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-3308
43
reference_url https://security.gentoo.org/glsa/201802-04
reference_id GLSA-201802-04
reference_type
scores
url https://security.gentoo.org/glsa/201802-04
44
reference_url https://access.redhat.com/errata/RHSA-2017:2192
reference_id RHSA-2017:2192
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:46:18Z/
url https://access.redhat.com/errata/RHSA-2017:2192
45
reference_url https://access.redhat.com/errata/RHSA-2017:2787
reference_id RHSA-2017:2787
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:46:18Z/
url https://access.redhat.com/errata/RHSA-2017:2787
46
reference_url https://access.redhat.com/errata/RHSA-2017:2886
reference_id RHSA-2017:2886
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:46:18Z/
url https://access.redhat.com/errata/RHSA-2017:2886
47
reference_url https://access.redhat.com/errata/RHSA-2018:0279
reference_id RHSA-2018:0279
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:46:18Z/
url https://access.redhat.com/errata/RHSA-2018:0279
48
reference_url https://access.redhat.com/errata/RHSA-2018:0574
reference_id RHSA-2018:0574
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:46:18Z/
url https://access.redhat.com/errata/RHSA-2018:0574
49
reference_url https://usn.ubuntu.com/3269-1/
reference_id USN-3269-1
reference_type
scores
url https://usn.ubuntu.com/3269-1/
50
reference_url https://usn.ubuntu.com/3357-2/
reference_id USN-3357-2
reference_type
scores
url https://usn.ubuntu.com/3357-2/
fixed_packages
0
url pkg:deb/debian/mysql-5.5@5.5.60-0%2Bdeb8u1
purl pkg:deb/debian/mysql-5.5@5.5.60-0%2Bdeb8u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-5.5@5.5.60-0%252Bdeb8u1
aliases CVE-2017-3308
risk_score 3.5
exploitability 0.5
weighted_severity 6.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6g4n-3xfu-hfee
26
url VCID-6gvj-hy6a-3qdx
vulnerability_id VCID-6gvj-hy6a-3qdx
summary
Multiple vulnerabilities were found in MySQL, the worst of which
    may allow remote execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3635.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3635.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-3635
reference_id
reference_type
scores
0
value 0.00635
scoring_system epss
scoring_elements 0.70345
published_at 2026-04-01T12:55:00Z
1
value 0.00635
scoring_system epss
scoring_elements 0.70357
published_at 2026-04-02T12:55:00Z
2
value 0.00635
scoring_system epss
scoring_elements 0.70458
published_at 2026-04-18T12:55:00Z
3
value 0.00635
scoring_system epss
scoring_elements 0.70437
published_at 2026-04-11T12:55:00Z
4
value 0.00635
scoring_system epss
scoring_elements 0.70422
published_at 2026-04-12T12:55:00Z
5
value 0.00635
scoring_system epss
scoring_elements 0.70407
published_at 2026-04-13T12:55:00Z
6
value 0.00635
scoring_system epss
scoring_elements 0.7045
published_at 2026-04-16T12:55:00Z
7
value 0.00635
scoring_system epss
scoring_elements 0.70374
published_at 2026-04-04T12:55:00Z
8
value 0.00635
scoring_system epss
scoring_elements 0.70353
published_at 2026-04-07T12:55:00Z
9
value 0.00635
scoring_system epss
scoring_elements 0.70398
published_at 2026-04-08T12:55:00Z
10
value 0.00635
scoring_system epss
scoring_elements 0.70413
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-3635
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3635
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3635
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3636
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3636
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3641
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3641
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3648
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3648
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3651
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3651
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3652
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3652
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3653
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3653
9
reference_url http://www.securitytracker.com/id/1038928
reference_id 1038928
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:48:25Z/
url http://www.securitytracker.com/id/1038928
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1472685
reference_id 1472685
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1472685
11
reference_url http://www.securityfocus.com/bid/99730
reference_id 99730
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:48:25Z/
url http://www.securityfocus.com/bid/99730
12
reference_url http://www.debian.org/security/2017/dsa-3922
reference_id dsa-3922
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:48:25Z/
url http://www.debian.org/security/2017/dsa-3922
13
reference_url https://security.gentoo.org/glsa/201802-04
reference_id GLSA-201802-04
reference_type
scores
url https://security.gentoo.org/glsa/201802-04
14
reference_url https://usn.ubuntu.com/3357-1/
reference_id USN-3357-1
reference_type
scores
url https://usn.ubuntu.com/3357-1/
15
reference_url https://usn.ubuntu.com/3357-2/
reference_id USN-3357-2
reference_type
scores
url https://usn.ubuntu.com/3357-2/
fixed_packages
0
url pkg:deb/debian/mysql-5.5@5.5.60-0%2Bdeb8u1
purl pkg:deb/debian/mysql-5.5@5.5.60-0%2Bdeb8u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-5.5@5.5.60-0%252Bdeb8u1
aliases CVE-2017-3635
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6gvj-hy6a-3qdx
27
url VCID-6q17-t984-4uhd
vulnerability_id VCID-6q17-t984-4uhd
summary
Multiple vulnerabilities have been found in MySQL and MariaDB, the
    worst of which could allow remote attackers to cause a Denial of Service
    condition or obtain sensitive information.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4737.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4737.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-4737
reference_id
reference_type
scores
0
value 0.00428
scoring_system epss
scoring_elements 0.62334
published_at 2026-04-01T12:55:00Z
1
value 0.00428
scoring_system epss
scoring_elements 0.62392
published_at 2026-04-02T12:55:00Z
2
value 0.00428
scoring_system epss
scoring_elements 0.62423
published_at 2026-04-04T12:55:00Z
3
value 0.00428
scoring_system epss
scoring_elements 0.62388
published_at 2026-04-07T12:55:00Z
4
value 0.00428
scoring_system epss
scoring_elements 0.62437
published_at 2026-04-08T12:55:00Z
5
value 0.00428
scoring_system epss
scoring_elements 0.62454
published_at 2026-04-09T12:55:00Z
6
value 0.00428
scoring_system epss
scoring_elements 0.62473
published_at 2026-04-11T12:55:00Z
7
value 0.00428
scoring_system epss
scoring_elements 0.62462
published_at 2026-04-12T12:55:00Z
8
value 0.00428
scoring_system epss
scoring_elements 0.6244
published_at 2026-04-13T12:55:00Z
9
value 0.00428
scoring_system epss
scoring_elements 0.62484
published_at 2026-04-16T12:55:00Z
10
value 0.00428
scoring_system epss
scoring_elements 0.6249
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-4737
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2582
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2582
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2620
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2620
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2643
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2643
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2648
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2648
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4737
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4737
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4752
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4752
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1244778
reference_id 1244778
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1244778
9
reference_url https://security.gentoo.org/glsa/201610-06
reference_id GLSA-201610-06
reference_type
scores
url https://security.gentoo.org/glsa/201610-06
10
reference_url https://access.redhat.com/errata/RHSA-2015:1628
reference_id RHSA-2015:1628
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1628
11
reference_url https://access.redhat.com/errata/RHSA-2015:1629
reference_id RHSA-2015:1629
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1629
12
reference_url https://access.redhat.com/errata/RHSA-2015:1630
reference_id RHSA-2015:1630
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1630
13
reference_url https://access.redhat.com/errata/RHSA-2015:1646
reference_id RHSA-2015:1646
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1646
14
reference_url https://access.redhat.com/errata/RHSA-2015:1647
reference_id RHSA-2015:1647
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1647
15
reference_url https://access.redhat.com/errata/RHSA-2015:1665
reference_id RHSA-2015:1665
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1665
16
reference_url https://usn.ubuntu.com/2674-1/
reference_id USN-2674-1
reference_type
scores
url https://usn.ubuntu.com/2674-1/
fixed_packages
0
url pkg:deb/debian/mysql-5.5@5.5.47-0%2Bdeb6u1
purl pkg:deb/debian/mysql-5.5@5.5.47-0%2Bdeb6u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1gmc-pj6y-rkfx
1
vulnerability VCID-1nvb-xd5n-gkh8
2
vulnerability VCID-2gyq-q761-h3br
3
vulnerability VCID-2jer-ss8p-7kbg
4
vulnerability VCID-2uxe-ep8b-y7b9
5
vulnerability VCID-2vp1-j324-dkat
6
vulnerability VCID-2yqz-qtv5-47hh
7
vulnerability VCID-2za2-cnwx-hbbw
8
vulnerability VCID-39gt-6dgh-wyar
9
vulnerability VCID-3qjy-4cen-7qev
10
vulnerability VCID-45hn-ezks-j7br
11
vulnerability VCID-4cnj-7fur-3qe3
12
vulnerability VCID-4yz4-vxnh-b3dp
13
vulnerability VCID-52w9-bgxr-nkba
14
vulnerability VCID-55fg-6c2c-6bg8
15
vulnerability VCID-5p65-gfsg-1ugq
16
vulnerability VCID-5q89-vg9j-k3as
17
vulnerability VCID-5sjj-599v-vybg
18
vulnerability VCID-64st-u4xn-z7g3
19
vulnerability VCID-6g4n-3xfu-hfee
20
vulnerability VCID-6gvj-hy6a-3qdx
21
vulnerability VCID-7tj3-dfxj-bke7
22
vulnerability VCID-7w3v-5s98-a7ec
23
vulnerability VCID-7yc3-7bkr-jfc9
24
vulnerability VCID-8krv-jqjg-uqc8
25
vulnerability VCID-8kvb-5u8c-zbc4
26
vulnerability VCID-8sya-wktg-dqa5
27
vulnerability VCID-9f48-53dz-13an
28
vulnerability VCID-9ff2-43rk-2ydj
29
vulnerability VCID-9w98-nfg2-muh2
30
vulnerability VCID-a3hx-qz7x-7ybk
31
vulnerability VCID-bfnh-7k45-nkg2
32
vulnerability VCID-bhxk-8byp-eyap
33
vulnerability VCID-ca85-vx8c-huht
34
vulnerability VCID-cnb3-dy3a-8bdp
35
vulnerability VCID-cyqa-e362-yyaf
36
vulnerability VCID-dfbz-5n6w-syd9
37
vulnerability VCID-dgtc-a2t2-k7f5
38
vulnerability VCID-dqg6-2gmj-judy
39
vulnerability VCID-ej67-ayfh-sqdt
40
vulnerability VCID-esfk-umc5-ska4
41
vulnerability VCID-f8p4-hpsh-2fcw
42
vulnerability VCID-f9vz-r6zv-t7ev
43
vulnerability VCID-fabc-rma2-myab
44
vulnerability VCID-fnks-p4e9-13es
45
vulnerability VCID-fuyw-1y1c-fkfp
46
vulnerability VCID-j2wu-2rx7-3yf2
47
vulnerability VCID-jgff-4jyp-9fgr
48
vulnerability VCID-kwrj-3fxz-g7c6
49
vulnerability VCID-mde2-1ynu-auh2
50
vulnerability VCID-mz71-vku8-ckbm
51
vulnerability VCID-nj41-1zpw-gkh9
52
vulnerability VCID-nkdd-suwp-4ffr
53
vulnerability VCID-p623-gxyv-g7fs
54
vulnerability VCID-pk7e-t26d-aqdm
55
vulnerability VCID-pv92-6p9x-v7bs
56
vulnerability VCID-qyb6-7ees-ukcm
57
vulnerability VCID-r2cz-9kjz-zbgu
58
vulnerability VCID-rfz7-vha1-e7gy
59
vulnerability VCID-rssq-mfc2-ckaf
60
vulnerability VCID-skzt-r7sx-1ucv
61
vulnerability VCID-sy6p-5km4-1kcy
62
vulnerability VCID-tazb-gd49-73b4
63
vulnerability VCID-u2c7-p86x-5bgf
64
vulnerability VCID-un5y-y9sq-1ufb
65
vulnerability VCID-v165-afmm-w3er
66
vulnerability VCID-v4gv-g9n5-ukgc
67
vulnerability VCID-wrna-cc9g-sqbe
68
vulnerability VCID-xuhv-wrut-wuez
69
vulnerability VCID-xvv1-nxs6-n7ab
70
vulnerability VCID-xyuf-au4f-57fr
71
vulnerability VCID-y6p4-vfkn-q7fc
72
vulnerability VCID-yx79-3g2x-pqex
73
vulnerability VCID-zb4s-9rj3-ebea
74
vulnerability VCID-zkvk-538h-w3b9
75
vulnerability VCID-zuxd-n3wn-s7hg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-5.5@5.5.47-0%252Bdeb6u1
aliases CVE-2015-4737
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6q17-t984-4uhd
28
url VCID-7qj2-atsh-pub4
vulnerability_id VCID-7qj2-atsh-pub4
summary security update
references
0
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177539.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177539.html
1
reference_url http://rhn.redhat.com/errata/RHSA-2015-1628.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-1628.html
2
reference_url http://rhn.redhat.com/errata/RHSA-2016-0534.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0534.html
3
reference_url http://rhn.redhat.com/errata/RHSA-2016-1481.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-1481.html
4
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4879.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4879.json
5
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-4879
reference_id
reference_type
scores
0
value 0.00327
scoring_system epss
scoring_elements 0.55733
published_at 2026-04-18T12:55:00Z
1
value 0.00327
scoring_system epss
scoring_elements 0.5555
published_at 2026-04-01T12:55:00Z
2
value 0.00327
scoring_system epss
scoring_elements 0.55662
published_at 2026-04-02T12:55:00Z
3
value 0.00327
scoring_system epss
scoring_elements 0.55686
published_at 2026-04-04T12:55:00Z
4
value 0.00327
scoring_system epss
scoring_elements 0.55664
published_at 2026-04-07T12:55:00Z
5
value 0.00327
scoring_system epss
scoring_elements 0.55715
published_at 2026-04-08T12:55:00Z
6
value 0.00327
scoring_system epss
scoring_elements 0.55718
published_at 2026-04-09T12:55:00Z
7
value 0.00327
scoring_system epss
scoring_elements 0.55727
published_at 2026-04-11T12:55:00Z
8
value 0.00327
scoring_system epss
scoring_elements 0.55707
published_at 2026-04-12T12:55:00Z
9
value 0.00327
scoring_system epss
scoring_elements 0.5569
published_at 2026-04-13T12:55:00Z
10
value 0.00327
scoring_system epss
scoring_elements 0.55729
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-4879
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4792
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4792
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4802
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4802
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4815
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4815
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4816
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4816
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4819
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4819
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4826
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4826
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4830
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4830
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4836
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4836
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4858
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4858
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4861
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4861
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4870
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4870
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4879
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4879
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4895
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4895
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4913
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4913
20
reference_url http://www.debian.org/security/2015/dsa-3377
reference_id
reference_type
scores
url http://www.debian.org/security/2015/dsa-3377
21
reference_url http://www.debian.org/security/2015/dsa-3385
reference_id
reference_type
scores
url http://www.debian.org/security/2015/dsa-3385
22
reference_url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
23
reference_url http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
24
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
25
reference_url http://www.securityfocus.com/bid/77140
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/77140
26
reference_url http://www.securitytracker.com/id/1033894
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1033894
27
reference_url http://www.ubuntu.com/usn/USN-2781-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2781-1
28
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1274783
reference_id 1274783
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1274783
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:-:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:linux:7:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:-:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-4879
reference_id CVE-2015-4879
reference_type
scores
0
value 4.6
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:S/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2015-4879
59
reference_url https://access.redhat.com/errata/RHSA-2015:1628
reference_id RHSA-2015:1628
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1628
60
reference_url https://access.redhat.com/errata/RHSA-2015:1629
reference_id RHSA-2015:1629
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1629
61
reference_url https://access.redhat.com/errata/RHSA-2015:1630
reference_id RHSA-2015:1630
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1630
62
reference_url https://access.redhat.com/errata/RHSA-2016:0534
reference_id RHSA-2016:0534
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0534
63
reference_url https://access.redhat.com/errata/RHSA-2016:1132
reference_id RHSA-2016:1132
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1132
64
reference_url https://access.redhat.com/errata/RHSA-2016:1481
reference_id RHSA-2016:1481
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1481
65
reference_url https://usn.ubuntu.com/2781-1/
reference_id USN-2781-1
reference_type
scores
url https://usn.ubuntu.com/2781-1/
fixed_packages
0
url pkg:deb/debian/mysql-5.5@5.5.47-0%2Bdeb6u1
purl pkg:deb/debian/mysql-5.5@5.5.47-0%2Bdeb6u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1gmc-pj6y-rkfx
1
vulnerability VCID-1nvb-xd5n-gkh8
2
vulnerability VCID-2gyq-q761-h3br
3
vulnerability VCID-2jer-ss8p-7kbg
4
vulnerability VCID-2uxe-ep8b-y7b9
5
vulnerability VCID-2vp1-j324-dkat
6
vulnerability VCID-2yqz-qtv5-47hh
7
vulnerability VCID-2za2-cnwx-hbbw
8
vulnerability VCID-39gt-6dgh-wyar
9
vulnerability VCID-3qjy-4cen-7qev
10
vulnerability VCID-45hn-ezks-j7br
11
vulnerability VCID-4cnj-7fur-3qe3
12
vulnerability VCID-4yz4-vxnh-b3dp
13
vulnerability VCID-52w9-bgxr-nkba
14
vulnerability VCID-55fg-6c2c-6bg8
15
vulnerability VCID-5p65-gfsg-1ugq
16
vulnerability VCID-5q89-vg9j-k3as
17
vulnerability VCID-5sjj-599v-vybg
18
vulnerability VCID-64st-u4xn-z7g3
19
vulnerability VCID-6g4n-3xfu-hfee
20
vulnerability VCID-6gvj-hy6a-3qdx
21
vulnerability VCID-7tj3-dfxj-bke7
22
vulnerability VCID-7w3v-5s98-a7ec
23
vulnerability VCID-7yc3-7bkr-jfc9
24
vulnerability VCID-8krv-jqjg-uqc8
25
vulnerability VCID-8kvb-5u8c-zbc4
26
vulnerability VCID-8sya-wktg-dqa5
27
vulnerability VCID-9f48-53dz-13an
28
vulnerability VCID-9ff2-43rk-2ydj
29
vulnerability VCID-9w98-nfg2-muh2
30
vulnerability VCID-a3hx-qz7x-7ybk
31
vulnerability VCID-bfnh-7k45-nkg2
32
vulnerability VCID-bhxk-8byp-eyap
33
vulnerability VCID-ca85-vx8c-huht
34
vulnerability VCID-cnb3-dy3a-8bdp
35
vulnerability VCID-cyqa-e362-yyaf
36
vulnerability VCID-dfbz-5n6w-syd9
37
vulnerability VCID-dgtc-a2t2-k7f5
38
vulnerability VCID-dqg6-2gmj-judy
39
vulnerability VCID-ej67-ayfh-sqdt
40
vulnerability VCID-esfk-umc5-ska4
41
vulnerability VCID-f8p4-hpsh-2fcw
42
vulnerability VCID-f9vz-r6zv-t7ev
43
vulnerability VCID-fabc-rma2-myab
44
vulnerability VCID-fnks-p4e9-13es
45
vulnerability VCID-fuyw-1y1c-fkfp
46
vulnerability VCID-j2wu-2rx7-3yf2
47
vulnerability VCID-jgff-4jyp-9fgr
48
vulnerability VCID-kwrj-3fxz-g7c6
49
vulnerability VCID-mde2-1ynu-auh2
50
vulnerability VCID-mz71-vku8-ckbm
51
vulnerability VCID-nj41-1zpw-gkh9
52
vulnerability VCID-nkdd-suwp-4ffr
53
vulnerability VCID-p623-gxyv-g7fs
54
vulnerability VCID-pk7e-t26d-aqdm
55
vulnerability VCID-pv92-6p9x-v7bs
56
vulnerability VCID-qyb6-7ees-ukcm
57
vulnerability VCID-r2cz-9kjz-zbgu
58
vulnerability VCID-rfz7-vha1-e7gy
59
vulnerability VCID-rssq-mfc2-ckaf
60
vulnerability VCID-skzt-r7sx-1ucv
61
vulnerability VCID-sy6p-5km4-1kcy
62
vulnerability VCID-tazb-gd49-73b4
63
vulnerability VCID-u2c7-p86x-5bgf
64
vulnerability VCID-un5y-y9sq-1ufb
65
vulnerability VCID-v165-afmm-w3er
66
vulnerability VCID-v4gv-g9n5-ukgc
67
vulnerability VCID-wrna-cc9g-sqbe
68
vulnerability VCID-xuhv-wrut-wuez
69
vulnerability VCID-xvv1-nxs6-n7ab
70
vulnerability VCID-xyuf-au4f-57fr
71
vulnerability VCID-y6p4-vfkn-q7fc
72
vulnerability VCID-yx79-3g2x-pqex
73
vulnerability VCID-zb4s-9rj3-ebea
74
vulnerability VCID-zkvk-538h-w3b9
75
vulnerability VCID-zuxd-n3wn-s7hg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-5.5@5.5.47-0%252Bdeb6u1
aliases CVE-2015-4879
risk_score 2.0
exploitability 0.5
weighted_severity 4.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7qj2-atsh-pub4
29
url VCID-7tj3-dfxj-bke7
vulnerability_id VCID-7tj3-dfxj-bke7
summary security update
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:17Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:17Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:17Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:17Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:17Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:17Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html
6
reference_url http://rhn.redhat.com/errata/RHSA-2016-0705.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:17Z/
url http://rhn.redhat.com/errata/RHSA-2016-0705.html
7
reference_url http://rhn.redhat.com/errata/RHSA-2016-1480.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:17Z/
url http://rhn.redhat.com/errata/RHSA-2016-1480.html
8
reference_url http://rhn.redhat.com/errata/RHSA-2016-1481.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:17Z/
url http://rhn.redhat.com/errata/RHSA-2016-1481.html
9
reference_url http://rhn.redhat.com/errata/RHSA-2016-1602.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:17Z/
url http://rhn.redhat.com/errata/RHSA-2016-1602.html
10
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0647.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0647.json
11
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-0647
reference_id
reference_type
scores
0
value 0.00243
scoring_system epss
scoring_elements 0.47464
published_at 2026-04-07T12:55:00Z
1
value 0.00243
scoring_system epss
scoring_elements 0.47494
published_at 2026-04-02T12:55:00Z
2
value 0.00243
scoring_system epss
scoring_elements 0.47515
published_at 2026-04-09T12:55:00Z
3
value 0.00243
scoring_system epss
scoring_elements 0.47518
published_at 2026-04-08T12:55:00Z
4
value 0.00243
scoring_system epss
scoring_elements 0.47537
published_at 2026-04-11T12:55:00Z
5
value 0.00243
scoring_system epss
scoring_elements 0.47513
published_at 2026-04-12T12:55:00Z
6
value 0.00243
scoring_system epss
scoring_elements 0.47521
published_at 2026-04-13T12:55:00Z
7
value 0.00243
scoring_system epss
scoring_elements 0.4758
published_at 2026-04-16T12:55:00Z
8
value 0.00243
scoring_system epss
scoring_elements 0.47573
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-0647
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0640
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0640
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0641
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0641
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0642
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0642
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0643
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0643
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0644
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0644
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0646
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0646
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0647
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0647
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0648
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0648
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0649
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0649
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0650
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0650
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0655
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0655
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0666
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0666
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0668
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0668
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2047
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2047
26
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:N/I:C/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
27
reference_url https://mariadb.com/kb/en/mariadb/mariadb-10025-release-notes/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:17Z/
url https://mariadb.com/kb/en/mariadb/mariadb-10025-release-notes/
28
reference_url https://mariadb.com/kb/en/mariadb/mariadb-10114-release-notes/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:17Z/
url https://mariadb.com/kb/en/mariadb/mariadb-10114-release-notes/
29
reference_url https://mariadb.com/kb/en/mariadb/mariadb-5549-release-notes/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:17Z/
url https://mariadb.com/kb/en/mariadb/mariadb-5549-release-notes/
30
reference_url http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:17Z/
url http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168
31
reference_url http://www.debian.org/security/2016/dsa-3557
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:17Z/
url http://www.debian.org/security/2016/dsa-3557
32
reference_url http://www.debian.org/security/2016/dsa-3595
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:17Z/
url http://www.debian.org/security/2016/dsa-3595
33
reference_url http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:17Z/
url http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
34
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:17Z/
url http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
35
reference_url http://www.securityfocus.com/bid/86495
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:17Z/
url http://www.securityfocus.com/bid/86495
36
reference_url http://www.securitytracker.com/id/1035606
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:17Z/
url http://www.securitytracker.com/id/1035606
37
reference_url http://www.ubuntu.com/usn/USN-2953-1
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:17Z/
url http://www.ubuntu.com/usn/USN-2953-1
38
reference_url http://www.ubuntu.com/usn/USN-2954-1
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:17Z/
url http://www.ubuntu.com/usn/USN-2954-1
39
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1329249
reference_id 1329249
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1329249
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:powerkvm:2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ibm:powerkvm:2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:powerkvm:2.1:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:powerkvm:3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ibm:powerkvm:3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:powerkvm:3.1:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-0647
reference_id CVE-2016-0647
reference_type
scores
0
value 4.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:P
1
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2016-0647
50
reference_url https://access.redhat.com/errata/RHSA-2016:0705
reference_id RHSA-2016:0705
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0705
51
reference_url https://access.redhat.com/errata/RHSA-2016:1132
reference_id RHSA-2016:1132
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:17Z/
url https://access.redhat.com/errata/RHSA-2016:1132
52
reference_url https://access.redhat.com/errata/RHSA-2016:1480
reference_id RHSA-2016:1480
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1480
53
reference_url https://access.redhat.com/errata/RHSA-2016:1481
reference_id RHSA-2016:1481
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1481
54
reference_url https://access.redhat.com/errata/RHSA-2016:1602
reference_id RHSA-2016:1602
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1602
55
reference_url https://usn.ubuntu.com/2953-1/
reference_id USN-2953-1
reference_type
scores
url https://usn.ubuntu.com/2953-1/
56
reference_url https://usn.ubuntu.com/2954-1/
reference_id USN-2954-1
reference_type
scores
url https://usn.ubuntu.com/2954-1/
fixed_packages
0
url pkg:deb/debian/mysql-5.5@5.5.60-0%2Bdeb8u1
purl pkg:deb/debian/mysql-5.5@5.5.60-0%2Bdeb8u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-5.5@5.5.60-0%252Bdeb8u1
aliases CVE-2016-0647
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7tj3-dfxj-bke7
30
url VCID-7w3v-5s98-a7ec
vulnerability_id VCID-7w3v-5s98-a7ec
summary security update
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html
6
reference_url http://rhn.redhat.com/errata/RHSA-2016-0534.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0534.html
7
reference_url http://rhn.redhat.com/errata/RHSA-2016-0705.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0705.html
8
reference_url http://rhn.redhat.com/errata/RHSA-2016-1480.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-1480.html
9
reference_url http://rhn.redhat.com/errata/RHSA-2016-1481.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-1481.html
10
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2047.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2047.json
11
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-2047
reference_id
reference_type
scores
0
value 0.01749
scoring_system epss
scoring_elements 0.82585
published_at 2026-04-18T12:55:00Z
1
value 0.01749
scoring_system epss
scoring_elements 0.82554
published_at 2026-04-12T12:55:00Z
2
value 0.01749
scoring_system epss
scoring_elements 0.82549
published_at 2026-04-13T12:55:00Z
3
value 0.01749
scoring_system epss
scoring_elements 0.82477
published_at 2026-04-01T12:55:00Z
4
value 0.01749
scoring_system epss
scoring_elements 0.82492
published_at 2026-04-02T12:55:00Z
5
value 0.01749
scoring_system epss
scoring_elements 0.8251
published_at 2026-04-04T12:55:00Z
6
value 0.01749
scoring_system epss
scoring_elements 0.82506
published_at 2026-04-07T12:55:00Z
7
value 0.01749
scoring_system epss
scoring_elements 0.82532
published_at 2026-04-08T12:55:00Z
8
value 0.01749
scoring_system epss
scoring_elements 0.8254
published_at 2026-04-09T12:55:00Z
9
value 0.01749
scoring_system epss
scoring_elements 0.82558
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-2047
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0505
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0505
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0546
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0546
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0596
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0596
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0597
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0597
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0598
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0598
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0600
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0600
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0606
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0606
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0608
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0608
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0609
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0609
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0616
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0616
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0640
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0640
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0641
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0641
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0642
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0642
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0643
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0643
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0644
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0644
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0646
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0646
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0647
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0647
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0648
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0648
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0649
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0649
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0650
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0650
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0666
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0666
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2047
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2047
34
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:S/C:P/I:P/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
35
reference_url https://mariadb.atlassian.net/browse/MDEV-9212
reference_id
reference_type
scores
url https://mariadb.atlassian.net/browse/MDEV-9212
36
reference_url https://mariadb.com/kb/en/mariadb/mariadb-10110-release-notes/
reference_id
reference_type
scores
url https://mariadb.com/kb/en/mariadb/mariadb-10110-release-notes/
37
reference_url https://mariadb.com/kb/en/mariadb/mariadb-5547-release-notes/
reference_id
reference_type
scores
url https://mariadb.com/kb/en/mariadb/mariadb-5547-release-notes/
38
reference_url https://mariadb.com/kb/en/mdb-10023-rn/
reference_id
reference_type
scores
url https://mariadb.com/kb/en/mdb-10023-rn/
39
reference_url http://www.debian.org/security/2016/dsa-3453
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3453
40
reference_url http://www.debian.org/security/2016/dsa-3557
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3557
41
reference_url http://www.openwall.com/lists/oss-security/2016/01/26/3
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2016/01/26/3
42
reference_url http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
43
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
44
reference_url http://www.securityfocus.com/bid/81810
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/81810
45
reference_url http://www.securitytracker.com/id/1035606
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1035606
46
reference_url http://www.ubuntu.com/usn/USN-2953-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2953-1
47
reference_url http://www.ubuntu.com/usn/USN-2954-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2954-1
48
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1301874
reference_id 1301874
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1301874
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-2047
reference_id CVE-2016-2047
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:P/A:N
1
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2016-2047
62
reference_url https://access.redhat.com/errata/RHSA-2016:0534
reference_id RHSA-2016:0534
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0534
63
reference_url https://access.redhat.com/errata/RHSA-2016:0705
reference_id RHSA-2016:0705
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0705
64
reference_url https://access.redhat.com/errata/RHSA-2016:1132
reference_id RHSA-2016:1132
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1132
65
reference_url https://access.redhat.com/errata/RHSA-2016:1480
reference_id RHSA-2016:1480
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1480
66
reference_url https://access.redhat.com/errata/RHSA-2016:1481
reference_id RHSA-2016:1481
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1481
67
reference_url https://usn.ubuntu.com/2953-1/
reference_id USN-2953-1
reference_type
scores
url https://usn.ubuntu.com/2953-1/
68
reference_url https://usn.ubuntu.com/2954-1/
reference_id USN-2954-1
reference_type
scores
url https://usn.ubuntu.com/2954-1/
fixed_packages
0
url pkg:deb/debian/mysql-5.5@5.5.60-0%2Bdeb8u1
purl pkg:deb/debian/mysql-5.5@5.5.60-0%2Bdeb8u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-5.5@5.5.60-0%252Bdeb8u1
aliases CVE-2016-2047
risk_score 2.6
exploitability 0.5
weighted_severity 5.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7w3v-5s98-a7ec
31
url VCID-7yc3-7bkr-jfc9
vulnerability_id VCID-7yc3-7bkr-jfc9
summary
Multiple vulnerabilities were found in MySQL, the worst of which
    may allow remote execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2640.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2640.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-2640
reference_id
reference_type
scores
0
value 0.00338
scoring_system epss
scoring_elements 0.5666
published_at 2026-04-18T12:55:00Z
1
value 0.00338
scoring_system epss
scoring_elements 0.56629
published_at 2026-04-13T12:55:00Z
2
value 0.00338
scoring_system epss
scoring_elements 0.56661
published_at 2026-04-16T12:55:00Z
3
value 0.00464
scoring_system epss
scoring_elements 0.64274
published_at 2026-04-07T12:55:00Z
4
value 0.00464
scoring_system epss
scoring_elements 0.6435
published_at 2026-04-11T12:55:00Z
5
value 0.00464
scoring_system epss
scoring_elements 0.64337
published_at 2026-04-09T12:55:00Z
6
value 0.00464
scoring_system epss
scoring_elements 0.64317
published_at 2026-04-04T12:55:00Z
7
value 0.00464
scoring_system epss
scoring_elements 0.64322
published_at 2026-04-08T12:55:00Z
8
value 0.00464
scoring_system epss
scoring_elements 0.64231
published_at 2026-04-01T12:55:00Z
9
value 0.00464
scoring_system epss
scoring_elements 0.64288
published_at 2026-04-02T12:55:00Z
10
value 0.00464
scoring_system epss
scoring_elements 0.64338
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-2640
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10268
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10268
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10378
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10378
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15365
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15365
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2562
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2562
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2612
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2612
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2622
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2622
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2640
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2640
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2665
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2665
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2668
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2668
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2755
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2755
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2761
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2761
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2766
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2766
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2767
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2767
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2771
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2771
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2781
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2781
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2782
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2782
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2784
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2784
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2787
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2787
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2813
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2813
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2817
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2817
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2819
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2819
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3058
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3058
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3063
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3063
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3064
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3064
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3066
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3066
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3081
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3081
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3143
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3143
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3156
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3156
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3174
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3174
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3251
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3251
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3282
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3282
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2503
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2503
34
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
35
reference_url http://www.securityfocus.com/bid/102678
reference_id 102678
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:22:53Z/
url http://www.securityfocus.com/bid/102678
36
reference_url http://www.securitytracker.com/id/1040216
reference_id 1040216
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:22:53Z/
url http://www.securitytracker.com/id/1040216
37
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1535500
reference_id 1535500
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1535500
38
reference_url https://www.debian.org/security/2018/dsa-4091
reference_id dsa-4091
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:22:53Z/
url https://www.debian.org/security/2018/dsa-4091
39
reference_url https://security.gentoo.org/glsa/201802-04
reference_id GLSA-201802-04
reference_type
scores
url https://security.gentoo.org/glsa/201802-04
40
reference_url https://lists.debian.org/debian-lts-announce/2018/01/msg00024.html
reference_id msg00024.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:22:53Z/
url https://lists.debian.org/debian-lts-announce/2018/01/msg00024.html
41
reference_url https://access.redhat.com/errata/RHSA-2018:0586
reference_id RHSA-2018:0586
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:22:53Z/
url https://access.redhat.com/errata/RHSA-2018:0586
42
reference_url https://access.redhat.com/errata/RHSA-2018:0587
reference_id RHSA-2018:0587
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:22:53Z/
url https://access.redhat.com/errata/RHSA-2018:0587
43
reference_url https://access.redhat.com/errata/RHSA-2018:2439
reference_id RHSA-2018:2439
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:22:53Z/
url https://access.redhat.com/errata/RHSA-2018:2439
44
reference_url https://access.redhat.com/errata/RHSA-2018:2729
reference_id RHSA-2018:2729
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:22:53Z/
url https://access.redhat.com/errata/RHSA-2018:2729
45
reference_url https://access.redhat.com/errata/RHSA-2019:1258
reference_id RHSA-2019:1258
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:22:53Z/
url https://access.redhat.com/errata/RHSA-2019:1258
46
reference_url https://usn.ubuntu.com/3537-1/
reference_id USN-3537-1
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:22:53Z/
url https://usn.ubuntu.com/3537-1/
47
reference_url https://usn.ubuntu.com/3537-2/
reference_id USN-3537-2
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:22:53Z/
url https://usn.ubuntu.com/3537-2/
fixed_packages
0
url pkg:deb/debian/mysql-5.5@5.5.60-0%2Bdeb8u1
purl pkg:deb/debian/mysql-5.5@5.5.60-0%2Bdeb8u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-5.5@5.5.60-0%252Bdeb8u1
aliases CVE-2018-2640
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7yc3-7bkr-jfc9
32
url VCID-8c58-rvng-7fga
vulnerability_id VCID-8c58-rvng-7fga
summary
Multiple vulnerabilities have been found in MySQL, allowing
    attackers to execute arbitrary code or cause Denial of Service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0499.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0499.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-0499
reference_id
reference_type
scores
0
value 0.00329
scoring_system epss
scoring_elements 0.55807
published_at 2026-04-01T12:55:00Z
1
value 0.00329
scoring_system epss
scoring_elements 0.55918
published_at 2026-04-07T12:55:00Z
2
value 0.00329
scoring_system epss
scoring_elements 0.5594
published_at 2026-04-04T12:55:00Z
3
value 0.00329
scoring_system epss
scoring_elements 0.55969
published_at 2026-04-08T12:55:00Z
4
value 0.00329
scoring_system epss
scoring_elements 0.55971
published_at 2026-04-09T12:55:00Z
5
value 0.00329
scoring_system epss
scoring_elements 0.55981
published_at 2026-04-11T12:55:00Z
6
value 0.00329
scoring_system epss
scoring_elements 0.55961
published_at 2026-04-12T12:55:00Z
7
value 0.00329
scoring_system epss
scoring_elements 0.55943
published_at 2026-04-13T12:55:00Z
8
value 0.00329
scoring_system epss
scoring_elements 0.55979
published_at 2026-04-16T12:55:00Z
9
value 0.00329
scoring_system epss
scoring_elements 0.55982
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-0499
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0433
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0433
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0441
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0441
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0499
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0499
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0501
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0501
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0505
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0505
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2568
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2568
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2571
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2571
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2573
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2573
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2582
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2582
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2643
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2643
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2648
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2648
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3152
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3152
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4752
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4752
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4757
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4757
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1212768
reference_id 1212768
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1212768
17
reference_url https://security.gentoo.org/glsa/201507-19
reference_id GLSA-201507-19
reference_type
scores
url https://security.gentoo.org/glsa/201507-19
18
reference_url https://access.redhat.com/errata/RHSA-2015:1628
reference_id RHSA-2015:1628
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1628
19
reference_url https://access.redhat.com/errata/RHSA-2015:1629
reference_id RHSA-2015:1629
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1629
20
reference_url https://access.redhat.com/errata/RHSA-2015:1646
reference_id RHSA-2015:1646
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1646
21
reference_url https://access.redhat.com/errata/RHSA-2015:1647
reference_id RHSA-2015:1647
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1647
22
reference_url https://access.redhat.com/errata/RHSA-2015:1665
reference_id RHSA-2015:1665
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1665
23
reference_url https://usn.ubuntu.com/2575-1/
reference_id USN-2575-1
reference_type
scores
url https://usn.ubuntu.com/2575-1/
fixed_packages
0
url pkg:deb/debian/mysql-5.5@5.5.47-0%2Bdeb6u1
purl pkg:deb/debian/mysql-5.5@5.5.47-0%2Bdeb6u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1gmc-pj6y-rkfx
1
vulnerability VCID-1nvb-xd5n-gkh8
2
vulnerability VCID-2gyq-q761-h3br
3
vulnerability VCID-2jer-ss8p-7kbg
4
vulnerability VCID-2uxe-ep8b-y7b9
5
vulnerability VCID-2vp1-j324-dkat
6
vulnerability VCID-2yqz-qtv5-47hh
7
vulnerability VCID-2za2-cnwx-hbbw
8
vulnerability VCID-39gt-6dgh-wyar
9
vulnerability VCID-3qjy-4cen-7qev
10
vulnerability VCID-45hn-ezks-j7br
11
vulnerability VCID-4cnj-7fur-3qe3
12
vulnerability VCID-4yz4-vxnh-b3dp
13
vulnerability VCID-52w9-bgxr-nkba
14
vulnerability VCID-55fg-6c2c-6bg8
15
vulnerability VCID-5p65-gfsg-1ugq
16
vulnerability VCID-5q89-vg9j-k3as
17
vulnerability VCID-5sjj-599v-vybg
18
vulnerability VCID-64st-u4xn-z7g3
19
vulnerability VCID-6g4n-3xfu-hfee
20
vulnerability VCID-6gvj-hy6a-3qdx
21
vulnerability VCID-7tj3-dfxj-bke7
22
vulnerability VCID-7w3v-5s98-a7ec
23
vulnerability VCID-7yc3-7bkr-jfc9
24
vulnerability VCID-8krv-jqjg-uqc8
25
vulnerability VCID-8kvb-5u8c-zbc4
26
vulnerability VCID-8sya-wktg-dqa5
27
vulnerability VCID-9f48-53dz-13an
28
vulnerability VCID-9ff2-43rk-2ydj
29
vulnerability VCID-9w98-nfg2-muh2
30
vulnerability VCID-a3hx-qz7x-7ybk
31
vulnerability VCID-bfnh-7k45-nkg2
32
vulnerability VCID-bhxk-8byp-eyap
33
vulnerability VCID-ca85-vx8c-huht
34
vulnerability VCID-cnb3-dy3a-8bdp
35
vulnerability VCID-cyqa-e362-yyaf
36
vulnerability VCID-dfbz-5n6w-syd9
37
vulnerability VCID-dgtc-a2t2-k7f5
38
vulnerability VCID-dqg6-2gmj-judy
39
vulnerability VCID-ej67-ayfh-sqdt
40
vulnerability VCID-esfk-umc5-ska4
41
vulnerability VCID-f8p4-hpsh-2fcw
42
vulnerability VCID-f9vz-r6zv-t7ev
43
vulnerability VCID-fabc-rma2-myab
44
vulnerability VCID-fnks-p4e9-13es
45
vulnerability VCID-fuyw-1y1c-fkfp
46
vulnerability VCID-j2wu-2rx7-3yf2
47
vulnerability VCID-jgff-4jyp-9fgr
48
vulnerability VCID-kwrj-3fxz-g7c6
49
vulnerability VCID-mde2-1ynu-auh2
50
vulnerability VCID-mz71-vku8-ckbm
51
vulnerability VCID-nj41-1zpw-gkh9
52
vulnerability VCID-nkdd-suwp-4ffr
53
vulnerability VCID-p623-gxyv-g7fs
54
vulnerability VCID-pk7e-t26d-aqdm
55
vulnerability VCID-pv92-6p9x-v7bs
56
vulnerability VCID-qyb6-7ees-ukcm
57
vulnerability VCID-r2cz-9kjz-zbgu
58
vulnerability VCID-rfz7-vha1-e7gy
59
vulnerability VCID-rssq-mfc2-ckaf
60
vulnerability VCID-skzt-r7sx-1ucv
61
vulnerability VCID-sy6p-5km4-1kcy
62
vulnerability VCID-tazb-gd49-73b4
63
vulnerability VCID-u2c7-p86x-5bgf
64
vulnerability VCID-un5y-y9sq-1ufb
65
vulnerability VCID-v165-afmm-w3er
66
vulnerability VCID-v4gv-g9n5-ukgc
67
vulnerability VCID-wrna-cc9g-sqbe
68
vulnerability VCID-xuhv-wrut-wuez
69
vulnerability VCID-xvv1-nxs6-n7ab
70
vulnerability VCID-xyuf-au4f-57fr
71
vulnerability VCID-y6p4-vfkn-q7fc
72
vulnerability VCID-yx79-3g2x-pqex
73
vulnerability VCID-zb4s-9rj3-ebea
74
vulnerability VCID-zkvk-538h-w3b9
75
vulnerability VCID-zuxd-n3wn-s7hg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-5.5@5.5.47-0%252Bdeb6u1
aliases CVE-2015-0499
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8c58-rvng-7fga
33
url VCID-8krv-jqjg-uqc8
vulnerability_id VCID-8krv-jqjg-uqc8
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7440.json
reference_id
reference_type
scores
0
value 5.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7440.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-7440
reference_id
reference_type
scores
0
value 0.0008
scoring_system epss
scoring_elements 0.23554
published_at 2026-04-01T12:55:00Z
1
value 0.0008
scoring_system epss
scoring_elements 0.23711
published_at 2026-04-02T12:55:00Z
2
value 0.0008
scoring_system epss
scoring_elements 0.23754
published_at 2026-04-04T12:55:00Z
3
value 0.0008
scoring_system epss
scoring_elements 0.23535
published_at 2026-04-07T12:55:00Z
4
value 0.0008
scoring_system epss
scoring_elements 0.23606
published_at 2026-04-08T12:55:00Z
5
value 0.0008
scoring_system epss
scoring_elements 0.23651
published_at 2026-04-09T12:55:00Z
6
value 0.0008
scoring_system epss
scoring_elements 0.23667
published_at 2026-04-11T12:55:00Z
7
value 0.0008
scoring_system epss
scoring_elements 0.23625
published_at 2026-04-12T12:55:00Z
8
value 0.0008
scoring_system epss
scoring_elements 0.23568
published_at 2026-04-13T12:55:00Z
9
value 0.0008
scoring_system epss
scoring_elements 0.2358
published_at 2026-04-16T12:55:00Z
10
value 0.0008
scoring_system epss
scoring_elements 0.23569
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-7440
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3492
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3492
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5584
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5584
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5624
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5624
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5626
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5626
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5629
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5629
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6663
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6663
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7440
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7440
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8283
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8283
10
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4
scoring_system cvssv2
scoring_elements AV:L/AC:H/Au:N/C:C/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1386584
reference_id 1386584
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1386584
12
reference_url https://usn.ubuntu.com/3109-1/
reference_id USN-3109-1
reference_type
scores
url https://usn.ubuntu.com/3109-1/
fixed_packages
0
url pkg:deb/debian/mysql-5.5@5.5.60-0%2Bdeb8u1
purl pkg:deb/debian/mysql-5.5@5.5.60-0%2Bdeb8u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-5.5@5.5.60-0%252Bdeb8u1
aliases CVE-2016-7440
risk_score 2.3
exploitability 0.5
weighted_severity 4.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8krv-jqjg-uqc8
34
url VCID-8kvb-5u8c-zbc4
vulnerability_id VCID-8kvb-5u8c-zbc4
summary
Multiple vulnerabilities have been found in MariaDB and MySQL, the
    worst of which could lead to the remote execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5584.json
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5584.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-5584
reference_id
reference_type
scores
0
value 0.00442
scoring_system epss
scoring_elements 0.63214
published_at 2026-04-01T12:55:00Z
1
value 0.00442
scoring_system epss
scoring_elements 0.63345
published_at 2026-04-18T12:55:00Z
2
value 0.00442
scoring_system epss
scoring_elements 0.63273
published_at 2026-04-02T12:55:00Z
3
value 0.00442
scoring_system epss
scoring_elements 0.63302
published_at 2026-04-13T12:55:00Z
4
value 0.00442
scoring_system epss
scoring_elements 0.63268
published_at 2026-04-07T12:55:00Z
5
value 0.00442
scoring_system epss
scoring_elements 0.63319
published_at 2026-04-08T12:55:00Z
6
value 0.00442
scoring_system epss
scoring_elements 0.63337
published_at 2026-04-16T12:55:00Z
7
value 0.00442
scoring_system epss
scoring_elements 0.63355
published_at 2026-04-11T12:55:00Z
8
value 0.00442
scoring_system epss
scoring_elements 0.63338
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-5584
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3492
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3492
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5584
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5584
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5624
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5624
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5626
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5626
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5629
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5629
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6663
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6663
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7440
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7440
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8283
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8283
10
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:S/C:C/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
11
reference_url http://www.securitytracker.com/id/1037050
reference_id 1037050
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:08Z/
url http://www.securitytracker.com/id/1037050
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1386557
reference_id 1386557
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1386557
13
reference_url http://www.securityfocus.com/bid/93735
reference_id 93735
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:08Z/
url http://www.securityfocus.com/bid/93735
14
reference_url http://www.debian.org/security/2016/dsa-3706
reference_id dsa-3706
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:08Z/
url http://www.debian.org/security/2016/dsa-3706
15
reference_url https://security.gentoo.org/glsa/201701-01
reference_id GLSA-201701-01
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:08Z/
url https://security.gentoo.org/glsa/201701-01
16
reference_url https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/
reference_id mariadb-10028-release-notes
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:08Z/
url https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/
17
reference_url https://usn.ubuntu.com/3109-1/
reference_id USN-3109-1
reference_type
scores
url https://usn.ubuntu.com/3109-1/
fixed_packages
0
url pkg:deb/debian/mysql-5.5@5.5.60-0%2Bdeb8u1
purl pkg:deb/debian/mysql-5.5@5.5.60-0%2Bdeb8u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-5.5@5.5.60-0%252Bdeb8u1
aliases CVE-2016-5584
risk_score 2.0
exploitability 0.5
weighted_severity 4.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8kvb-5u8c-zbc4
35
url VCID-8sya-wktg-dqa5
vulnerability_id VCID-8sya-wktg-dqa5
summary security update
references
0
reference_url http://lists.opensuse.org/opensuse-updates/2016-09/msg00042.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:47:35Z/
url http://lists.opensuse.org/opensuse-updates/2016-09/msg00042.html
1
reference_url http://rhn.redhat.com/errata/RHSA-2016-1480.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:47:35Z/
url http://rhn.redhat.com/errata/RHSA-2016-1480.html
2
reference_url http://rhn.redhat.com/errata/RHSA-2016-1601.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:47:35Z/
url http://rhn.redhat.com/errata/RHSA-2016-1601.html
3
reference_url http://rhn.redhat.com/errata/RHSA-2016-1602.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:47:35Z/
url http://rhn.redhat.com/errata/RHSA-2016-1602.html
4
reference_url http://rhn.redhat.com/errata/RHSA-2016-1603.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:47:35Z/
url http://rhn.redhat.com/errata/RHSA-2016-1603.html
5
reference_url http://rhn.redhat.com/errata/RHSA-2016-1604.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:47:35Z/
url http://rhn.redhat.com/errata/RHSA-2016-1604.html
6
reference_url http://rhn.redhat.com/errata/RHSA-2016-1637.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:47:35Z/
url http://rhn.redhat.com/errata/RHSA-2016-1637.html
7
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5440.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5440.json
8
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-5440
reference_id
reference_type
scores
0
value 0.00854
scoring_system epss
scoring_elements 0.74934
published_at 2026-04-08T12:55:00Z
1
value 0.00854
scoring_system epss
scoring_elements 0.74938
published_at 2026-04-13T12:55:00Z
2
value 0.00854
scoring_system epss
scoring_elements 0.74947
published_at 2026-04-12T12:55:00Z
3
value 0.00854
scoring_system epss
scoring_elements 0.74969
published_at 2026-04-11T12:55:00Z
4
value 0.00854
scoring_system epss
scoring_elements 0.74946
published_at 2026-04-09T12:55:00Z
5
value 0.00854
scoring_system epss
scoring_elements 0.74897
published_at 2026-04-01T12:55:00Z
6
value 0.00854
scoring_system epss
scoring_elements 0.74898
published_at 2026-04-02T12:55:00Z
7
value 0.00854
scoring_system epss
scoring_elements 0.74927
published_at 2026-04-04T12:55:00Z
8
value 0.00854
scoring_system epss
scoring_elements 0.749
published_at 2026-04-07T12:55:00Z
9
value 0.00854
scoring_system epss
scoring_elements 0.74982
published_at 2026-04-18T12:55:00Z
10
value 0.00854
scoring_system epss
scoring_elements 0.74975
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-5440
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3477
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3477
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3521
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3521
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3615
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3615
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5440
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5440
13
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:C
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
14
reference_url https://mariadb.com/kb/en/mariadb/mariadb-10026-release-notes/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:47:35Z/
url https://mariadb.com/kb/en/mariadb/mariadb-10026-release-notes/
15
reference_url https://mariadb.com/kb/en/mariadb/mariadb-10115-release-notes/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:47:35Z/
url https://mariadb.com/kb/en/mariadb/mariadb-10115-release-notes/
16
reference_url https://mariadb.com/kb/en/mariadb/mariadb-5550-release-notes/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:47:35Z/
url https://mariadb.com/kb/en/mariadb/mariadb-5550-release-notes/
17
reference_url http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:47:35Z/
url http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168
18
reference_url http://www.debian.org/security/2016/dsa-3624
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:47:35Z/
url http://www.debian.org/security/2016/dsa-3624
19
reference_url http://www.debian.org/security/2016/dsa-3632
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:47:35Z/
url http://www.debian.org/security/2016/dsa-3632
20
reference_url http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:47:35Z/
url http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
21
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:47:35Z/
url http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
22
reference_url http://www.securityfocus.com/bid/91787
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:47:35Z/
url http://www.securityfocus.com/bid/91787
23
reference_url http://www.securityfocus.com/bid/91953
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:47:35Z/
url http://www.securityfocus.com/bid/91953
24
reference_url http://www.securitytracker.com/id/1036362
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:47:35Z/
url http://www.securitytracker.com/id/1036362
25
reference_url http://www.ubuntu.com/usn/USN-3040-1
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:47:35Z/
url http://www.ubuntu.com/usn/USN-3040-1
26
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1358218
reference_id 1358218
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1358218
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:powerkvm:2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ibm:powerkvm:2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:powerkvm:2.1:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:powerkvm:3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ibm:powerkvm:3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:powerkvm:3.1:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-5440
reference_id CVE-2016-5440
reference_type
scores
0
value 4.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:P
1
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2016-5440
51
reference_url https://access.redhat.com/errata/RHSA-2016:1480
reference_id RHSA-2016:1480
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1480
52
reference_url https://access.redhat.com/errata/RHSA-2016:1601
reference_id RHSA-2016:1601
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1601
53
reference_url https://access.redhat.com/errata/RHSA-2016:1602
reference_id RHSA-2016:1602
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1602
54
reference_url https://access.redhat.com/errata/RHSA-2016:1603
reference_id RHSA-2016:1603
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1603
55
reference_url https://access.redhat.com/errata/RHSA-2016:1604
reference_id RHSA-2016:1604
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1604
56
reference_url https://access.redhat.com/errata/RHSA-2016:1637
reference_id RHSA-2016:1637
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1637
57
reference_url https://usn.ubuntu.com/3040-1/
reference_id USN-3040-1
reference_type
scores
url https://usn.ubuntu.com/3040-1/
fixed_packages
0
url pkg:deb/debian/mysql-5.5@5.5.60-0%2Bdeb8u1
purl pkg:deb/debian/mysql-5.5@5.5.60-0%2Bdeb8u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-5.5@5.5.60-0%252Bdeb8u1
aliases CVE-2016-5440
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8sya-wktg-dqa5
36
url VCID-9591-6344-yuga
vulnerability_id VCID-9591-6344-yuga
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4792.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4792.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-4792
reference_id
reference_type
scores
0
value 0.00906
scoring_system epss
scoring_elements 0.75688
published_at 2026-04-01T12:55:00Z
1
value 0.00906
scoring_system epss
scoring_elements 0.7569
published_at 2026-04-02T12:55:00Z
2
value 0.00906
scoring_system epss
scoring_elements 0.75721
published_at 2026-04-04T12:55:00Z
3
value 0.00906
scoring_system epss
scoring_elements 0.757
published_at 2026-04-07T12:55:00Z
4
value 0.00906
scoring_system epss
scoring_elements 0.75734
published_at 2026-04-08T12:55:00Z
5
value 0.00906
scoring_system epss
scoring_elements 0.75745
published_at 2026-04-13T12:55:00Z
6
value 0.00906
scoring_system epss
scoring_elements 0.75769
published_at 2026-04-11T12:55:00Z
7
value 0.00906
scoring_system epss
scoring_elements 0.75751
published_at 2026-04-12T12:55:00Z
8
value 0.00906
scoring_system epss
scoring_elements 0.75782
published_at 2026-04-16T12:55:00Z
9
value 0.00906
scoring_system epss
scoring_elements 0.75785
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-4792
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4792
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4792
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4802
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4802
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4815
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4815
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4816
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4816
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4819
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4819
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4826
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4826
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4830
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4830
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4836
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4836
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4858
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4858
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4861
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4861
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4870
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4870
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4879
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4879
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4895
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4895
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4913
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4913
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1274752
reference_id 1274752
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1274752
17
reference_url https://access.redhat.com/errata/RHSA-2016:0534
reference_id RHSA-2016:0534
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0534
18
reference_url https://access.redhat.com/errata/RHSA-2016:0705
reference_id RHSA-2016:0705
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0705
19
reference_url https://access.redhat.com/errata/RHSA-2016:1132
reference_id RHSA-2016:1132
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1132
20
reference_url https://access.redhat.com/errata/RHSA-2016:1480
reference_id RHSA-2016:1480
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1480
21
reference_url https://access.redhat.com/errata/RHSA-2016:1481
reference_id RHSA-2016:1481
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1481
22
reference_url https://usn.ubuntu.com/2781-1/
reference_id USN-2781-1
reference_type
scores
url https://usn.ubuntu.com/2781-1/
fixed_packages
0
url pkg:deb/debian/mysql-5.5@5.5.47-0%2Bdeb6u1
purl pkg:deb/debian/mysql-5.5@5.5.47-0%2Bdeb6u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1gmc-pj6y-rkfx
1
vulnerability VCID-1nvb-xd5n-gkh8
2
vulnerability VCID-2gyq-q761-h3br
3
vulnerability VCID-2jer-ss8p-7kbg
4
vulnerability VCID-2uxe-ep8b-y7b9
5
vulnerability VCID-2vp1-j324-dkat
6
vulnerability VCID-2yqz-qtv5-47hh
7
vulnerability VCID-2za2-cnwx-hbbw
8
vulnerability VCID-39gt-6dgh-wyar
9
vulnerability VCID-3qjy-4cen-7qev
10
vulnerability VCID-45hn-ezks-j7br
11
vulnerability VCID-4cnj-7fur-3qe3
12
vulnerability VCID-4yz4-vxnh-b3dp
13
vulnerability VCID-52w9-bgxr-nkba
14
vulnerability VCID-55fg-6c2c-6bg8
15
vulnerability VCID-5p65-gfsg-1ugq
16
vulnerability VCID-5q89-vg9j-k3as
17
vulnerability VCID-5sjj-599v-vybg
18
vulnerability VCID-64st-u4xn-z7g3
19
vulnerability VCID-6g4n-3xfu-hfee
20
vulnerability VCID-6gvj-hy6a-3qdx
21
vulnerability VCID-7tj3-dfxj-bke7
22
vulnerability VCID-7w3v-5s98-a7ec
23
vulnerability VCID-7yc3-7bkr-jfc9
24
vulnerability VCID-8krv-jqjg-uqc8
25
vulnerability VCID-8kvb-5u8c-zbc4
26
vulnerability VCID-8sya-wktg-dqa5
27
vulnerability VCID-9f48-53dz-13an
28
vulnerability VCID-9ff2-43rk-2ydj
29
vulnerability VCID-9w98-nfg2-muh2
30
vulnerability VCID-a3hx-qz7x-7ybk
31
vulnerability VCID-bfnh-7k45-nkg2
32
vulnerability VCID-bhxk-8byp-eyap
33
vulnerability VCID-ca85-vx8c-huht
34
vulnerability VCID-cnb3-dy3a-8bdp
35
vulnerability VCID-cyqa-e362-yyaf
36
vulnerability VCID-dfbz-5n6w-syd9
37
vulnerability VCID-dgtc-a2t2-k7f5
38
vulnerability VCID-dqg6-2gmj-judy
39
vulnerability VCID-ej67-ayfh-sqdt
40
vulnerability VCID-esfk-umc5-ska4
41
vulnerability VCID-f8p4-hpsh-2fcw
42
vulnerability VCID-f9vz-r6zv-t7ev
43
vulnerability VCID-fabc-rma2-myab
44
vulnerability VCID-fnks-p4e9-13es
45
vulnerability VCID-fuyw-1y1c-fkfp
46
vulnerability VCID-j2wu-2rx7-3yf2
47
vulnerability VCID-jgff-4jyp-9fgr
48
vulnerability VCID-kwrj-3fxz-g7c6
49
vulnerability VCID-mde2-1ynu-auh2
50
vulnerability VCID-mz71-vku8-ckbm
51
vulnerability VCID-nj41-1zpw-gkh9
52
vulnerability VCID-nkdd-suwp-4ffr
53
vulnerability VCID-p623-gxyv-g7fs
54
vulnerability VCID-pk7e-t26d-aqdm
55
vulnerability VCID-pv92-6p9x-v7bs
56
vulnerability VCID-qyb6-7ees-ukcm
57
vulnerability VCID-r2cz-9kjz-zbgu
58
vulnerability VCID-rfz7-vha1-e7gy
59
vulnerability VCID-rssq-mfc2-ckaf
60
vulnerability VCID-skzt-r7sx-1ucv
61
vulnerability VCID-sy6p-5km4-1kcy
62
vulnerability VCID-tazb-gd49-73b4
63
vulnerability VCID-u2c7-p86x-5bgf
64
vulnerability VCID-un5y-y9sq-1ufb
65
vulnerability VCID-v165-afmm-w3er
66
vulnerability VCID-v4gv-g9n5-ukgc
67
vulnerability VCID-wrna-cc9g-sqbe
68
vulnerability VCID-xuhv-wrut-wuez
69
vulnerability VCID-xvv1-nxs6-n7ab
70
vulnerability VCID-xyuf-au4f-57fr
71
vulnerability VCID-y6p4-vfkn-q7fc
72
vulnerability VCID-yx79-3g2x-pqex
73
vulnerability VCID-zb4s-9rj3-ebea
74
vulnerability VCID-zkvk-538h-w3b9
75
vulnerability VCID-zuxd-n3wn-s7hg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-5.5@5.5.47-0%252Bdeb6u1
aliases CVE-2015-4792
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9591-6344-yuga
37
url VCID-9f48-53dz-13an
vulnerability_id VCID-9f48-53dz-13an
summary
Multiple vulnerabilities have been found in MariaDB, the worst of
    which could lead to privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3318.json
reference_id
reference_type
scores
0
value 4.0
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3318.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-3318
reference_id
reference_type
scores
0
value 0.00052
scoring_system epss
scoring_elements 0.16314
published_at 2026-04-18T12:55:00Z
1
value 0.00052
scoring_system epss
scoring_elements 0.16472
published_at 2026-04-02T12:55:00Z
2
value 0.00052
scoring_system epss
scoring_elements 0.1629
published_at 2026-04-01T12:55:00Z
3
value 0.00052
scoring_system epss
scoring_elements 0.16533
published_at 2026-04-04T12:55:00Z
4
value 0.00052
scoring_system epss
scoring_elements 0.1633
published_at 2026-04-07T12:55:00Z
5
value 0.00052
scoring_system epss
scoring_elements 0.16416
published_at 2026-04-08T12:55:00Z
6
value 0.00052
scoring_system epss
scoring_elements 0.16474
published_at 2026-04-09T12:55:00Z
7
value 0.00052
scoring_system epss
scoring_elements 0.16459
published_at 2026-04-11T12:55:00Z
8
value 0.00052
scoring_system epss
scoring_elements 0.16419
published_at 2026-04-12T12:55:00Z
9
value 0.00052
scoring_system epss
scoring_elements 0.16358
published_at 2026-04-13T12:55:00Z
10
value 0.00052
scoring_system epss
scoring_elements 0.16294
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-3318
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6664
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6664
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3238
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3238
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3243
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3243
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3244
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3244
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3257
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3257
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3258
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3258
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3265
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3265
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3291
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3291
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3312
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3312
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3313
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3313
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3317
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3317
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3318
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3318
14
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 1
scoring_system cvssv2
scoring_elements AV:L/AC:H/Au:S/C:P/I:N/A:N
1
value 4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1414357
reference_id 1414357
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1414357
16
reference_url http://www.securityfocus.com/bid/95588
reference_id 95588
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-08T20:09:30Z/
url http://www.securityfocus.com/bid/95588
17
reference_url http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
reference_id cpujan2017-2881727.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-08T20:09:30Z/
url http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
18
reference_url http://www.debian.org/security/2017/dsa-3767
reference_id dsa-3767
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-08T20:09:30Z/
url http://www.debian.org/security/2017/dsa-3767
19
reference_url http://www.debian.org/security/2017/dsa-3770
reference_id dsa-3770
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-08T20:09:30Z/
url http://www.debian.org/security/2017/dsa-3770
20
reference_url https://security.gentoo.org/glsa/201702-17
reference_id GLSA-201702-17
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-08T20:09:30Z/
url https://security.gentoo.org/glsa/201702-17
21
reference_url https://security.gentoo.org/glsa/201702-18
reference_id GLSA-201702-18
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-08T20:09:30Z/
url https://security.gentoo.org/glsa/201702-18
22
reference_url https://access.redhat.com/errata/RHSA-2017:2192
reference_id RHSA-2017:2192
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-08T20:09:30Z/
url https://access.redhat.com/errata/RHSA-2017:2192
23
reference_url https://access.redhat.com/errata/RHSA-2017:2787
reference_id RHSA-2017:2787
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-08T20:09:30Z/
url https://access.redhat.com/errata/RHSA-2017:2787
24
reference_url https://access.redhat.com/errata/RHSA-2017:2886
reference_id RHSA-2017:2886
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-08T20:09:30Z/
url https://access.redhat.com/errata/RHSA-2017:2886
25
reference_url https://access.redhat.com/errata/RHSA-2018:0279
reference_id RHSA-2018:0279
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-08T20:09:30Z/
url https://access.redhat.com/errata/RHSA-2018:0279
26
reference_url https://access.redhat.com/errata/RHSA-2018:0574
reference_id RHSA-2018:0574
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-08T20:09:30Z/
url https://access.redhat.com/errata/RHSA-2018:0574
27
reference_url https://usn.ubuntu.com/3174-1/
reference_id USN-3174-1
reference_type
scores
url https://usn.ubuntu.com/3174-1/
fixed_packages
0
url pkg:deb/debian/mysql-5.5@5.5.60-0%2Bdeb8u1
purl pkg:deb/debian/mysql-5.5@5.5.60-0%2Bdeb8u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-5.5@5.5.60-0%252Bdeb8u1
aliases CVE-2017-3318
risk_score 1.8
exploitability 0.5
weighted_severity 3.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9f48-53dz-13an
38
url VCID-9ff2-43rk-2ydj
vulnerability_id VCID-9ff2-43rk-2ydj
summary security update
references
0
reference_url http://lists.opensuse.org/opensuse-updates/2016-09/msg00042.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:49:14Z/
url http://lists.opensuse.org/opensuse-updates/2016-09/msg00042.html
1
reference_url http://rhn.redhat.com/errata/RHSA-2016-1480.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:49:14Z/
url http://rhn.redhat.com/errata/RHSA-2016-1480.html
2
reference_url http://rhn.redhat.com/errata/RHSA-2016-1601.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:49:14Z/
url http://rhn.redhat.com/errata/RHSA-2016-1601.html
3
reference_url http://rhn.redhat.com/errata/RHSA-2016-1602.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:49:14Z/
url http://rhn.redhat.com/errata/RHSA-2016-1602.html
4
reference_url http://rhn.redhat.com/errata/RHSA-2016-1603.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:49:14Z/
url http://rhn.redhat.com/errata/RHSA-2016-1603.html
5
reference_url http://rhn.redhat.com/errata/RHSA-2016-1604.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:49:14Z/
url http://rhn.redhat.com/errata/RHSA-2016-1604.html
6
reference_url http://rhn.redhat.com/errata/RHSA-2016-1637.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:49:14Z/
url http://rhn.redhat.com/errata/RHSA-2016-1637.html
7
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3521.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3521.json
8
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-3521
reference_id
reference_type
scores
0
value 0.01349
scoring_system epss
scoring_elements 0.80122
published_at 2026-04-18T12:55:00Z
1
value 0.01349
scoring_system epss
scoring_elements 0.80043
published_at 2026-04-01T12:55:00Z
2
value 0.01349
scoring_system epss
scoring_elements 0.80051
published_at 2026-04-02T12:55:00Z
3
value 0.01349
scoring_system epss
scoring_elements 0.80072
published_at 2026-04-04T12:55:00Z
4
value 0.01349
scoring_system epss
scoring_elements 0.80061
published_at 2026-04-07T12:55:00Z
5
value 0.01349
scoring_system epss
scoring_elements 0.80089
published_at 2026-04-08T12:55:00Z
6
value 0.01349
scoring_system epss
scoring_elements 0.80097
published_at 2026-04-09T12:55:00Z
7
value 0.01349
scoring_system epss
scoring_elements 0.80116
published_at 2026-04-11T12:55:00Z
8
value 0.01349
scoring_system epss
scoring_elements 0.80101
published_at 2026-04-12T12:55:00Z
9
value 0.01349
scoring_system epss
scoring_elements 0.80092
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-3521
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3477
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3477
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3521
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3521
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3615
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3615
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5440
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5440
13
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:C
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
14
reference_url https://mariadb.com/kb/en/mariadb/mariadb-10026-release-notes/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:49:14Z/
url https://mariadb.com/kb/en/mariadb/mariadb-10026-release-notes/
15
reference_url https://mariadb.com/kb/en/mariadb/mariadb-10115-release-notes/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:49:14Z/
url https://mariadb.com/kb/en/mariadb/mariadb-10115-release-notes/
16
reference_url https://mariadb.com/kb/en/mariadb/mariadb-5550-release-notes/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:49:14Z/
url https://mariadb.com/kb/en/mariadb/mariadb-5550-release-notes/
17
reference_url http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:49:14Z/
url http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168
18
reference_url http://www.debian.org/security/2016/dsa-3624
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:49:14Z/
url http://www.debian.org/security/2016/dsa-3624
19
reference_url http://www.debian.org/security/2016/dsa-3632
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:49:14Z/
url http://www.debian.org/security/2016/dsa-3632
20
reference_url http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:49:14Z/
url http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
21
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:49:14Z/
url http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
22
reference_url http://www.securityfocus.com/bid/91787
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:49:14Z/
url http://www.securityfocus.com/bid/91787
23
reference_url http://www.securityfocus.com/bid/91932
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:49:14Z/
url http://www.securityfocus.com/bid/91932
24
reference_url http://www.securitytracker.com/id/1036362
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:49:14Z/
url http://www.securitytracker.com/id/1036362
25
reference_url http://www.ubuntu.com/usn/USN-3040-1
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:49:14Z/
url http://www.ubuntu.com/usn/USN-3040-1
26
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1358209
reference_id 1358209
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1358209
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:powerkvm:2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ibm:powerkvm:2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:powerkvm:2.1:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:powerkvm:3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ibm:powerkvm:3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:powerkvm:3.1:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-3521
reference_id CVE-2016-3521
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:C
1
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2016-3521
38
reference_url https://access.redhat.com/errata/RHSA-2016:1480
reference_id RHSA-2016:1480
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1480
39
reference_url https://access.redhat.com/errata/RHSA-2016:1601
reference_id RHSA-2016:1601
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1601
40
reference_url https://access.redhat.com/errata/RHSA-2016:1602
reference_id RHSA-2016:1602
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1602
41
reference_url https://access.redhat.com/errata/RHSA-2016:1603
reference_id RHSA-2016:1603
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1603
42
reference_url https://access.redhat.com/errata/RHSA-2016:1604
reference_id RHSA-2016:1604
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1604
43
reference_url https://access.redhat.com/errata/RHSA-2016:1637
reference_id RHSA-2016:1637
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1637
44
reference_url https://usn.ubuntu.com/3040-1/
reference_id USN-3040-1
reference_type
scores
url https://usn.ubuntu.com/3040-1/
fixed_packages
0
url pkg:deb/debian/mysql-5.5@5.5.60-0%2Bdeb8u1
purl pkg:deb/debian/mysql-5.5@5.5.60-0%2Bdeb8u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-5.5@5.5.60-0%252Bdeb8u1
aliases CVE-2016-3521
risk_score 3.0
exploitability 0.5
weighted_severity 6.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9ff2-43rk-2ydj
39
url VCID-9qd9-48p8-nyey
vulnerability_id VCID-9qd9-48p8-nyey
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4819.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4819.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-4819
reference_id
reference_type
scores
0
value 0.00089
scoring_system epss
scoring_elements 0.25406
published_at 2026-04-01T12:55:00Z
1
value 0.00089
scoring_system epss
scoring_elements 0.2547
published_at 2026-04-02T12:55:00Z
2
value 0.00089
scoring_system epss
scoring_elements 0.25506
published_at 2026-04-04T12:55:00Z
3
value 0.00089
scoring_system epss
scoring_elements 0.25278
published_at 2026-04-07T12:55:00Z
4
value 0.00089
scoring_system epss
scoring_elements 0.25346
published_at 2026-04-08T12:55:00Z
5
value 0.00089
scoring_system epss
scoring_elements 0.2539
published_at 2026-04-09T12:55:00Z
6
value 0.00089
scoring_system epss
scoring_elements 0.25402
published_at 2026-04-11T12:55:00Z
7
value 0.00089
scoring_system epss
scoring_elements 0.2536
published_at 2026-04-12T12:55:00Z
8
value 0.00089
scoring_system epss
scoring_elements 0.25307
published_at 2026-04-13T12:55:00Z
9
value 0.00089
scoring_system epss
scoring_elements 0.25314
published_at 2026-04-16T12:55:00Z
10
value 0.00089
scoring_system epss
scoring_elements 0.25305
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-4819
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4792
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4792
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4802
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4802
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4815
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4815
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4816
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4816
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4819
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4819
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4826
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4826
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4830
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4830
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4836
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4836
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4858
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4858
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4861
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4861
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4870
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4870
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4879
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4879
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4895
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4895
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4913
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4913
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1274764
reference_id 1274764
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1274764
17
reference_url https://access.redhat.com/errata/RHSA-2015:1628
reference_id RHSA-2015:1628
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1628
18
reference_url https://access.redhat.com/errata/RHSA-2015:1629
reference_id RHSA-2015:1629
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1629
19
reference_url https://access.redhat.com/errata/RHSA-2015:1630
reference_id RHSA-2015:1630
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1630
20
reference_url https://access.redhat.com/errata/RHSA-2016:0534
reference_id RHSA-2016:0534
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0534
21
reference_url https://access.redhat.com/errata/RHSA-2016:1132
reference_id RHSA-2016:1132
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1132
22
reference_url https://access.redhat.com/errata/RHSA-2016:1481
reference_id RHSA-2016:1481
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1481
23
reference_url https://usn.ubuntu.com/2781-1/
reference_id USN-2781-1
reference_type
scores
url https://usn.ubuntu.com/2781-1/
fixed_packages
0
url pkg:deb/debian/mysql-5.5@5.5.47-0%2Bdeb6u1
purl pkg:deb/debian/mysql-5.5@5.5.47-0%2Bdeb6u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1gmc-pj6y-rkfx
1
vulnerability VCID-1nvb-xd5n-gkh8
2
vulnerability VCID-2gyq-q761-h3br
3
vulnerability VCID-2jer-ss8p-7kbg
4
vulnerability VCID-2uxe-ep8b-y7b9
5
vulnerability VCID-2vp1-j324-dkat
6
vulnerability VCID-2yqz-qtv5-47hh
7
vulnerability VCID-2za2-cnwx-hbbw
8
vulnerability VCID-39gt-6dgh-wyar
9
vulnerability VCID-3qjy-4cen-7qev
10
vulnerability VCID-45hn-ezks-j7br
11
vulnerability VCID-4cnj-7fur-3qe3
12
vulnerability VCID-4yz4-vxnh-b3dp
13
vulnerability VCID-52w9-bgxr-nkba
14
vulnerability VCID-55fg-6c2c-6bg8
15
vulnerability VCID-5p65-gfsg-1ugq
16
vulnerability VCID-5q89-vg9j-k3as
17
vulnerability VCID-5sjj-599v-vybg
18
vulnerability VCID-64st-u4xn-z7g3
19
vulnerability VCID-6g4n-3xfu-hfee
20
vulnerability VCID-6gvj-hy6a-3qdx
21
vulnerability VCID-7tj3-dfxj-bke7
22
vulnerability VCID-7w3v-5s98-a7ec
23
vulnerability VCID-7yc3-7bkr-jfc9
24
vulnerability VCID-8krv-jqjg-uqc8
25
vulnerability VCID-8kvb-5u8c-zbc4
26
vulnerability VCID-8sya-wktg-dqa5
27
vulnerability VCID-9f48-53dz-13an
28
vulnerability VCID-9ff2-43rk-2ydj
29
vulnerability VCID-9w98-nfg2-muh2
30
vulnerability VCID-a3hx-qz7x-7ybk
31
vulnerability VCID-bfnh-7k45-nkg2
32
vulnerability VCID-bhxk-8byp-eyap
33
vulnerability VCID-ca85-vx8c-huht
34
vulnerability VCID-cnb3-dy3a-8bdp
35
vulnerability VCID-cyqa-e362-yyaf
36
vulnerability VCID-dfbz-5n6w-syd9
37
vulnerability VCID-dgtc-a2t2-k7f5
38
vulnerability VCID-dqg6-2gmj-judy
39
vulnerability VCID-ej67-ayfh-sqdt
40
vulnerability VCID-esfk-umc5-ska4
41
vulnerability VCID-f8p4-hpsh-2fcw
42
vulnerability VCID-f9vz-r6zv-t7ev
43
vulnerability VCID-fabc-rma2-myab
44
vulnerability VCID-fnks-p4e9-13es
45
vulnerability VCID-fuyw-1y1c-fkfp
46
vulnerability VCID-j2wu-2rx7-3yf2
47
vulnerability VCID-jgff-4jyp-9fgr
48
vulnerability VCID-kwrj-3fxz-g7c6
49
vulnerability VCID-mde2-1ynu-auh2
50
vulnerability VCID-mz71-vku8-ckbm
51
vulnerability VCID-nj41-1zpw-gkh9
52
vulnerability VCID-nkdd-suwp-4ffr
53
vulnerability VCID-p623-gxyv-g7fs
54
vulnerability VCID-pk7e-t26d-aqdm
55
vulnerability VCID-pv92-6p9x-v7bs
56
vulnerability VCID-qyb6-7ees-ukcm
57
vulnerability VCID-r2cz-9kjz-zbgu
58
vulnerability VCID-rfz7-vha1-e7gy
59
vulnerability VCID-rssq-mfc2-ckaf
60
vulnerability VCID-skzt-r7sx-1ucv
61
vulnerability VCID-sy6p-5km4-1kcy
62
vulnerability VCID-tazb-gd49-73b4
63
vulnerability VCID-u2c7-p86x-5bgf
64
vulnerability VCID-un5y-y9sq-1ufb
65
vulnerability VCID-v165-afmm-w3er
66
vulnerability VCID-v4gv-g9n5-ukgc
67
vulnerability VCID-wrna-cc9g-sqbe
68
vulnerability VCID-xuhv-wrut-wuez
69
vulnerability VCID-xvv1-nxs6-n7ab
70
vulnerability VCID-xyuf-au4f-57fr
71
vulnerability VCID-y6p4-vfkn-q7fc
72
vulnerability VCID-yx79-3g2x-pqex
73
vulnerability VCID-zb4s-9rj3-ebea
74
vulnerability VCID-zkvk-538h-w3b9
75
vulnerability VCID-zuxd-n3wn-s7hg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-5.5@5.5.47-0%252Bdeb6u1
aliases CVE-2015-4819
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9qd9-48p8-nyey
40
url VCID-9w98-nfg2-muh2
vulnerability_id VCID-9w98-nfg2-muh2
summary
Multiple vulnerabilities have been found in MariaDB, the worst of
    which could lead to privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3238.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3238.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-3238
reference_id
reference_type
scores
0
value 0.02525
scoring_system epss
scoring_elements 0.85455
published_at 2026-04-18T12:55:00Z
1
value 0.02525
scoring_system epss
scoring_elements 0.85385
published_at 2026-04-04T12:55:00Z
2
value 0.02525
scoring_system epss
scoring_elements 0.85387
published_at 2026-04-07T12:55:00Z
3
value 0.02525
scoring_system epss
scoring_elements 0.85409
published_at 2026-04-08T12:55:00Z
4
value 0.02525
scoring_system epss
scoring_elements 0.85417
published_at 2026-04-09T12:55:00Z
5
value 0.02525
scoring_system epss
scoring_elements 0.85432
published_at 2026-04-11T12:55:00Z
6
value 0.02525
scoring_system epss
scoring_elements 0.8543
published_at 2026-04-12T12:55:00Z
7
value 0.02525
scoring_system epss
scoring_elements 0.85427
published_at 2026-04-13T12:55:00Z
8
value 0.02525
scoring_system epss
scoring_elements 0.85451
published_at 2026-04-16T12:55:00Z
9
value 0.02525
scoring_system epss
scoring_elements 0.85366
published_at 2026-04-02T12:55:00Z
10
value 0.02525
scoring_system epss
scoring_elements 0.85353
published_at 2026-04-01T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-3238
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6664
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6664
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3238
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3238
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3243
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3243
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3244
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3244
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3257
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3257
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3258
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3258
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3265
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3265
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3291
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3291
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3312
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3312
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3313
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3313
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3317
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3317
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3318
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3318
14
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:C
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1414338
reference_id 1414338
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1414338
16
reference_url http://www.securityfocus.com/bid/95571
reference_id 95571
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:35Z/
url http://www.securityfocus.com/bid/95571
17
reference_url http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
reference_id cpujan2017-2881727.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:35Z/
url http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
18
reference_url http://www.debian.org/security/2017/dsa-3767
reference_id dsa-3767
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:35Z/
url http://www.debian.org/security/2017/dsa-3767
19
reference_url http://www.debian.org/security/2017/dsa-3770
reference_id dsa-3770
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:35Z/
url http://www.debian.org/security/2017/dsa-3770
20
reference_url https://security.gentoo.org/glsa/201702-17
reference_id GLSA-201702-17
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:35Z/
url https://security.gentoo.org/glsa/201702-17
21
reference_url https://security.gentoo.org/glsa/201702-18
reference_id GLSA-201702-18
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:35Z/
url https://security.gentoo.org/glsa/201702-18
22
reference_url https://access.redhat.com/errata/RHSA-2017:2192
reference_id RHSA-2017:2192
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:35Z/
url https://access.redhat.com/errata/RHSA-2017:2192
23
reference_url https://access.redhat.com/errata/RHSA-2017:2787
reference_id RHSA-2017:2787
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:35Z/
url https://access.redhat.com/errata/RHSA-2017:2787
24
reference_url https://access.redhat.com/errata/RHSA-2017:2886
reference_id RHSA-2017:2886
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:35Z/
url https://access.redhat.com/errata/RHSA-2017:2886
25
reference_url https://access.redhat.com/errata/RHSA-2018:0279
reference_id RHSA-2018:0279
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:35Z/
url https://access.redhat.com/errata/RHSA-2018:0279
26
reference_url https://access.redhat.com/errata/RHSA-2018:0574
reference_id RHSA-2018:0574
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:35Z/
url https://access.redhat.com/errata/RHSA-2018:0574
27
reference_url https://usn.ubuntu.com/3174-1/
reference_id USN-3174-1
reference_type
scores
url https://usn.ubuntu.com/3174-1/
fixed_packages
0
url pkg:deb/debian/mysql-5.5@5.5.60-0%2Bdeb8u1
purl pkg:deb/debian/mysql-5.5@5.5.60-0%2Bdeb8u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-5.5@5.5.60-0%252Bdeb8u1
aliases CVE-2017-3238
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9w98-nfg2-muh2
41
url VCID-a3hx-qz7x-7ybk
vulnerability_id VCID-a3hx-qz7x-7ybk
summary security update
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:13Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:13Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:13Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:13Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:13Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:13Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html
6
reference_url http://rhn.redhat.com/errata/RHSA-2016-0705.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:13Z/
url http://rhn.redhat.com/errata/RHSA-2016-0705.html
7
reference_url http://rhn.redhat.com/errata/RHSA-2016-1480.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:13Z/
url http://rhn.redhat.com/errata/RHSA-2016-1480.html
8
reference_url http://rhn.redhat.com/errata/RHSA-2016-1481.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:13Z/
url http://rhn.redhat.com/errata/RHSA-2016-1481.html
9
reference_url http://rhn.redhat.com/errata/RHSA-2016-1602.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:13Z/
url http://rhn.redhat.com/errata/RHSA-2016-1602.html
10
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0649.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0649.json
11
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-0649
reference_id
reference_type
scores
0
value 0.00214
scoring_system epss
scoring_elements 0.43877
published_at 2026-04-01T12:55:00Z
1
value 0.00214
scoring_system epss
scoring_elements 0.43921
published_at 2026-04-02T12:55:00Z
2
value 0.00214
scoring_system epss
scoring_elements 0.43944
published_at 2026-04-11T12:55:00Z
3
value 0.00214
scoring_system epss
scoring_elements 0.43874
published_at 2026-04-07T12:55:00Z
4
value 0.00214
scoring_system epss
scoring_elements 0.43924
published_at 2026-04-08T12:55:00Z
5
value 0.00214
scoring_system epss
scoring_elements 0.43926
published_at 2026-04-09T12:55:00Z
6
value 0.00214
scoring_system epss
scoring_elements 0.43911
published_at 2026-04-12T12:55:00Z
7
value 0.00214
scoring_system epss
scoring_elements 0.43895
published_at 2026-04-13T12:55:00Z
8
value 0.00214
scoring_system epss
scoring_elements 0.43957
published_at 2026-04-16T12:55:00Z
9
value 0.00214
scoring_system epss
scoring_elements 0.43948
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-0649
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0640
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0640
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0641
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0641
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0642
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0642
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0643
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0643
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0644
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0644
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0646
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0646
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0647
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0647
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0648
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0648
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0649
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0649
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0650
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0650
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0655
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0655
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0666
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0666
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0668
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0668
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2047
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2047
26
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.6
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:S/C:N/I:N/A:C
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
27
reference_url https://mariadb.com/kb/en/mariadb/mariadb-10024-release-notes/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:13Z/
url https://mariadb.com/kb/en/mariadb/mariadb-10024-release-notes/
28
reference_url https://mariadb.com/kb/en/mariadb/mariadb-10112-release-notes/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:13Z/
url https://mariadb.com/kb/en/mariadb/mariadb-10112-release-notes/
29
reference_url https://mariadb.com/kb/en/mariadb/mariadb-5548-release-notes/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:13Z/
url https://mariadb.com/kb/en/mariadb/mariadb-5548-release-notes/
30
reference_url http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:13Z/
url http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168
31
reference_url http://www.debian.org/security/2016/dsa-3557
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:13Z/
url http://www.debian.org/security/2016/dsa-3557
32
reference_url http://www.debian.org/security/2016/dsa-3595
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:13Z/
url http://www.debian.org/security/2016/dsa-3595
33
reference_url http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:13Z/
url http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
34
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:13Z/
url http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
35
reference_url http://www.securityfocus.com/bid/86498
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:13Z/
url http://www.securityfocus.com/bid/86498
36
reference_url http://www.securitytracker.com/id/1035606
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:13Z/
url http://www.securitytracker.com/id/1035606
37
reference_url http://www.ubuntu.com/usn/USN-2953-1
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:13Z/
url http://www.ubuntu.com/usn/USN-2953-1
38
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1329252
reference_id 1329252
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1329252
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:powerkvm:2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ibm:powerkvm:2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:powerkvm:2.1:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:powerkvm:3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ibm:powerkvm:3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:powerkvm:3.1:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-0649
reference_id CVE-2016-0649
reference_type
scores
0
value 4.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:P
1
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2016-0649
49
reference_url https://access.redhat.com/errata/RHSA-2016:0705
reference_id RHSA-2016:0705
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0705
50
reference_url https://access.redhat.com/errata/RHSA-2016:1132
reference_id RHSA-2016:1132
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:13Z/
url https://access.redhat.com/errata/RHSA-2016:1132
51
reference_url https://access.redhat.com/errata/RHSA-2016:1480
reference_id RHSA-2016:1480
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1480
52
reference_url https://access.redhat.com/errata/RHSA-2016:1481
reference_id RHSA-2016:1481
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1481
53
reference_url https://access.redhat.com/errata/RHSA-2016:1602
reference_id RHSA-2016:1602
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1602
54
reference_url https://usn.ubuntu.com/2953-1/
reference_id USN-2953-1
reference_type
scores
url https://usn.ubuntu.com/2953-1/
fixed_packages
0
url pkg:deb/debian/mysql-5.5@5.5.60-0%2Bdeb8u1
purl pkg:deb/debian/mysql-5.5@5.5.60-0%2Bdeb8u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-5.5@5.5.60-0%252Bdeb8u1
aliases CVE-2016-0649
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-a3hx-qz7x-7ybk
42
url VCID-bfnh-7k45-nkg2
vulnerability_id VCID-bfnh-7k45-nkg2
summary security update
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:19Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:19Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:19Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:19Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:19Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:19Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html
6
reference_url http://rhn.redhat.com/errata/RHSA-2016-0705.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:19Z/
url http://rhn.redhat.com/errata/RHSA-2016-0705.html
7
reference_url http://rhn.redhat.com/errata/RHSA-2016-1480.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:19Z/
url http://rhn.redhat.com/errata/RHSA-2016-1480.html
8
reference_url http://rhn.redhat.com/errata/RHSA-2016-1481.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:19Z/
url http://rhn.redhat.com/errata/RHSA-2016-1481.html
9
reference_url http://rhn.redhat.com/errata/RHSA-2016-1602.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:19Z/
url http://rhn.redhat.com/errata/RHSA-2016-1602.html
10
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0646.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0646.json
11
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-0646
reference_id
reference_type
scores
0
value 0.00214
scoring_system epss
scoring_elements 0.43877
published_at 2026-04-01T12:55:00Z
1
value 0.00214
scoring_system epss
scoring_elements 0.43921
published_at 2026-04-02T12:55:00Z
2
value 0.00214
scoring_system epss
scoring_elements 0.43944
published_at 2026-04-11T12:55:00Z
3
value 0.00214
scoring_system epss
scoring_elements 0.43874
published_at 2026-04-07T12:55:00Z
4
value 0.00214
scoring_system epss
scoring_elements 0.43924
published_at 2026-04-08T12:55:00Z
5
value 0.00214
scoring_system epss
scoring_elements 0.43926
published_at 2026-04-09T12:55:00Z
6
value 0.00214
scoring_system epss
scoring_elements 0.43911
published_at 2026-04-12T12:55:00Z
7
value 0.00214
scoring_system epss
scoring_elements 0.43895
published_at 2026-04-13T12:55:00Z
8
value 0.00214
scoring_system epss
scoring_elements 0.43957
published_at 2026-04-16T12:55:00Z
9
value 0.00214
scoring_system epss
scoring_elements 0.43948
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-0646
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0640
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0640
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0641
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0641
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0642
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0642
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0643
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0643
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0644
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0644
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0646
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0646
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0647
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0647
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0648
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0648
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0649
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0649
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0650
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0650
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0655
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0655
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0666
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0666
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0668
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0668
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2047
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2047
26
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.6
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:S/C:N/I:N/A:C
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
27
reference_url https://mariadb.com/kb/en/mariadb/mariadb-10024-release-notes/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:19Z/
url https://mariadb.com/kb/en/mariadb/mariadb-10024-release-notes/
28
reference_url https://mariadb.com/kb/en/mariadb/mariadb-10112-release-notes/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:19Z/
url https://mariadb.com/kb/en/mariadb/mariadb-10112-release-notes/
29
reference_url https://mariadb.com/kb/en/mariadb/mariadb-5548-release-notes/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:19Z/
url https://mariadb.com/kb/en/mariadb/mariadb-5548-release-notes/
30
reference_url http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:19Z/
url http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168
31
reference_url http://www.debian.org/security/2016/dsa-3557
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:19Z/
url http://www.debian.org/security/2016/dsa-3557
32
reference_url http://www.debian.org/security/2016/dsa-3595
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:19Z/
url http://www.debian.org/security/2016/dsa-3595
33
reference_url http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:19Z/
url http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
34
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:19Z/
url http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
35
reference_url http://www.securityfocus.com/bid/86436
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:19Z/
url http://www.securityfocus.com/bid/86436
36
reference_url http://www.securitytracker.com/id/1035606
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:19Z/
url http://www.securitytracker.com/id/1035606
37
reference_url http://www.ubuntu.com/usn/USN-2953-1
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:19Z/
url http://www.ubuntu.com/usn/USN-2953-1
38
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1329248
reference_id 1329248
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1329248
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:powerkvm:2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ibm:powerkvm:2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:powerkvm:2.1:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:powerkvm:3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ibm:powerkvm:3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:powerkvm:3.1:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-0646
reference_id CVE-2016-0646
reference_type
scores
0
value 4.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:P
1
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2016-0646
49
reference_url https://access.redhat.com/errata/RHSA-2016:0705
reference_id RHSA-2016:0705
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0705
50
reference_url https://access.redhat.com/errata/RHSA-2016:1132
reference_id RHSA-2016:1132
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:19Z/
url https://access.redhat.com/errata/RHSA-2016:1132
51
reference_url https://access.redhat.com/errata/RHSA-2016:1480
reference_id RHSA-2016:1480
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1480
52
reference_url https://access.redhat.com/errata/RHSA-2016:1481
reference_id RHSA-2016:1481
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1481
53
reference_url https://access.redhat.com/errata/RHSA-2016:1602
reference_id RHSA-2016:1602
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1602
54
reference_url https://usn.ubuntu.com/2953-1/
reference_id USN-2953-1
reference_type
scores
url https://usn.ubuntu.com/2953-1/
fixed_packages
0
url pkg:deb/debian/mysql-5.5@5.5.60-0%2Bdeb8u1
purl pkg:deb/debian/mysql-5.5@5.5.60-0%2Bdeb8u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-5.5@5.5.60-0%252Bdeb8u1
aliases CVE-2016-0646
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bfnh-7k45-nkg2
43
url VCID-bhxk-8byp-eyap
vulnerability_id VCID-bhxk-8byp-eyap
summary
Multiple vulnerabilities were found in MySQL, the worst of which
    may allow remote execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3309.json
reference_id
reference_type
scores
0
value 7.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3309.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-3309
reference_id
reference_type
scores
0
value 0.00319
scoring_system epss
scoring_elements 0.54932
published_at 2026-04-16T12:55:00Z
1
value 0.00319
scoring_system epss
scoring_elements 0.54905
published_at 2026-04-04T12:55:00Z
2
value 0.00319
scoring_system epss
scoring_elements 0.54875
published_at 2026-04-07T12:55:00Z
3
value 0.00319
scoring_system epss
scoring_elements 0.54924
published_at 2026-04-08T12:55:00Z
4
value 0.00319
scoring_system epss
scoring_elements 0.54923
published_at 2026-04-09T12:55:00Z
5
value 0.00319
scoring_system epss
scoring_elements 0.54935
published_at 2026-04-18T12:55:00Z
6
value 0.00319
scoring_system epss
scoring_elements 0.54917
published_at 2026-04-12T12:55:00Z
7
value 0.00319
scoring_system epss
scoring_elements 0.54894
published_at 2026-04-13T12:55:00Z
8
value 0.00319
scoring_system epss
scoring_elements 0.54879
published_at 2026-04-02T12:55:00Z
9
value 0.00319
scoring_system epss
scoring_elements 0.54809
published_at 2026-04-01T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-3309
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10286
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10286
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10379
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10379
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10384
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10384
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3302
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3302
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3305
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3305
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3308
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3308
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3309
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3309
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3329
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3329
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3453
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3453
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3456
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3456
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3461
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3461
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3462
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3462
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3463
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3463
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3464
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3464
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3600
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3600
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3636
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3636
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3641
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3641
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3653
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3653
20
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 2.1
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:S/C:N/I:N/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
21
reference_url http://www.debian.org/security/2017/dsa-3834
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:46:17Z/
url http://www.debian.org/security/2017/dsa-3834
22
reference_url http://www.debian.org/security/2017/dsa-3944
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:46:17Z/
url http://www.debian.org/security/2017/dsa-3944
23
reference_url http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:46:17Z/
url http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
24
reference_url http://www.securityfocus.com/bid/97742
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:46:17Z/
url http://www.securityfocus.com/bid/97742
25
reference_url http://www.securitytracker.com/id/1038287
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:46:17Z/
url http://www.securitytracker.com/id/1038287
26
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1443359
reference_id 1443359
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1443359
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-3309
reference_id CVE-2017-3309
reference_type
scores
0
value 4.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:P
1
value 7.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-3309
43
reference_url https://security.gentoo.org/glsa/201802-04
reference_id GLSA-201802-04
reference_type
scores
url https://security.gentoo.org/glsa/201802-04
44
reference_url https://access.redhat.com/errata/RHSA-2017:2192
reference_id RHSA-2017:2192
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:46:17Z/
url https://access.redhat.com/errata/RHSA-2017:2192
45
reference_url https://access.redhat.com/errata/RHSA-2017:2787
reference_id RHSA-2017:2787
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:46:17Z/
url https://access.redhat.com/errata/RHSA-2017:2787
46
reference_url https://access.redhat.com/errata/RHSA-2017:2886
reference_id RHSA-2017:2886
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:46:17Z/
url https://access.redhat.com/errata/RHSA-2017:2886
47
reference_url https://access.redhat.com/errata/RHSA-2018:0279
reference_id RHSA-2018:0279
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:46:17Z/
url https://access.redhat.com/errata/RHSA-2018:0279
48
reference_url https://access.redhat.com/errata/RHSA-2018:0574
reference_id RHSA-2018:0574
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:46:17Z/
url https://access.redhat.com/errata/RHSA-2018:0574
49
reference_url https://usn.ubuntu.com/3269-1/
reference_id USN-3269-1
reference_type
scores
url https://usn.ubuntu.com/3269-1/
50
reference_url https://usn.ubuntu.com/3357-2/
reference_id USN-3357-2
reference_type
scores
url https://usn.ubuntu.com/3357-2/
fixed_packages
0
url pkg:deb/debian/mysql-5.5@5.5.60-0%2Bdeb8u1
purl pkg:deb/debian/mysql-5.5@5.5.60-0%2Bdeb8u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-5.5@5.5.60-0%252Bdeb8u1
aliases CVE-2017-3309
risk_score 3.5
exploitability 0.5
weighted_severity 6.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bhxk-8byp-eyap
44
url VCID-bjyw-emd1-zbfv
vulnerability_id VCID-bjyw-emd1-zbfv
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4816.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4816.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-4816
reference_id
reference_type
scores
0
value 0.04002
scoring_system epss
scoring_elements 0.88383
published_at 2026-04-01T12:55:00Z
1
value 0.04002
scoring_system epss
scoring_elements 0.88391
published_at 2026-04-02T12:55:00Z
2
value 0.04002
scoring_system epss
scoring_elements 0.884
published_at 2026-04-04T12:55:00Z
3
value 0.04002
scoring_system epss
scoring_elements 0.88404
published_at 2026-04-07T12:55:00Z
4
value 0.04002
scoring_system epss
scoring_elements 0.88423
published_at 2026-04-08T12:55:00Z
5
value 0.04002
scoring_system epss
scoring_elements 0.8843
published_at 2026-04-09T12:55:00Z
6
value 0.04002
scoring_system epss
scoring_elements 0.8844
published_at 2026-04-11T12:55:00Z
7
value 0.04002
scoring_system epss
scoring_elements 0.88433
published_at 2026-04-12T12:55:00Z
8
value 0.04002
scoring_system epss
scoring_elements 0.88432
published_at 2026-04-13T12:55:00Z
9
value 0.04002
scoring_system epss
scoring_elements 0.88447
published_at 2026-04-16T12:55:00Z
10
value 0.04002
scoring_system epss
scoring_elements 0.88444
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-4816
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4792
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4792
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4802
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4802
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4815
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4815
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4816
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4816
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4819
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4819
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4826
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4826
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4830
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4830
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4836
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4836
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4858
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4858
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4861
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4861
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4870
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4870
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4879
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4879
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4895
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4895
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4913
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4913
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1274761
reference_id 1274761
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1274761
17
reference_url https://access.redhat.com/errata/RHSA-2015:1628
reference_id RHSA-2015:1628
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1628
18
reference_url https://access.redhat.com/errata/RHSA-2015:1629
reference_id RHSA-2015:1629
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1629
19
reference_url https://access.redhat.com/errata/RHSA-2016:0534
reference_id RHSA-2016:0534
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0534
20
reference_url https://access.redhat.com/errata/RHSA-2016:1132
reference_id RHSA-2016:1132
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1132
21
reference_url https://access.redhat.com/errata/RHSA-2016:1481
reference_id RHSA-2016:1481
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1481
22
reference_url https://usn.ubuntu.com/2781-1/
reference_id USN-2781-1
reference_type
scores
url https://usn.ubuntu.com/2781-1/
fixed_packages
0
url pkg:deb/debian/mysql-5.5@5.5.47-0%2Bdeb6u1
purl pkg:deb/debian/mysql-5.5@5.5.47-0%2Bdeb6u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1gmc-pj6y-rkfx
1
vulnerability VCID-1nvb-xd5n-gkh8
2
vulnerability VCID-2gyq-q761-h3br
3
vulnerability VCID-2jer-ss8p-7kbg
4
vulnerability VCID-2uxe-ep8b-y7b9
5
vulnerability VCID-2vp1-j324-dkat
6
vulnerability VCID-2yqz-qtv5-47hh
7
vulnerability VCID-2za2-cnwx-hbbw
8
vulnerability VCID-39gt-6dgh-wyar
9
vulnerability VCID-3qjy-4cen-7qev
10
vulnerability VCID-45hn-ezks-j7br
11
vulnerability VCID-4cnj-7fur-3qe3
12
vulnerability VCID-4yz4-vxnh-b3dp
13
vulnerability VCID-52w9-bgxr-nkba
14
vulnerability VCID-55fg-6c2c-6bg8
15
vulnerability VCID-5p65-gfsg-1ugq
16
vulnerability VCID-5q89-vg9j-k3as
17
vulnerability VCID-5sjj-599v-vybg
18
vulnerability VCID-64st-u4xn-z7g3
19
vulnerability VCID-6g4n-3xfu-hfee
20
vulnerability VCID-6gvj-hy6a-3qdx
21
vulnerability VCID-7tj3-dfxj-bke7
22
vulnerability VCID-7w3v-5s98-a7ec
23
vulnerability VCID-7yc3-7bkr-jfc9
24
vulnerability VCID-8krv-jqjg-uqc8
25
vulnerability VCID-8kvb-5u8c-zbc4
26
vulnerability VCID-8sya-wktg-dqa5
27
vulnerability VCID-9f48-53dz-13an
28
vulnerability VCID-9ff2-43rk-2ydj
29
vulnerability VCID-9w98-nfg2-muh2
30
vulnerability VCID-a3hx-qz7x-7ybk
31
vulnerability VCID-bfnh-7k45-nkg2
32
vulnerability VCID-bhxk-8byp-eyap
33
vulnerability VCID-ca85-vx8c-huht
34
vulnerability VCID-cnb3-dy3a-8bdp
35
vulnerability VCID-cyqa-e362-yyaf
36
vulnerability VCID-dfbz-5n6w-syd9
37
vulnerability VCID-dgtc-a2t2-k7f5
38
vulnerability VCID-dqg6-2gmj-judy
39
vulnerability VCID-ej67-ayfh-sqdt
40
vulnerability VCID-esfk-umc5-ska4
41
vulnerability VCID-f8p4-hpsh-2fcw
42
vulnerability VCID-f9vz-r6zv-t7ev
43
vulnerability VCID-fabc-rma2-myab
44
vulnerability VCID-fnks-p4e9-13es
45
vulnerability VCID-fuyw-1y1c-fkfp
46
vulnerability VCID-j2wu-2rx7-3yf2
47
vulnerability VCID-jgff-4jyp-9fgr
48
vulnerability VCID-kwrj-3fxz-g7c6
49
vulnerability VCID-mde2-1ynu-auh2
50
vulnerability VCID-mz71-vku8-ckbm
51
vulnerability VCID-nj41-1zpw-gkh9
52
vulnerability VCID-nkdd-suwp-4ffr
53
vulnerability VCID-p623-gxyv-g7fs
54
vulnerability VCID-pk7e-t26d-aqdm
55
vulnerability VCID-pv92-6p9x-v7bs
56
vulnerability VCID-qyb6-7ees-ukcm
57
vulnerability VCID-r2cz-9kjz-zbgu
58
vulnerability VCID-rfz7-vha1-e7gy
59
vulnerability VCID-rssq-mfc2-ckaf
60
vulnerability VCID-skzt-r7sx-1ucv
61
vulnerability VCID-sy6p-5km4-1kcy
62
vulnerability VCID-tazb-gd49-73b4
63
vulnerability VCID-u2c7-p86x-5bgf
64
vulnerability VCID-un5y-y9sq-1ufb
65
vulnerability VCID-v165-afmm-w3er
66
vulnerability VCID-v4gv-g9n5-ukgc
67
vulnerability VCID-wrna-cc9g-sqbe
68
vulnerability VCID-xuhv-wrut-wuez
69
vulnerability VCID-xvv1-nxs6-n7ab
70
vulnerability VCID-xyuf-au4f-57fr
71
vulnerability VCID-y6p4-vfkn-q7fc
72
vulnerability VCID-yx79-3g2x-pqex
73
vulnerability VCID-zb4s-9rj3-ebea
74
vulnerability VCID-zkvk-538h-w3b9
75
vulnerability VCID-zuxd-n3wn-s7hg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-5.5@5.5.47-0%252Bdeb6u1
aliases CVE-2015-4816
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bjyw-emd1-zbfv
45
url VCID-ca85-vx8c-huht
vulnerability_id VCID-ca85-vx8c-huht
summary security update
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:11Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:11Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:11Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:11Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:11Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:11Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html
6
reference_url http://rhn.redhat.com/errata/RHSA-2016-0705.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:11Z/
url http://rhn.redhat.com/errata/RHSA-2016-0705.html
7
reference_url http://rhn.redhat.com/errata/RHSA-2016-1480.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:11Z/
url http://rhn.redhat.com/errata/RHSA-2016-1480.html
8
reference_url http://rhn.redhat.com/errata/RHSA-2016-1481.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:11Z/
url http://rhn.redhat.com/errata/RHSA-2016-1481.html
9
reference_url http://rhn.redhat.com/errata/RHSA-2016-1602.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:11Z/
url http://rhn.redhat.com/errata/RHSA-2016-1602.html
10
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0650.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0650.json
11
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-0650
reference_id
reference_type
scores
0
value 0.00214
scoring_system epss
scoring_elements 0.43877
published_at 2026-04-01T12:55:00Z
1
value 0.00214
scoring_system epss
scoring_elements 0.43921
published_at 2026-04-02T12:55:00Z
2
value 0.00214
scoring_system epss
scoring_elements 0.43944
published_at 2026-04-11T12:55:00Z
3
value 0.00214
scoring_system epss
scoring_elements 0.43874
published_at 2026-04-07T12:55:00Z
4
value 0.00214
scoring_system epss
scoring_elements 0.43924
published_at 2026-04-08T12:55:00Z
5
value 0.00214
scoring_system epss
scoring_elements 0.43926
published_at 2026-04-09T12:55:00Z
6
value 0.00214
scoring_system epss
scoring_elements 0.43911
published_at 2026-04-12T12:55:00Z
7
value 0.00214
scoring_system epss
scoring_elements 0.43895
published_at 2026-04-13T12:55:00Z
8
value 0.00214
scoring_system epss
scoring_elements 0.43957
published_at 2026-04-16T12:55:00Z
9
value 0.00214
scoring_system epss
scoring_elements 0.43948
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-0650
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0640
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0640
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0641
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0641
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0642
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0642
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0643
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0643
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0644
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0644
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0646
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0646
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0647
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0647
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0648
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0648
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0649
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0649
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0650
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0650
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0655
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0655
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0666
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0666
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0668
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0668
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2047
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2047
26
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.6
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:S/C:N/I:N/A:C
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
27
reference_url https://mariadb.com/kb/en/mariadb/mariadb-10024-release-notes/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:11Z/
url https://mariadb.com/kb/en/mariadb/mariadb-10024-release-notes/
28
reference_url https://mariadb.com/kb/en/mariadb/mariadb-10112-release-notes/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:11Z/
url https://mariadb.com/kb/en/mariadb/mariadb-10112-release-notes/
29
reference_url https://mariadb.com/kb/en/mariadb/mariadb-5548-release-notes/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:11Z/
url https://mariadb.com/kb/en/mariadb/mariadb-5548-release-notes/
30
reference_url http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:11Z/
url http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168
31
reference_url http://www.debian.org/security/2016/dsa-3557
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:11Z/
url http://www.debian.org/security/2016/dsa-3557
32
reference_url http://www.debian.org/security/2016/dsa-3595
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:11Z/
url http://www.debian.org/security/2016/dsa-3595
33
reference_url http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:11Z/
url http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
34
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:11Z/
url http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
35
reference_url http://www.securityfocus.com/bid/86496
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:11Z/
url http://www.securityfocus.com/bid/86496
36
reference_url http://www.securitytracker.com/id/1035606
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:11Z/
url http://www.securitytracker.com/id/1035606
37
reference_url http://www.ubuntu.com/usn/USN-2953-1
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:11Z/
url http://www.ubuntu.com/usn/USN-2953-1
38
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1329253
reference_id 1329253
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1329253
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:powerkvm:2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ibm:powerkvm:2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:powerkvm:2.1:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:powerkvm:3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ibm:powerkvm:3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:powerkvm:3.1:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-0650
reference_id CVE-2016-0650
reference_type
scores
0
value 4.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:P
1
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2016-0650
49
reference_url https://access.redhat.com/errata/RHSA-2016:0705
reference_id RHSA-2016:0705
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0705
50
reference_url https://access.redhat.com/errata/RHSA-2016:1132
reference_id RHSA-2016:1132
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:11Z/
url https://access.redhat.com/errata/RHSA-2016:1132
51
reference_url https://access.redhat.com/errata/RHSA-2016:1480
reference_id RHSA-2016:1480
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1480
52
reference_url https://access.redhat.com/errata/RHSA-2016:1481
reference_id RHSA-2016:1481
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1481
53
reference_url https://access.redhat.com/errata/RHSA-2016:1602
reference_id RHSA-2016:1602
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1602
54
reference_url https://usn.ubuntu.com/2953-1/
reference_id USN-2953-1
reference_type
scores
url https://usn.ubuntu.com/2953-1/
fixed_packages
0
url pkg:deb/debian/mysql-5.5@5.5.60-0%2Bdeb8u1
purl pkg:deb/debian/mysql-5.5@5.5.60-0%2Bdeb8u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-5.5@5.5.60-0%252Bdeb8u1
aliases CVE-2016-0650
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ca85-vx8c-huht
46
url VCID-cnb3-dy3a-8bdp
vulnerability_id VCID-cnb3-dy3a-8bdp
summary
Multiple vulnerabilities were found in MySQL, the worst of which
    may allow remote execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10268.json
reference_id
reference_type
scores
0
value 4.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10268.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-10268
reference_id
reference_type
scores
0
value 0.00031
scoring_system epss
scoring_elements 0.08918
published_at 2026-04-18T12:55:00Z
1
value 0.00031
scoring_system epss
scoring_elements 0.09055
published_at 2026-04-12T12:55:00Z
2
value 0.00031
scoring_system epss
scoring_elements 0.09041
published_at 2026-04-13T12:55:00Z
3
value 0.00031
scoring_system epss
scoring_elements 0.08936
published_at 2026-04-16T12:55:00Z
4
value 0.00044
scoring_system epss
scoring_elements 0.13641
published_at 2026-04-04T12:55:00Z
5
value 0.00044
scoring_system epss
scoring_elements 0.13543
published_at 2026-04-11T12:55:00Z
6
value 0.00044
scoring_system epss
scoring_elements 0.1358
published_at 2026-04-02T12:55:00Z
7
value 0.00044
scoring_system epss
scoring_elements 0.1357
published_at 2026-04-09T12:55:00Z
8
value 0.00044
scoring_system epss
scoring_elements 0.13521
published_at 2026-04-08T12:55:00Z
9
value 0.00044
scoring_system epss
scoring_elements 0.1344
published_at 2026-04-07T12:55:00Z
10
value 0.00046
scoring_system epss
scoring_elements 0.14087
published_at 2026-04-01T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-10268
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10268
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10268
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10378
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10378
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10379
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10379
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10384
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10384
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15365
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15365
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2562
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2562
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2612
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2612
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2622
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2622
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2640
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2640
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2665
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2665
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2668
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2668
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2755
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2755
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2761
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2761
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2766
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2766
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2767
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2767
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2771
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2771
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2781
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2781
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2782
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2782
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2784
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2784
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2787
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2787
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2813
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2813
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2817
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2817
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2819
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2819
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3058
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3058
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3063
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3063
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3064
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3064
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3066
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3066
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3081
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3081
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3143
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3143
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3156
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3156
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3174
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3174
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3251
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3251
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3282
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3282
35
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2503
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2503
36
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv2
scoring_elements AV:L/AC:H/Au:M/C:C/I:N/A:N
1
value 4.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
37
reference_url https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:46:18Z/
url https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html
38
reference_url https://security.netapp.com/advisory/ntap-20171019-0002/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:46:18Z/
url https://security.netapp.com/advisory/ntap-20171019-0002/
39
reference_url https://www.debian.org/security/2018/dsa-4341
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:46:18Z/
url https://www.debian.org/security/2018/dsa-4341
40
reference_url http://www.debian.org/security/2017/dsa-4002
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:46:18Z/
url http://www.debian.org/security/2017/dsa-4002
41
reference_url http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:46:18Z/
url http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
42
reference_url http://www.securityfocus.com/bid/101390
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:46:18Z/
url http://www.securityfocus.com/bid/101390
43
reference_url http://www.securitytracker.com/id/1039597
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:46:18Z/
url http://www.securitytracker.com/id/1039597
44
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1503656
reference_id 1503656
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1503656
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
reference_id cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
reference_id cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_balance:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_balance:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_balance:-:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_performance_manager:-:*:*:*:*:vmware_vsphere:*:*
reference_id cpe:2.3:a:netapp:oncommand_performance_manager:-:*:*:*:*:vmware_vsphere:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_performance_manager:-:*:*:*:*:vmware_vsphere:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vsphere:*:*
reference_id cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vsphere:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vsphere:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:windows:*:*
reference_id cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:windows:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:windows:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openstack:12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:openstack:12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openstack:12:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-10268
reference_id CVE-2017-10268
reference_type
scores
0
value 1.5
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:S/C:P/I:N/A:N
1
value 4.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2017-10268
70
reference_url https://security.gentoo.org/glsa/201802-04
reference_id GLSA-201802-04
reference_type
scores
url https://security.gentoo.org/glsa/201802-04
71
reference_url https://access.redhat.com/errata/RHSA-2017:3265
reference_id RHSA-2017:3265
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:46:18Z/
url https://access.redhat.com/errata/RHSA-2017:3265
72
reference_url https://access.redhat.com/errata/RHSA-2017:3442
reference_id RHSA-2017:3442
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:46:18Z/
url https://access.redhat.com/errata/RHSA-2017:3442
73
reference_url https://access.redhat.com/errata/RHSA-2018:0279
reference_id RHSA-2018:0279
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:46:18Z/
url https://access.redhat.com/errata/RHSA-2018:0279
74
reference_url https://access.redhat.com/errata/RHSA-2018:0574
reference_id RHSA-2018:0574
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:46:18Z/
url https://access.redhat.com/errata/RHSA-2018:0574
75
reference_url https://access.redhat.com/errata/RHSA-2018:2439
reference_id RHSA-2018:2439
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:46:18Z/
url https://access.redhat.com/errata/RHSA-2018:2439
76
reference_url https://access.redhat.com/errata/RHSA-2018:2729
reference_id RHSA-2018:2729
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:46:18Z/
url https://access.redhat.com/errata/RHSA-2018:2729
77
reference_url https://access.redhat.com/errata/RHSA-2019:1258
reference_id RHSA-2019:1258
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:46:18Z/
url https://access.redhat.com/errata/RHSA-2019:1258
78
reference_url https://usn.ubuntu.com/3459-1/
reference_id USN-3459-1
reference_type
scores
url https://usn.ubuntu.com/3459-1/
79
reference_url https://usn.ubuntu.com/3459-2/
reference_id USN-3459-2
reference_type
scores
url https://usn.ubuntu.com/3459-2/
fixed_packages
0
url pkg:deb/debian/mysql-5.5@5.5.60-0%2Bdeb8u1
purl pkg:deb/debian/mysql-5.5@5.5.60-0%2Bdeb8u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-5.5@5.5.60-0%252Bdeb8u1
aliases CVE-2017-10268
risk_score 1.9
exploitability 0.5
weighted_severity 3.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-cnb3-dy3a-8bdp
47
url VCID-ctzs-ypzj-t7dg
vulnerability_id VCID-ctzs-ypzj-t7dg
summary security update
references
0
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177539.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177539.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00010.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00010.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00011.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00011.html
3
reference_url http://lists.opensuse.org/opensuse-updates/2016-02/msg00039.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2016-02/msg00039.html
4
reference_url http://rhn.redhat.com/errata/RHSA-2016-0534.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0534.html
5
reference_url http://rhn.redhat.com/errata/RHSA-2016-0705.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0705.html
6
reference_url http://rhn.redhat.com/errata/RHSA-2016-1480.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-1480.html
7
reference_url http://rhn.redhat.com/errata/RHSA-2016-1481.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-1481.html
8
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4826.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4826.json
9
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-4826
reference_id
reference_type
scores
0
value 0.00276
scoring_system epss
scoring_elements 0.51075
published_at 2026-04-18T12:55:00Z
1
value 0.00276
scoring_system epss
scoring_elements 0.50937
published_at 2026-04-01T12:55:00Z
2
value 0.00276
scoring_system epss
scoring_elements 0.5099
published_at 2026-04-02T12:55:00Z
3
value 0.00276
scoring_system epss
scoring_elements 0.51015
published_at 2026-04-04T12:55:00Z
4
value 0.00276
scoring_system epss
scoring_elements 0.50974
published_at 2026-04-07T12:55:00Z
5
value 0.00276
scoring_system epss
scoring_elements 0.51031
published_at 2026-04-13T12:55:00Z
6
value 0.00276
scoring_system epss
scoring_elements 0.51027
published_at 2026-04-09T12:55:00Z
7
value 0.00276
scoring_system epss
scoring_elements 0.5107
published_at 2026-04-11T12:55:00Z
8
value 0.00276
scoring_system epss
scoring_elements 0.51048
published_at 2026-04-12T12:55:00Z
9
value 0.00276
scoring_system epss
scoring_elements 0.51069
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-4826
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4792
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4792
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4802
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4802
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4815
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4815
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4816
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4816
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4819
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4819
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4826
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4826
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4830
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4830
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4836
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4836
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4858
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4858
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4861
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4861
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4870
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4870
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4879
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4879
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4895
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4895
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4913
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4913
24
reference_url https://www.suse.com/support/update/announcement/2016/suse-su-20160296-1.html
reference_id
reference_type
scores
url https://www.suse.com/support/update/announcement/2016/suse-su-20160296-1.html
25
reference_url http://www.debian.org/security/2015/dsa-3377
reference_id
reference_type
scores
url http://www.debian.org/security/2015/dsa-3377
26
reference_url http://www.debian.org/security/2015/dsa-3385
reference_id
reference_type
scores
url http://www.debian.org/security/2015/dsa-3385
27
reference_url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
28
reference_url http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
29
reference_url http://www.securityfocus.com/bid/77237
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/77237
30
reference_url http://www.securitytracker.com/id/1033894
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1033894
31
reference_url http://www.ubuntu.com/usn/USN-2781-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2781-1
32
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1274766
reference_id 1274766
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1274766
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.1:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-4826
reference_id CVE-2015-4826
reference_type
scores
0
value 4.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:P/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2015-4826
64
reference_url https://access.redhat.com/errata/RHSA-2016:0534
reference_id RHSA-2016:0534
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0534
65
reference_url https://access.redhat.com/errata/RHSA-2016:0705
reference_id RHSA-2016:0705
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0705
66
reference_url https://access.redhat.com/errata/RHSA-2016:1132
reference_id RHSA-2016:1132
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1132
67
reference_url https://access.redhat.com/errata/RHSA-2016:1480
reference_id RHSA-2016:1480
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1480
68
reference_url https://access.redhat.com/errata/RHSA-2016:1481
reference_id RHSA-2016:1481
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1481
69
reference_url https://usn.ubuntu.com/2781-1/
reference_id USN-2781-1
reference_type
scores
url https://usn.ubuntu.com/2781-1/
fixed_packages
0
url pkg:deb/debian/mysql-5.5@5.5.47-0%2Bdeb6u1
purl pkg:deb/debian/mysql-5.5@5.5.47-0%2Bdeb6u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1gmc-pj6y-rkfx
1
vulnerability VCID-1nvb-xd5n-gkh8
2
vulnerability VCID-2gyq-q761-h3br
3
vulnerability VCID-2jer-ss8p-7kbg
4
vulnerability VCID-2uxe-ep8b-y7b9
5
vulnerability VCID-2vp1-j324-dkat
6
vulnerability VCID-2yqz-qtv5-47hh
7
vulnerability VCID-2za2-cnwx-hbbw
8
vulnerability VCID-39gt-6dgh-wyar
9
vulnerability VCID-3qjy-4cen-7qev
10
vulnerability VCID-45hn-ezks-j7br
11
vulnerability VCID-4cnj-7fur-3qe3
12
vulnerability VCID-4yz4-vxnh-b3dp
13
vulnerability VCID-52w9-bgxr-nkba
14
vulnerability VCID-55fg-6c2c-6bg8
15
vulnerability VCID-5p65-gfsg-1ugq
16
vulnerability VCID-5q89-vg9j-k3as
17
vulnerability VCID-5sjj-599v-vybg
18
vulnerability VCID-64st-u4xn-z7g3
19
vulnerability VCID-6g4n-3xfu-hfee
20
vulnerability VCID-6gvj-hy6a-3qdx
21
vulnerability VCID-7tj3-dfxj-bke7
22
vulnerability VCID-7w3v-5s98-a7ec
23
vulnerability VCID-7yc3-7bkr-jfc9
24
vulnerability VCID-8krv-jqjg-uqc8
25
vulnerability VCID-8kvb-5u8c-zbc4
26
vulnerability VCID-8sya-wktg-dqa5
27
vulnerability VCID-9f48-53dz-13an
28
vulnerability VCID-9ff2-43rk-2ydj
29
vulnerability VCID-9w98-nfg2-muh2
30
vulnerability VCID-a3hx-qz7x-7ybk
31
vulnerability VCID-bfnh-7k45-nkg2
32
vulnerability VCID-bhxk-8byp-eyap
33
vulnerability VCID-ca85-vx8c-huht
34
vulnerability VCID-cnb3-dy3a-8bdp
35
vulnerability VCID-cyqa-e362-yyaf
36
vulnerability VCID-dfbz-5n6w-syd9
37
vulnerability VCID-dgtc-a2t2-k7f5
38
vulnerability VCID-dqg6-2gmj-judy
39
vulnerability VCID-ej67-ayfh-sqdt
40
vulnerability VCID-esfk-umc5-ska4
41
vulnerability VCID-f8p4-hpsh-2fcw
42
vulnerability VCID-f9vz-r6zv-t7ev
43
vulnerability VCID-fabc-rma2-myab
44
vulnerability VCID-fnks-p4e9-13es
45
vulnerability VCID-fuyw-1y1c-fkfp
46
vulnerability VCID-j2wu-2rx7-3yf2
47
vulnerability VCID-jgff-4jyp-9fgr
48
vulnerability VCID-kwrj-3fxz-g7c6
49
vulnerability VCID-mde2-1ynu-auh2
50
vulnerability VCID-mz71-vku8-ckbm
51
vulnerability VCID-nj41-1zpw-gkh9
52
vulnerability VCID-nkdd-suwp-4ffr
53
vulnerability VCID-p623-gxyv-g7fs
54
vulnerability VCID-pk7e-t26d-aqdm
55
vulnerability VCID-pv92-6p9x-v7bs
56
vulnerability VCID-qyb6-7ees-ukcm
57
vulnerability VCID-r2cz-9kjz-zbgu
58
vulnerability VCID-rfz7-vha1-e7gy
59
vulnerability VCID-rssq-mfc2-ckaf
60
vulnerability VCID-skzt-r7sx-1ucv
61
vulnerability VCID-sy6p-5km4-1kcy
62
vulnerability VCID-tazb-gd49-73b4
63
vulnerability VCID-u2c7-p86x-5bgf
64
vulnerability VCID-un5y-y9sq-1ufb
65
vulnerability VCID-v165-afmm-w3er
66
vulnerability VCID-v4gv-g9n5-ukgc
67
vulnerability VCID-wrna-cc9g-sqbe
68
vulnerability VCID-xuhv-wrut-wuez
69
vulnerability VCID-xvv1-nxs6-n7ab
70
vulnerability VCID-xyuf-au4f-57fr
71
vulnerability VCID-y6p4-vfkn-q7fc
72
vulnerability VCID-yx79-3g2x-pqex
73
vulnerability VCID-zb4s-9rj3-ebea
74
vulnerability VCID-zkvk-538h-w3b9
75
vulnerability VCID-zuxd-n3wn-s7hg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-5.5@5.5.47-0%252Bdeb6u1
aliases CVE-2015-4826
risk_score 1.8
exploitability 0.5
weighted_severity 3.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ctzs-ypzj-t7dg
48
url VCID-cyqa-e362-yyaf
vulnerability_id VCID-cyqa-e362-yyaf
summary security update
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:24Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:24Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:24Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:24Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:24Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:24Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html
6
reference_url http://rhn.redhat.com/errata/RHSA-2016-0705.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:24Z/
url http://rhn.redhat.com/errata/RHSA-2016-0705.html
7
reference_url http://rhn.redhat.com/errata/RHSA-2016-1480.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:24Z/
url http://rhn.redhat.com/errata/RHSA-2016-1480.html
8
reference_url http://rhn.redhat.com/errata/RHSA-2016-1481.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:24Z/
url http://rhn.redhat.com/errata/RHSA-2016-1481.html
9
reference_url http://rhn.redhat.com/errata/RHSA-2016-1602.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:24Z/
url http://rhn.redhat.com/errata/RHSA-2016-1602.html
10
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0643.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0643.json
11
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-0643
reference_id
reference_type
scores
0
value 0.00267
scoring_system epss
scoring_elements 0.50117
published_at 2026-04-01T12:55:00Z
1
value 0.00267
scoring_system epss
scoring_elements 0.50162
published_at 2026-04-02T12:55:00Z
2
value 0.00267
scoring_system epss
scoring_elements 0.5019
published_at 2026-04-12T12:55:00Z
3
value 0.00267
scoring_system epss
scoring_elements 0.5014
published_at 2026-04-07T12:55:00Z
4
value 0.00267
scoring_system epss
scoring_elements 0.50194
published_at 2026-04-08T12:55:00Z
5
value 0.00267
scoring_system epss
scoring_elements 0.50187
published_at 2026-04-09T12:55:00Z
6
value 0.00267
scoring_system epss
scoring_elements 0.50216
published_at 2026-04-11T12:55:00Z
7
value 0.00267
scoring_system epss
scoring_elements 0.50177
published_at 2026-04-13T12:55:00Z
8
value 0.00267
scoring_system epss
scoring_elements 0.50221
published_at 2026-04-16T12:55:00Z
9
value 0.00267
scoring_system epss
scoring_elements 0.50222
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-0643
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0640
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0640
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0641
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0641
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0642
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0642
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0643
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0643
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0644
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0644
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0646
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0646
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0647
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0647
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0648
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0648
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0649
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0649
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0650
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0650
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0655
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0655
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0666
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0666
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0668
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0668
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2047
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2047
26
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 1.7
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:S/C:P/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
27
reference_url https://mariadb.com/kb/en/mariadb/mariadb-10025-release-notes/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:24Z/
url https://mariadb.com/kb/en/mariadb/mariadb-10025-release-notes/
28
reference_url https://mariadb.com/kb/en/mariadb/mariadb-10114-release-notes/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:24Z/
url https://mariadb.com/kb/en/mariadb/mariadb-10114-release-notes/
29
reference_url https://mariadb.com/kb/en/mariadb/mariadb-5549-release-notes/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:24Z/
url https://mariadb.com/kb/en/mariadb/mariadb-5549-release-notes/
30
reference_url http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:24Z/
url http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168
31
reference_url http://www.debian.org/security/2016/dsa-3557
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:24Z/
url http://www.debian.org/security/2016/dsa-3557
32
reference_url http://www.debian.org/security/2016/dsa-3595
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:24Z/
url http://www.debian.org/security/2016/dsa-3595
33
reference_url http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:24Z/
url http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
34
reference_url http://www.securityfocus.com/bid/86486
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:24Z/
url http://www.securityfocus.com/bid/86486
35
reference_url http://www.securitytracker.com/id/1035606
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:24Z/
url http://www.securitytracker.com/id/1035606
36
reference_url http://www.ubuntu.com/usn/USN-2953-1
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:24Z/
url http://www.ubuntu.com/usn/USN-2953-1
37
reference_url http://www.ubuntu.com/usn/USN-2954-1
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:24Z/
url http://www.ubuntu.com/usn/USN-2954-1
38
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1329245
reference_id 1329245
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1329245
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:powerkvm:2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ibm:powerkvm:2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:powerkvm:2.1:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:powerkvm:3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ibm:powerkvm:3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:powerkvm:3.1:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-0643
reference_id CVE-2016-0643
reference_type
scores
0
value 4.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:P/I:N/A:N
1
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2016-0643
48
reference_url https://access.redhat.com/errata/RHSA-2016:0705
reference_id RHSA-2016:0705
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0705
49
reference_url https://access.redhat.com/errata/RHSA-2016:1132
reference_id RHSA-2016:1132
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:24Z/
url https://access.redhat.com/errata/RHSA-2016:1132
50
reference_url https://access.redhat.com/errata/RHSA-2016:1480
reference_id RHSA-2016:1480
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1480
51
reference_url https://access.redhat.com/errata/RHSA-2016:1481
reference_id RHSA-2016:1481
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1481
52
reference_url https://access.redhat.com/errata/RHSA-2016:1602
reference_id RHSA-2016:1602
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1602
53
reference_url https://usn.ubuntu.com/2953-1/
reference_id USN-2953-1
reference_type
scores
url https://usn.ubuntu.com/2953-1/
54
reference_url https://usn.ubuntu.com/2954-1/
reference_id USN-2954-1
reference_type
scores
url https://usn.ubuntu.com/2954-1/
fixed_packages
0
url pkg:deb/debian/mysql-5.5@5.5.60-0%2Bdeb8u1
purl pkg:deb/debian/mysql-5.5@5.5.60-0%2Bdeb8u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-5.5@5.5.60-0%252Bdeb8u1
aliases CVE-2016-0643
risk_score 1.8
exploitability 0.5
weighted_severity 3.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-cyqa-e362-yyaf
49
url VCID-dfbz-5n6w-syd9
vulnerability_id VCID-dfbz-5n6w-syd9
summary
Multiple vulnerabilities have been found in MariaDB and MySQL, the
    worst of which could result in privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2761.json
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2761.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-2761
reference_id
reference_type
scores
0
value 0.00267
scoring_system epss
scoring_elements 0.50192
published_at 2026-04-18T12:55:00Z
1
value 0.00267
scoring_system epss
scoring_elements 0.50099
published_at 2026-04-01T12:55:00Z
2
value 0.00267
scoring_system epss
scoring_elements 0.50134
published_at 2026-04-02T12:55:00Z
3
value 0.00267
scoring_system epss
scoring_elements 0.50161
published_at 2026-04-04T12:55:00Z
4
value 0.00267
scoring_system epss
scoring_elements 0.50112
published_at 2026-04-07T12:55:00Z
5
value 0.00267
scoring_system epss
scoring_elements 0.50166
published_at 2026-04-08T12:55:00Z
6
value 0.00267
scoring_system epss
scoring_elements 0.50159
published_at 2026-04-09T12:55:00Z
7
value 0.00267
scoring_system epss
scoring_elements 0.50176
published_at 2026-04-11T12:55:00Z
8
value 0.00267
scoring_system epss
scoring_elements 0.5015
published_at 2026-04-12T12:55:00Z
9
value 0.00267
scoring_system epss
scoring_elements 0.50147
published_at 2026-04-13T12:55:00Z
10
value 0.00267
scoring_system epss
scoring_elements 0.50191
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-2761
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10268
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10268
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10378
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10378
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15365
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15365
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2562
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2562
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2612
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2612
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2622
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2622
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2640
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2640
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2665
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2665
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2668
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2668
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2755
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2755
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2761
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2761
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2766
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2766
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2767
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2767
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2771
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2771
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2773
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2773
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2781
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2781
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2782
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2782
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2784
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2784
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2787
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2787
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2813
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2813
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2817
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2817
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2818
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2818
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2819
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2819
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3058
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3058
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3063
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3063
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3064
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3064
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3066
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3066
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3081
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3081
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3143
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3143
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3156
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3156
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3174
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3174
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3251
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3251
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3282
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3282
35
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2503
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2503
36
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
37
reference_url https://lists.debian.org/debian-lts-announce/2018/04/msg00020.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:11Z/
url https://lists.debian.org/debian-lts-announce/2018/04/msg00020.html
38
reference_url https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:11Z/
url https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html
39
reference_url https://security.netapp.com/advisory/ntap-20180419-0002/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:11Z/
url https://security.netapp.com/advisory/ntap-20180419-0002/
40
reference_url https://www.debian.org/security/2018/dsa-4176
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:11Z/
url https://www.debian.org/security/2018/dsa-4176
41
reference_url https://www.debian.org/security/2018/dsa-4341
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:11Z/
url https://www.debian.org/security/2018/dsa-4341
42
reference_url http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:11Z/
url http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
43
reference_url http://www.securityfocus.com/bid/103820
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:11Z/
url http://www.securityfocus.com/bid/103820
44
reference_url http://www.securitytracker.com/id/1040698
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:11Z/
url http://www.securitytracker.com/id/1040698
45
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1568924
reference_id 1568924
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1568924
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
reference_id cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
reference_id cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openstack:12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:openstack:12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openstack:12:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
71
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
72
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-2761
reference_id CVE-2018-2761
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
1
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2018-2761
73
reference_url https://security.gentoo.org/glsa/201908-24
reference_id GLSA-201908-24
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:11Z/
url https://security.gentoo.org/glsa/201908-24
74
reference_url https://access.redhat.com/errata/RHSA-2018:1254
reference_id RHSA-2018:1254
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:11Z/
url https://access.redhat.com/errata/RHSA-2018:1254
75
reference_url https://access.redhat.com/errata/RHSA-2018:2439
reference_id RHSA-2018:2439
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:11Z/
url https://access.redhat.com/errata/RHSA-2018:2439
76
reference_url https://access.redhat.com/errata/RHSA-2018:2729
reference_id RHSA-2018:2729
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:11Z/
url https://access.redhat.com/errata/RHSA-2018:2729
77
reference_url https://access.redhat.com/errata/RHSA-2018:3655
reference_id RHSA-2018:3655
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:11Z/
url https://access.redhat.com/errata/RHSA-2018:3655
78
reference_url https://access.redhat.com/errata/RHSA-2019:1258
reference_id RHSA-2019:1258
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:11Z/
url https://access.redhat.com/errata/RHSA-2019:1258
79
reference_url https://usn.ubuntu.com/3629-1/
reference_id USN-3629-1
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:11Z/
url https://usn.ubuntu.com/3629-1/
80
reference_url https://usn.ubuntu.com/3629-2/
reference_id USN-3629-2
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:11Z/
url https://usn.ubuntu.com/3629-2/
81
reference_url https://usn.ubuntu.com/3629-3/
reference_id USN-3629-3
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:11Z/
url https://usn.ubuntu.com/3629-3/
fixed_packages
0
url pkg:deb/debian/mysql-5.5@5.5.60-0%2Bdeb8u1
purl pkg:deb/debian/mysql-5.5@5.5.60-0%2Bdeb8u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-5.5@5.5.60-0%252Bdeb8u1
aliases CVE-2018-2761
risk_score 2.6
exploitability 0.5
weighted_severity 5.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dfbz-5n6w-syd9
50
url VCID-dgtc-a2t2-k7f5
vulnerability_id VCID-dgtc-a2t2-k7f5
summary
Multiple vulnerabilities were found in MySQL, the worst of which
    may allow remote execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3329.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3329.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-3329
reference_id
reference_type
scores
0
value 0.0263
scoring_system epss
scoring_elements 0.8561
published_at 2026-04-01T12:55:00Z
1
value 0.0263
scoring_system epss
scoring_elements 0.85712
published_at 2026-04-18T12:55:00Z
2
value 0.0263
scoring_system epss
scoring_elements 0.85647
published_at 2026-04-07T12:55:00Z
3
value 0.0263
scoring_system epss
scoring_elements 0.85667
published_at 2026-04-08T12:55:00Z
4
value 0.0263
scoring_system epss
scoring_elements 0.85678
published_at 2026-04-09T12:55:00Z
5
value 0.0263
scoring_system epss
scoring_elements 0.85693
published_at 2026-04-11T12:55:00Z
6
value 0.0263
scoring_system epss
scoring_elements 0.85689
published_at 2026-04-12T12:55:00Z
7
value 0.0263
scoring_system epss
scoring_elements 0.85685
published_at 2026-04-13T12:55:00Z
8
value 0.0263
scoring_system epss
scoring_elements 0.85708
published_at 2026-04-16T12:55:00Z
9
value 0.0263
scoring_system epss
scoring_elements 0.85622
published_at 2026-04-02T12:55:00Z
10
value 0.0263
scoring_system epss
scoring_elements 0.8564
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-3329
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3302
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3302
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3305
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3305
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3308
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3308
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3309
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3309
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3329
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3329
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3453
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3453
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3456
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3456
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3461
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3461
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3462
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3462
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3463
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3463
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3464
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3464
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3600
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3600
14
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 2.1
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:S/C:N/I:N/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
15
reference_url http://www.debian.org/security/2017/dsa-3834
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:40:29Z/
url http://www.debian.org/security/2017/dsa-3834
16
reference_url http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:40:29Z/
url http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
17
reference_url http://www.securityfocus.com/bid/97763
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:40:29Z/
url http://www.securityfocus.com/bid/97763
18
reference_url http://www.securitytracker.com/id/1038287
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:40:29Z/
url http://www.securitytracker.com/id/1038287
19
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1443360
reference_id 1443360
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1443360
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-3329
reference_id CVE-2017-3329
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
1
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-3329
23
reference_url https://security.gentoo.org/glsa/201802-04
reference_id GLSA-201802-04
reference_type
scores
url https://security.gentoo.org/glsa/201802-04
24
reference_url https://usn.ubuntu.com/3269-1/
reference_id USN-3269-1
reference_type
scores
url https://usn.ubuntu.com/3269-1/
25
reference_url https://usn.ubuntu.com/3357-2/
reference_id USN-3357-2
reference_type
scores
url https://usn.ubuntu.com/3357-2/
fixed_packages
0
url pkg:deb/debian/mysql-5.5@5.5.60-0%2Bdeb8u1
purl pkg:deb/debian/mysql-5.5@5.5.60-0%2Bdeb8u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-5.5@5.5.60-0%252Bdeb8u1
aliases CVE-2017-3329
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dgtc-a2t2-k7f5
51
url VCID-dqg6-2gmj-judy
vulnerability_id VCID-dqg6-2gmj-judy
summary security update
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00015.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00015.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00016.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00016.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html
6
reference_url http://rhn.redhat.com/errata/RHSA-2016-0534.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0534.html
7
reference_url http://rhn.redhat.com/errata/RHSA-2016-0705.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0705.html
8
reference_url http://rhn.redhat.com/errata/RHSA-2016-1480.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-1480.html
9
reference_url http://rhn.redhat.com/errata/RHSA-2016-1481.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-1481.html
10
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0546.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0546.json
11
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-0546
reference_id
reference_type
scores
0
value 0.0018
scoring_system epss
scoring_elements 0.39629
published_at 2026-04-18T12:55:00Z
1
value 0.0018
scoring_system epss
scoring_elements 0.39658
published_at 2026-04-16T12:55:00Z
2
value 0.0018
scoring_system epss
scoring_elements 0.39493
published_at 2026-04-01T12:55:00Z
3
value 0.0018
scoring_system epss
scoring_elements 0.39643
published_at 2026-04-02T12:55:00Z
4
value 0.0018
scoring_system epss
scoring_elements 0.39665
published_at 2026-04-04T12:55:00Z
5
value 0.0018
scoring_system epss
scoring_elements 0.39582
published_at 2026-04-07T12:55:00Z
6
value 0.0018
scoring_system epss
scoring_elements 0.39637
published_at 2026-04-08T12:55:00Z
7
value 0.0018
scoring_system epss
scoring_elements 0.39651
published_at 2026-04-09T12:55:00Z
8
value 0.0018
scoring_system epss
scoring_elements 0.3966
published_at 2026-04-11T12:55:00Z
9
value 0.0018
scoring_system epss
scoring_elements 0.39624
published_at 2026-04-12T12:55:00Z
10
value 0.0018
scoring_system epss
scoring_elements 0.39607
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-0546
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0505
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0505
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0546
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0546
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0596
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0596
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0597
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0597
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0598
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0598
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0600
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0600
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0606
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0606
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0608
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0608
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0609
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0609
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0616
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0616
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2047
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2047
23
reference_url https://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-47.html
reference_id
reference_type
scores
url https://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-47.html
24
reference_url https://dev.mysql.com/doc/relnotes/mysql/5.6/en/news-5-6-28.html
reference_id
reference_type
scores
url https://dev.mysql.com/doc/relnotes/mysql/5.6/en/news-5-6-28.html
25
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.2
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:C/I:C/A:C
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
26
reference_url https://github.com/mysql/mysql-server/commit/0dbd5a8797ed4bd18e8b883988fb62177eb0f73f
reference_id
reference_type
scores
url https://github.com/mysql/mysql-server/commit/0dbd5a8797ed4bd18e8b883988fb62177eb0f73f
27
reference_url https://mariadb.com/kb/en/mariadb/mariadb-10110-release-notes/
reference_id
reference_type
scores
url https://mariadb.com/kb/en/mariadb/mariadb-10110-release-notes/
28
reference_url https://mariadb.com/kb/en/mariadb/mariadb-5547-release-notes/
reference_id
reference_type
scores
url https://mariadb.com/kb/en/mariadb/mariadb-5547-release-notes/
29
reference_url https://mariadb.com/kb/en/mdb-10023-rn/
reference_id
reference_type
scores
url https://mariadb.com/kb/en/mdb-10023-rn/
30
reference_url http://www.debian.org/security/2016/dsa-3453
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3453
31
reference_url http://www.debian.org/security/2016/dsa-3459
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3459
32
reference_url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
33
reference_url http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
34
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
35
reference_url http://www.securityfocus.com/bid/81066
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/81066
36
reference_url http://www.securitytracker.com/id/1034708
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1034708
37
reference_url http://www.ubuntu.com/usn/USN-2881-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2881-1
38
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1301493
reference_id 1301493
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1301493
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node_eus:7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_hpc_node_eus:7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node_eus:7.2:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-0546
reference_id CVE-2016-0546
reference_type
scores
0
value 7.2
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2016-0546
60
reference_url https://access.redhat.com/errata/RHSA-2016:0534
reference_id RHSA-2016:0534
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0534
61
reference_url https://access.redhat.com/errata/RHSA-2016:0705
reference_id RHSA-2016:0705
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0705
62
reference_url https://access.redhat.com/errata/RHSA-2016:1132
reference_id RHSA-2016:1132
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1132
63
reference_url https://access.redhat.com/errata/RHSA-2016:1480
reference_id RHSA-2016:1480
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1480
64
reference_url https://access.redhat.com/errata/RHSA-2016:1481
reference_id RHSA-2016:1481
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1481
65
reference_url https://usn.ubuntu.com/2881-1/
reference_id USN-2881-1
reference_type
scores
url https://usn.ubuntu.com/2881-1/
fixed_packages
0
url pkg:deb/debian/mysql-5.5@5.5.47-0%2Bdeb7u1
purl pkg:deb/debian/mysql-5.5@5.5.47-0%2Bdeb7u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1gmc-pj6y-rkfx
1
vulnerability VCID-1nvb-xd5n-gkh8
2
vulnerability VCID-2gyq-q761-h3br
3
vulnerability VCID-2jer-ss8p-7kbg
4
vulnerability VCID-2uxe-ep8b-y7b9
5
vulnerability VCID-2vp1-j324-dkat
6
vulnerability VCID-2yqz-qtv5-47hh
7
vulnerability VCID-2za2-cnwx-hbbw
8
vulnerability VCID-39gt-6dgh-wyar
9
vulnerability VCID-3qjy-4cen-7qev
10
vulnerability VCID-45hn-ezks-j7br
11
vulnerability VCID-4cnj-7fur-3qe3
12
vulnerability VCID-4yz4-vxnh-b3dp
13
vulnerability VCID-52w9-bgxr-nkba
14
vulnerability VCID-55fg-6c2c-6bg8
15
vulnerability VCID-5p65-gfsg-1ugq
16
vulnerability VCID-5q89-vg9j-k3as
17
vulnerability VCID-5sjj-599v-vybg
18
vulnerability VCID-64st-u4xn-z7g3
19
vulnerability VCID-6g4n-3xfu-hfee
20
vulnerability VCID-6gvj-hy6a-3qdx
21
vulnerability VCID-7tj3-dfxj-bke7
22
vulnerability VCID-7w3v-5s98-a7ec
23
vulnerability VCID-7yc3-7bkr-jfc9
24
vulnerability VCID-8krv-jqjg-uqc8
25
vulnerability VCID-8kvb-5u8c-zbc4
26
vulnerability VCID-8sya-wktg-dqa5
27
vulnerability VCID-9f48-53dz-13an
28
vulnerability VCID-9ff2-43rk-2ydj
29
vulnerability VCID-9w98-nfg2-muh2
30
vulnerability VCID-a3hx-qz7x-7ybk
31
vulnerability VCID-bfnh-7k45-nkg2
32
vulnerability VCID-bhxk-8byp-eyap
33
vulnerability VCID-ca85-vx8c-huht
34
vulnerability VCID-cnb3-dy3a-8bdp
35
vulnerability VCID-cyqa-e362-yyaf
36
vulnerability VCID-dfbz-5n6w-syd9
37
vulnerability VCID-dgtc-a2t2-k7f5
38
vulnerability VCID-dqg6-2gmj-judy
39
vulnerability VCID-ej67-ayfh-sqdt
40
vulnerability VCID-esfk-umc5-ska4
41
vulnerability VCID-f8p4-hpsh-2fcw
42
vulnerability VCID-f9vz-r6zv-t7ev
43
vulnerability VCID-fabc-rma2-myab
44
vulnerability VCID-fnks-p4e9-13es
45
vulnerability VCID-fuyw-1y1c-fkfp
46
vulnerability VCID-j2wu-2rx7-3yf2
47
vulnerability VCID-jgff-4jyp-9fgr
48
vulnerability VCID-kwrj-3fxz-g7c6
49
vulnerability VCID-mde2-1ynu-auh2
50
vulnerability VCID-mz71-vku8-ckbm
51
vulnerability VCID-nj41-1zpw-gkh9
52
vulnerability VCID-nkdd-suwp-4ffr
53
vulnerability VCID-p623-gxyv-g7fs
54
vulnerability VCID-pk7e-t26d-aqdm
55
vulnerability VCID-pv92-6p9x-v7bs
56
vulnerability VCID-qyb6-7ees-ukcm
57
vulnerability VCID-r2cz-9kjz-zbgu
58
vulnerability VCID-rfz7-vha1-e7gy
59
vulnerability VCID-rssq-mfc2-ckaf
60
vulnerability VCID-skzt-r7sx-1ucv
61
vulnerability VCID-sy6p-5km4-1kcy
62
vulnerability VCID-tazb-gd49-73b4
63
vulnerability VCID-u2c7-p86x-5bgf
64
vulnerability VCID-un5y-y9sq-1ufb
65
vulnerability VCID-v165-afmm-w3er
66
vulnerability VCID-v4gv-g9n5-ukgc
67
vulnerability VCID-wrna-cc9g-sqbe
68
vulnerability VCID-xuhv-wrut-wuez
69
vulnerability VCID-xvv1-nxs6-n7ab
70
vulnerability VCID-xyuf-au4f-57fr
71
vulnerability VCID-y6p4-vfkn-q7fc
72
vulnerability VCID-yx79-3g2x-pqex
73
vulnerability VCID-zb4s-9rj3-ebea
74
vulnerability VCID-zkvk-538h-w3b9
75
vulnerability VCID-zuxd-n3wn-s7hg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-5.5@5.5.47-0%252Bdeb7u1
1
url pkg:deb/debian/mysql-5.5@5.5.60-0%2Bdeb8u1
purl pkg:deb/debian/mysql-5.5@5.5.60-0%2Bdeb8u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-5.5@5.5.60-0%252Bdeb8u1
aliases CVE-2016-0546
risk_score 3.2
exploitability 0.5
weighted_severity 6.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dqg6-2gmj-judy
52
url VCID-dvjd-g5eh-2uh8
vulnerability_id VCID-dvjd-g5eh-2uh8
summary
Multiple vulnerabilities have been found in MySQL and MariaDB, the
    worst of which could allow remote attackers to cause a Denial of Service
    condition or obtain sensitive information.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2582.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2582.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-2582
reference_id
reference_type
scores
0
value 0.00811
scoring_system epss
scoring_elements 0.74185
published_at 2026-04-01T12:55:00Z
1
value 0.00811
scoring_system epss
scoring_elements 0.7419
published_at 2026-04-07T12:55:00Z
2
value 0.00811
scoring_system epss
scoring_elements 0.74217
published_at 2026-04-04T12:55:00Z
3
value 0.00811
scoring_system epss
scoring_elements 0.74223
published_at 2026-04-08T12:55:00Z
4
value 0.00811
scoring_system epss
scoring_elements 0.74238
published_at 2026-04-09T12:55:00Z
5
value 0.00811
scoring_system epss
scoring_elements 0.74259
published_at 2026-04-11T12:55:00Z
6
value 0.00811
scoring_system epss
scoring_elements 0.7424
published_at 2026-04-12T12:55:00Z
7
value 0.00811
scoring_system epss
scoring_elements 0.74233
published_at 2026-04-13T12:55:00Z
8
value 0.00811
scoring_system epss
scoring_elements 0.74271
published_at 2026-04-16T12:55:00Z
9
value 0.00811
scoring_system epss
scoring_elements 0.74281
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-2582
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0433
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0433
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0441
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0441
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0499
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0499
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0501
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0501
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0505
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0505
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2568
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2568
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2571
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2571
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2573
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2573
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2582
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2582
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2620
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2620
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2643
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2643
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2648
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2648
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3152
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3152
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4737
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4737
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4752
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4752
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4757
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4757
18
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1244768
reference_id 1244768
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1244768
19
reference_url https://security.gentoo.org/glsa/201610-06
reference_id GLSA-201610-06
reference_type
scores
url https://security.gentoo.org/glsa/201610-06
20
reference_url https://access.redhat.com/errata/RHSA-2015:1628
reference_id RHSA-2015:1628
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1628
21
reference_url https://access.redhat.com/errata/RHSA-2015:1629
reference_id RHSA-2015:1629
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1629
22
reference_url https://access.redhat.com/errata/RHSA-2015:1630
reference_id RHSA-2015:1630
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1630
23
reference_url https://access.redhat.com/errata/RHSA-2015:1646
reference_id RHSA-2015:1646
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1646
24
reference_url https://access.redhat.com/errata/RHSA-2015:1647
reference_id RHSA-2015:1647
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1647
25
reference_url https://access.redhat.com/errata/RHSA-2015:1665
reference_id RHSA-2015:1665
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1665
26
reference_url https://usn.ubuntu.com/2674-1/
reference_id USN-2674-1
reference_type
scores
url https://usn.ubuntu.com/2674-1/
fixed_packages
0
url pkg:deb/debian/mysql-5.5@5.5.47-0%2Bdeb6u1
purl pkg:deb/debian/mysql-5.5@5.5.47-0%2Bdeb6u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1gmc-pj6y-rkfx
1
vulnerability VCID-1nvb-xd5n-gkh8
2
vulnerability VCID-2gyq-q761-h3br
3
vulnerability VCID-2jer-ss8p-7kbg
4
vulnerability VCID-2uxe-ep8b-y7b9
5
vulnerability VCID-2vp1-j324-dkat
6
vulnerability VCID-2yqz-qtv5-47hh
7
vulnerability VCID-2za2-cnwx-hbbw
8
vulnerability VCID-39gt-6dgh-wyar
9
vulnerability VCID-3qjy-4cen-7qev
10
vulnerability VCID-45hn-ezks-j7br
11
vulnerability VCID-4cnj-7fur-3qe3
12
vulnerability VCID-4yz4-vxnh-b3dp
13
vulnerability VCID-52w9-bgxr-nkba
14
vulnerability VCID-55fg-6c2c-6bg8
15
vulnerability VCID-5p65-gfsg-1ugq
16
vulnerability VCID-5q89-vg9j-k3as
17
vulnerability VCID-5sjj-599v-vybg
18
vulnerability VCID-64st-u4xn-z7g3
19
vulnerability VCID-6g4n-3xfu-hfee
20
vulnerability VCID-6gvj-hy6a-3qdx
21
vulnerability VCID-7tj3-dfxj-bke7
22
vulnerability VCID-7w3v-5s98-a7ec
23
vulnerability VCID-7yc3-7bkr-jfc9
24
vulnerability VCID-8krv-jqjg-uqc8
25
vulnerability VCID-8kvb-5u8c-zbc4
26
vulnerability VCID-8sya-wktg-dqa5
27
vulnerability VCID-9f48-53dz-13an
28
vulnerability VCID-9ff2-43rk-2ydj
29
vulnerability VCID-9w98-nfg2-muh2
30
vulnerability VCID-a3hx-qz7x-7ybk
31
vulnerability VCID-bfnh-7k45-nkg2
32
vulnerability VCID-bhxk-8byp-eyap
33
vulnerability VCID-ca85-vx8c-huht
34
vulnerability VCID-cnb3-dy3a-8bdp
35
vulnerability VCID-cyqa-e362-yyaf
36
vulnerability VCID-dfbz-5n6w-syd9
37
vulnerability VCID-dgtc-a2t2-k7f5
38
vulnerability VCID-dqg6-2gmj-judy
39
vulnerability VCID-ej67-ayfh-sqdt
40
vulnerability VCID-esfk-umc5-ska4
41
vulnerability VCID-f8p4-hpsh-2fcw
42
vulnerability VCID-f9vz-r6zv-t7ev
43
vulnerability VCID-fabc-rma2-myab
44
vulnerability VCID-fnks-p4e9-13es
45
vulnerability VCID-fuyw-1y1c-fkfp
46
vulnerability VCID-j2wu-2rx7-3yf2
47
vulnerability VCID-jgff-4jyp-9fgr
48
vulnerability VCID-kwrj-3fxz-g7c6
49
vulnerability VCID-mde2-1ynu-auh2
50
vulnerability VCID-mz71-vku8-ckbm
51
vulnerability VCID-nj41-1zpw-gkh9
52
vulnerability VCID-nkdd-suwp-4ffr
53
vulnerability VCID-p623-gxyv-g7fs
54
vulnerability VCID-pk7e-t26d-aqdm
55
vulnerability VCID-pv92-6p9x-v7bs
56
vulnerability VCID-qyb6-7ees-ukcm
57
vulnerability VCID-r2cz-9kjz-zbgu
58
vulnerability VCID-rfz7-vha1-e7gy
59
vulnerability VCID-rssq-mfc2-ckaf
60
vulnerability VCID-skzt-r7sx-1ucv
61
vulnerability VCID-sy6p-5km4-1kcy
62
vulnerability VCID-tazb-gd49-73b4
63
vulnerability VCID-u2c7-p86x-5bgf
64
vulnerability VCID-un5y-y9sq-1ufb
65
vulnerability VCID-v165-afmm-w3er
66
vulnerability VCID-v4gv-g9n5-ukgc
67
vulnerability VCID-wrna-cc9g-sqbe
68
vulnerability VCID-xuhv-wrut-wuez
69
vulnerability VCID-xvv1-nxs6-n7ab
70
vulnerability VCID-xyuf-au4f-57fr
71
vulnerability VCID-y6p4-vfkn-q7fc
72
vulnerability VCID-yx79-3g2x-pqex
73
vulnerability VCID-zb4s-9rj3-ebea
74
vulnerability VCID-zkvk-538h-w3b9
75
vulnerability VCID-zuxd-n3wn-s7hg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-5.5@5.5.47-0%252Bdeb6u1
aliases CVE-2015-2582
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dvjd-g5eh-2uh8
53
url VCID-ej67-ayfh-sqdt
vulnerability_id VCID-ej67-ayfh-sqdt
summary
Multiple vulnerabilities were found in MySQL, the worst of which
    may allow remote execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10379.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10379.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-10379
reference_id
reference_type
scores
0
value 0.00326
scoring_system epss
scoring_elements 0.55667
published_at 2026-04-18T12:55:00Z
1
value 0.00326
scoring_system epss
scoring_elements 0.55641
published_at 2026-04-12T12:55:00Z
2
value 0.00326
scoring_system epss
scoring_elements 0.55624
published_at 2026-04-13T12:55:00Z
3
value 0.00326
scoring_system epss
scoring_elements 0.55663
published_at 2026-04-16T12:55:00Z
4
value 0.00351
scoring_system epss
scoring_elements 0.57419
published_at 2026-04-01T12:55:00Z
5
value 0.00458
scoring_system epss
scoring_elements 0.63965
published_at 2026-04-02T12:55:00Z
6
value 0.00458
scoring_system epss
scoring_elements 0.63992
published_at 2026-04-04T12:55:00Z
7
value 0.00458
scoring_system epss
scoring_elements 0.63952
published_at 2026-04-07T12:55:00Z
8
value 0.00458
scoring_system epss
scoring_elements 0.64002
published_at 2026-04-08T12:55:00Z
9
value 0.00458
scoring_system epss
scoring_elements 0.64019
published_at 2026-04-09T12:55:00Z
10
value 0.00458
scoring_system epss
scoring_elements 0.64031
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-10379
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10268
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10268
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10286
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10286
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10378
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10378
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10379
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10379
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10384
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10384
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3308
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3308
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3309
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3309
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3453
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3453
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3456
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3456
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3464
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3464
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3636
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3636
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3641
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3641
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3653
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3653
15
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:C
1
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
16
reference_url https://security.netapp.com/advisory/ntap-20171019-0002/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:42:50Z/
url https://security.netapp.com/advisory/ntap-20171019-0002/
17
reference_url http://www.debian.org/security/2017/dsa-4002
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:42:50Z/
url http://www.debian.org/security/2017/dsa-4002
18
reference_url http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:42:50Z/
url http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
19
reference_url http://www.securityfocus.com/bid/101415
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:42:50Z/
url http://www.securityfocus.com/bid/101415
20
reference_url http://www.securitytracker.com/id/1039597
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:42:50Z/
url http://www.securitytracker.com/id/1039597
21
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1503685
reference_id 1503685
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1503685
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
reference_id cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
reference_id cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_balance:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_balance:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_balance:-:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_performance_manager:-:*:*:*:*:vmware_vsphere:*:*
reference_id cpe:2.3:a:netapp:oncommand_performance_manager:-:*:*:*:*:vmware_vsphere:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_performance_manager:-:*:*:*:*:vmware_vsphere:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vsphere:*:*
reference_id cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vsphere:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vsphere:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:windows:*:*
reference_id cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:windows:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:windows:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openstack:12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:openstack:12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openstack:12:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-10379
reference_id CVE-2017-10379
reference_type
scores
0
value 4.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:P/I:N/A:N
1
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2017-10379
46
reference_url https://security.gentoo.org/glsa/201802-04
reference_id GLSA-201802-04
reference_type
scores
url https://security.gentoo.org/glsa/201802-04
47
reference_url https://access.redhat.com/errata/RHSA-2017:3265
reference_id RHSA-2017:3265
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:42:50Z/
url https://access.redhat.com/errata/RHSA-2017:3265
48
reference_url https://access.redhat.com/errata/RHSA-2017:3442
reference_id RHSA-2017:3442
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:42:50Z/
url https://access.redhat.com/errata/RHSA-2017:3442
49
reference_url https://access.redhat.com/errata/RHSA-2018:0279
reference_id RHSA-2018:0279
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:42:50Z/
url https://access.redhat.com/errata/RHSA-2018:0279
50
reference_url https://access.redhat.com/errata/RHSA-2018:0574
reference_id RHSA-2018:0574
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:42:50Z/
url https://access.redhat.com/errata/RHSA-2018:0574
51
reference_url https://access.redhat.com/errata/RHSA-2018:2439
reference_id RHSA-2018:2439
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:42:50Z/
url https://access.redhat.com/errata/RHSA-2018:2439
52
reference_url https://access.redhat.com/errata/RHSA-2018:2729
reference_id RHSA-2018:2729
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:42:50Z/
url https://access.redhat.com/errata/RHSA-2018:2729
53
reference_url https://usn.ubuntu.com/3459-1/
reference_id USN-3459-1
reference_type
scores
url https://usn.ubuntu.com/3459-1/
54
reference_url https://usn.ubuntu.com/3459-2/
reference_id USN-3459-2
reference_type
scores
url https://usn.ubuntu.com/3459-2/
fixed_packages
0
url pkg:deb/debian/mysql-5.5@5.5.60-0%2Bdeb8u1
purl pkg:deb/debian/mysql-5.5@5.5.60-0%2Bdeb8u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-5.5@5.5.60-0%252Bdeb8u1
aliases CVE-2017-10379
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ej67-ayfh-sqdt
54
url VCID-esfk-umc5-ska4
vulnerability_id VCID-esfk-umc5-ska4
summary security update
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00015.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00015.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00016.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00016.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html
6
reference_url http://rhn.redhat.com/errata/RHSA-2016-0534.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0534.html
7
reference_url http://rhn.redhat.com/errata/RHSA-2016-0705.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0705.html
8
reference_url http://rhn.redhat.com/errata/RHSA-2016-1480.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-1480.html
9
reference_url http://rhn.redhat.com/errata/RHSA-2016-1481.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-1481.html
10
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0609.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0609.json
11
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-0609
reference_id
reference_type
scores
0
value 0.00794
scoring_system epss
scoring_elements 0.74005
published_at 2026-04-18T12:55:00Z
1
value 0.00794
scoring_system epss
scoring_elements 0.73995
published_at 2026-04-16T12:55:00Z
2
value 0.00794
scoring_system epss
scoring_elements 0.73905
published_at 2026-04-01T12:55:00Z
3
value 0.00794
scoring_system epss
scoring_elements 0.73915
published_at 2026-04-02T12:55:00Z
4
value 0.00794
scoring_system epss
scoring_elements 0.73939
published_at 2026-04-04T12:55:00Z
5
value 0.00794
scoring_system epss
scoring_elements 0.73911
published_at 2026-04-07T12:55:00Z
6
value 0.00794
scoring_system epss
scoring_elements 0.73945
published_at 2026-04-08T12:55:00Z
7
value 0.00794
scoring_system epss
scoring_elements 0.73958
published_at 2026-04-09T12:55:00Z
8
value 0.00794
scoring_system epss
scoring_elements 0.73981
published_at 2026-04-11T12:55:00Z
9
value 0.00794
scoring_system epss
scoring_elements 0.73963
published_at 2026-04-12T12:55:00Z
10
value 0.00794
scoring_system epss
scoring_elements 0.73955
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-0609
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0505
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0505
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0546
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0546
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0596
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0596
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0597
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0597
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0598
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0598
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0600
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0600
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0606
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0606
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0608
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0608
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0609
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0609
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0616
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0616
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2047
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2047
23
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 1.7
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:M/C:N/I:N/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
24
reference_url https://mariadb.com/kb/en/mariadb/mariadb-10110-release-notes/
reference_id
reference_type
scores
url https://mariadb.com/kb/en/mariadb/mariadb-10110-release-notes/
25
reference_url https://mariadb.com/kb/en/mariadb/mariadb-5547-release-notes/
reference_id
reference_type
scores
url https://mariadb.com/kb/en/mariadb/mariadb-5547-release-notes/
26
reference_url https://mariadb.com/kb/en/mdb-10023-rn/
reference_id
reference_type
scores
url https://mariadb.com/kb/en/mdb-10023-rn/
27
reference_url http://www.debian.org/security/2016/dsa-3453
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3453
28
reference_url http://www.debian.org/security/2016/dsa-3459
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3459
29
reference_url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
30
reference_url http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
31
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
32
reference_url http://www.securityfocus.com/bid/81258
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/81258
33
reference_url http://www.securitytracker.com/id/1034708
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1034708
34
reference_url http://www.ubuntu.com/usn/USN-2881-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2881-1
35
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1301507
reference_id 1301507
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1301507
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node_eus:7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_hpc_node_eus:7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node_eus:7.2:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-0609
reference_id CVE-2016-0609
reference_type
scores
0
value 1.7
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:M/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2016-0609
57
reference_url https://access.redhat.com/errata/RHSA-2016:0534
reference_id RHSA-2016:0534
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0534
58
reference_url https://access.redhat.com/errata/RHSA-2016:0705
reference_id RHSA-2016:0705
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0705
59
reference_url https://access.redhat.com/errata/RHSA-2016:1132
reference_id RHSA-2016:1132
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1132
60
reference_url https://access.redhat.com/errata/RHSA-2016:1480
reference_id RHSA-2016:1480
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1480
61
reference_url https://access.redhat.com/errata/RHSA-2016:1481
reference_id RHSA-2016:1481
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1481
62
reference_url https://usn.ubuntu.com/2881-1/
reference_id USN-2881-1
reference_type
scores
url https://usn.ubuntu.com/2881-1/
fixed_packages
0
url pkg:deb/debian/mysql-5.5@5.5.47-0%2Bdeb7u1
purl pkg:deb/debian/mysql-5.5@5.5.47-0%2Bdeb7u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1gmc-pj6y-rkfx
1
vulnerability VCID-1nvb-xd5n-gkh8
2
vulnerability VCID-2gyq-q761-h3br
3
vulnerability VCID-2jer-ss8p-7kbg
4
vulnerability VCID-2uxe-ep8b-y7b9
5
vulnerability VCID-2vp1-j324-dkat
6
vulnerability VCID-2yqz-qtv5-47hh
7
vulnerability VCID-2za2-cnwx-hbbw
8
vulnerability VCID-39gt-6dgh-wyar
9
vulnerability VCID-3qjy-4cen-7qev
10
vulnerability VCID-45hn-ezks-j7br
11
vulnerability VCID-4cnj-7fur-3qe3
12
vulnerability VCID-4yz4-vxnh-b3dp
13
vulnerability VCID-52w9-bgxr-nkba
14
vulnerability VCID-55fg-6c2c-6bg8
15
vulnerability VCID-5p65-gfsg-1ugq
16
vulnerability VCID-5q89-vg9j-k3as
17
vulnerability VCID-5sjj-599v-vybg
18
vulnerability VCID-64st-u4xn-z7g3
19
vulnerability VCID-6g4n-3xfu-hfee
20
vulnerability VCID-6gvj-hy6a-3qdx
21
vulnerability VCID-7tj3-dfxj-bke7
22
vulnerability VCID-7w3v-5s98-a7ec
23
vulnerability VCID-7yc3-7bkr-jfc9
24
vulnerability VCID-8krv-jqjg-uqc8
25
vulnerability VCID-8kvb-5u8c-zbc4
26
vulnerability VCID-8sya-wktg-dqa5
27
vulnerability VCID-9f48-53dz-13an
28
vulnerability VCID-9ff2-43rk-2ydj
29
vulnerability VCID-9w98-nfg2-muh2
30
vulnerability VCID-a3hx-qz7x-7ybk
31
vulnerability VCID-bfnh-7k45-nkg2
32
vulnerability VCID-bhxk-8byp-eyap
33
vulnerability VCID-ca85-vx8c-huht
34
vulnerability VCID-cnb3-dy3a-8bdp
35
vulnerability VCID-cyqa-e362-yyaf
36
vulnerability VCID-dfbz-5n6w-syd9
37
vulnerability VCID-dgtc-a2t2-k7f5
38
vulnerability VCID-dqg6-2gmj-judy
39
vulnerability VCID-ej67-ayfh-sqdt
40
vulnerability VCID-esfk-umc5-ska4
41
vulnerability VCID-f8p4-hpsh-2fcw
42
vulnerability VCID-f9vz-r6zv-t7ev
43
vulnerability VCID-fabc-rma2-myab
44
vulnerability VCID-fnks-p4e9-13es
45
vulnerability VCID-fuyw-1y1c-fkfp
46
vulnerability VCID-j2wu-2rx7-3yf2
47
vulnerability VCID-jgff-4jyp-9fgr
48
vulnerability VCID-kwrj-3fxz-g7c6
49
vulnerability VCID-mde2-1ynu-auh2
50
vulnerability VCID-mz71-vku8-ckbm
51
vulnerability VCID-nj41-1zpw-gkh9
52
vulnerability VCID-nkdd-suwp-4ffr
53
vulnerability VCID-p623-gxyv-g7fs
54
vulnerability VCID-pk7e-t26d-aqdm
55
vulnerability VCID-pv92-6p9x-v7bs
56
vulnerability VCID-qyb6-7ees-ukcm
57
vulnerability VCID-r2cz-9kjz-zbgu
58
vulnerability VCID-rfz7-vha1-e7gy
59
vulnerability VCID-rssq-mfc2-ckaf
60
vulnerability VCID-skzt-r7sx-1ucv
61
vulnerability VCID-sy6p-5km4-1kcy
62
vulnerability VCID-tazb-gd49-73b4
63
vulnerability VCID-u2c7-p86x-5bgf
64
vulnerability VCID-un5y-y9sq-1ufb
65
vulnerability VCID-v165-afmm-w3er
66
vulnerability VCID-v4gv-g9n5-ukgc
67
vulnerability VCID-wrna-cc9g-sqbe
68
vulnerability VCID-xuhv-wrut-wuez
69
vulnerability VCID-xvv1-nxs6-n7ab
70
vulnerability VCID-xyuf-au4f-57fr
71
vulnerability VCID-y6p4-vfkn-q7fc
72
vulnerability VCID-yx79-3g2x-pqex
73
vulnerability VCID-zb4s-9rj3-ebea
74
vulnerability VCID-zkvk-538h-w3b9
75
vulnerability VCID-zuxd-n3wn-s7hg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-5.5@5.5.47-0%252Bdeb7u1
1
url pkg:deb/debian/mysql-5.5@5.5.60-0%2Bdeb8u1
purl pkg:deb/debian/mysql-5.5@5.5.60-0%2Bdeb8u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-5.5@5.5.60-0%252Bdeb8u1
aliases CVE-2016-0609
risk_score 0.8
exploitability 0.5
weighted_severity 1.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-esfk-umc5-ska4
55
url VCID-f8p4-hpsh-2fcw
vulnerability_id VCID-f8p4-hpsh-2fcw
summary
Multiple vulnerabilities were found in MySQL, the worst of which
    may allow remote execution of arbitrary code.
references
0
reference_url http://rhn.redhat.com/errata/RHSA-2016-2927.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T16:21:49Z/
url http://rhn.redhat.com/errata/RHSA-2016-2927.html
1
reference_url http://rhn.redhat.com/errata/RHSA-2016-2928.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T16:21:49Z/
url http://rhn.redhat.com/errata/RHSA-2016-2928.html
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3600.json
reference_id
reference_type
scores
0
value 6.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3600.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-3600
reference_id
reference_type
scores
0
value 0.00811
scoring_system epss
scoring_elements 0.74278
published_at 2026-04-18T12:55:00Z
1
value 0.00811
scoring_system epss
scoring_elements 0.7422
published_at 2026-04-08T12:55:00Z
2
value 0.00811
scoring_system epss
scoring_elements 0.74235
published_at 2026-04-09T12:55:00Z
3
value 0.00811
scoring_system epss
scoring_elements 0.74256
published_at 2026-04-11T12:55:00Z
4
value 0.00811
scoring_system epss
scoring_elements 0.74237
published_at 2026-04-12T12:55:00Z
5
value 0.00811
scoring_system epss
scoring_elements 0.7423
published_at 2026-04-13T12:55:00Z
6
value 0.00811
scoring_system epss
scoring_elements 0.74268
published_at 2026-04-16T12:55:00Z
7
value 0.00811
scoring_system epss
scoring_elements 0.74187
published_at 2026-04-07T12:55:00Z
8
value 0.00811
scoring_system epss
scoring_elements 0.74182
published_at 2026-04-01T12:55:00Z
9
value 0.00811
scoring_system epss
scoring_elements 0.74215
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-3600
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3302
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3302
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3305
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3305
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3308
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3308
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3309
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3309
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3329
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3329
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3453
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3453
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3456
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3456
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3461
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3461
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3462
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3462
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3463
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3463
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3464
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3464
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3600
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3600
16
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.6
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:S/C:P/I:P/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
17
reference_url http://www.debian.org/security/2017/dsa-3834
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T16:21:49Z/
url http://www.debian.org/security/2017/dsa-3834
18
reference_url http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T16:21:49Z/
url http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
19
reference_url http://www.securityfocus.com/bid/97765
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T16:21:49Z/
url http://www.securityfocus.com/bid/97765
20
reference_url http://www.securitytracker.com/id/1038287
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T16:21:49Z/
url http://www.securitytracker.com/id/1038287
21
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1433010
reference_id 1433010
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1433010
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-3600
reference_id CVE-2017-3600
reference_type
scores
0
value 6.0
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:S/C:P/I:P/A:P
1
value 6.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-3600
35
reference_url https://security.gentoo.org/glsa/201802-04
reference_id GLSA-201802-04
reference_type
scores
url https://security.gentoo.org/glsa/201802-04
36
reference_url https://access.redhat.com/errata/RHSA-2016:2927
reference_id RHSA-2016:2927
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2927
37
reference_url https://access.redhat.com/errata/RHSA-2016:2928
reference_id RHSA-2016:2928
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2928
38
reference_url https://access.redhat.com/errata/RHSA-2017:2192
reference_id RHSA-2017:2192
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T16:21:49Z/
url https://access.redhat.com/errata/RHSA-2017:2192
39
reference_url https://access.redhat.com/errata/RHSA-2017:2787
reference_id RHSA-2017:2787
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T16:21:49Z/
url https://access.redhat.com/errata/RHSA-2017:2787
40
reference_url https://access.redhat.com/errata/RHSA-2017:2886
reference_id RHSA-2017:2886
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T16:21:49Z/
url https://access.redhat.com/errata/RHSA-2017:2886
41
reference_url https://usn.ubuntu.com/3269-1/
reference_id USN-3269-1
reference_type
scores
url https://usn.ubuntu.com/3269-1/
42
reference_url https://usn.ubuntu.com/3357-2/
reference_id USN-3357-2
reference_type
scores
url https://usn.ubuntu.com/3357-2/
fixed_packages
0
url pkg:deb/debian/mysql-5.5@5.5.60-0%2Bdeb8u1
purl pkg:deb/debian/mysql-5.5@5.5.60-0%2Bdeb8u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-5.5@5.5.60-0%252Bdeb8u1
aliases CVE-2017-3600
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-f8p4-hpsh-2fcw
56
url VCID-f9vz-r6zv-t7ev
vulnerability_id VCID-f9vz-r6zv-t7ev
summary security update
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00015.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00015.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00016.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00016.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html
6
reference_url http://rhn.redhat.com/errata/RHSA-2016-0534.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0534.html
7
reference_url http://rhn.redhat.com/errata/RHSA-2016-0705.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0705.html
8
reference_url http://rhn.redhat.com/errata/RHSA-2016-1480.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-1480.html
9
reference_url http://rhn.redhat.com/errata/RHSA-2016-1481.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-1481.html
10
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0596.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0596.json
11
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-0596
reference_id
reference_type
scores
0
value 0.00361
scoring_system epss
scoring_elements 0.58298
published_at 2026-04-18T12:55:00Z
1
value 0.00361
scoring_system epss
scoring_elements 0.58296
published_at 2026-04-16T12:55:00Z
2
value 0.00361
scoring_system epss
scoring_elements 0.58149
published_at 2026-04-01T12:55:00Z
3
value 0.00361
scoring_system epss
scoring_elements 0.58235
published_at 2026-04-02T12:55:00Z
4
value 0.00361
scoring_system epss
scoring_elements 0.58255
published_at 2026-04-04T12:55:00Z
5
value 0.00361
scoring_system epss
scoring_elements 0.58229
published_at 2026-04-07T12:55:00Z
6
value 0.00361
scoring_system epss
scoring_elements 0.58283
published_at 2026-04-08T12:55:00Z
7
value 0.00361
scoring_system epss
scoring_elements 0.58288
published_at 2026-04-09T12:55:00Z
8
value 0.00361
scoring_system epss
scoring_elements 0.58307
published_at 2026-04-11T12:55:00Z
9
value 0.00361
scoring_system epss
scoring_elements 0.58284
published_at 2026-04-12T12:55:00Z
10
value 0.00361
scoring_system epss
scoring_elements 0.58264
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-0596
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0505
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0505
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0546
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0546
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0596
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0596
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0597
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0597
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0598
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0598
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0600
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0600
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0606
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0606
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0608
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0608
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0609
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0609
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0616
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0616
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2047
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2047
23
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
24
reference_url https://mariadb.com/kb/en/mariadb/mariadb-10110-release-notes/
reference_id
reference_type
scores
url https://mariadb.com/kb/en/mariadb/mariadb-10110-release-notes/
25
reference_url https://mariadb.com/kb/en/mariadb/mariadb-5547-release-notes/
reference_id
reference_type
scores
url https://mariadb.com/kb/en/mariadb/mariadb-5547-release-notes/
26
reference_url https://mariadb.com/kb/en/mdb-10023-rn/
reference_id
reference_type
scores
url https://mariadb.com/kb/en/mdb-10023-rn/
27
reference_url http://www.debian.org/security/2016/dsa-3453
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3453
28
reference_url http://www.debian.org/security/2016/dsa-3459
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3459
29
reference_url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
30
reference_url http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
31
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
32
reference_url http://www.securityfocus.com/bid/81130
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/81130
33
reference_url http://www.securitytracker.com/id/1034708
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1034708
34
reference_url http://www.ubuntu.com/usn/USN-2881-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2881-1
35
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1301496
reference_id 1301496
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1301496
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node_eus:7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_hpc_node_eus:7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node_eus:7.2:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-0596
reference_id CVE-2016-0596
reference_type
scores
0
value 4.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2016-0596
57
reference_url https://access.redhat.com/errata/RHSA-2016:0534
reference_id RHSA-2016:0534
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0534
58
reference_url https://access.redhat.com/errata/RHSA-2016:0705
reference_id RHSA-2016:0705
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0705
59
reference_url https://access.redhat.com/errata/RHSA-2016:1132
reference_id RHSA-2016:1132
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1132
60
reference_url https://access.redhat.com/errata/RHSA-2016:1480
reference_id RHSA-2016:1480
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1480
61
reference_url https://access.redhat.com/errata/RHSA-2016:1481
reference_id RHSA-2016:1481
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1481
62
reference_url https://usn.ubuntu.com/2881-1/
reference_id USN-2881-1
reference_type
scores
url https://usn.ubuntu.com/2881-1/
fixed_packages
0
url pkg:deb/debian/mysql-5.5@5.5.47-0%2Bdeb7u1
purl pkg:deb/debian/mysql-5.5@5.5.47-0%2Bdeb7u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1gmc-pj6y-rkfx
1
vulnerability VCID-1nvb-xd5n-gkh8
2
vulnerability VCID-2gyq-q761-h3br
3
vulnerability VCID-2jer-ss8p-7kbg
4
vulnerability VCID-2uxe-ep8b-y7b9
5
vulnerability VCID-2vp1-j324-dkat
6
vulnerability VCID-2yqz-qtv5-47hh
7
vulnerability VCID-2za2-cnwx-hbbw
8
vulnerability VCID-39gt-6dgh-wyar
9
vulnerability VCID-3qjy-4cen-7qev
10
vulnerability VCID-45hn-ezks-j7br
11
vulnerability VCID-4cnj-7fur-3qe3
12
vulnerability VCID-4yz4-vxnh-b3dp
13
vulnerability VCID-52w9-bgxr-nkba
14
vulnerability VCID-55fg-6c2c-6bg8
15
vulnerability VCID-5p65-gfsg-1ugq
16
vulnerability VCID-5q89-vg9j-k3as
17
vulnerability VCID-5sjj-599v-vybg
18
vulnerability VCID-64st-u4xn-z7g3
19
vulnerability VCID-6g4n-3xfu-hfee
20
vulnerability VCID-6gvj-hy6a-3qdx
21
vulnerability VCID-7tj3-dfxj-bke7
22
vulnerability VCID-7w3v-5s98-a7ec
23
vulnerability VCID-7yc3-7bkr-jfc9
24
vulnerability VCID-8krv-jqjg-uqc8
25
vulnerability VCID-8kvb-5u8c-zbc4
26
vulnerability VCID-8sya-wktg-dqa5
27
vulnerability VCID-9f48-53dz-13an
28
vulnerability VCID-9ff2-43rk-2ydj
29
vulnerability VCID-9w98-nfg2-muh2
30
vulnerability VCID-a3hx-qz7x-7ybk
31
vulnerability VCID-bfnh-7k45-nkg2
32
vulnerability VCID-bhxk-8byp-eyap
33
vulnerability VCID-ca85-vx8c-huht
34
vulnerability VCID-cnb3-dy3a-8bdp
35
vulnerability VCID-cyqa-e362-yyaf
36
vulnerability VCID-dfbz-5n6w-syd9
37
vulnerability VCID-dgtc-a2t2-k7f5
38
vulnerability VCID-dqg6-2gmj-judy
39
vulnerability VCID-ej67-ayfh-sqdt
40
vulnerability VCID-esfk-umc5-ska4
41
vulnerability VCID-f8p4-hpsh-2fcw
42
vulnerability VCID-f9vz-r6zv-t7ev
43
vulnerability VCID-fabc-rma2-myab
44
vulnerability VCID-fnks-p4e9-13es
45
vulnerability VCID-fuyw-1y1c-fkfp
46
vulnerability VCID-j2wu-2rx7-3yf2
47
vulnerability VCID-jgff-4jyp-9fgr
48
vulnerability VCID-kwrj-3fxz-g7c6
49
vulnerability VCID-mde2-1ynu-auh2
50
vulnerability VCID-mz71-vku8-ckbm
51
vulnerability VCID-nj41-1zpw-gkh9
52
vulnerability VCID-nkdd-suwp-4ffr
53
vulnerability VCID-p623-gxyv-g7fs
54
vulnerability VCID-pk7e-t26d-aqdm
55
vulnerability VCID-pv92-6p9x-v7bs
56
vulnerability VCID-qyb6-7ees-ukcm
57
vulnerability VCID-r2cz-9kjz-zbgu
58
vulnerability VCID-rfz7-vha1-e7gy
59
vulnerability VCID-rssq-mfc2-ckaf
60
vulnerability VCID-skzt-r7sx-1ucv
61
vulnerability VCID-sy6p-5km4-1kcy
62
vulnerability VCID-tazb-gd49-73b4
63
vulnerability VCID-u2c7-p86x-5bgf
64
vulnerability VCID-un5y-y9sq-1ufb
65
vulnerability VCID-v165-afmm-w3er
66
vulnerability VCID-v4gv-g9n5-ukgc
67
vulnerability VCID-wrna-cc9g-sqbe
68
vulnerability VCID-xuhv-wrut-wuez
69
vulnerability VCID-xvv1-nxs6-n7ab
70
vulnerability VCID-xyuf-au4f-57fr
71
vulnerability VCID-y6p4-vfkn-q7fc
72
vulnerability VCID-yx79-3g2x-pqex
73
vulnerability VCID-zb4s-9rj3-ebea
74
vulnerability VCID-zkvk-538h-w3b9
75
vulnerability VCID-zuxd-n3wn-s7hg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-5.5@5.5.47-0%252Bdeb7u1
1
url pkg:deb/debian/mysql-5.5@5.5.60-0%2Bdeb8u1
purl pkg:deb/debian/mysql-5.5@5.5.60-0%2Bdeb8u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-5.5@5.5.60-0%252Bdeb8u1
aliases CVE-2016-0596
risk_score 1.8
exploitability 0.5
weighted_severity 3.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-f9vz-r6zv-t7ev
57
url VCID-fabc-rma2-myab
vulnerability_id VCID-fabc-rma2-myab
summary
Multiple vulnerabilities were found in MySQL, the worst of which
    may allow remote execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10378.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10378.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-10378
reference_id
reference_type
scores
0
value 0.00282
scoring_system epss
scoring_elements 0.51672
published_at 2026-04-18T12:55:00Z
1
value 0.00282
scoring_system epss
scoring_elements 0.5164
published_at 2026-04-12T12:55:00Z
2
value 0.00282
scoring_system epss
scoring_elements 0.51623
published_at 2026-04-13T12:55:00Z
3
value 0.00282
scoring_system epss
scoring_elements 0.51665
published_at 2026-04-16T12:55:00Z
4
value 0.00303
scoring_system epss
scoring_elements 0.53547
published_at 2026-04-01T12:55:00Z
5
value 0.00396
scoring_system epss
scoring_elements 0.604
published_at 2026-04-02T12:55:00Z
6
value 0.00396
scoring_system epss
scoring_elements 0.60481
published_at 2026-04-11T12:55:00Z
7
value 0.00396
scoring_system epss
scoring_elements 0.60427
published_at 2026-04-04T12:55:00Z
8
value 0.00396
scoring_system epss
scoring_elements 0.60395
published_at 2026-04-07T12:55:00Z
9
value 0.00396
scoring_system epss
scoring_elements 0.60444
published_at 2026-04-08T12:55:00Z
10
value 0.00396
scoring_system epss
scoring_elements 0.60461
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-10378
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10268
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10268
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10378
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10378
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10379
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10379
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10384
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10384
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15365
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15365
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2562
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2562
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2612
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2612
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2622
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2622
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2640
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2640
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2665
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2665
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2668
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2668
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2755
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2755
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2761
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2761
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2766
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2766
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2767
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2767
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2771
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2771
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2781
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2781
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2782
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2782
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2784
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2784
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2787
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2787
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2813
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2813
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2817
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2817
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2819
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2819
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3058
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3058
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3063
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3063
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3064
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3064
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3066
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3066
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3081
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3081
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3143
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3143
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3156
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3156
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3174
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3174
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3251
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3251
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3282
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3282
35
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2503
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2503
36
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:C
1
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
37
reference_url https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:42:56Z/
url https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html
38
reference_url https://security.netapp.com/advisory/ntap-20171019-0002/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:42:56Z/
url https://security.netapp.com/advisory/ntap-20171019-0002/
39
reference_url https://www.debian.org/security/2018/dsa-4341
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:42:56Z/
url https://www.debian.org/security/2018/dsa-4341
40
reference_url http://www.debian.org/security/2017/dsa-4002
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:42:56Z/
url http://www.debian.org/security/2017/dsa-4002
41
reference_url http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:42:56Z/
url http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
42
reference_url http://www.securityfocus.com/bid/101375
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:42:56Z/
url http://www.securityfocus.com/bid/101375
43
reference_url http://www.securitytracker.com/id/1039597
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:42:56Z/
url http://www.securitytracker.com/id/1039597
44
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1503684
reference_id 1503684
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1503684
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
reference_id cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
reference_id cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_balance:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_balance:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_balance:-:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_performance_manager:-:*:*:*:*:vmware_vsphere:*:*
reference_id cpe:2.3:a:netapp:oncommand_performance_manager:-:*:*:*:*:vmware_vsphere:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_performance_manager:-:*:*:*:*:vmware_vsphere:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vsphere:*:*
reference_id cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vsphere:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vsphere:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:windows:*:*
reference_id cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:windows:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:windows:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openstack:12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:openstack:12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openstack:12:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-10378
reference_id CVE-2017-10378
reference_type
scores
0
value 4.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:P
1
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-10378
70
reference_url https://security.gentoo.org/glsa/201802-04
reference_id GLSA-201802-04
reference_type
scores
url https://security.gentoo.org/glsa/201802-04
71
reference_url https://access.redhat.com/errata/RHSA-2017:3265
reference_id RHSA-2017:3265
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:42:56Z/
url https://access.redhat.com/errata/RHSA-2017:3265
72
reference_url https://access.redhat.com/errata/RHSA-2017:3442
reference_id RHSA-2017:3442
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:42:56Z/
url https://access.redhat.com/errata/RHSA-2017:3442
73
reference_url https://access.redhat.com/errata/RHSA-2018:0279
reference_id RHSA-2018:0279
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:42:56Z/
url https://access.redhat.com/errata/RHSA-2018:0279
74
reference_url https://access.redhat.com/errata/RHSA-2018:0574
reference_id RHSA-2018:0574
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:42:56Z/
url https://access.redhat.com/errata/RHSA-2018:0574
75
reference_url https://access.redhat.com/errata/RHSA-2018:2439
reference_id RHSA-2018:2439
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:42:56Z/
url https://access.redhat.com/errata/RHSA-2018:2439
76
reference_url https://access.redhat.com/errata/RHSA-2018:2729
reference_id RHSA-2018:2729
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:42:56Z/
url https://access.redhat.com/errata/RHSA-2018:2729
77
reference_url https://access.redhat.com/errata/RHSA-2019:1258
reference_id RHSA-2019:1258
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:42:56Z/
url https://access.redhat.com/errata/RHSA-2019:1258
78
reference_url https://usn.ubuntu.com/3459-1/
reference_id USN-3459-1
reference_type
scores
url https://usn.ubuntu.com/3459-1/
79
reference_url https://usn.ubuntu.com/3459-2/
reference_id USN-3459-2
reference_type
scores
url https://usn.ubuntu.com/3459-2/
fixed_packages
0
url pkg:deb/debian/mysql-5.5@5.5.60-0%2Bdeb8u1
purl pkg:deb/debian/mysql-5.5@5.5.60-0%2Bdeb8u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-5.5@5.5.60-0%252Bdeb8u1
aliases CVE-2017-10378
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fabc-rma2-myab
58
url VCID-fnks-p4e9-13es
vulnerability_id VCID-fnks-p4e9-13es
summary security update
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00015.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00015.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00016.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00016.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html
6
reference_url http://rhn.redhat.com/errata/RHSA-2016-0534.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0534.html
7
reference_url http://rhn.redhat.com/errata/RHSA-2016-0705.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0705.html
8
reference_url http://rhn.redhat.com/errata/RHSA-2016-1480.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-1480.html
9
reference_url http://rhn.redhat.com/errata/RHSA-2016-1481.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-1481.html
10
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0505.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0505.json
11
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-0505
reference_id
reference_type
scores
0
value 0.06492
scoring_system epss
scoring_elements 0.91121
published_at 2026-04-18T12:55:00Z
1
value 0.06492
scoring_system epss
scoring_elements 0.91097
published_at 2026-04-13T12:55:00Z
2
value 0.06492
scoring_system epss
scoring_elements 0.91047
published_at 2026-04-01T12:55:00Z
3
value 0.06492
scoring_system epss
scoring_elements 0.91051
published_at 2026-04-02T12:55:00Z
4
value 0.06492
scoring_system epss
scoring_elements 0.91061
published_at 2026-04-04T12:55:00Z
5
value 0.06492
scoring_system epss
scoring_elements 0.91069
published_at 2026-04-07T12:55:00Z
6
value 0.06492
scoring_system epss
scoring_elements 0.91082
published_at 2026-04-08T12:55:00Z
7
value 0.06492
scoring_system epss
scoring_elements 0.91088
published_at 2026-04-09T12:55:00Z
8
value 0.06492
scoring_system epss
scoring_elements 0.91096
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-0505
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0505
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0505
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0546
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0546
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0596
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0596
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0597
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0597
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0598
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0598
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0600
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0600
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0606
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0606
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0608
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0608
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0609
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0609
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0616
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0616
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2047
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2047
23
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:C
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
24
reference_url https://mariadb.com/kb/en/mariadb/mariadb-10110-release-notes/
reference_id
reference_type
scores
url https://mariadb.com/kb/en/mariadb/mariadb-10110-release-notes/
25
reference_url https://mariadb.com/kb/en/mariadb/mariadb-5547-release-notes/
reference_id
reference_type
scores
url https://mariadb.com/kb/en/mariadb/mariadb-5547-release-notes/
26
reference_url https://mariadb.com/kb/en/mdb-10023-rn/
reference_id
reference_type
scores
url https://mariadb.com/kb/en/mdb-10023-rn/
27
reference_url http://www.debian.org/security/2016/dsa-3453
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3453
28
reference_url http://www.debian.org/security/2016/dsa-3459
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3459
29
reference_url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
30
reference_url http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
31
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
32
reference_url http://www.securityfocus.com/bid/81088
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/81088
33
reference_url http://www.securitytracker.com/id/1034708
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1034708
34
reference_url http://www.ubuntu.com/usn/USN-2881-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2881-1
35
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1301492
reference_id 1301492
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1301492
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node_eus:7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_hpc_node_eus:7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node_eus:7.2:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-0505
reference_id CVE-2016-0505
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2016-0505
57
reference_url https://access.redhat.com/errata/RHSA-2016:0534
reference_id RHSA-2016:0534
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0534
58
reference_url https://access.redhat.com/errata/RHSA-2016:0705
reference_id RHSA-2016:0705
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0705
59
reference_url https://access.redhat.com/errata/RHSA-2016:1132
reference_id RHSA-2016:1132
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1132
60
reference_url https://access.redhat.com/errata/RHSA-2016:1480
reference_id RHSA-2016:1480
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1480
61
reference_url https://access.redhat.com/errata/RHSA-2016:1481
reference_id RHSA-2016:1481
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1481
62
reference_url https://usn.ubuntu.com/2881-1/
reference_id USN-2881-1
reference_type
scores
url https://usn.ubuntu.com/2881-1/
fixed_packages
0
url pkg:deb/debian/mysql-5.5@5.5.47-0%2Bdeb7u1
purl pkg:deb/debian/mysql-5.5@5.5.47-0%2Bdeb7u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1gmc-pj6y-rkfx
1
vulnerability VCID-1nvb-xd5n-gkh8
2
vulnerability VCID-2gyq-q761-h3br
3
vulnerability VCID-2jer-ss8p-7kbg
4
vulnerability VCID-2uxe-ep8b-y7b9
5
vulnerability VCID-2vp1-j324-dkat
6
vulnerability VCID-2yqz-qtv5-47hh
7
vulnerability VCID-2za2-cnwx-hbbw
8
vulnerability VCID-39gt-6dgh-wyar
9
vulnerability VCID-3qjy-4cen-7qev
10
vulnerability VCID-45hn-ezks-j7br
11
vulnerability VCID-4cnj-7fur-3qe3
12
vulnerability VCID-4yz4-vxnh-b3dp
13
vulnerability VCID-52w9-bgxr-nkba
14
vulnerability VCID-55fg-6c2c-6bg8
15
vulnerability VCID-5p65-gfsg-1ugq
16
vulnerability VCID-5q89-vg9j-k3as
17
vulnerability VCID-5sjj-599v-vybg
18
vulnerability VCID-64st-u4xn-z7g3
19
vulnerability VCID-6g4n-3xfu-hfee
20
vulnerability VCID-6gvj-hy6a-3qdx
21
vulnerability VCID-7tj3-dfxj-bke7
22
vulnerability VCID-7w3v-5s98-a7ec
23
vulnerability VCID-7yc3-7bkr-jfc9
24
vulnerability VCID-8krv-jqjg-uqc8
25
vulnerability VCID-8kvb-5u8c-zbc4
26
vulnerability VCID-8sya-wktg-dqa5
27
vulnerability VCID-9f48-53dz-13an
28
vulnerability VCID-9ff2-43rk-2ydj
29
vulnerability VCID-9w98-nfg2-muh2
30
vulnerability VCID-a3hx-qz7x-7ybk
31
vulnerability VCID-bfnh-7k45-nkg2
32
vulnerability VCID-bhxk-8byp-eyap
33
vulnerability VCID-ca85-vx8c-huht
34
vulnerability VCID-cnb3-dy3a-8bdp
35
vulnerability VCID-cyqa-e362-yyaf
36
vulnerability VCID-dfbz-5n6w-syd9
37
vulnerability VCID-dgtc-a2t2-k7f5
38
vulnerability VCID-dqg6-2gmj-judy
39
vulnerability VCID-ej67-ayfh-sqdt
40
vulnerability VCID-esfk-umc5-ska4
41
vulnerability VCID-f8p4-hpsh-2fcw
42
vulnerability VCID-f9vz-r6zv-t7ev
43
vulnerability VCID-fabc-rma2-myab
44
vulnerability VCID-fnks-p4e9-13es
45
vulnerability VCID-fuyw-1y1c-fkfp
46
vulnerability VCID-j2wu-2rx7-3yf2
47
vulnerability VCID-jgff-4jyp-9fgr
48
vulnerability VCID-kwrj-3fxz-g7c6
49
vulnerability VCID-mde2-1ynu-auh2
50
vulnerability VCID-mz71-vku8-ckbm
51
vulnerability VCID-nj41-1zpw-gkh9
52
vulnerability VCID-nkdd-suwp-4ffr
53
vulnerability VCID-p623-gxyv-g7fs
54
vulnerability VCID-pk7e-t26d-aqdm
55
vulnerability VCID-pv92-6p9x-v7bs
56
vulnerability VCID-qyb6-7ees-ukcm
57
vulnerability VCID-r2cz-9kjz-zbgu
58
vulnerability VCID-rfz7-vha1-e7gy
59
vulnerability VCID-rssq-mfc2-ckaf
60
vulnerability VCID-skzt-r7sx-1ucv
61
vulnerability VCID-sy6p-5km4-1kcy
62
vulnerability VCID-tazb-gd49-73b4
63
vulnerability VCID-u2c7-p86x-5bgf
64
vulnerability VCID-un5y-y9sq-1ufb
65
vulnerability VCID-v165-afmm-w3er
66
vulnerability VCID-v4gv-g9n5-ukgc
67
vulnerability VCID-wrna-cc9g-sqbe
68
vulnerability VCID-xuhv-wrut-wuez
69
vulnerability VCID-xvv1-nxs6-n7ab
70
vulnerability VCID-xyuf-au4f-57fr
71
vulnerability VCID-y6p4-vfkn-q7fc
72
vulnerability VCID-yx79-3g2x-pqex
73
vulnerability VCID-zb4s-9rj3-ebea
74
vulnerability VCID-zkvk-538h-w3b9
75
vulnerability VCID-zuxd-n3wn-s7hg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-5.5@5.5.47-0%252Bdeb7u1
1
url pkg:deb/debian/mysql-5.5@5.5.60-0%2Bdeb8u1
purl pkg:deb/debian/mysql-5.5@5.5.60-0%2Bdeb8u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-5.5@5.5.60-0%252Bdeb8u1
aliases CVE-2016-0505
risk_score 3.0
exploitability 0.5
weighted_severity 6.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fnks-p4e9-13es
59
url VCID-fuyw-1y1c-fkfp
vulnerability_id VCID-fuyw-1y1c-fkfp
summary security update
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html
4
reference_url http://rhn.redhat.com/errata/RHSA-2016-0534.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0534.html
5
reference_url http://rhn.redhat.com/errata/RHSA-2016-1480.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-1480.html
6
reference_url http://rhn.redhat.com/errata/RHSA-2016-1481.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-1481.html
7
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0616.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0616.json
8
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-0616
reference_id
reference_type
scores
0
value 0.00472
scoring_system epss
scoring_elements 0.64722
published_at 2026-04-18T12:55:00Z
1
value 0.00472
scoring_system epss
scoring_elements 0.6471
published_at 2026-04-16T12:55:00Z
2
value 0.00472
scoring_system epss
scoring_elements 0.64596
published_at 2026-04-01T12:55:00Z
3
value 0.00472
scoring_system epss
scoring_elements 0.64648
published_at 2026-04-02T12:55:00Z
4
value 0.00472
scoring_system epss
scoring_elements 0.64676
published_at 2026-04-04T12:55:00Z
5
value 0.00472
scoring_system epss
scoring_elements 0.64634
published_at 2026-04-07T12:55:00Z
6
value 0.00472
scoring_system epss
scoring_elements 0.64682
published_at 2026-04-08T12:55:00Z
7
value 0.00472
scoring_system epss
scoring_elements 0.64698
published_at 2026-04-09T12:55:00Z
8
value 0.00472
scoring_system epss
scoring_elements 0.64715
published_at 2026-04-11T12:55:00Z
9
value 0.00472
scoring_system epss
scoring_elements 0.64703
published_at 2026-04-12T12:55:00Z
10
value 0.00472
scoring_system epss
scoring_elements 0.64674
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-0616
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0505
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0505
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0546
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0546
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0596
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0596
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0597
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0597
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0598
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0598
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0600
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0600
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0606
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0606
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0608
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0608
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0609
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0609
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0616
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0616
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2047
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2047
20
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
21
reference_url https://mariadb.com/kb/en/mariadb/mariadb-10110-release-notes/
reference_id
reference_type
scores
url https://mariadb.com/kb/en/mariadb/mariadb-10110-release-notes/
22
reference_url https://mariadb.com/kb/en/mariadb/mariadb-5547-release-notes/
reference_id
reference_type
scores
url https://mariadb.com/kb/en/mariadb/mariadb-5547-release-notes/
23
reference_url https://mariadb.com/kb/en/mdb-10023-rn/
reference_id
reference_type
scores
url https://mariadb.com/kb/en/mdb-10023-rn/
24
reference_url http://www.debian.org/security/2016/dsa-3453
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3453
25
reference_url http://www.debian.org/security/2016/dsa-3459
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3459
26
reference_url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
27
reference_url http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
28
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
29
reference_url http://www.securityfocus.com/bid/81176
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/81176
30
reference_url http://www.securitytracker.com/id/1034708
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1034708
31
reference_url http://www.ubuntu.com/usn/USN-2881-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2881-1
32
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1301510
reference_id 1301510
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1301510
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:10.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.0.0:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:10.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.0.1:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.0.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:10.0.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.0.10:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.0.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:10.0.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.0.11:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.0.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:10.0.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.0.12:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.0.13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:10.0.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.0.13:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.0.14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:10.0.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.0.14:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.0.15:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:10.0.15:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.0.15:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.0.16:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:10.0.16:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.0.16:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.0.17:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:10.0.17:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.0.17:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.0.18:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:10.0.18:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.0.18:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.0.19:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:10.0.19:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.0.19:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:10.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.0.2:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.0.20:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:10.0.20:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.0.20:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.0.21:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:10.0.21:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.0.21:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.0.22:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:10.0.22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.0.22:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:10.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.0.3:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:10.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.0.4:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:10.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.0.5:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:10.0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.0.6:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.0.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:10.0.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.0.7:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.0.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:10.0.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.0.8:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.0.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:10.0.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.0.9:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:10.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.1.0:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:10.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.1.1:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:10.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.1.2:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:10.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.1.3:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.1.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:10.1.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.1.4:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.1.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:10.1.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.1.5:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.1.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:10.1.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.1.6:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.1.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:10.1.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.1.7:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.1.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:10.1.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.1.8:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.1.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:10.1.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.1.9:*:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
71
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
72
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
73
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
74
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
75
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
76
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
77
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*
78
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node_eus:7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_hpc_node_eus:7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node_eus:7.2:*:*:*:*:*:*:*
79
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
80
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
81
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*
82
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
83
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-0616
reference_id CVE-2016-0616
reference_type
scores
0
value 4.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2016-0616
84
reference_url https://access.redhat.com/errata/RHSA-2016:0534
reference_id RHSA-2016:0534
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0534
85
reference_url https://access.redhat.com/errata/RHSA-2016:1132
reference_id RHSA-2016:1132
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1132
86
reference_url https://access.redhat.com/errata/RHSA-2016:1480
reference_id RHSA-2016:1480
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1480
87
reference_url https://access.redhat.com/errata/RHSA-2016:1481
reference_id RHSA-2016:1481
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1481
88
reference_url https://usn.ubuntu.com/2881-1/
reference_id USN-2881-1
reference_type
scores
url https://usn.ubuntu.com/2881-1/
fixed_packages
0
url pkg:deb/debian/mysql-5.5@5.5.47-0%2Bdeb7u1
purl pkg:deb/debian/mysql-5.5@5.5.47-0%2Bdeb7u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1gmc-pj6y-rkfx
1
vulnerability VCID-1nvb-xd5n-gkh8
2
vulnerability VCID-2gyq-q761-h3br
3
vulnerability VCID-2jer-ss8p-7kbg
4
vulnerability VCID-2uxe-ep8b-y7b9
5
vulnerability VCID-2vp1-j324-dkat
6
vulnerability VCID-2yqz-qtv5-47hh
7
vulnerability VCID-2za2-cnwx-hbbw
8
vulnerability VCID-39gt-6dgh-wyar
9
vulnerability VCID-3qjy-4cen-7qev
10
vulnerability VCID-45hn-ezks-j7br
11
vulnerability VCID-4cnj-7fur-3qe3
12
vulnerability VCID-4yz4-vxnh-b3dp
13
vulnerability VCID-52w9-bgxr-nkba
14
vulnerability VCID-55fg-6c2c-6bg8
15
vulnerability VCID-5p65-gfsg-1ugq
16
vulnerability VCID-5q89-vg9j-k3as
17
vulnerability VCID-5sjj-599v-vybg
18
vulnerability VCID-64st-u4xn-z7g3
19
vulnerability VCID-6g4n-3xfu-hfee
20
vulnerability VCID-6gvj-hy6a-3qdx
21
vulnerability VCID-7tj3-dfxj-bke7
22
vulnerability VCID-7w3v-5s98-a7ec
23
vulnerability VCID-7yc3-7bkr-jfc9
24
vulnerability VCID-8krv-jqjg-uqc8
25
vulnerability VCID-8kvb-5u8c-zbc4
26
vulnerability VCID-8sya-wktg-dqa5
27
vulnerability VCID-9f48-53dz-13an
28
vulnerability VCID-9ff2-43rk-2ydj
29
vulnerability VCID-9w98-nfg2-muh2
30
vulnerability VCID-a3hx-qz7x-7ybk
31
vulnerability VCID-bfnh-7k45-nkg2
32
vulnerability VCID-bhxk-8byp-eyap
33
vulnerability VCID-ca85-vx8c-huht
34
vulnerability VCID-cnb3-dy3a-8bdp
35
vulnerability VCID-cyqa-e362-yyaf
36
vulnerability VCID-dfbz-5n6w-syd9
37
vulnerability VCID-dgtc-a2t2-k7f5
38
vulnerability VCID-dqg6-2gmj-judy
39
vulnerability VCID-ej67-ayfh-sqdt
40
vulnerability VCID-esfk-umc5-ska4
41
vulnerability VCID-f8p4-hpsh-2fcw
42
vulnerability VCID-f9vz-r6zv-t7ev
43
vulnerability VCID-fabc-rma2-myab
44
vulnerability VCID-fnks-p4e9-13es
45
vulnerability VCID-fuyw-1y1c-fkfp
46
vulnerability VCID-j2wu-2rx7-3yf2
47
vulnerability VCID-jgff-4jyp-9fgr
48
vulnerability VCID-kwrj-3fxz-g7c6
49
vulnerability VCID-mde2-1ynu-auh2
50
vulnerability VCID-mz71-vku8-ckbm
51
vulnerability VCID-nj41-1zpw-gkh9
52
vulnerability VCID-nkdd-suwp-4ffr
53
vulnerability VCID-p623-gxyv-g7fs
54
vulnerability VCID-pk7e-t26d-aqdm
55
vulnerability VCID-pv92-6p9x-v7bs
56
vulnerability VCID-qyb6-7ees-ukcm
57
vulnerability VCID-r2cz-9kjz-zbgu
58
vulnerability VCID-rfz7-vha1-e7gy
59
vulnerability VCID-rssq-mfc2-ckaf
60
vulnerability VCID-skzt-r7sx-1ucv
61
vulnerability VCID-sy6p-5km4-1kcy
62
vulnerability VCID-tazb-gd49-73b4
63
vulnerability VCID-u2c7-p86x-5bgf
64
vulnerability VCID-un5y-y9sq-1ufb
65
vulnerability VCID-v165-afmm-w3er
66
vulnerability VCID-v4gv-g9n5-ukgc
67
vulnerability VCID-wrna-cc9g-sqbe
68
vulnerability VCID-xuhv-wrut-wuez
69
vulnerability VCID-xvv1-nxs6-n7ab
70
vulnerability VCID-xyuf-au4f-57fr
71
vulnerability VCID-y6p4-vfkn-q7fc
72
vulnerability VCID-yx79-3g2x-pqex
73
vulnerability VCID-zb4s-9rj3-ebea
74
vulnerability VCID-zkvk-538h-w3b9
75
vulnerability VCID-zuxd-n3wn-s7hg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-5.5@5.5.47-0%252Bdeb7u1
1
url pkg:deb/debian/mysql-5.5@5.5.60-0%2Bdeb8u1
purl pkg:deb/debian/mysql-5.5@5.5.60-0%2Bdeb8u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-5.5@5.5.60-0%252Bdeb8u1
aliases CVE-2016-0616
risk_score 1.8
exploitability 0.5
weighted_severity 3.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fuyw-1y1c-fkfp
60
url VCID-hg16-rg46-4fe3
vulnerability_id VCID-hg16-rg46-4fe3
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4815.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4815.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-4815
reference_id
reference_type
scores
0
value 0.00413
scoring_system epss
scoring_elements 0.61354
published_at 2026-04-01T12:55:00Z
1
value 0.00413
scoring_system epss
scoring_elements 0.61431
published_at 2026-04-02T12:55:00Z
2
value 0.00413
scoring_system epss
scoring_elements 0.61459
published_at 2026-04-04T12:55:00Z
3
value 0.00413
scoring_system epss
scoring_elements 0.61429
published_at 2026-04-07T12:55:00Z
4
value 0.00413
scoring_system epss
scoring_elements 0.61477
published_at 2026-04-08T12:55:00Z
5
value 0.00413
scoring_system epss
scoring_elements 0.61492
published_at 2026-04-09T12:55:00Z
6
value 0.00413
scoring_system epss
scoring_elements 0.61513
published_at 2026-04-11T12:55:00Z
7
value 0.00413
scoring_system epss
scoring_elements 0.615
published_at 2026-04-12T12:55:00Z
8
value 0.00413
scoring_system epss
scoring_elements 0.6148
published_at 2026-04-13T12:55:00Z
9
value 0.00413
scoring_system epss
scoring_elements 0.61519
published_at 2026-04-16T12:55:00Z
10
value 0.00413
scoring_system epss
scoring_elements 0.61523
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-4815
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4792
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4792
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4802
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4802
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4815
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4815
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4816
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4816
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4819
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4819
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4826
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4826
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4830
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4830
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4836
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4836
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4858
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4858
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4861
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4861
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4870
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4870
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4879
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4879
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4895
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4895
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4913
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4913
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1274759
reference_id 1274759
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1274759
17
reference_url https://access.redhat.com/errata/RHSA-2016:0534
reference_id RHSA-2016:0534
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0534
18
reference_url https://access.redhat.com/errata/RHSA-2016:0705
reference_id RHSA-2016:0705
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0705
19
reference_url https://access.redhat.com/errata/RHSA-2016:1132
reference_id RHSA-2016:1132
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1132
20
reference_url https://access.redhat.com/errata/RHSA-2016:1480
reference_id RHSA-2016:1480
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1480
21
reference_url https://access.redhat.com/errata/RHSA-2016:1481
reference_id RHSA-2016:1481
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1481
22
reference_url https://usn.ubuntu.com/2781-1/
reference_id USN-2781-1
reference_type
scores
url https://usn.ubuntu.com/2781-1/
fixed_packages
0
url pkg:deb/debian/mysql-5.5@5.5.47-0%2Bdeb6u1
purl pkg:deb/debian/mysql-5.5@5.5.47-0%2Bdeb6u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1gmc-pj6y-rkfx
1
vulnerability VCID-1nvb-xd5n-gkh8
2
vulnerability VCID-2gyq-q761-h3br
3
vulnerability VCID-2jer-ss8p-7kbg
4
vulnerability VCID-2uxe-ep8b-y7b9
5
vulnerability VCID-2vp1-j324-dkat
6
vulnerability VCID-2yqz-qtv5-47hh
7
vulnerability VCID-2za2-cnwx-hbbw
8
vulnerability VCID-39gt-6dgh-wyar
9
vulnerability VCID-3qjy-4cen-7qev
10
vulnerability VCID-45hn-ezks-j7br
11
vulnerability VCID-4cnj-7fur-3qe3
12
vulnerability VCID-4yz4-vxnh-b3dp
13
vulnerability VCID-52w9-bgxr-nkba
14
vulnerability VCID-55fg-6c2c-6bg8
15
vulnerability VCID-5p65-gfsg-1ugq
16
vulnerability VCID-5q89-vg9j-k3as
17
vulnerability VCID-5sjj-599v-vybg
18
vulnerability VCID-64st-u4xn-z7g3
19
vulnerability VCID-6g4n-3xfu-hfee
20
vulnerability VCID-6gvj-hy6a-3qdx
21
vulnerability VCID-7tj3-dfxj-bke7
22
vulnerability VCID-7w3v-5s98-a7ec
23
vulnerability VCID-7yc3-7bkr-jfc9
24
vulnerability VCID-8krv-jqjg-uqc8
25
vulnerability VCID-8kvb-5u8c-zbc4
26
vulnerability VCID-8sya-wktg-dqa5
27
vulnerability VCID-9f48-53dz-13an
28
vulnerability VCID-9ff2-43rk-2ydj
29
vulnerability VCID-9w98-nfg2-muh2
30
vulnerability VCID-a3hx-qz7x-7ybk
31
vulnerability VCID-bfnh-7k45-nkg2
32
vulnerability VCID-bhxk-8byp-eyap
33
vulnerability VCID-ca85-vx8c-huht
34
vulnerability VCID-cnb3-dy3a-8bdp
35
vulnerability VCID-cyqa-e362-yyaf
36
vulnerability VCID-dfbz-5n6w-syd9
37
vulnerability VCID-dgtc-a2t2-k7f5
38
vulnerability VCID-dqg6-2gmj-judy
39
vulnerability VCID-ej67-ayfh-sqdt
40
vulnerability VCID-esfk-umc5-ska4
41
vulnerability VCID-f8p4-hpsh-2fcw
42
vulnerability VCID-f9vz-r6zv-t7ev
43
vulnerability VCID-fabc-rma2-myab
44
vulnerability VCID-fnks-p4e9-13es
45
vulnerability VCID-fuyw-1y1c-fkfp
46
vulnerability VCID-j2wu-2rx7-3yf2
47
vulnerability VCID-jgff-4jyp-9fgr
48
vulnerability VCID-kwrj-3fxz-g7c6
49
vulnerability VCID-mde2-1ynu-auh2
50
vulnerability VCID-mz71-vku8-ckbm
51
vulnerability VCID-nj41-1zpw-gkh9
52
vulnerability VCID-nkdd-suwp-4ffr
53
vulnerability VCID-p623-gxyv-g7fs
54
vulnerability VCID-pk7e-t26d-aqdm
55
vulnerability VCID-pv92-6p9x-v7bs
56
vulnerability VCID-qyb6-7ees-ukcm
57
vulnerability VCID-r2cz-9kjz-zbgu
58
vulnerability VCID-rfz7-vha1-e7gy
59
vulnerability VCID-rssq-mfc2-ckaf
60
vulnerability VCID-skzt-r7sx-1ucv
61
vulnerability VCID-sy6p-5km4-1kcy
62
vulnerability VCID-tazb-gd49-73b4
63
vulnerability VCID-u2c7-p86x-5bgf
64
vulnerability VCID-un5y-y9sq-1ufb
65
vulnerability VCID-v165-afmm-w3er
66
vulnerability VCID-v4gv-g9n5-ukgc
67
vulnerability VCID-wrna-cc9g-sqbe
68
vulnerability VCID-xuhv-wrut-wuez
69
vulnerability VCID-xvv1-nxs6-n7ab
70
vulnerability VCID-xyuf-au4f-57fr
71
vulnerability VCID-y6p4-vfkn-q7fc
72
vulnerability VCID-yx79-3g2x-pqex
73
vulnerability VCID-zb4s-9rj3-ebea
74
vulnerability VCID-zkvk-538h-w3b9
75
vulnerability VCID-zuxd-n3wn-s7hg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-5.5@5.5.47-0%252Bdeb6u1
aliases CVE-2015-4815
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hg16-rg46-4fe3
61
url VCID-hpk6-es28-5ueb
vulnerability_id VCID-hpk6-es28-5ueb
summary
Multiple vulnerabilities have been found in MySQL, allowing
    attackers to execute arbitrary code or cause Denial of Service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2571.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2571.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-2571
reference_id
reference_type
scores
0
value 0.00308
scoring_system epss
scoring_elements 0.53886
published_at 2026-04-01T12:55:00Z
1
value 0.00308
scoring_system epss
scoring_elements 0.53904
published_at 2026-04-02T12:55:00Z
2
value 0.00308
scoring_system epss
scoring_elements 0.53932
published_at 2026-04-04T12:55:00Z
3
value 0.00308
scoring_system epss
scoring_elements 0.53906
published_at 2026-04-07T12:55:00Z
4
value 0.00308
scoring_system epss
scoring_elements 0.53958
published_at 2026-04-09T12:55:00Z
5
value 0.00308
scoring_system epss
scoring_elements 0.54004
published_at 2026-04-11T12:55:00Z
6
value 0.00308
scoring_system epss
scoring_elements 0.53987
published_at 2026-04-12T12:55:00Z
7
value 0.00308
scoring_system epss
scoring_elements 0.5397
published_at 2026-04-13T12:55:00Z
8
value 0.00308
scoring_system epss
scoring_elements 0.54008
published_at 2026-04-16T12:55:00Z
9
value 0.00308
scoring_system epss
scoring_elements 0.54013
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-2571
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0433
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0433
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0441
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0441
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0499
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0499
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0501
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0501
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0505
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0505
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2568
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2568
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2571
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2571
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2573
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2573
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2582
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2582
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2643
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2643
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2648
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2648
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3152
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3152
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4752
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4752
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4757
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4757
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1212772
reference_id 1212772
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1212772
17
reference_url https://security.gentoo.org/glsa/201507-19
reference_id GLSA-201507-19
reference_type
scores
url https://security.gentoo.org/glsa/201507-19
18
reference_url https://access.redhat.com/errata/RHSA-2015:1628
reference_id RHSA-2015:1628
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1628
19
reference_url https://access.redhat.com/errata/RHSA-2015:1629
reference_id RHSA-2015:1629
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1629
20
reference_url https://access.redhat.com/errata/RHSA-2015:1646
reference_id RHSA-2015:1646
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1646
21
reference_url https://access.redhat.com/errata/RHSA-2015:1647
reference_id RHSA-2015:1647
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1647
22
reference_url https://access.redhat.com/errata/RHSA-2015:1665
reference_id RHSA-2015:1665
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1665
23
reference_url https://usn.ubuntu.com/2575-1/
reference_id USN-2575-1
reference_type
scores
url https://usn.ubuntu.com/2575-1/
fixed_packages
0
url pkg:deb/debian/mysql-5.5@5.5.47-0%2Bdeb6u1
purl pkg:deb/debian/mysql-5.5@5.5.47-0%2Bdeb6u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1gmc-pj6y-rkfx
1
vulnerability VCID-1nvb-xd5n-gkh8
2
vulnerability VCID-2gyq-q761-h3br
3
vulnerability VCID-2jer-ss8p-7kbg
4
vulnerability VCID-2uxe-ep8b-y7b9
5
vulnerability VCID-2vp1-j324-dkat
6
vulnerability VCID-2yqz-qtv5-47hh
7
vulnerability VCID-2za2-cnwx-hbbw
8
vulnerability VCID-39gt-6dgh-wyar
9
vulnerability VCID-3qjy-4cen-7qev
10
vulnerability VCID-45hn-ezks-j7br
11
vulnerability VCID-4cnj-7fur-3qe3
12
vulnerability VCID-4yz4-vxnh-b3dp
13
vulnerability VCID-52w9-bgxr-nkba
14
vulnerability VCID-55fg-6c2c-6bg8
15
vulnerability VCID-5p65-gfsg-1ugq
16
vulnerability VCID-5q89-vg9j-k3as
17
vulnerability VCID-5sjj-599v-vybg
18
vulnerability VCID-64st-u4xn-z7g3
19
vulnerability VCID-6g4n-3xfu-hfee
20
vulnerability VCID-6gvj-hy6a-3qdx
21
vulnerability VCID-7tj3-dfxj-bke7
22
vulnerability VCID-7w3v-5s98-a7ec
23
vulnerability VCID-7yc3-7bkr-jfc9
24
vulnerability VCID-8krv-jqjg-uqc8
25
vulnerability VCID-8kvb-5u8c-zbc4
26
vulnerability VCID-8sya-wktg-dqa5
27
vulnerability VCID-9f48-53dz-13an
28
vulnerability VCID-9ff2-43rk-2ydj
29
vulnerability VCID-9w98-nfg2-muh2
30
vulnerability VCID-a3hx-qz7x-7ybk
31
vulnerability VCID-bfnh-7k45-nkg2
32
vulnerability VCID-bhxk-8byp-eyap
33
vulnerability VCID-ca85-vx8c-huht
34
vulnerability VCID-cnb3-dy3a-8bdp
35
vulnerability VCID-cyqa-e362-yyaf
36
vulnerability VCID-dfbz-5n6w-syd9
37
vulnerability VCID-dgtc-a2t2-k7f5
38
vulnerability VCID-dqg6-2gmj-judy
39
vulnerability VCID-ej67-ayfh-sqdt
40
vulnerability VCID-esfk-umc5-ska4
41
vulnerability VCID-f8p4-hpsh-2fcw
42
vulnerability VCID-f9vz-r6zv-t7ev
43
vulnerability VCID-fabc-rma2-myab
44
vulnerability VCID-fnks-p4e9-13es
45
vulnerability VCID-fuyw-1y1c-fkfp
46
vulnerability VCID-j2wu-2rx7-3yf2
47
vulnerability VCID-jgff-4jyp-9fgr
48
vulnerability VCID-kwrj-3fxz-g7c6
49
vulnerability VCID-mde2-1ynu-auh2
50
vulnerability VCID-mz71-vku8-ckbm
51
vulnerability VCID-nj41-1zpw-gkh9
52
vulnerability VCID-nkdd-suwp-4ffr
53
vulnerability VCID-p623-gxyv-g7fs
54
vulnerability VCID-pk7e-t26d-aqdm
55
vulnerability VCID-pv92-6p9x-v7bs
56
vulnerability VCID-qyb6-7ees-ukcm
57
vulnerability VCID-r2cz-9kjz-zbgu
58
vulnerability VCID-rfz7-vha1-e7gy
59
vulnerability VCID-rssq-mfc2-ckaf
60
vulnerability VCID-skzt-r7sx-1ucv
61
vulnerability VCID-sy6p-5km4-1kcy
62
vulnerability VCID-tazb-gd49-73b4
63
vulnerability VCID-u2c7-p86x-5bgf
64
vulnerability VCID-un5y-y9sq-1ufb
65
vulnerability VCID-v165-afmm-w3er
66
vulnerability VCID-v4gv-g9n5-ukgc
67
vulnerability VCID-wrna-cc9g-sqbe
68
vulnerability VCID-xuhv-wrut-wuez
69
vulnerability VCID-xvv1-nxs6-n7ab
70
vulnerability VCID-xyuf-au4f-57fr
71
vulnerability VCID-y6p4-vfkn-q7fc
72
vulnerability VCID-yx79-3g2x-pqex
73
vulnerability VCID-zb4s-9rj3-ebea
74
vulnerability VCID-zkvk-538h-w3b9
75
vulnerability VCID-zuxd-n3wn-s7hg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-5.5@5.5.47-0%252Bdeb6u1
aliases CVE-2015-2571
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hpk6-es28-5ueb
62
url VCID-j2wu-2rx7-3yf2
vulnerability_id VCID-j2wu-2rx7-3yf2
summary
Multiple vulnerabilities have been found in MariaDB and MySQL, the
    worst of which could result in privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2813.json
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2813.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-2813
reference_id
reference_type
scores
0
value 0.00307
scoring_system epss
scoring_elements 0.5398
published_at 2026-04-18T12:55:00Z
1
value 0.00307
scoring_system epss
scoring_elements 0.53854
published_at 2026-04-01T12:55:00Z
2
value 0.00307
scoring_system epss
scoring_elements 0.53871
published_at 2026-04-02T12:55:00Z
3
value 0.00307
scoring_system epss
scoring_elements 0.539
published_at 2026-04-04T12:55:00Z
4
value 0.00307
scoring_system epss
scoring_elements 0.53874
published_at 2026-04-07T12:55:00Z
5
value 0.00307
scoring_system epss
scoring_elements 0.53926
published_at 2026-04-08T12:55:00Z
6
value 0.00307
scoring_system epss
scoring_elements 0.53924
published_at 2026-04-09T12:55:00Z
7
value 0.00307
scoring_system epss
scoring_elements 0.53971
published_at 2026-04-11T12:55:00Z
8
value 0.00307
scoring_system epss
scoring_elements 0.53954
published_at 2026-04-12T12:55:00Z
9
value 0.00307
scoring_system epss
scoring_elements 0.53937
published_at 2026-04-13T12:55:00Z
10
value 0.00307
scoring_system epss
scoring_elements 0.53974
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-2813
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10268
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10268
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10378
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10378
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15365
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15365
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2562
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2562
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2612
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2612
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2622
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2622
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2640
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2640
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2665
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2665
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2668
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2668
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2755
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2755
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2761
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2761
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2766
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2766
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2767
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2767
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2771
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2771
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2773
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2773
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2781
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2781
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2782
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2782
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2784
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2784
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2787
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2787
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2813
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2813
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2817
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2817
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2818
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2818
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2819
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2819
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3058
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3058
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3063
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3063
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3064
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3064
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3066
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3066
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3081
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3081
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3143
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3143
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3156
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3156
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3174
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3174
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3251
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3251
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3282
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3282
35
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2503
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2503
36
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
37
reference_url https://lists.debian.org/debian-lts-announce/2018/04/msg00020.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:35Z/
url https://lists.debian.org/debian-lts-announce/2018/04/msg00020.html
38
reference_url https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:35Z/
url https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html
39
reference_url https://security.netapp.com/advisory/ntap-20180419-0002/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:35Z/
url https://security.netapp.com/advisory/ntap-20180419-0002/
40
reference_url https://www.debian.org/security/2018/dsa-4176
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:35Z/
url https://www.debian.org/security/2018/dsa-4176
41
reference_url https://www.debian.org/security/2018/dsa-4341
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:35Z/
url https://www.debian.org/security/2018/dsa-4341
42
reference_url http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:35Z/
url http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
43
reference_url http://www.securityfocus.com/bid/103830
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:35Z/
url http://www.securityfocus.com/bid/103830
44
reference_url http://www.securitytracker.com/id/1040698
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:35Z/
url http://www.securitytracker.com/id/1040698
45
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1568951
reference_id 1568951
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1568951
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vsphere:*:*
reference_id cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vsphere:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vsphere:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:windows:*:*
reference_id cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:windows:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:windows:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_automation_store:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:storage_automation_store:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_automation_store:-:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openstack:12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:openstack:12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openstack:12:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-2813
reference_id CVE-2018-2813
reference_type
scores
0
value 4.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:P/I:N/A:N
1
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2018-2813
71
reference_url https://security.gentoo.org/glsa/201908-24
reference_id GLSA-201908-24
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:35Z/
url https://security.gentoo.org/glsa/201908-24
72
reference_url https://access.redhat.com/errata/RHSA-2018:1254
reference_id RHSA-2018:1254
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:35Z/
url https://access.redhat.com/errata/RHSA-2018:1254
73
reference_url https://access.redhat.com/errata/RHSA-2018:2439
reference_id RHSA-2018:2439
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:35Z/
url https://access.redhat.com/errata/RHSA-2018:2439
74
reference_url https://access.redhat.com/errata/RHSA-2018:2729
reference_id RHSA-2018:2729
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:35Z/
url https://access.redhat.com/errata/RHSA-2018:2729
75
reference_url https://access.redhat.com/errata/RHSA-2018:3655
reference_id RHSA-2018:3655
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:35Z/
url https://access.redhat.com/errata/RHSA-2018:3655
76
reference_url https://access.redhat.com/errata/RHSA-2019:1258
reference_id RHSA-2019:1258
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:35Z/
url https://access.redhat.com/errata/RHSA-2019:1258
77
reference_url https://usn.ubuntu.com/3629-1/
reference_id USN-3629-1
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:35Z/
url https://usn.ubuntu.com/3629-1/
78
reference_url https://usn.ubuntu.com/3629-2/
reference_id USN-3629-2
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:35Z/
url https://usn.ubuntu.com/3629-2/
79
reference_url https://usn.ubuntu.com/3629-3/
reference_id USN-3629-3
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:35Z/
url https://usn.ubuntu.com/3629-3/
fixed_packages
0
url pkg:deb/debian/mysql-5.5@5.5.60-0%2Bdeb8u1
purl pkg:deb/debian/mysql-5.5@5.5.60-0%2Bdeb8u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-5.5@5.5.60-0%252Bdeb8u1
aliases CVE-2018-2813
risk_score 1.9
exploitability 0.5
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-j2wu-2rx7-3yf2
63
url VCID-jgff-4jyp-9fgr
vulnerability_id VCID-jgff-4jyp-9fgr
summary
Multiple vulnerabilities were found in MySQL, the worst of which
    may allow remote execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3641.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3641.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-3641
reference_id
reference_type
scores
0
value 0.00187
scoring_system epss
scoring_elements 0.40537
published_at 2026-04-13T12:55:00Z
1
value 0.00187
scoring_system epss
scoring_elements 0.40565
published_at 2026-04-02T12:55:00Z
2
value 0.00187
scoring_system epss
scoring_elements 0.40593
published_at 2026-04-11T12:55:00Z
3
value 0.00187
scoring_system epss
scoring_elements 0.40514
published_at 2026-04-07T12:55:00Z
4
value 0.00187
scoring_system epss
scoring_elements 0.40564
published_at 2026-04-08T12:55:00Z
5
value 0.00187
scoring_system epss
scoring_elements 0.40575
published_at 2026-04-09T12:55:00Z
6
value 0.00187
scoring_system epss
scoring_elements 0.40557
published_at 2026-04-12T12:55:00Z
7
value 0.00187
scoring_system epss
scoring_elements 0.40555
published_at 2026-04-18T12:55:00Z
8
value 0.00187
scoring_system epss
scoring_elements 0.40485
published_at 2026-04-01T12:55:00Z
9
value 0.00187
scoring_system epss
scoring_elements 0.40585
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-3641
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10286
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10286
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10379
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10379
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10384
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10384
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3308
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3308
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3309
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3309
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3453
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3453
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3456
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3456
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3464
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3464
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3635
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3635
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3636
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3636
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3641
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3641
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3648
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3648
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3651
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3651
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3652
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3652
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3653
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3653
17
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:C
1
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
18
reference_url http://www.securitytracker.com/id/1038928
reference_id 1038928
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:48:15Z/
url http://www.securitytracker.com/id/1038928
19
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1472693
reference_id 1472693
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1472693
20
reference_url http://www.securityfocus.com/bid/99767
reference_id 99767
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:48:15Z/
url http://www.securityfocus.com/bid/99767
21
reference_url http://www.debian.org/security/2017/dsa-3922
reference_id dsa-3922
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:48:15Z/
url http://www.debian.org/security/2017/dsa-3922
22
reference_url https://www.debian.org/security/2017/dsa-3955
reference_id dsa-3955
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:48:15Z/
url https://www.debian.org/security/2017/dsa-3955
23
reference_url https://security.gentoo.org/glsa/201802-04
reference_id GLSA-201802-04
reference_type
scores
url https://security.gentoo.org/glsa/201802-04
24
reference_url https://access.redhat.com/errata/RHSA-2017:2787
reference_id RHSA-2017:2787
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:48:15Z/
url https://access.redhat.com/errata/RHSA-2017:2787
25
reference_url https://access.redhat.com/errata/RHSA-2017:2886
reference_id RHSA-2017:2886
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:48:15Z/
url https://access.redhat.com/errata/RHSA-2017:2886
26
reference_url https://access.redhat.com/errata/RHSA-2018:0279
reference_id RHSA-2018:0279
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:48:15Z/
url https://access.redhat.com/errata/RHSA-2018:0279
27
reference_url https://access.redhat.com/errata/RHSA-2018:0574
reference_id RHSA-2018:0574
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:48:15Z/
url https://access.redhat.com/errata/RHSA-2018:0574
28
reference_url https://access.redhat.com/errata/RHSA-2018:2439
reference_id RHSA-2018:2439
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:48:15Z/
url https://access.redhat.com/errata/RHSA-2018:2439
29
reference_url https://access.redhat.com/errata/RHSA-2018:2729
reference_id RHSA-2018:2729
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:48:15Z/
url https://access.redhat.com/errata/RHSA-2018:2729
30
reference_url https://usn.ubuntu.com/3357-1/
reference_id USN-3357-1
reference_type
scores
url https://usn.ubuntu.com/3357-1/
31
reference_url https://usn.ubuntu.com/3357-2/
reference_id USN-3357-2
reference_type
scores
url https://usn.ubuntu.com/3357-2/
fixed_packages
0
url pkg:deb/debian/mysql-5.5@5.5.60-0%2Bdeb8u1
purl pkg:deb/debian/mysql-5.5@5.5.60-0%2Bdeb8u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-5.5@5.5.60-0%252Bdeb8u1
aliases CVE-2017-3641
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jgff-4jyp-9fgr
64
url VCID-jqmx-5tfh-qqff
vulnerability_id VCID-jqmx-5tfh-qqff
summary security update
references
0
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177539.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177539.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00010.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00010.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00011.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00011.html
3
reference_url http://lists.opensuse.org/opensuse-updates/2016-02/msg00039.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2016-02/msg00039.html
4
reference_url http://rhn.redhat.com/errata/RHSA-2016-0534.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0534.html
5
reference_url http://rhn.redhat.com/errata/RHSA-2016-0705.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0705.html
6
reference_url http://rhn.redhat.com/errata/RHSA-2016-1480.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-1480.html
7
reference_url http://rhn.redhat.com/errata/RHSA-2016-1481.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-1481.html
8
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4836.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4836.json
9
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-4836
reference_id
reference_type
scores
0
value 0.00861
scoring_system epss
scoring_elements 0.75097
published_at 2026-04-18T12:55:00Z
1
value 0.00861
scoring_system epss
scoring_elements 0.75008
published_at 2026-04-01T12:55:00Z
2
value 0.00861
scoring_system epss
scoring_elements 0.75011
published_at 2026-04-02T12:55:00Z
3
value 0.00861
scoring_system epss
scoring_elements 0.7504
published_at 2026-04-04T12:55:00Z
4
value 0.00861
scoring_system epss
scoring_elements 0.75016
published_at 2026-04-07T12:55:00Z
5
value 0.00861
scoring_system epss
scoring_elements 0.7505
published_at 2026-04-08T12:55:00Z
6
value 0.00861
scoring_system epss
scoring_elements 0.75061
published_at 2026-04-09T12:55:00Z
7
value 0.00861
scoring_system epss
scoring_elements 0.75084
published_at 2026-04-11T12:55:00Z
8
value 0.00861
scoring_system epss
scoring_elements 0.75063
published_at 2026-04-12T12:55:00Z
9
value 0.00861
scoring_system epss
scoring_elements 0.75052
published_at 2026-04-13T12:55:00Z
10
value 0.00861
scoring_system epss
scoring_elements 0.7509
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-4836
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4792
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4792
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4802
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4802
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4815
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4815
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4816
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4816
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4819
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4819
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4826
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4826
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4830
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4830
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4836
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4836
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4858
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4858
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4861
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4861
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4870
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4870
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4879
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4879
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4895
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4895
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4913
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4913
24
reference_url https://www.suse.com/support/update/announcement/2016/suse-su-20160296-1.html
reference_id
reference_type
scores
url https://www.suse.com/support/update/announcement/2016/suse-su-20160296-1.html
25
reference_url http://www.debian.org/security/2015/dsa-3377
reference_id
reference_type
scores
url http://www.debian.org/security/2015/dsa-3377
26
reference_url http://www.debian.org/security/2015/dsa-3385
reference_id
reference_type
scores
url http://www.debian.org/security/2015/dsa-3385
27
reference_url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
28
reference_url http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
29
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
30
reference_url http://www.securityfocus.com/bid/77190
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/77190
31
reference_url http://www.securitytracker.com/id/1033894
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1033894
32
reference_url http://www.ubuntu.com/usn/USN-2781-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2781-1
33
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1274771
reference_id 1274771
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1274771
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:-:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:linux:7:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:-:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-4836
reference_id CVE-2015-4836
reference_type
scores
0
value 2.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:M/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2015-4836
67
reference_url https://access.redhat.com/errata/RHSA-2016:0534
reference_id RHSA-2016:0534
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0534
68
reference_url https://access.redhat.com/errata/RHSA-2016:0705
reference_id RHSA-2016:0705
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0705
69
reference_url https://access.redhat.com/errata/RHSA-2016:1132
reference_id RHSA-2016:1132
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1132
70
reference_url https://access.redhat.com/errata/RHSA-2016:1480
reference_id RHSA-2016:1480
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1480
71
reference_url https://access.redhat.com/errata/RHSA-2016:1481
reference_id RHSA-2016:1481
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1481
72
reference_url https://usn.ubuntu.com/2781-1/
reference_id USN-2781-1
reference_type
scores
url https://usn.ubuntu.com/2781-1/
fixed_packages
0
url pkg:deb/debian/mysql-5.5@5.5.47-0%2Bdeb6u1
purl pkg:deb/debian/mysql-5.5@5.5.47-0%2Bdeb6u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1gmc-pj6y-rkfx
1
vulnerability VCID-1nvb-xd5n-gkh8
2
vulnerability VCID-2gyq-q761-h3br
3
vulnerability VCID-2jer-ss8p-7kbg
4
vulnerability VCID-2uxe-ep8b-y7b9
5
vulnerability VCID-2vp1-j324-dkat
6
vulnerability VCID-2yqz-qtv5-47hh
7
vulnerability VCID-2za2-cnwx-hbbw
8
vulnerability VCID-39gt-6dgh-wyar
9
vulnerability VCID-3qjy-4cen-7qev
10
vulnerability VCID-45hn-ezks-j7br
11
vulnerability VCID-4cnj-7fur-3qe3
12
vulnerability VCID-4yz4-vxnh-b3dp
13
vulnerability VCID-52w9-bgxr-nkba
14
vulnerability VCID-55fg-6c2c-6bg8
15
vulnerability VCID-5p65-gfsg-1ugq
16
vulnerability VCID-5q89-vg9j-k3as
17
vulnerability VCID-5sjj-599v-vybg
18
vulnerability VCID-64st-u4xn-z7g3
19
vulnerability VCID-6g4n-3xfu-hfee
20
vulnerability VCID-6gvj-hy6a-3qdx
21
vulnerability VCID-7tj3-dfxj-bke7
22
vulnerability VCID-7w3v-5s98-a7ec
23
vulnerability VCID-7yc3-7bkr-jfc9
24
vulnerability VCID-8krv-jqjg-uqc8
25
vulnerability VCID-8kvb-5u8c-zbc4
26
vulnerability VCID-8sya-wktg-dqa5
27
vulnerability VCID-9f48-53dz-13an
28
vulnerability VCID-9ff2-43rk-2ydj
29
vulnerability VCID-9w98-nfg2-muh2
30
vulnerability VCID-a3hx-qz7x-7ybk
31
vulnerability VCID-bfnh-7k45-nkg2
32
vulnerability VCID-bhxk-8byp-eyap
33
vulnerability VCID-ca85-vx8c-huht
34
vulnerability VCID-cnb3-dy3a-8bdp
35
vulnerability VCID-cyqa-e362-yyaf
36
vulnerability VCID-dfbz-5n6w-syd9
37
vulnerability VCID-dgtc-a2t2-k7f5
38
vulnerability VCID-dqg6-2gmj-judy
39
vulnerability VCID-ej67-ayfh-sqdt
40
vulnerability VCID-esfk-umc5-ska4
41
vulnerability VCID-f8p4-hpsh-2fcw
42
vulnerability VCID-f9vz-r6zv-t7ev
43
vulnerability VCID-fabc-rma2-myab
44
vulnerability VCID-fnks-p4e9-13es
45
vulnerability VCID-fuyw-1y1c-fkfp
46
vulnerability VCID-j2wu-2rx7-3yf2
47
vulnerability VCID-jgff-4jyp-9fgr
48
vulnerability VCID-kwrj-3fxz-g7c6
49
vulnerability VCID-mde2-1ynu-auh2
50
vulnerability VCID-mz71-vku8-ckbm
51
vulnerability VCID-nj41-1zpw-gkh9
52
vulnerability VCID-nkdd-suwp-4ffr
53
vulnerability VCID-p623-gxyv-g7fs
54
vulnerability VCID-pk7e-t26d-aqdm
55
vulnerability VCID-pv92-6p9x-v7bs
56
vulnerability VCID-qyb6-7ees-ukcm
57
vulnerability VCID-r2cz-9kjz-zbgu
58
vulnerability VCID-rfz7-vha1-e7gy
59
vulnerability VCID-rssq-mfc2-ckaf
60
vulnerability VCID-skzt-r7sx-1ucv
61
vulnerability VCID-sy6p-5km4-1kcy
62
vulnerability VCID-tazb-gd49-73b4
63
vulnerability VCID-u2c7-p86x-5bgf
64
vulnerability VCID-un5y-y9sq-1ufb
65
vulnerability VCID-v165-afmm-w3er
66
vulnerability VCID-v4gv-g9n5-ukgc
67
vulnerability VCID-wrna-cc9g-sqbe
68
vulnerability VCID-xuhv-wrut-wuez
69
vulnerability VCID-xvv1-nxs6-n7ab
70
vulnerability VCID-xyuf-au4f-57fr
71
vulnerability VCID-y6p4-vfkn-q7fc
72
vulnerability VCID-yx79-3g2x-pqex
73
vulnerability VCID-zb4s-9rj3-ebea
74
vulnerability VCID-zkvk-538h-w3b9
75
vulnerability VCID-zuxd-n3wn-s7hg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-5.5@5.5.47-0%252Bdeb6u1
aliases CVE-2015-4836
risk_score 1.2
exploitability 0.5
weighted_severity 2.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jqmx-5tfh-qqff
65
url VCID-jzjd-n9ga-6yf5
vulnerability_id VCID-jzjd-n9ga-6yf5
summary
Multiple vulnerabilities have been found in MySQL, allowing
    attackers to execute arbitrary code or cause Denial of Service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0441.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0441.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-0441
reference_id
reference_type
scores
0
value 0.00384
scoring_system epss
scoring_elements 0.59573
published_at 2026-04-01T12:55:00Z
1
value 0.00384
scoring_system epss
scoring_elements 0.59646
published_at 2026-04-02T12:55:00Z
2
value 0.00384
scoring_system epss
scoring_elements 0.5967
published_at 2026-04-04T12:55:00Z
3
value 0.00384
scoring_system epss
scoring_elements 0.59641
published_at 2026-04-07T12:55:00Z
4
value 0.00384
scoring_system epss
scoring_elements 0.59692
published_at 2026-04-08T12:55:00Z
5
value 0.00384
scoring_system epss
scoring_elements 0.59705
published_at 2026-04-09T12:55:00Z
6
value 0.00384
scoring_system epss
scoring_elements 0.59725
published_at 2026-04-11T12:55:00Z
7
value 0.00384
scoring_system epss
scoring_elements 0.59708
published_at 2026-04-12T12:55:00Z
8
value 0.00384
scoring_system epss
scoring_elements 0.59689
published_at 2026-04-13T12:55:00Z
9
value 0.00384
scoring_system epss
scoring_elements 0.59722
published_at 2026-04-16T12:55:00Z
10
value 0.00384
scoring_system epss
scoring_elements 0.5973
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-0441
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0433
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0433
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0441
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0441
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0499
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0499
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0501
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0501
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0505
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0505
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2568
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2568
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2571
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2571
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2573
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2573
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2582
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2582
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2643
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2643
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2648
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2648
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3152
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3152
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4752
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4752
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4757
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4757
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1212777
reference_id 1212777
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1212777
17
reference_url https://security.gentoo.org/glsa/201507-19
reference_id GLSA-201507-19
reference_type
scores
url https://security.gentoo.org/glsa/201507-19
18
reference_url https://access.redhat.com/errata/RHSA-2015:1628
reference_id RHSA-2015:1628
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1628
19
reference_url https://access.redhat.com/errata/RHSA-2015:1629
reference_id RHSA-2015:1629
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1629
20
reference_url https://access.redhat.com/errata/RHSA-2015:1647
reference_id RHSA-2015:1647
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1647
21
reference_url https://access.redhat.com/errata/RHSA-2015:1665
reference_id RHSA-2015:1665
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1665
22
reference_url https://usn.ubuntu.com/2575-1/
reference_id USN-2575-1
reference_type
scores
url https://usn.ubuntu.com/2575-1/
fixed_packages
0
url pkg:deb/debian/mysql-5.5@5.5.47-0%2Bdeb6u1
purl pkg:deb/debian/mysql-5.5@5.5.47-0%2Bdeb6u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1gmc-pj6y-rkfx
1
vulnerability VCID-1nvb-xd5n-gkh8
2
vulnerability VCID-2gyq-q761-h3br
3
vulnerability VCID-2jer-ss8p-7kbg
4
vulnerability VCID-2uxe-ep8b-y7b9
5
vulnerability VCID-2vp1-j324-dkat
6
vulnerability VCID-2yqz-qtv5-47hh
7
vulnerability VCID-2za2-cnwx-hbbw
8
vulnerability VCID-39gt-6dgh-wyar
9
vulnerability VCID-3qjy-4cen-7qev
10
vulnerability VCID-45hn-ezks-j7br
11
vulnerability VCID-4cnj-7fur-3qe3
12
vulnerability VCID-4yz4-vxnh-b3dp
13
vulnerability VCID-52w9-bgxr-nkba
14
vulnerability VCID-55fg-6c2c-6bg8
15
vulnerability VCID-5p65-gfsg-1ugq
16
vulnerability VCID-5q89-vg9j-k3as
17
vulnerability VCID-5sjj-599v-vybg
18
vulnerability VCID-64st-u4xn-z7g3
19
vulnerability VCID-6g4n-3xfu-hfee
20
vulnerability VCID-6gvj-hy6a-3qdx
21
vulnerability VCID-7tj3-dfxj-bke7
22
vulnerability VCID-7w3v-5s98-a7ec
23
vulnerability VCID-7yc3-7bkr-jfc9
24
vulnerability VCID-8krv-jqjg-uqc8
25
vulnerability VCID-8kvb-5u8c-zbc4
26
vulnerability VCID-8sya-wktg-dqa5
27
vulnerability VCID-9f48-53dz-13an
28
vulnerability VCID-9ff2-43rk-2ydj
29
vulnerability VCID-9w98-nfg2-muh2
30
vulnerability VCID-a3hx-qz7x-7ybk
31
vulnerability VCID-bfnh-7k45-nkg2
32
vulnerability VCID-bhxk-8byp-eyap
33
vulnerability VCID-ca85-vx8c-huht
34
vulnerability VCID-cnb3-dy3a-8bdp
35
vulnerability VCID-cyqa-e362-yyaf
36
vulnerability VCID-dfbz-5n6w-syd9
37
vulnerability VCID-dgtc-a2t2-k7f5
38
vulnerability VCID-dqg6-2gmj-judy
39
vulnerability VCID-ej67-ayfh-sqdt
40
vulnerability VCID-esfk-umc5-ska4
41
vulnerability VCID-f8p4-hpsh-2fcw
42
vulnerability VCID-f9vz-r6zv-t7ev
43
vulnerability VCID-fabc-rma2-myab
44
vulnerability VCID-fnks-p4e9-13es
45
vulnerability VCID-fuyw-1y1c-fkfp
46
vulnerability VCID-j2wu-2rx7-3yf2
47
vulnerability VCID-jgff-4jyp-9fgr
48
vulnerability VCID-kwrj-3fxz-g7c6
49
vulnerability VCID-mde2-1ynu-auh2
50
vulnerability VCID-mz71-vku8-ckbm
51
vulnerability VCID-nj41-1zpw-gkh9
52
vulnerability VCID-nkdd-suwp-4ffr
53
vulnerability VCID-p623-gxyv-g7fs
54
vulnerability VCID-pk7e-t26d-aqdm
55
vulnerability VCID-pv92-6p9x-v7bs
56
vulnerability VCID-qyb6-7ees-ukcm
57
vulnerability VCID-r2cz-9kjz-zbgu
58
vulnerability VCID-rfz7-vha1-e7gy
59
vulnerability VCID-rssq-mfc2-ckaf
60
vulnerability VCID-skzt-r7sx-1ucv
61
vulnerability VCID-sy6p-5km4-1kcy
62
vulnerability VCID-tazb-gd49-73b4
63
vulnerability VCID-u2c7-p86x-5bgf
64
vulnerability VCID-un5y-y9sq-1ufb
65
vulnerability VCID-v165-afmm-w3er
66
vulnerability VCID-v4gv-g9n5-ukgc
67
vulnerability VCID-wrna-cc9g-sqbe
68
vulnerability VCID-xuhv-wrut-wuez
69
vulnerability VCID-xvv1-nxs6-n7ab
70
vulnerability VCID-xyuf-au4f-57fr
71
vulnerability VCID-y6p4-vfkn-q7fc
72
vulnerability VCID-yx79-3g2x-pqex
73
vulnerability VCID-zb4s-9rj3-ebea
74
vulnerability VCID-zkvk-538h-w3b9
75
vulnerability VCID-zuxd-n3wn-s7hg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-5.5@5.5.47-0%252Bdeb6u1
aliases CVE-2015-0441
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jzjd-n9ga-6yf5
66
url VCID-kwrj-3fxz-g7c6
vulnerability_id VCID-kwrj-3fxz-g7c6
summary security update
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:22Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:22Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:22Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:22Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:22Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:22Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html
6
reference_url http://rhn.redhat.com/errata/RHSA-2016-0705.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:22Z/
url http://rhn.redhat.com/errata/RHSA-2016-0705.html
7
reference_url http://rhn.redhat.com/errata/RHSA-2016-1480.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:22Z/
url http://rhn.redhat.com/errata/RHSA-2016-1480.html
8
reference_url http://rhn.redhat.com/errata/RHSA-2016-1481.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:22Z/
url http://rhn.redhat.com/errata/RHSA-2016-1481.html
9
reference_url http://rhn.redhat.com/errata/RHSA-2016-1602.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:22Z/
url http://rhn.redhat.com/errata/RHSA-2016-1602.html
10
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0644.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0644.json
11
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-0644
reference_id
reference_type
scores
0
value 0.00214
scoring_system epss
scoring_elements 0.43877
published_at 2026-04-01T12:55:00Z
1
value 0.00214
scoring_system epss
scoring_elements 0.43921
published_at 2026-04-02T12:55:00Z
2
value 0.00214
scoring_system epss
scoring_elements 0.43944
published_at 2026-04-11T12:55:00Z
3
value 0.00214
scoring_system epss
scoring_elements 0.43874
published_at 2026-04-07T12:55:00Z
4
value 0.00214
scoring_system epss
scoring_elements 0.43924
published_at 2026-04-08T12:55:00Z
5
value 0.00214
scoring_system epss
scoring_elements 0.43926
published_at 2026-04-09T12:55:00Z
6
value 0.00214
scoring_system epss
scoring_elements 0.43911
published_at 2026-04-12T12:55:00Z
7
value 0.00214
scoring_system epss
scoring_elements 0.43895
published_at 2026-04-13T12:55:00Z
8
value 0.00214
scoring_system epss
scoring_elements 0.43957
published_at 2026-04-16T12:55:00Z
9
value 0.00214
scoring_system epss
scoring_elements 0.43948
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-0644
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0640
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0640
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0641
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0641
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0642
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0642
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0643
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0643
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0644
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0644
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0646
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0646
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0647
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0647
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0648
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0648
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0649
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0649
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0650
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0650
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0655
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0655
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0666
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0666
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0668
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0668
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2047
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2047
26
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.6
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:S/C:N/I:N/A:C
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
27
reference_url https://mariadb.com/kb/en/mariadb/mariadb-10024-release-notes/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:22Z/
url https://mariadb.com/kb/en/mariadb/mariadb-10024-release-notes/
28
reference_url https://mariadb.com/kb/en/mariadb/mariadb-10112-release-notes/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:22Z/
url https://mariadb.com/kb/en/mariadb/mariadb-10112-release-notes/
29
reference_url https://mariadb.com/kb/en/mariadb/mariadb-5548-release-notes/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:22Z/
url https://mariadb.com/kb/en/mariadb/mariadb-5548-release-notes/
30
reference_url http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:22Z/
url http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168
31
reference_url http://www.debian.org/security/2016/dsa-3557
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:22Z/
url http://www.debian.org/security/2016/dsa-3557
32
reference_url http://www.debian.org/security/2016/dsa-3595
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:22Z/
url http://www.debian.org/security/2016/dsa-3595
33
reference_url http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:22Z/
url http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
34
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:22Z/
url http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
35
reference_url http://www.securityfocus.com/bid/86442
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:22Z/
url http://www.securityfocus.com/bid/86442
36
reference_url http://www.securitytracker.com/id/1035606
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:22Z/
url http://www.securitytracker.com/id/1035606
37
reference_url http://www.ubuntu.com/usn/USN-2953-1
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:22Z/
url http://www.ubuntu.com/usn/USN-2953-1
38
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1329247
reference_id 1329247
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1329247
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:powerkvm:2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ibm:powerkvm:2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:powerkvm:2.1:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:powerkvm:3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ibm:powerkvm:3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:powerkvm:3.1:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-0644
reference_id CVE-2016-0644
reference_type
scores
0
value 4.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:P
1
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2016-0644
49
reference_url https://access.redhat.com/errata/RHSA-2016:0705
reference_id RHSA-2016:0705
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0705
50
reference_url https://access.redhat.com/errata/RHSA-2016:1132
reference_id RHSA-2016:1132
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:22Z/
url https://access.redhat.com/errata/RHSA-2016:1132
51
reference_url https://access.redhat.com/errata/RHSA-2016:1480
reference_id RHSA-2016:1480
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1480
52
reference_url https://access.redhat.com/errata/RHSA-2016:1481
reference_id RHSA-2016:1481
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1481
53
reference_url https://access.redhat.com/errata/RHSA-2016:1602
reference_id RHSA-2016:1602
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1602
54
reference_url https://usn.ubuntu.com/2953-1/
reference_id USN-2953-1
reference_type
scores
url https://usn.ubuntu.com/2953-1/
fixed_packages
0
url pkg:deb/debian/mysql-5.5@5.5.60-0%2Bdeb8u1
purl pkg:deb/debian/mysql-5.5@5.5.60-0%2Bdeb8u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-5.5@5.5.60-0%252Bdeb8u1
aliases CVE-2016-0644
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-kwrj-3fxz-g7c6
67
url VCID-mde2-1ynu-auh2
vulnerability_id VCID-mde2-1ynu-auh2
summary
Multiple vulnerabilities were found in MySQL, the worst of which
    may allow remote execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3456.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3456.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-3456
reference_id
reference_type
scores
0
value 0.0018
scoring_system epss
scoring_elements 0.39692
published_at 2026-04-18T12:55:00Z
1
value 0.0018
scoring_system epss
scoring_elements 0.39555
published_at 2026-04-01T12:55:00Z
2
value 0.0018
scoring_system epss
scoring_elements 0.39704
published_at 2026-04-02T12:55:00Z
3
value 0.0018
scoring_system epss
scoring_elements 0.39726
published_at 2026-04-04T12:55:00Z
4
value 0.0018
scoring_system epss
scoring_elements 0.39644
published_at 2026-04-07T12:55:00Z
5
value 0.0018
scoring_system epss
scoring_elements 0.39699
published_at 2026-04-08T12:55:00Z
6
value 0.0018
scoring_system epss
scoring_elements 0.39713
published_at 2026-04-09T12:55:00Z
7
value 0.0018
scoring_system epss
scoring_elements 0.39723
published_at 2026-04-11T12:55:00Z
8
value 0.0018
scoring_system epss
scoring_elements 0.39687
published_at 2026-04-12T12:55:00Z
9
value 0.0018
scoring_system epss
scoring_elements 0.3967
published_at 2026-04-13T12:55:00Z
10
value 0.0018
scoring_system epss
scoring_elements 0.39721
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-3456
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10286
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10286
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10379
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10379
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10384
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10384
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3302
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3302
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3305
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3305
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3308
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3308
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3309
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3309
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3329
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3329
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3453
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3453
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3456
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3456
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3461
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3461
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3462
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3462
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3463
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3463
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3464
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3464
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3600
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3600
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3636
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3636
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3641
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3641
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3653
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3653
20
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 2.1
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:S/C:N/I:N/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
21
reference_url http://www.debian.org/security/2017/dsa-3834
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:46:04Z/
url http://www.debian.org/security/2017/dsa-3834
22
reference_url http://www.debian.org/security/2017/dsa-3944
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:46:04Z/
url http://www.debian.org/security/2017/dsa-3944
23
reference_url http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:46:04Z/
url http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
24
reference_url http://www.securityfocus.com/bid/97831
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:46:04Z/
url http://www.securityfocus.com/bid/97831
25
reference_url http://www.securitytracker.com/id/1038287
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:46:04Z/
url http://www.securitytracker.com/id/1038287
26
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1443369
reference_id 1443369
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1443369
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-3456
reference_id CVE-2017-3456
reference_type
scores
0
value 4.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:P
1
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-3456
43
reference_url https://security.gentoo.org/glsa/201802-04
reference_id GLSA-201802-04
reference_type
scores
url https://security.gentoo.org/glsa/201802-04
44
reference_url https://access.redhat.com/errata/RHSA-2017:2192
reference_id RHSA-2017:2192
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:46:04Z/
url https://access.redhat.com/errata/RHSA-2017:2192
45
reference_url https://access.redhat.com/errata/RHSA-2017:2787
reference_id RHSA-2017:2787
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:46:04Z/
url https://access.redhat.com/errata/RHSA-2017:2787
46
reference_url https://access.redhat.com/errata/RHSA-2017:2886
reference_id RHSA-2017:2886
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:46:04Z/
url https://access.redhat.com/errata/RHSA-2017:2886
47
reference_url https://access.redhat.com/errata/RHSA-2018:0279
reference_id RHSA-2018:0279
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:46:04Z/
url https://access.redhat.com/errata/RHSA-2018:0279
48
reference_url https://access.redhat.com/errata/RHSA-2018:0574
reference_id RHSA-2018:0574
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:46:04Z/
url https://access.redhat.com/errata/RHSA-2018:0574
49
reference_url https://usn.ubuntu.com/3269-1/
reference_id USN-3269-1
reference_type
scores
url https://usn.ubuntu.com/3269-1/
50
reference_url https://usn.ubuntu.com/3357-2/
reference_id USN-3357-2
reference_type
scores
url https://usn.ubuntu.com/3357-2/
fixed_packages
0
url pkg:deb/debian/mysql-5.5@5.5.60-0%2Bdeb8u1
purl pkg:deb/debian/mysql-5.5@5.5.60-0%2Bdeb8u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-5.5@5.5.60-0%252Bdeb8u1
aliases CVE-2017-3456
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mde2-1ynu-auh2
68
url VCID-mz71-vku8-ckbm
vulnerability_id VCID-mz71-vku8-ckbm
summary
Multiple vulnerabilities were found in MySQL, the worst of which
    may allow remote execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3461.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3461.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-3461
reference_id
reference_type
scores
0
value 0.00543
scoring_system epss
scoring_elements 0.67751
published_at 2026-04-16T12:55:00Z
1
value 0.00543
scoring_system epss
scoring_elements 0.67638
published_at 2026-04-01T12:55:00Z
2
value 0.00543
scoring_system epss
scoring_elements 0.67673
published_at 2026-04-07T12:55:00Z
3
value 0.00543
scoring_system epss
scoring_elements 0.67693
published_at 2026-04-04T12:55:00Z
4
value 0.00543
scoring_system epss
scoring_elements 0.67725
published_at 2026-04-08T12:55:00Z
5
value 0.00543
scoring_system epss
scoring_elements 0.67739
published_at 2026-04-09T12:55:00Z
6
value 0.00543
scoring_system epss
scoring_elements 0.67763
published_at 2026-04-18T12:55:00Z
7
value 0.00543
scoring_system epss
scoring_elements 0.67748
published_at 2026-04-12T12:55:00Z
8
value 0.00543
scoring_system epss
scoring_elements 0.67715
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-3461
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3302
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3302
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3305
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3305
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3308
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3308
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3309
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3309
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3329
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3329
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3453
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3453
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3456
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3456
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3461
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3461
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3462
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3462
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3463
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3463
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3464
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3464
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3600
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3600
14
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 2.1
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:S/C:N/I:N/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
15
reference_url http://www.debian.org/security/2017/dsa-3834
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:58Z/
url http://www.debian.org/security/2017/dsa-3834
16
reference_url http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:58Z/
url http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
17
reference_url http://www.securityfocus.com/bid/97812
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:58Z/
url http://www.securityfocus.com/bid/97812
18
reference_url http://www.securitytracker.com/id/1038287
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:58Z/
url http://www.securitytracker.com/id/1038287
19
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1443376
reference_id 1443376
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1443376
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-3461
reference_id CVE-2017-3461
reference_type
scores
0
value 4.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:P
1
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-3461
23
reference_url https://security.gentoo.org/glsa/201802-04
reference_id GLSA-201802-04
reference_type
scores
url https://security.gentoo.org/glsa/201802-04
24
reference_url https://access.redhat.com/errata/RHSA-2017:2787
reference_id RHSA-2017:2787
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:58Z/
url https://access.redhat.com/errata/RHSA-2017:2787
25
reference_url https://access.redhat.com/errata/RHSA-2017:2886
reference_id RHSA-2017:2886
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:58Z/
url https://access.redhat.com/errata/RHSA-2017:2886
26
reference_url https://usn.ubuntu.com/3269-1/
reference_id USN-3269-1
reference_type
scores
url https://usn.ubuntu.com/3269-1/
27
reference_url https://usn.ubuntu.com/3357-2/
reference_id USN-3357-2
reference_type
scores
url https://usn.ubuntu.com/3357-2/
fixed_packages
0
url pkg:deb/debian/mysql-5.5@5.5.60-0%2Bdeb8u1
purl pkg:deb/debian/mysql-5.5@5.5.60-0%2Bdeb8u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-5.5@5.5.60-0%252Bdeb8u1
aliases CVE-2017-3461
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mz71-vku8-ckbm
69
url VCID-nj41-1zpw-gkh9
vulnerability_id VCID-nj41-1zpw-gkh9
summary
Multiple vulnerabilities were found in MySQL, the worst of which
    may allow remote execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3462.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3462.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-3462
reference_id
reference_type
scores
0
value 0.00585
scoring_system epss
scoring_elements 0.69099
published_at 2026-04-18T12:55:00Z
1
value 0.00585
scoring_system epss
scoring_elements 0.68986
published_at 2026-04-01T12:55:00Z
2
value 0.00585
scoring_system epss
scoring_elements 0.69003
published_at 2026-04-07T12:55:00Z
3
value 0.00585
scoring_system epss
scoring_elements 0.69023
published_at 2026-04-04T12:55:00Z
4
value 0.00585
scoring_system epss
scoring_elements 0.69053
published_at 2026-04-08T12:55:00Z
5
value 0.00585
scoring_system epss
scoring_elements 0.69072
published_at 2026-04-09T12:55:00Z
6
value 0.00585
scoring_system epss
scoring_elements 0.69095
published_at 2026-04-11T12:55:00Z
7
value 0.00585
scoring_system epss
scoring_elements 0.6908
published_at 2026-04-12T12:55:00Z
8
value 0.00585
scoring_system epss
scoring_elements 0.69051
published_at 2026-04-13T12:55:00Z
9
value 0.00585
scoring_system epss
scoring_elements 0.69091
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-3462
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3302
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3302
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3305
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3305
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3308
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3308
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3309
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3309
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3329
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3329
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3453
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3453
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3456
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3456
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3461
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3461
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3462
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3462
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3463
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3463
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3464
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3464
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3600
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3600
14
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 2.1
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:S/C:N/I:N/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
15
reference_url http://www.debian.org/security/2017/dsa-3834
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:57Z/
url http://www.debian.org/security/2017/dsa-3834
16
reference_url http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:57Z/
url http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
17
reference_url http://www.securityfocus.com/bid/97851
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:57Z/
url http://www.securityfocus.com/bid/97851
18
reference_url http://www.securitytracker.com/id/1038287
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:57Z/
url http://www.securitytracker.com/id/1038287
19
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1443377
reference_id 1443377
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1443377
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-3462
reference_id CVE-2017-3462
reference_type
scores
0
value 4.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:P
1
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-3462
23
reference_url https://security.gentoo.org/glsa/201802-04
reference_id GLSA-201802-04
reference_type
scores
url https://security.gentoo.org/glsa/201802-04
24
reference_url https://access.redhat.com/errata/RHSA-2017:2787
reference_id RHSA-2017:2787
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:57Z/
url https://access.redhat.com/errata/RHSA-2017:2787
25
reference_url https://access.redhat.com/errata/RHSA-2017:2886
reference_id RHSA-2017:2886
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:57Z/
url https://access.redhat.com/errata/RHSA-2017:2886
26
reference_url https://usn.ubuntu.com/3269-1/
reference_id USN-3269-1
reference_type
scores
url https://usn.ubuntu.com/3269-1/
27
reference_url https://usn.ubuntu.com/3357-2/
reference_id USN-3357-2
reference_type
scores
url https://usn.ubuntu.com/3357-2/
fixed_packages
0
url pkg:deb/debian/mysql-5.5@5.5.60-0%2Bdeb8u1
purl pkg:deb/debian/mysql-5.5@5.5.60-0%2Bdeb8u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-5.5@5.5.60-0%252Bdeb8u1
aliases CVE-2017-3462
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-nj41-1zpw-gkh9
70
url VCID-nkdd-suwp-4ffr
vulnerability_id VCID-nkdd-suwp-4ffr
summary
Multiple vulnerabilities have been found in MariaDB, the worst of
    which could lead to privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3243.json
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3243.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-3243
reference_id
reference_type
scores
0
value 0.05555
scoring_system epss
scoring_elements 0.90293
published_at 2026-04-18T12:55:00Z
1
value 0.05555
scoring_system epss
scoring_elements 0.90233
published_at 2026-04-01T12:55:00Z
2
value 0.05555
scoring_system epss
scoring_elements 0.90236
published_at 2026-04-02T12:55:00Z
3
value 0.05555
scoring_system epss
scoring_elements 0.90249
published_at 2026-04-04T12:55:00Z
4
value 0.05555
scoring_system epss
scoring_elements 0.90253
published_at 2026-04-07T12:55:00Z
5
value 0.05555
scoring_system epss
scoring_elements 0.90269
published_at 2026-04-08T12:55:00Z
6
value 0.05555
scoring_system epss
scoring_elements 0.90275
published_at 2026-04-09T12:55:00Z
7
value 0.05555
scoring_system epss
scoring_elements 0.90284
published_at 2026-04-11T12:55:00Z
8
value 0.05555
scoring_system epss
scoring_elements 0.90283
published_at 2026-04-12T12:55:00Z
9
value 0.05555
scoring_system epss
scoring_elements 0.90277
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-3243
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6664
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6664
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3238
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3238
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3243
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3243
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3244
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3244
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3257
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3257
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3258
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3258
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3265
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3265
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3291
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3291
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3312
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3312
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3313
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3313
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3317
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3317
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3318
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3318
14
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:S/C:N/I:N/A:C
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1414340
reference_id 1414340
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1414340
16
reference_url http://www.securityfocus.com/bid/95538
reference_id 95538
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:27Z/
url http://www.securityfocus.com/bid/95538
17
reference_url http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
reference_id cpujan2017-2881727.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:27Z/
url http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
18
reference_url http://www.debian.org/security/2017/dsa-3767
reference_id dsa-3767
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:27Z/
url http://www.debian.org/security/2017/dsa-3767
19
reference_url http://www.debian.org/security/2017/dsa-3770
reference_id dsa-3770
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:27Z/
url http://www.debian.org/security/2017/dsa-3770
20
reference_url https://security.gentoo.org/glsa/201702-17
reference_id GLSA-201702-17
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:27Z/
url https://security.gentoo.org/glsa/201702-17
21
reference_url https://security.gentoo.org/glsa/201702-18
reference_id GLSA-201702-18
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:27Z/
url https://security.gentoo.org/glsa/201702-18
22
reference_url https://access.redhat.com/errata/RHSA-2017:2192
reference_id RHSA-2017:2192
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:27Z/
url https://access.redhat.com/errata/RHSA-2017:2192
23
reference_url https://access.redhat.com/errata/RHSA-2018:0279
reference_id RHSA-2018:0279
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:27Z/
url https://access.redhat.com/errata/RHSA-2018:0279
24
reference_url https://access.redhat.com/errata/RHSA-2018:0574
reference_id RHSA-2018:0574
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:27Z/
url https://access.redhat.com/errata/RHSA-2018:0574
25
reference_url https://usn.ubuntu.com/3174-1/
reference_id USN-3174-1
reference_type
scores
url https://usn.ubuntu.com/3174-1/
fixed_packages
0
url pkg:deb/debian/mysql-5.5@5.5.60-0%2Bdeb8u1
purl pkg:deb/debian/mysql-5.5@5.5.60-0%2Bdeb8u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-5.5@5.5.60-0%252Bdeb8u1
aliases CVE-2017-3243
risk_score 2.0
exploitability 0.5
weighted_severity 4.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-nkdd-suwp-4ffr
71
url VCID-nw5h-p35b-2khv
vulnerability_id VCID-nw5h-p35b-2khv
summary security update
references
0
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177539.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177539.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00010.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00010.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00011.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00011.html
3
reference_url http://lists.opensuse.org/opensuse-updates/2016-02/msg00039.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2016-02/msg00039.html
4
reference_url http://rhn.redhat.com/errata/RHSA-2016-0534.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0534.html
5
reference_url http://rhn.redhat.com/errata/RHSA-2016-0705.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0705.html
6
reference_url http://rhn.redhat.com/errata/RHSA-2016-1480.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-1480.html
7
reference_url http://rhn.redhat.com/errata/RHSA-2016-1481.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-1481.html
8
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4830.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4830.json
9
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-4830
reference_id
reference_type
scores
0
value 0.0027
scoring_system epss
scoring_elements 0.50576
published_at 2026-04-18T12:55:00Z
1
value 0.0027
scoring_system epss
scoring_elements 0.50436
published_at 2026-04-01T12:55:00Z
2
value 0.0027
scoring_system epss
scoring_elements 0.50493
published_at 2026-04-02T12:55:00Z
3
value 0.0027
scoring_system epss
scoring_elements 0.5052
published_at 2026-04-04T12:55:00Z
4
value 0.0027
scoring_system epss
scoring_elements 0.50474
published_at 2026-04-07T12:55:00Z
5
value 0.0027
scoring_system epss
scoring_elements 0.50528
published_at 2026-04-13T12:55:00Z
6
value 0.0027
scoring_system epss
scoring_elements 0.50524
published_at 2026-04-09T12:55:00Z
7
value 0.0027
scoring_system epss
scoring_elements 0.50566
published_at 2026-04-11T12:55:00Z
8
value 0.0027
scoring_system epss
scoring_elements 0.50542
published_at 2026-04-12T12:55:00Z
9
value 0.0027
scoring_system epss
scoring_elements 0.50571
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-4830
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4792
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4792
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4802
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4802
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4815
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4815
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4816
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4816
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4819
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4819
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4826
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4826
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4830
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4830
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4836
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4836
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4858
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4858
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4861
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4861
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4870
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4870
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4879
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4879
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4895
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4895
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4913
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4913
24
reference_url https://www.suse.com/support/update/announcement/2016/suse-su-20160296-1.html
reference_id
reference_type
scores
url https://www.suse.com/support/update/announcement/2016/suse-su-20160296-1.html
25
reference_url http://www.debian.org/security/2015/dsa-3377
reference_id
reference_type
scores
url http://www.debian.org/security/2015/dsa-3377
26
reference_url http://www.debian.org/security/2015/dsa-3385
reference_id
reference_type
scores
url http://www.debian.org/security/2015/dsa-3385
27
reference_url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
28
reference_url http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
29
reference_url http://www.securityfocus.com/bid/77228
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/77228
30
reference_url http://www.securitytracker.com/id/1033894
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1033894
31
reference_url http://www.ubuntu.com/usn/USN-2781-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2781-1
32
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1274767
reference_id 1274767
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1274767
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.1:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11:sp3:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_desktop:11:sp3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11:sp3:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:-:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:-:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:-:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:vmware:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:vmware:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:vmware:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp3:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp3:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-4830
reference_id CVE-2015-4830
reference_type
scores
0
value 4.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:P/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2015-4830
68
reference_url https://access.redhat.com/errata/RHSA-2016:0534
reference_id RHSA-2016:0534
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0534
69
reference_url https://access.redhat.com/errata/RHSA-2016:0705
reference_id RHSA-2016:0705
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0705
70
reference_url https://access.redhat.com/errata/RHSA-2016:1132
reference_id RHSA-2016:1132
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1132
71
reference_url https://access.redhat.com/errata/RHSA-2016:1480
reference_id RHSA-2016:1480
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1480
72
reference_url https://access.redhat.com/errata/RHSA-2016:1481
reference_id RHSA-2016:1481
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1481
73
reference_url https://usn.ubuntu.com/2781-1/
reference_id USN-2781-1
reference_type
scores
url https://usn.ubuntu.com/2781-1/
fixed_packages
0
url pkg:deb/debian/mysql-5.5@5.5.47-0%2Bdeb6u1
purl pkg:deb/debian/mysql-5.5@5.5.47-0%2Bdeb6u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1gmc-pj6y-rkfx
1
vulnerability VCID-1nvb-xd5n-gkh8
2
vulnerability VCID-2gyq-q761-h3br
3
vulnerability VCID-2jer-ss8p-7kbg
4
vulnerability VCID-2uxe-ep8b-y7b9
5
vulnerability VCID-2vp1-j324-dkat
6
vulnerability VCID-2yqz-qtv5-47hh
7
vulnerability VCID-2za2-cnwx-hbbw
8
vulnerability VCID-39gt-6dgh-wyar
9
vulnerability VCID-3qjy-4cen-7qev
10
vulnerability VCID-45hn-ezks-j7br
11
vulnerability VCID-4cnj-7fur-3qe3
12
vulnerability VCID-4yz4-vxnh-b3dp
13
vulnerability VCID-52w9-bgxr-nkba
14
vulnerability VCID-55fg-6c2c-6bg8
15
vulnerability VCID-5p65-gfsg-1ugq
16
vulnerability VCID-5q89-vg9j-k3as
17
vulnerability VCID-5sjj-599v-vybg
18
vulnerability VCID-64st-u4xn-z7g3
19
vulnerability VCID-6g4n-3xfu-hfee
20
vulnerability VCID-6gvj-hy6a-3qdx
21
vulnerability VCID-7tj3-dfxj-bke7
22
vulnerability VCID-7w3v-5s98-a7ec
23
vulnerability VCID-7yc3-7bkr-jfc9
24
vulnerability VCID-8krv-jqjg-uqc8
25
vulnerability VCID-8kvb-5u8c-zbc4
26
vulnerability VCID-8sya-wktg-dqa5
27
vulnerability VCID-9f48-53dz-13an
28
vulnerability VCID-9ff2-43rk-2ydj
29
vulnerability VCID-9w98-nfg2-muh2
30
vulnerability VCID-a3hx-qz7x-7ybk
31
vulnerability VCID-bfnh-7k45-nkg2
32
vulnerability VCID-bhxk-8byp-eyap
33
vulnerability VCID-ca85-vx8c-huht
34
vulnerability VCID-cnb3-dy3a-8bdp
35
vulnerability VCID-cyqa-e362-yyaf
36
vulnerability VCID-dfbz-5n6w-syd9
37
vulnerability VCID-dgtc-a2t2-k7f5
38
vulnerability VCID-dqg6-2gmj-judy
39
vulnerability VCID-ej67-ayfh-sqdt
40
vulnerability VCID-esfk-umc5-ska4
41
vulnerability VCID-f8p4-hpsh-2fcw
42
vulnerability VCID-f9vz-r6zv-t7ev
43
vulnerability VCID-fabc-rma2-myab
44
vulnerability VCID-fnks-p4e9-13es
45
vulnerability VCID-fuyw-1y1c-fkfp
46
vulnerability VCID-j2wu-2rx7-3yf2
47
vulnerability VCID-jgff-4jyp-9fgr
48
vulnerability VCID-kwrj-3fxz-g7c6
49
vulnerability VCID-mde2-1ynu-auh2
50
vulnerability VCID-mz71-vku8-ckbm
51
vulnerability VCID-nj41-1zpw-gkh9
52
vulnerability VCID-nkdd-suwp-4ffr
53
vulnerability VCID-p623-gxyv-g7fs
54
vulnerability VCID-pk7e-t26d-aqdm
55
vulnerability VCID-pv92-6p9x-v7bs
56
vulnerability VCID-qyb6-7ees-ukcm
57
vulnerability VCID-r2cz-9kjz-zbgu
58
vulnerability VCID-rfz7-vha1-e7gy
59
vulnerability VCID-rssq-mfc2-ckaf
60
vulnerability VCID-skzt-r7sx-1ucv
61
vulnerability VCID-sy6p-5km4-1kcy
62
vulnerability VCID-tazb-gd49-73b4
63
vulnerability VCID-u2c7-p86x-5bgf
64
vulnerability VCID-un5y-y9sq-1ufb
65
vulnerability VCID-v165-afmm-w3er
66
vulnerability VCID-v4gv-g9n5-ukgc
67
vulnerability VCID-wrna-cc9g-sqbe
68
vulnerability VCID-xuhv-wrut-wuez
69
vulnerability VCID-xvv1-nxs6-n7ab
70
vulnerability VCID-xyuf-au4f-57fr
71
vulnerability VCID-y6p4-vfkn-q7fc
72
vulnerability VCID-yx79-3g2x-pqex
73
vulnerability VCID-zb4s-9rj3-ebea
74
vulnerability VCID-zkvk-538h-w3b9
75
vulnerability VCID-zuxd-n3wn-s7hg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-5.5@5.5.47-0%252Bdeb6u1
aliases CVE-2015-4830
risk_score 1.8
exploitability 0.5
weighted_severity 3.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-nw5h-p35b-2khv
72
url VCID-p623-gxyv-g7fs
vulnerability_id VCID-p623-gxyv-g7fs
summary
Multiple vulnerabilities have been found in MariaDB, the worst of
    which could lead to privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3291.json
reference_id
reference_type
scores
0
value 6.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3291.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-3291
reference_id
reference_type
scores
0
value 0.00091
scoring_system epss
scoring_elements 0.25565
published_at 2026-04-18T12:55:00Z
1
value 0.00091
scoring_system epss
scoring_elements 0.25775
published_at 2026-04-04T12:55:00Z
2
value 0.00091
scoring_system epss
scoring_elements 0.25545
published_at 2026-04-07T12:55:00Z
3
value 0.00091
scoring_system epss
scoring_elements 0.25618
published_at 2026-04-08T12:55:00Z
4
value 0.00091
scoring_system epss
scoring_elements 0.25665
published_at 2026-04-09T12:55:00Z
5
value 0.00091
scoring_system epss
scoring_elements 0.25676
published_at 2026-04-11T12:55:00Z
6
value 0.00091
scoring_system epss
scoring_elements 0.25635
published_at 2026-04-12T12:55:00Z
7
value 0.00091
scoring_system epss
scoring_elements 0.25578
published_at 2026-04-13T12:55:00Z
8
value 0.00091
scoring_system epss
scoring_elements 0.2558
published_at 2026-04-16T12:55:00Z
9
value 0.00091
scoring_system epss
scoring_elements 0.25734
published_at 2026-04-02T12:55:00Z
10
value 0.00091
scoring_system epss
scoring_elements 0.25664
published_at 2026-04-01T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-3291
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6664
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6664
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3238
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3238
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3243
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3243
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3244
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3244
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3257
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3257
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3258
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3258
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3265
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3265
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3291
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3291
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3312
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3312
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3313
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3313
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3317
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3317
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3318
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3318
14
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6
scoring_system cvssv2
scoring_elements AV:L/AC:H/Au:S/C:C/I:C/A:C
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1414429
reference_id 1414429
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1414429
16
reference_url http://www.securityfocus.com/bid/95501
reference_id 95501
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:06:04Z/
url http://www.securityfocus.com/bid/95501
17
reference_url http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
reference_id cpujan2017-2881727.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:06:04Z/
url http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
18
reference_url http://www.debian.org/security/2017/dsa-3767
reference_id dsa-3767
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:06:04Z/
url http://www.debian.org/security/2017/dsa-3767
19
reference_url http://www.debian.org/security/2017/dsa-3770
reference_id dsa-3770
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:06:04Z/
url http://www.debian.org/security/2017/dsa-3770
20
reference_url https://security.gentoo.org/glsa/201702-17
reference_id GLSA-201702-17
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:06:04Z/
url https://security.gentoo.org/glsa/201702-17
21
reference_url https://security.gentoo.org/glsa/201702-18
reference_id GLSA-201702-18
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:06:04Z/
url https://security.gentoo.org/glsa/201702-18
22
reference_url https://access.redhat.com/errata/RHSA-2017:2192
reference_id RHSA-2017:2192
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:06:04Z/
url https://access.redhat.com/errata/RHSA-2017:2192
23
reference_url https://access.redhat.com/errata/RHSA-2017:2787
reference_id RHSA-2017:2787
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:06:04Z/
url https://access.redhat.com/errata/RHSA-2017:2787
24
reference_url https://access.redhat.com/errata/RHSA-2017:2886
reference_id RHSA-2017:2886
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:06:04Z/
url https://access.redhat.com/errata/RHSA-2017:2886
25
reference_url https://access.redhat.com/errata/RHSA-2018:0279
reference_id RHSA-2018:0279
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:06:04Z/
url https://access.redhat.com/errata/RHSA-2018:0279
26
reference_url https://access.redhat.com/errata/RHSA-2018:0574
reference_id RHSA-2018:0574
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:06:04Z/
url https://access.redhat.com/errata/RHSA-2018:0574
27
reference_url https://usn.ubuntu.com/3174-1/
reference_id USN-3174-1
reference_type
scores
url https://usn.ubuntu.com/3174-1/
fixed_packages
0
url pkg:deb/debian/mysql-5.5@5.5.60-0%2Bdeb8u1
purl pkg:deb/debian/mysql-5.5@5.5.60-0%2Bdeb8u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-5.5@5.5.60-0%252Bdeb8u1
aliases CVE-2017-3291
risk_score 2.9
exploitability 0.5
weighted_severity 5.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-p623-gxyv-g7fs
73
url VCID-p9xn-27dm-nfhg
vulnerability_id VCID-p9xn-27dm-nfhg
summary
Multiple vulnerabilities have been found in MySQL and MariaDB, the
    worst of which could allow remote attackers to cause a Denial of Service
    condition or obtain sensitive information.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2620.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2620.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-2620
reference_id
reference_type
scores
0
value 0.00774
scoring_system epss
scoring_elements 0.73535
published_at 2026-04-01T12:55:00Z
1
value 0.00774
scoring_system epss
scoring_elements 0.73544
published_at 2026-04-02T12:55:00Z
2
value 0.00774
scoring_system epss
scoring_elements 0.73567
published_at 2026-04-04T12:55:00Z
3
value 0.00774
scoring_system epss
scoring_elements 0.73539
published_at 2026-04-07T12:55:00Z
4
value 0.00774
scoring_system epss
scoring_elements 0.73575
published_at 2026-04-08T12:55:00Z
5
value 0.00774
scoring_system epss
scoring_elements 0.73588
published_at 2026-04-09T12:55:00Z
6
value 0.00774
scoring_system epss
scoring_elements 0.73611
published_at 2026-04-11T12:55:00Z
7
value 0.00774
scoring_system epss
scoring_elements 0.73593
published_at 2026-04-12T12:55:00Z
8
value 0.00774
scoring_system epss
scoring_elements 0.73585
published_at 2026-04-13T12:55:00Z
9
value 0.00774
scoring_system epss
scoring_elements 0.73629
published_at 2026-04-16T12:55:00Z
10
value 0.00774
scoring_system epss
scoring_elements 0.73638
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-2620
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2582
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2582
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2620
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2620
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2643
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2643
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2648
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2648
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4737
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4737
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4752
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4752
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1244771
reference_id 1244771
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1244771
9
reference_url https://security.gentoo.org/glsa/201610-06
reference_id GLSA-201610-06
reference_type
scores
url https://security.gentoo.org/glsa/201610-06
10
reference_url https://access.redhat.com/errata/RHSA-2015:1628
reference_id RHSA-2015:1628
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1628
11
reference_url https://access.redhat.com/errata/RHSA-2015:1629
reference_id RHSA-2015:1629
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1629
12
reference_url https://access.redhat.com/errata/RHSA-2015:1630
reference_id RHSA-2015:1630
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1630
13
reference_url https://access.redhat.com/errata/RHSA-2015:1646
reference_id RHSA-2015:1646
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1646
14
reference_url https://access.redhat.com/errata/RHSA-2015:1647
reference_id RHSA-2015:1647
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1647
15
reference_url https://access.redhat.com/errata/RHSA-2015:1665
reference_id RHSA-2015:1665
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1665
16
reference_url https://usn.ubuntu.com/2674-1/
reference_id USN-2674-1
reference_type
scores
url https://usn.ubuntu.com/2674-1/
fixed_packages
0
url pkg:deb/debian/mysql-5.5@5.5.47-0%2Bdeb6u1
purl pkg:deb/debian/mysql-5.5@5.5.47-0%2Bdeb6u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1gmc-pj6y-rkfx
1
vulnerability VCID-1nvb-xd5n-gkh8
2
vulnerability VCID-2gyq-q761-h3br
3
vulnerability VCID-2jer-ss8p-7kbg
4
vulnerability VCID-2uxe-ep8b-y7b9
5
vulnerability VCID-2vp1-j324-dkat
6
vulnerability VCID-2yqz-qtv5-47hh
7
vulnerability VCID-2za2-cnwx-hbbw
8
vulnerability VCID-39gt-6dgh-wyar
9
vulnerability VCID-3qjy-4cen-7qev
10
vulnerability VCID-45hn-ezks-j7br
11
vulnerability VCID-4cnj-7fur-3qe3
12
vulnerability VCID-4yz4-vxnh-b3dp
13
vulnerability VCID-52w9-bgxr-nkba
14
vulnerability VCID-55fg-6c2c-6bg8
15
vulnerability VCID-5p65-gfsg-1ugq
16
vulnerability VCID-5q89-vg9j-k3as
17
vulnerability VCID-5sjj-599v-vybg
18
vulnerability VCID-64st-u4xn-z7g3
19
vulnerability VCID-6g4n-3xfu-hfee
20
vulnerability VCID-6gvj-hy6a-3qdx
21
vulnerability VCID-7tj3-dfxj-bke7
22
vulnerability VCID-7w3v-5s98-a7ec
23
vulnerability VCID-7yc3-7bkr-jfc9
24
vulnerability VCID-8krv-jqjg-uqc8
25
vulnerability VCID-8kvb-5u8c-zbc4
26
vulnerability VCID-8sya-wktg-dqa5
27
vulnerability VCID-9f48-53dz-13an
28
vulnerability VCID-9ff2-43rk-2ydj
29
vulnerability VCID-9w98-nfg2-muh2
30
vulnerability VCID-a3hx-qz7x-7ybk
31
vulnerability VCID-bfnh-7k45-nkg2
32
vulnerability VCID-bhxk-8byp-eyap
33
vulnerability VCID-ca85-vx8c-huht
34
vulnerability VCID-cnb3-dy3a-8bdp
35
vulnerability VCID-cyqa-e362-yyaf
36
vulnerability VCID-dfbz-5n6w-syd9
37
vulnerability VCID-dgtc-a2t2-k7f5
38
vulnerability VCID-dqg6-2gmj-judy
39
vulnerability VCID-ej67-ayfh-sqdt
40
vulnerability VCID-esfk-umc5-ska4
41
vulnerability VCID-f8p4-hpsh-2fcw
42
vulnerability VCID-f9vz-r6zv-t7ev
43
vulnerability VCID-fabc-rma2-myab
44
vulnerability VCID-fnks-p4e9-13es
45
vulnerability VCID-fuyw-1y1c-fkfp
46
vulnerability VCID-j2wu-2rx7-3yf2
47
vulnerability VCID-jgff-4jyp-9fgr
48
vulnerability VCID-kwrj-3fxz-g7c6
49
vulnerability VCID-mde2-1ynu-auh2
50
vulnerability VCID-mz71-vku8-ckbm
51
vulnerability VCID-nj41-1zpw-gkh9
52
vulnerability VCID-nkdd-suwp-4ffr
53
vulnerability VCID-p623-gxyv-g7fs
54
vulnerability VCID-pk7e-t26d-aqdm
55
vulnerability VCID-pv92-6p9x-v7bs
56
vulnerability VCID-qyb6-7ees-ukcm
57
vulnerability VCID-r2cz-9kjz-zbgu
58
vulnerability VCID-rfz7-vha1-e7gy
59
vulnerability VCID-rssq-mfc2-ckaf
60
vulnerability VCID-skzt-r7sx-1ucv
61
vulnerability VCID-sy6p-5km4-1kcy
62
vulnerability VCID-tazb-gd49-73b4
63
vulnerability VCID-u2c7-p86x-5bgf
64
vulnerability VCID-un5y-y9sq-1ufb
65
vulnerability VCID-v165-afmm-w3er
66
vulnerability VCID-v4gv-g9n5-ukgc
67
vulnerability VCID-wrna-cc9g-sqbe
68
vulnerability VCID-xuhv-wrut-wuez
69
vulnerability VCID-xvv1-nxs6-n7ab
70
vulnerability VCID-xyuf-au4f-57fr
71
vulnerability VCID-y6p4-vfkn-q7fc
72
vulnerability VCID-yx79-3g2x-pqex
73
vulnerability VCID-zb4s-9rj3-ebea
74
vulnerability VCID-zkvk-538h-w3b9
75
vulnerability VCID-zuxd-n3wn-s7hg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-5.5@5.5.47-0%252Bdeb6u1
aliases CVE-2015-2620
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-p9xn-27dm-nfhg
74
url VCID-pk7e-t26d-aqdm
vulnerability_id VCID-pk7e-t26d-aqdm
summary security update
references
0
reference_url http://lists.opensuse.org/opensuse-updates/2016-09/msg00042.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:28Z/
url http://lists.opensuse.org/opensuse-updates/2016-09/msg00042.html
1
reference_url http://rhn.redhat.com/errata/RHSA-2016-1480.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:28Z/
url http://rhn.redhat.com/errata/RHSA-2016-1480.html
2
reference_url http://rhn.redhat.com/errata/RHSA-2016-1601.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:28Z/
url http://rhn.redhat.com/errata/RHSA-2016-1601.html
3
reference_url http://rhn.redhat.com/errata/RHSA-2016-1602.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:28Z/
url http://rhn.redhat.com/errata/RHSA-2016-1602.html
4
reference_url http://rhn.redhat.com/errata/RHSA-2016-1603.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:28Z/
url http://rhn.redhat.com/errata/RHSA-2016-1603.html
5
reference_url http://rhn.redhat.com/errata/RHSA-2016-1604.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:28Z/
url http://rhn.redhat.com/errata/RHSA-2016-1604.html
6
reference_url http://rhn.redhat.com/errata/RHSA-2016-1637.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:28Z/
url http://rhn.redhat.com/errata/RHSA-2016-1637.html
7
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3477.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3477.json
8
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-3477
reference_id
reference_type
scores
0
value 0.00115
scoring_system epss
scoring_elements 0.30191
published_at 2026-04-01T12:55:00Z
1
value 0.00115
scoring_system epss
scoring_elements 0.30088
published_at 2026-04-18T12:55:00Z
2
value 0.00115
scoring_system epss
scoring_elements 0.3027
published_at 2026-04-04T12:55:00Z
3
value 0.00115
scoring_system epss
scoring_elements 0.30221
published_at 2026-04-02T12:55:00Z
4
value 0.00115
scoring_system epss
scoring_elements 0.30108
published_at 2026-04-16T12:55:00Z
5
value 0.00115
scoring_system epss
scoring_elements 0.30093
published_at 2026-04-13T12:55:00Z
6
value 0.00115
scoring_system epss
scoring_elements 0.30143
published_at 2026-04-12T12:55:00Z
7
value 0.00115
scoring_system epss
scoring_elements 0.30186
published_at 2026-04-11T12:55:00Z
8
value 0.00115
scoring_system epss
scoring_elements 0.30184
published_at 2026-04-09T12:55:00Z
9
value 0.00115
scoring_system epss
scoring_elements 0.30148
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-3477
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3477
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3477
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3521
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3521
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3615
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3615
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5440
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5440
13
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:S/C:C/I:C/A:C
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
14
reference_url https://mariadb.com/kb/en/mariadb/mariadb-10026-release-notes/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:28Z/
url https://mariadb.com/kb/en/mariadb/mariadb-10026-release-notes/
15
reference_url https://mariadb.com/kb/en/mariadb/mariadb-10115-release-notes/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:28Z/
url https://mariadb.com/kb/en/mariadb/mariadb-10115-release-notes/
16
reference_url https://mariadb.com/kb/en/mariadb/mariadb-5550-release-notes/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:28Z/
url https://mariadb.com/kb/en/mariadb/mariadb-5550-release-notes/
17
reference_url http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:28Z/
url http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168
18
reference_url http://www.debian.org/security/2016/dsa-3624
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:28Z/
url http://www.debian.org/security/2016/dsa-3624
19
reference_url http://www.debian.org/security/2016/dsa-3632
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:28Z/
url http://www.debian.org/security/2016/dsa-3632
20
reference_url http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:28Z/
url http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
21
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:28Z/
url http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
22
reference_url http://www.securityfocus.com/bid/91787
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:28Z/
url http://www.securityfocus.com/bid/91787
23
reference_url http://www.securityfocus.com/bid/91902
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:28Z/
url http://www.securityfocus.com/bid/91902
24
reference_url http://www.securitytracker.com/id/1036362
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:28Z/
url http://www.securitytracker.com/id/1036362
25
reference_url http://www.ubuntu.com/usn/USN-3040-1
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:28Z/
url http://www.ubuntu.com/usn/USN-3040-1
26
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1358205
reference_id 1358205
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1358205
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:powerkvm:2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ibm:powerkvm:2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:powerkvm:2.1:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:powerkvm:3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ibm:powerkvm:3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:powerkvm:3.1:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-3477
reference_id CVE-2016-3477
reference_type
scores
0
value 4.1
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:S/C:P/I:P/A:P
1
value 8.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2016-3477
38
reference_url https://access.redhat.com/errata/RHSA-2016:1480
reference_id RHSA-2016:1480
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1480
39
reference_url https://access.redhat.com/errata/RHSA-2016:1601
reference_id RHSA-2016:1601
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1601
40
reference_url https://access.redhat.com/errata/RHSA-2016:1602
reference_id RHSA-2016:1602
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1602
41
reference_url https://access.redhat.com/errata/RHSA-2016:1603
reference_id RHSA-2016:1603
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1603
42
reference_url https://access.redhat.com/errata/RHSA-2016:1604
reference_id RHSA-2016:1604
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1604
43
reference_url https://access.redhat.com/errata/RHSA-2016:1637
reference_id RHSA-2016:1637
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1637
44
reference_url https://usn.ubuntu.com/3040-1/
reference_id USN-3040-1
reference_type
scores
url https://usn.ubuntu.com/3040-1/
fixed_packages
0
url pkg:deb/debian/mysql-5.5@5.5.60-0%2Bdeb8u1
purl pkg:deb/debian/mysql-5.5@5.5.60-0%2Bdeb8u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-5.5@5.5.60-0%252Bdeb8u1
aliases CVE-2016-3477
risk_score 3.6
exploitability 0.5
weighted_severity 7.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pk7e-t26d-aqdm
75
url VCID-pv92-6p9x-v7bs
vulnerability_id VCID-pv92-6p9x-v7bs
summary
Multiple vulnerabilities have been found in MariaDB, the worst of
    which could lead to privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3317.json
reference_id
reference_type
scores
0
value 4.0
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:H/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3317.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-3317
reference_id
reference_type
scores
0
value 0.00022
scoring_system epss
scoring_elements 0.05978
published_at 2026-04-18T12:55:00Z
1
value 0.00022
scoring_system epss
scoring_elements 0.05968
published_at 2026-04-04T12:55:00Z
2
value 0.00022
scoring_system epss
scoring_elements 0.05951
published_at 2026-04-07T12:55:00Z
3
value 0.00022
scoring_system epss
scoring_elements 0.0599
published_at 2026-04-08T12:55:00Z
4
value 0.00022
scoring_system epss
scoring_elements 0.06028
published_at 2026-04-09T12:55:00Z
5
value 0.00022
scoring_system epss
scoring_elements 0.06019
published_at 2026-04-11T12:55:00Z
6
value 0.00022
scoring_system epss
scoring_elements 0.0601
published_at 2026-04-12T12:55:00Z
7
value 0.00022
scoring_system epss
scoring_elements 0.06002
published_at 2026-04-13T12:55:00Z
8
value 0.00022
scoring_system epss
scoring_elements 0.05967
published_at 2026-04-16T12:55:00Z
9
value 0.00022
scoring_system epss
scoring_elements 0.05935
published_at 2026-04-02T12:55:00Z
10
value 0.00022
scoring_system epss
scoring_elements 0.05903
published_at 2026-04-01T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-3317
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6664
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6664
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3238
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3238
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3243
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3243
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3244
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3244
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3257
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3257
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3258
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3258
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3265
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3265
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3291
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3291
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3312
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3312
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3313
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3313
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3317
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3317
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3318
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3318
14
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.8
scoring_system cvssv2
scoring_elements AV:L/AC:H/Au:S/C:N/I:N/A:C
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1414355
reference_id 1414355
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1414355
16
reference_url http://www.securityfocus.com/bid/95585
reference_id 95585
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-08T20:09:31Z/
url http://www.securityfocus.com/bid/95585
17
reference_url http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
reference_id cpujan2017-2881727.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-08T20:09:31Z/
url http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
18
reference_url http://www.debian.org/security/2017/dsa-3767
reference_id dsa-3767
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-08T20:09:31Z/
url http://www.debian.org/security/2017/dsa-3767
19
reference_url http://www.debian.org/security/2017/dsa-3770
reference_id dsa-3770
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-08T20:09:31Z/
url http://www.debian.org/security/2017/dsa-3770
20
reference_url https://security.gentoo.org/glsa/201702-17
reference_id GLSA-201702-17
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-08T20:09:31Z/
url https://security.gentoo.org/glsa/201702-17
21
reference_url https://security.gentoo.org/glsa/201702-18
reference_id GLSA-201702-18
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-08T20:09:31Z/
url https://security.gentoo.org/glsa/201702-18
22
reference_url https://access.redhat.com/errata/RHSA-2017:2192
reference_id RHSA-2017:2192
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-08T20:09:31Z/
url https://access.redhat.com/errata/RHSA-2017:2192
23
reference_url https://access.redhat.com/errata/RHSA-2017:2787
reference_id RHSA-2017:2787
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-08T20:09:31Z/
url https://access.redhat.com/errata/RHSA-2017:2787
24
reference_url https://access.redhat.com/errata/RHSA-2017:2886
reference_id RHSA-2017:2886
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-08T20:09:31Z/
url https://access.redhat.com/errata/RHSA-2017:2886
25
reference_url https://access.redhat.com/errata/RHSA-2018:0279
reference_id RHSA-2018:0279
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-08T20:09:31Z/
url https://access.redhat.com/errata/RHSA-2018:0279
26
reference_url https://access.redhat.com/errata/RHSA-2018:0574
reference_id RHSA-2018:0574
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-08T20:09:31Z/
url https://access.redhat.com/errata/RHSA-2018:0574
27
reference_url https://usn.ubuntu.com/3174-1/
reference_id USN-3174-1
reference_type
scores
url https://usn.ubuntu.com/3174-1/
fixed_packages
0
url pkg:deb/debian/mysql-5.5@5.5.60-0%2Bdeb8u1
purl pkg:deb/debian/mysql-5.5@5.5.60-0%2Bdeb8u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-5.5@5.5.60-0%252Bdeb8u1
aliases CVE-2017-3317
risk_score 1.8
exploitability 0.5
weighted_severity 3.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pv92-6p9x-v7bs
76
url VCID-q1vh-jwcy-87cz
vulnerability_id VCID-q1vh-jwcy-87cz
summary security update
references
0
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177539.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177539.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00010.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00010.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00011.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00011.html
3
reference_url http://lists.opensuse.org/opensuse-updates/2016-02/msg00039.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2016-02/msg00039.html
4
reference_url http://rhn.redhat.com/errata/RHSA-2016-0534.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0534.html
5
reference_url http://rhn.redhat.com/errata/RHSA-2016-0705.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0705.html
6
reference_url http://rhn.redhat.com/errata/RHSA-2016-1480.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-1480.html
7
reference_url http://rhn.redhat.com/errata/RHSA-2016-1481.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-1481.html
8
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4858.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4858.json
9
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-4858
reference_id
reference_type
scores
0
value 0.00419
scoring_system epss
scoring_elements 0.61939
published_at 2026-04-18T12:55:00Z
1
value 0.00419
scoring_system epss
scoring_elements 0.6176
published_at 2026-04-01T12:55:00Z
2
value 0.00419
scoring_system epss
scoring_elements 0.61834
published_at 2026-04-02T12:55:00Z
3
value 0.00419
scoring_system epss
scoring_elements 0.61865
published_at 2026-04-04T12:55:00Z
4
value 0.00419
scoring_system epss
scoring_elements 0.61837
published_at 2026-04-07T12:55:00Z
5
value 0.00419
scoring_system epss
scoring_elements 0.61886
published_at 2026-04-08T12:55:00Z
6
value 0.00419
scoring_system epss
scoring_elements 0.61902
published_at 2026-04-09T12:55:00Z
7
value 0.00419
scoring_system epss
scoring_elements 0.61923
published_at 2026-04-11T12:55:00Z
8
value 0.00419
scoring_system epss
scoring_elements 0.61911
published_at 2026-04-12T12:55:00Z
9
value 0.00419
scoring_system epss
scoring_elements 0.61891
published_at 2026-04-13T12:55:00Z
10
value 0.00419
scoring_system epss
scoring_elements 0.61934
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-4858
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4792
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4792
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4802
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4802
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4815
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4815
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4816
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4816
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4819
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4819
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4826
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4826
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4830
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4830
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4836
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4836
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4858
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4858
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4861
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4861
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4870
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4870
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4879
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4879
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4895
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4895
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4913
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4913
24
reference_url https://www.suse.com/support/update/announcement/2016/suse-su-20160296-1.html
reference_id
reference_type
scores
url https://www.suse.com/support/update/announcement/2016/suse-su-20160296-1.html
25
reference_url http://www.debian.org/security/2015/dsa-3377
reference_id
reference_type
scores
url http://www.debian.org/security/2015/dsa-3377
26
reference_url http://www.debian.org/security/2015/dsa-3385
reference_id
reference_type
scores
url http://www.debian.org/security/2015/dsa-3385
27
reference_url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
28
reference_url http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
29
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
30
reference_url http://www.securityfocus.com/bid/77145
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/77145
31
reference_url http://www.securitytracker.com/id/1033894
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1033894
32
reference_url http://www.ubuntu.com/usn/USN-2781-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2781-1
33
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1274773
reference_id 1274773
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1274773
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:-:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:linux:7:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:-:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.1:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-4858
reference_id CVE-2015-4858
reference_type
scores
0
value 4.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2015-4858
66
reference_url https://access.redhat.com/errata/RHSA-2016:0534
reference_id RHSA-2016:0534
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0534
67
reference_url https://access.redhat.com/errata/RHSA-2016:0705
reference_id RHSA-2016:0705
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0705
68
reference_url https://access.redhat.com/errata/RHSA-2016:1132
reference_id RHSA-2016:1132
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1132
69
reference_url https://access.redhat.com/errata/RHSA-2016:1480
reference_id RHSA-2016:1480
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1480
70
reference_url https://access.redhat.com/errata/RHSA-2016:1481
reference_id RHSA-2016:1481
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1481
71
reference_url https://usn.ubuntu.com/2781-1/
reference_id USN-2781-1
reference_type
scores
url https://usn.ubuntu.com/2781-1/
fixed_packages
0
url pkg:deb/debian/mysql-5.5@5.5.47-0%2Bdeb6u1
purl pkg:deb/debian/mysql-5.5@5.5.47-0%2Bdeb6u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1gmc-pj6y-rkfx
1
vulnerability VCID-1nvb-xd5n-gkh8
2
vulnerability VCID-2gyq-q761-h3br
3
vulnerability VCID-2jer-ss8p-7kbg
4
vulnerability VCID-2uxe-ep8b-y7b9
5
vulnerability VCID-2vp1-j324-dkat
6
vulnerability VCID-2yqz-qtv5-47hh
7
vulnerability VCID-2za2-cnwx-hbbw
8
vulnerability VCID-39gt-6dgh-wyar
9
vulnerability VCID-3qjy-4cen-7qev
10
vulnerability VCID-45hn-ezks-j7br
11
vulnerability VCID-4cnj-7fur-3qe3
12
vulnerability VCID-4yz4-vxnh-b3dp
13
vulnerability VCID-52w9-bgxr-nkba
14
vulnerability VCID-55fg-6c2c-6bg8
15
vulnerability VCID-5p65-gfsg-1ugq
16
vulnerability VCID-5q89-vg9j-k3as
17
vulnerability VCID-5sjj-599v-vybg
18
vulnerability VCID-64st-u4xn-z7g3
19
vulnerability VCID-6g4n-3xfu-hfee
20
vulnerability VCID-6gvj-hy6a-3qdx
21
vulnerability VCID-7tj3-dfxj-bke7
22
vulnerability VCID-7w3v-5s98-a7ec
23
vulnerability VCID-7yc3-7bkr-jfc9
24
vulnerability VCID-8krv-jqjg-uqc8
25
vulnerability VCID-8kvb-5u8c-zbc4
26
vulnerability VCID-8sya-wktg-dqa5
27
vulnerability VCID-9f48-53dz-13an
28
vulnerability VCID-9ff2-43rk-2ydj
29
vulnerability VCID-9w98-nfg2-muh2
30
vulnerability VCID-a3hx-qz7x-7ybk
31
vulnerability VCID-bfnh-7k45-nkg2
32
vulnerability VCID-bhxk-8byp-eyap
33
vulnerability VCID-ca85-vx8c-huht
34
vulnerability VCID-cnb3-dy3a-8bdp
35
vulnerability VCID-cyqa-e362-yyaf
36
vulnerability VCID-dfbz-5n6w-syd9
37
vulnerability VCID-dgtc-a2t2-k7f5
38
vulnerability VCID-dqg6-2gmj-judy
39
vulnerability VCID-ej67-ayfh-sqdt
40
vulnerability VCID-esfk-umc5-ska4
41
vulnerability VCID-f8p4-hpsh-2fcw
42
vulnerability VCID-f9vz-r6zv-t7ev
43
vulnerability VCID-fabc-rma2-myab
44
vulnerability VCID-fnks-p4e9-13es
45
vulnerability VCID-fuyw-1y1c-fkfp
46
vulnerability VCID-j2wu-2rx7-3yf2
47
vulnerability VCID-jgff-4jyp-9fgr
48
vulnerability VCID-kwrj-3fxz-g7c6
49
vulnerability VCID-mde2-1ynu-auh2
50
vulnerability VCID-mz71-vku8-ckbm
51
vulnerability VCID-nj41-1zpw-gkh9
52
vulnerability VCID-nkdd-suwp-4ffr
53
vulnerability VCID-p623-gxyv-g7fs
54
vulnerability VCID-pk7e-t26d-aqdm
55
vulnerability VCID-pv92-6p9x-v7bs
56
vulnerability VCID-qyb6-7ees-ukcm
57
vulnerability VCID-r2cz-9kjz-zbgu
58
vulnerability VCID-rfz7-vha1-e7gy
59
vulnerability VCID-rssq-mfc2-ckaf
60
vulnerability VCID-skzt-r7sx-1ucv
61
vulnerability VCID-sy6p-5km4-1kcy
62
vulnerability VCID-tazb-gd49-73b4
63
vulnerability VCID-u2c7-p86x-5bgf
64
vulnerability VCID-un5y-y9sq-1ufb
65
vulnerability VCID-v165-afmm-w3er
66
vulnerability VCID-v4gv-g9n5-ukgc
67
vulnerability VCID-wrna-cc9g-sqbe
68
vulnerability VCID-xuhv-wrut-wuez
69
vulnerability VCID-xvv1-nxs6-n7ab
70
vulnerability VCID-xyuf-au4f-57fr
71
vulnerability VCID-y6p4-vfkn-q7fc
72
vulnerability VCID-yx79-3g2x-pqex
73
vulnerability VCID-zb4s-9rj3-ebea
74
vulnerability VCID-zkvk-538h-w3b9
75
vulnerability VCID-zuxd-n3wn-s7hg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-5.5@5.5.47-0%252Bdeb6u1
aliases CVE-2015-4858
risk_score 1.8
exploitability 0.5
weighted_severity 3.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-q1vh-jwcy-87cz
77
url VCID-q4pg-yfsh-zqcu
vulnerability_id VCID-q4pg-yfsh-zqcu
summary
Multiple vulnerabilities have been found in MySQL, allowing
    attackers to execute arbitrary code or cause Denial of Service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0433.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0433.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-0433
reference_id
reference_type
scores
0
value 0.00465
scoring_system epss
scoring_elements 0.64285
published_at 2026-04-01T12:55:00Z
1
value 0.00465
scoring_system epss
scoring_elements 0.64342
published_at 2026-04-02T12:55:00Z
2
value 0.00465
scoring_system epss
scoring_elements 0.64371
published_at 2026-04-04T12:55:00Z
3
value 0.00465
scoring_system epss
scoring_elements 0.6433
published_at 2026-04-07T12:55:00Z
4
value 0.00465
scoring_system epss
scoring_elements 0.64379
published_at 2026-04-08T12:55:00Z
5
value 0.00465
scoring_system epss
scoring_elements 0.64393
published_at 2026-04-09T12:55:00Z
6
value 0.00465
scoring_system epss
scoring_elements 0.64405
published_at 2026-04-11T12:55:00Z
7
value 0.00465
scoring_system epss
scoring_elements 0.64392
published_at 2026-04-12T12:55:00Z
8
value 0.00465
scoring_system epss
scoring_elements 0.64363
published_at 2026-04-13T12:55:00Z
9
value 0.00465
scoring_system epss
scoring_elements 0.64399
published_at 2026-04-16T12:55:00Z
10
value 0.00465
scoring_system epss
scoring_elements 0.64411
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-0433
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0433
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0433
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0441
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0441
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0499
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0499
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0501
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0501
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0505
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0505
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2568
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2568
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2571
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2571
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2573
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2573
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2582
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2582
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2643
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2643
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2648
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2648
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3152
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3152
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4752
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4752
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4757
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4757
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1212776
reference_id 1212776
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1212776
17
reference_url https://security.gentoo.org/glsa/201507-19
reference_id GLSA-201507-19
reference_type
scores
url https://security.gentoo.org/glsa/201507-19
18
reference_url https://access.redhat.com/errata/RHSA-2015:1628
reference_id RHSA-2015:1628
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1628
19
reference_url https://access.redhat.com/errata/RHSA-2015:1629
reference_id RHSA-2015:1629
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1629
20
reference_url https://access.redhat.com/errata/RHSA-2015:1647
reference_id RHSA-2015:1647
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1647
21
reference_url https://access.redhat.com/errata/RHSA-2015:1665
reference_id RHSA-2015:1665
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1665
22
reference_url https://usn.ubuntu.com/2575-1/
reference_id USN-2575-1
reference_type
scores
url https://usn.ubuntu.com/2575-1/
fixed_packages
0
url pkg:deb/debian/mysql-5.5@5.5.47-0%2Bdeb6u1
purl pkg:deb/debian/mysql-5.5@5.5.47-0%2Bdeb6u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1gmc-pj6y-rkfx
1
vulnerability VCID-1nvb-xd5n-gkh8
2
vulnerability VCID-2gyq-q761-h3br
3
vulnerability VCID-2jer-ss8p-7kbg
4
vulnerability VCID-2uxe-ep8b-y7b9
5
vulnerability VCID-2vp1-j324-dkat
6
vulnerability VCID-2yqz-qtv5-47hh
7
vulnerability VCID-2za2-cnwx-hbbw
8
vulnerability VCID-39gt-6dgh-wyar
9
vulnerability VCID-3qjy-4cen-7qev
10
vulnerability VCID-45hn-ezks-j7br
11
vulnerability VCID-4cnj-7fur-3qe3
12
vulnerability VCID-4yz4-vxnh-b3dp
13
vulnerability VCID-52w9-bgxr-nkba
14
vulnerability VCID-55fg-6c2c-6bg8
15
vulnerability VCID-5p65-gfsg-1ugq
16
vulnerability VCID-5q89-vg9j-k3as
17
vulnerability VCID-5sjj-599v-vybg
18
vulnerability VCID-64st-u4xn-z7g3
19
vulnerability VCID-6g4n-3xfu-hfee
20
vulnerability VCID-6gvj-hy6a-3qdx
21
vulnerability VCID-7tj3-dfxj-bke7
22
vulnerability VCID-7w3v-5s98-a7ec
23
vulnerability VCID-7yc3-7bkr-jfc9
24
vulnerability VCID-8krv-jqjg-uqc8
25
vulnerability VCID-8kvb-5u8c-zbc4
26
vulnerability VCID-8sya-wktg-dqa5
27
vulnerability VCID-9f48-53dz-13an
28
vulnerability VCID-9ff2-43rk-2ydj
29
vulnerability VCID-9w98-nfg2-muh2
30
vulnerability VCID-a3hx-qz7x-7ybk
31
vulnerability VCID-bfnh-7k45-nkg2
32
vulnerability VCID-bhxk-8byp-eyap
33
vulnerability VCID-ca85-vx8c-huht
34
vulnerability VCID-cnb3-dy3a-8bdp
35
vulnerability VCID-cyqa-e362-yyaf
36
vulnerability VCID-dfbz-5n6w-syd9
37
vulnerability VCID-dgtc-a2t2-k7f5
38
vulnerability VCID-dqg6-2gmj-judy
39
vulnerability VCID-ej67-ayfh-sqdt
40
vulnerability VCID-esfk-umc5-ska4
41
vulnerability VCID-f8p4-hpsh-2fcw
42
vulnerability VCID-f9vz-r6zv-t7ev
43
vulnerability VCID-fabc-rma2-myab
44
vulnerability VCID-fnks-p4e9-13es
45
vulnerability VCID-fuyw-1y1c-fkfp
46
vulnerability VCID-j2wu-2rx7-3yf2
47
vulnerability VCID-jgff-4jyp-9fgr
48
vulnerability VCID-kwrj-3fxz-g7c6
49
vulnerability VCID-mde2-1ynu-auh2
50
vulnerability VCID-mz71-vku8-ckbm
51
vulnerability VCID-nj41-1zpw-gkh9
52
vulnerability VCID-nkdd-suwp-4ffr
53
vulnerability VCID-p623-gxyv-g7fs
54
vulnerability VCID-pk7e-t26d-aqdm
55
vulnerability VCID-pv92-6p9x-v7bs
56
vulnerability VCID-qyb6-7ees-ukcm
57
vulnerability VCID-r2cz-9kjz-zbgu
58
vulnerability VCID-rfz7-vha1-e7gy
59
vulnerability VCID-rssq-mfc2-ckaf
60
vulnerability VCID-skzt-r7sx-1ucv
61
vulnerability VCID-sy6p-5km4-1kcy
62
vulnerability VCID-tazb-gd49-73b4
63
vulnerability VCID-u2c7-p86x-5bgf
64
vulnerability VCID-un5y-y9sq-1ufb
65
vulnerability VCID-v165-afmm-w3er
66
vulnerability VCID-v4gv-g9n5-ukgc
67
vulnerability VCID-wrna-cc9g-sqbe
68
vulnerability VCID-xuhv-wrut-wuez
69
vulnerability VCID-xvv1-nxs6-n7ab
70
vulnerability VCID-xyuf-au4f-57fr
71
vulnerability VCID-y6p4-vfkn-q7fc
72
vulnerability VCID-yx79-3g2x-pqex
73
vulnerability VCID-zb4s-9rj3-ebea
74
vulnerability VCID-zkvk-538h-w3b9
75
vulnerability VCID-zuxd-n3wn-s7hg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-5.5@5.5.47-0%252Bdeb6u1
aliases CVE-2015-0433
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-q4pg-yfsh-zqcu
78
url VCID-qyb6-7ees-ukcm
vulnerability_id VCID-qyb6-7ees-ukcm
summary security update
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00015.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00015.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00016.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00016.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html
6
reference_url http://rhn.redhat.com/errata/RHSA-2016-0534.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0534.html
7
reference_url http://rhn.redhat.com/errata/RHSA-2016-0705.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0705.html
8
reference_url http://rhn.redhat.com/errata/RHSA-2016-1480.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-1480.html
9
reference_url http://rhn.redhat.com/errata/RHSA-2016-1481.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-1481.html
10
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0608.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0608.json
11
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-0608
reference_id
reference_type
scores
0
value 0.00338
scoring_system epss
scoring_elements 0.56668
published_at 2026-04-18T12:55:00Z
1
value 0.00338
scoring_system epss
scoring_elements 0.56638
published_at 2026-04-13T12:55:00Z
2
value 0.00338
scoring_system epss
scoring_elements 0.56522
published_at 2026-04-01T12:55:00Z
3
value 0.00338
scoring_system epss
scoring_elements 0.56618
published_at 2026-04-07T12:55:00Z
4
value 0.00338
scoring_system epss
scoring_elements 0.56639
published_at 2026-04-04T12:55:00Z
5
value 0.00338
scoring_system epss
scoring_elements 0.56669
published_at 2026-04-16T12:55:00Z
6
value 0.00338
scoring_system epss
scoring_elements 0.56675
published_at 2026-04-09T12:55:00Z
7
value 0.00338
scoring_system epss
scoring_elements 0.56683
published_at 2026-04-11T12:55:00Z
8
value 0.00338
scoring_system epss
scoring_elements 0.56658
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-0608
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0505
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0505
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0546
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0546
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0596
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0596
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0597
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0597
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0598
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0598
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0600
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0600
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0606
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0606
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0608
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0608
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0609
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0609
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0616
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0616
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2047
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2047
23
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.5
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:S/C:N/I:N/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
24
reference_url https://mariadb.com/kb/en/mariadb/mariadb-10110-release-notes/
reference_id
reference_type
scores
url https://mariadb.com/kb/en/mariadb/mariadb-10110-release-notes/
25
reference_url https://mariadb.com/kb/en/mariadb/mariadb-5547-release-notes/
reference_id
reference_type
scores
url https://mariadb.com/kb/en/mariadb/mariadb-5547-release-notes/
26
reference_url https://mariadb.com/kb/en/mdb-10023-rn/
reference_id
reference_type
scores
url https://mariadb.com/kb/en/mdb-10023-rn/
27
reference_url http://www.debian.org/security/2016/dsa-3453
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3453
28
reference_url http://www.debian.org/security/2016/dsa-3459
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3459
29
reference_url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
30
reference_url http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
31
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
32
reference_url http://www.securityfocus.com/bid/81226
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/81226
33
reference_url http://www.securitytracker.com/id/1034708
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1034708
34
reference_url http://www.ubuntu.com/usn/USN-2881-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2881-1
35
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1301506
reference_id 1301506
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1301506
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node_eus:7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_hpc_node_eus:7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node_eus:7.2:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-0608
reference_id CVE-2016-0608
reference_type
scores
0
value 3.5
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:S/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2016-0608
57
reference_url https://access.redhat.com/errata/RHSA-2016:0534
reference_id RHSA-2016:0534
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0534
58
reference_url https://access.redhat.com/errata/RHSA-2016:0705
reference_id RHSA-2016:0705
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0705
59
reference_url https://access.redhat.com/errata/RHSA-2016:1132
reference_id RHSA-2016:1132
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1132
60
reference_url https://access.redhat.com/errata/RHSA-2016:1480
reference_id RHSA-2016:1480
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1480
61
reference_url https://access.redhat.com/errata/RHSA-2016:1481
reference_id RHSA-2016:1481
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1481
62
reference_url https://usn.ubuntu.com/2881-1/
reference_id USN-2881-1
reference_type
scores
url https://usn.ubuntu.com/2881-1/
fixed_packages
0
url pkg:deb/debian/mysql-5.5@5.5.47-0%2Bdeb7u1
purl pkg:deb/debian/mysql-5.5@5.5.47-0%2Bdeb7u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1gmc-pj6y-rkfx
1
vulnerability VCID-1nvb-xd5n-gkh8
2
vulnerability VCID-2gyq-q761-h3br
3
vulnerability VCID-2jer-ss8p-7kbg
4
vulnerability VCID-2uxe-ep8b-y7b9
5
vulnerability VCID-2vp1-j324-dkat
6
vulnerability VCID-2yqz-qtv5-47hh
7
vulnerability VCID-2za2-cnwx-hbbw
8
vulnerability VCID-39gt-6dgh-wyar
9
vulnerability VCID-3qjy-4cen-7qev
10
vulnerability VCID-45hn-ezks-j7br
11
vulnerability VCID-4cnj-7fur-3qe3
12
vulnerability VCID-4yz4-vxnh-b3dp
13
vulnerability VCID-52w9-bgxr-nkba
14
vulnerability VCID-55fg-6c2c-6bg8
15
vulnerability VCID-5p65-gfsg-1ugq
16
vulnerability VCID-5q89-vg9j-k3as
17
vulnerability VCID-5sjj-599v-vybg
18
vulnerability VCID-64st-u4xn-z7g3
19
vulnerability VCID-6g4n-3xfu-hfee
20
vulnerability VCID-6gvj-hy6a-3qdx
21
vulnerability VCID-7tj3-dfxj-bke7
22
vulnerability VCID-7w3v-5s98-a7ec
23
vulnerability VCID-7yc3-7bkr-jfc9
24
vulnerability VCID-8krv-jqjg-uqc8
25
vulnerability VCID-8kvb-5u8c-zbc4
26
vulnerability VCID-8sya-wktg-dqa5
27
vulnerability VCID-9f48-53dz-13an
28
vulnerability VCID-9ff2-43rk-2ydj
29
vulnerability VCID-9w98-nfg2-muh2
30
vulnerability VCID-a3hx-qz7x-7ybk
31
vulnerability VCID-bfnh-7k45-nkg2
32
vulnerability VCID-bhxk-8byp-eyap
33
vulnerability VCID-ca85-vx8c-huht
34
vulnerability VCID-cnb3-dy3a-8bdp
35
vulnerability VCID-cyqa-e362-yyaf
36
vulnerability VCID-dfbz-5n6w-syd9
37
vulnerability VCID-dgtc-a2t2-k7f5
38
vulnerability VCID-dqg6-2gmj-judy
39
vulnerability VCID-ej67-ayfh-sqdt
40
vulnerability VCID-esfk-umc5-ska4
41
vulnerability VCID-f8p4-hpsh-2fcw
42
vulnerability VCID-f9vz-r6zv-t7ev
43
vulnerability VCID-fabc-rma2-myab
44
vulnerability VCID-fnks-p4e9-13es
45
vulnerability VCID-fuyw-1y1c-fkfp
46
vulnerability VCID-j2wu-2rx7-3yf2
47
vulnerability VCID-jgff-4jyp-9fgr
48
vulnerability VCID-kwrj-3fxz-g7c6
49
vulnerability VCID-mde2-1ynu-auh2
50
vulnerability VCID-mz71-vku8-ckbm
51
vulnerability VCID-nj41-1zpw-gkh9
52
vulnerability VCID-nkdd-suwp-4ffr
53
vulnerability VCID-p623-gxyv-g7fs
54
vulnerability VCID-pk7e-t26d-aqdm
55
vulnerability VCID-pv92-6p9x-v7bs
56
vulnerability VCID-qyb6-7ees-ukcm
57
vulnerability VCID-r2cz-9kjz-zbgu
58
vulnerability VCID-rfz7-vha1-e7gy
59
vulnerability VCID-rssq-mfc2-ckaf
60
vulnerability VCID-skzt-r7sx-1ucv
61
vulnerability VCID-sy6p-5km4-1kcy
62
vulnerability VCID-tazb-gd49-73b4
63
vulnerability VCID-u2c7-p86x-5bgf
64
vulnerability VCID-un5y-y9sq-1ufb
65
vulnerability VCID-v165-afmm-w3er
66
vulnerability VCID-v4gv-g9n5-ukgc
67
vulnerability VCID-wrna-cc9g-sqbe
68
vulnerability VCID-xuhv-wrut-wuez
69
vulnerability VCID-xvv1-nxs6-n7ab
70
vulnerability VCID-xyuf-au4f-57fr
71
vulnerability VCID-y6p4-vfkn-q7fc
72
vulnerability VCID-yx79-3g2x-pqex
73
vulnerability VCID-zb4s-9rj3-ebea
74
vulnerability VCID-zkvk-538h-w3b9
75
vulnerability VCID-zuxd-n3wn-s7hg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-5.5@5.5.47-0%252Bdeb7u1
1
url pkg:deb/debian/mysql-5.5@5.5.60-0%2Bdeb8u1
purl pkg:deb/debian/mysql-5.5@5.5.60-0%2Bdeb8u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-5.5@5.5.60-0%252Bdeb8u1
aliases CVE-2016-0608
risk_score 1.6
exploitability 0.5
weighted_severity 3.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qyb6-7ees-ukcm
79
url VCID-r2cz-9kjz-zbgu
vulnerability_id VCID-r2cz-9kjz-zbgu
summary mysql: prepared statement handle use-after-free after disconnect
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3302.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3302.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-3302
reference_id
reference_type
scores
0
value 0.025
scoring_system epss
scoring_elements 0.85359
published_at 2026-04-18T12:55:00Z
1
value 0.025
scoring_system epss
scoring_elements 0.85265
published_at 2026-04-01T12:55:00Z
2
value 0.025
scoring_system epss
scoring_elements 0.85277
published_at 2026-04-02T12:55:00Z
3
value 0.025
scoring_system epss
scoring_elements 0.85298
published_at 2026-04-07T12:55:00Z
4
value 0.025
scoring_system epss
scoring_elements 0.8532
published_at 2026-04-08T12:55:00Z
5
value 0.025
scoring_system epss
scoring_elements 0.85328
published_at 2026-04-09T12:55:00Z
6
value 0.025
scoring_system epss
scoring_elements 0.85342
published_at 2026-04-11T12:55:00Z
7
value 0.025
scoring_system epss
scoring_elements 0.85341
published_at 2026-04-12T12:55:00Z
8
value 0.025
scoring_system epss
scoring_elements 0.85337
published_at 2026-04-13T12:55:00Z
9
value 0.025
scoring_system epss
scoring_elements 0.85357
published_at 2026-04-16T12:55:00Z
10
value 0.025
scoring_system epss
scoring_elements 0.85296
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-3302
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3302
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3302
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3305
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3305
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3308
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3308
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3309
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3309
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3313
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3313
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3329
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3329
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3453
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3453
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3456
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3456
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3461
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3461
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3462
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3462
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3463
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3463
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3464
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3464
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3600
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3600
15
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
16
reference_url http://www.openwall.com/lists/oss-security/2017/02/11/11
reference_id 11
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-08T20:04:48Z/
url http://www.openwall.com/lists/oss-security/2017/02/11/11
17
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1422119
reference_id 1422119
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1422119
18
reference_url http://www.securityfocus.com/bid/96162
reference_id 96162
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-08T20:04:48Z/
url http://www.securityfocus.com/bid/96162
19
reference_url http://www.debian.org/security/2017/dsa-3809
reference_id dsa-3809
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-08T20:04:48Z/
url http://www.debian.org/security/2017/dsa-3809
20
reference_url https://access.redhat.com/errata/RHSA-2017:2192
reference_id RHSA-2017:2192
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-08T20:04:48Z/
url https://access.redhat.com/errata/RHSA-2017:2192
21
reference_url https://access.redhat.com/errata/RHSA-2017:2787
reference_id RHSA-2017:2787
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-08T20:04:48Z/
url https://access.redhat.com/errata/RHSA-2017:2787
22
reference_url https://access.redhat.com/errata/RHSA-2018:0279
reference_id RHSA-2018:0279
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-08T20:04:48Z/
url https://access.redhat.com/errata/RHSA-2018:0279
23
reference_url https://access.redhat.com/errata/RHSA-2018:0574
reference_id RHSA-2018:0574
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-08T20:04:48Z/
url https://access.redhat.com/errata/RHSA-2018:0574
24
reference_url https://usn.ubuntu.com/3269-1/
reference_id USN-3269-1
reference_type
scores
url https://usn.ubuntu.com/3269-1/
25
reference_url https://usn.ubuntu.com/3357-2/
reference_id USN-3357-2
reference_type
scores
url https://usn.ubuntu.com/3357-2/
fixed_packages
0
url pkg:deb/debian/mysql-5.5@5.5.60-0%2Bdeb8u1
purl pkg:deb/debian/mysql-5.5@5.5.60-0%2Bdeb8u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-5.5@5.5.60-0%252Bdeb8u1
aliases CVE-2017-3302
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-r2cz-9kjz-zbgu
80
url VCID-r3kw-ufpz-aqft
vulnerability_id VCID-r3kw-ufpz-aqft
summary
Multiple vulnerabilities have been found in MySQL and MariaDB, the
    worst of which could allow remote attackers to cause a Denial of Service
    condition or obtain sensitive information.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2643.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2643.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-2643
reference_id
reference_type
scores
0
value 0.00598
scoring_system epss
scoring_elements 0.69334
published_at 2026-04-01T12:55:00Z
1
value 0.00598
scoring_system epss
scoring_elements 0.69347
published_at 2026-04-02T12:55:00Z
2
value 0.00598
scoring_system epss
scoring_elements 0.69363
published_at 2026-04-04T12:55:00Z
3
value 0.00598
scoring_system epss
scoring_elements 0.69343
published_at 2026-04-07T12:55:00Z
4
value 0.00598
scoring_system epss
scoring_elements 0.69393
published_at 2026-04-08T12:55:00Z
5
value 0.00598
scoring_system epss
scoring_elements 0.69409
published_at 2026-04-09T12:55:00Z
6
value 0.00598
scoring_system epss
scoring_elements 0.69432
published_at 2026-04-11T12:55:00Z
7
value 0.00598
scoring_system epss
scoring_elements 0.69417
published_at 2026-04-12T12:55:00Z
8
value 0.00598
scoring_system epss
scoring_elements 0.69402
published_at 2026-04-13T12:55:00Z
9
value 0.00598
scoring_system epss
scoring_elements 0.69442
published_at 2026-04-16T12:55:00Z
10
value 0.00598
scoring_system epss
scoring_elements 0.69452
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-2643
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0433
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0433
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0441
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0441
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0499
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0499
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0501
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0501
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0505
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0505
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2568
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2568
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2571
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2571
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2573
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2573
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2582
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2582
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2620
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2620
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2643
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2643
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2648
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2648
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3152
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3152
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4737
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4737
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4752
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4752
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4757
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4757
18
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1244774
reference_id 1244774
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1244774
19
reference_url https://security.gentoo.org/glsa/201610-06
reference_id GLSA-201610-06
reference_type
scores
url https://security.gentoo.org/glsa/201610-06
20
reference_url https://access.redhat.com/errata/RHSA-2015:1628
reference_id RHSA-2015:1628
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1628
21
reference_url https://access.redhat.com/errata/RHSA-2015:1629
reference_id RHSA-2015:1629
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1629
22
reference_url https://access.redhat.com/errata/RHSA-2015:1630
reference_id RHSA-2015:1630
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1630
23
reference_url https://access.redhat.com/errata/RHSA-2015:1646
reference_id RHSA-2015:1646
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1646
24
reference_url https://access.redhat.com/errata/RHSA-2015:1647
reference_id RHSA-2015:1647
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1647
25
reference_url https://access.redhat.com/errata/RHSA-2015:1665
reference_id RHSA-2015:1665
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1665
26
reference_url https://usn.ubuntu.com/2674-1/
reference_id USN-2674-1
reference_type
scores
url https://usn.ubuntu.com/2674-1/
fixed_packages
0
url pkg:deb/debian/mysql-5.5@5.5.47-0%2Bdeb6u1
purl pkg:deb/debian/mysql-5.5@5.5.47-0%2Bdeb6u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1gmc-pj6y-rkfx
1
vulnerability VCID-1nvb-xd5n-gkh8
2
vulnerability VCID-2gyq-q761-h3br
3
vulnerability VCID-2jer-ss8p-7kbg
4
vulnerability VCID-2uxe-ep8b-y7b9
5
vulnerability VCID-2vp1-j324-dkat
6
vulnerability VCID-2yqz-qtv5-47hh
7
vulnerability VCID-2za2-cnwx-hbbw
8
vulnerability VCID-39gt-6dgh-wyar
9
vulnerability VCID-3qjy-4cen-7qev
10
vulnerability VCID-45hn-ezks-j7br
11
vulnerability VCID-4cnj-7fur-3qe3
12
vulnerability VCID-4yz4-vxnh-b3dp
13
vulnerability VCID-52w9-bgxr-nkba
14
vulnerability VCID-55fg-6c2c-6bg8
15
vulnerability VCID-5p65-gfsg-1ugq
16
vulnerability VCID-5q89-vg9j-k3as
17
vulnerability VCID-5sjj-599v-vybg
18
vulnerability VCID-64st-u4xn-z7g3
19
vulnerability VCID-6g4n-3xfu-hfee
20
vulnerability VCID-6gvj-hy6a-3qdx
21
vulnerability VCID-7tj3-dfxj-bke7
22
vulnerability VCID-7w3v-5s98-a7ec
23
vulnerability VCID-7yc3-7bkr-jfc9
24
vulnerability VCID-8krv-jqjg-uqc8
25
vulnerability VCID-8kvb-5u8c-zbc4
26
vulnerability VCID-8sya-wktg-dqa5
27
vulnerability VCID-9f48-53dz-13an
28
vulnerability VCID-9ff2-43rk-2ydj
29
vulnerability VCID-9w98-nfg2-muh2
30
vulnerability VCID-a3hx-qz7x-7ybk
31
vulnerability VCID-bfnh-7k45-nkg2
32
vulnerability VCID-bhxk-8byp-eyap
33
vulnerability VCID-ca85-vx8c-huht
34
vulnerability VCID-cnb3-dy3a-8bdp
35
vulnerability VCID-cyqa-e362-yyaf
36
vulnerability VCID-dfbz-5n6w-syd9
37
vulnerability VCID-dgtc-a2t2-k7f5
38
vulnerability VCID-dqg6-2gmj-judy
39
vulnerability VCID-ej67-ayfh-sqdt
40
vulnerability VCID-esfk-umc5-ska4
41
vulnerability VCID-f8p4-hpsh-2fcw
42
vulnerability VCID-f9vz-r6zv-t7ev
43
vulnerability VCID-fabc-rma2-myab
44
vulnerability VCID-fnks-p4e9-13es
45
vulnerability VCID-fuyw-1y1c-fkfp
46
vulnerability VCID-j2wu-2rx7-3yf2
47
vulnerability VCID-jgff-4jyp-9fgr
48
vulnerability VCID-kwrj-3fxz-g7c6
49
vulnerability VCID-mde2-1ynu-auh2
50
vulnerability VCID-mz71-vku8-ckbm
51
vulnerability VCID-nj41-1zpw-gkh9
52
vulnerability VCID-nkdd-suwp-4ffr
53
vulnerability VCID-p623-gxyv-g7fs
54
vulnerability VCID-pk7e-t26d-aqdm
55
vulnerability VCID-pv92-6p9x-v7bs
56
vulnerability VCID-qyb6-7ees-ukcm
57
vulnerability VCID-r2cz-9kjz-zbgu
58
vulnerability VCID-rfz7-vha1-e7gy
59
vulnerability VCID-rssq-mfc2-ckaf
60
vulnerability VCID-skzt-r7sx-1ucv
61
vulnerability VCID-sy6p-5km4-1kcy
62
vulnerability VCID-tazb-gd49-73b4
63
vulnerability VCID-u2c7-p86x-5bgf
64
vulnerability VCID-un5y-y9sq-1ufb
65
vulnerability VCID-v165-afmm-w3er
66
vulnerability VCID-v4gv-g9n5-ukgc
67
vulnerability VCID-wrna-cc9g-sqbe
68
vulnerability VCID-xuhv-wrut-wuez
69
vulnerability VCID-xvv1-nxs6-n7ab
70
vulnerability VCID-xyuf-au4f-57fr
71
vulnerability VCID-y6p4-vfkn-q7fc
72
vulnerability VCID-yx79-3g2x-pqex
73
vulnerability VCID-zb4s-9rj3-ebea
74
vulnerability VCID-zkvk-538h-w3b9
75
vulnerability VCID-zuxd-n3wn-s7hg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-5.5@5.5.47-0%252Bdeb6u1
aliases CVE-2015-2643
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-r3kw-ufpz-aqft
81
url VCID-r5m9-kdvc-g3fv
vulnerability_id VCID-r5m9-kdvc-g3fv
summary
Multiple vulnerabilities have been found in MySQL, allowing
    attackers to execute arbitrary code or cause Denial of Service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0505.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0505.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-0505
reference_id
reference_type
scores
0
value 0.00288
scoring_system epss
scoring_elements 0.52118
published_at 2026-04-01T12:55:00Z
1
value 0.00288
scoring_system epss
scoring_elements 0.52162
published_at 2026-04-02T12:55:00Z
2
value 0.00288
scoring_system epss
scoring_elements 0.52189
published_at 2026-04-04T12:55:00Z
3
value 0.00288
scoring_system epss
scoring_elements 0.52154
published_at 2026-04-07T12:55:00Z
4
value 0.00288
scoring_system epss
scoring_elements 0.52207
published_at 2026-04-08T12:55:00Z
5
value 0.00288
scoring_system epss
scoring_elements 0.52203
published_at 2026-04-09T12:55:00Z
6
value 0.00288
scoring_system epss
scoring_elements 0.52254
published_at 2026-04-11T12:55:00Z
7
value 0.00288
scoring_system epss
scoring_elements 0.52238
published_at 2026-04-12T12:55:00Z
8
value 0.00288
scoring_system epss
scoring_elements 0.52224
published_at 2026-04-13T12:55:00Z
9
value 0.00288
scoring_system epss
scoring_elements 0.52261
published_at 2026-04-16T12:55:00Z
10
value 0.00288
scoring_system epss
scoring_elements 0.52265
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-0505
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0433
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0433
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0441
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0441
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0499
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0499
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0501
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0501
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0505
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0505
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2568
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2568
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2571
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2571
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2573
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2573
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2582
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2582
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2643
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2643
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2648
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2648
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3152
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3152
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4752
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4752
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4757
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4757
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1212780
reference_id 1212780
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1212780
17
reference_url https://security.gentoo.org/glsa/201507-19
reference_id GLSA-201507-19
reference_type
scores
url https://security.gentoo.org/glsa/201507-19
18
reference_url https://access.redhat.com/errata/RHSA-2015:1628
reference_id RHSA-2015:1628
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1628
19
reference_url https://access.redhat.com/errata/RHSA-2015:1629
reference_id RHSA-2015:1629
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1629
20
reference_url https://access.redhat.com/errata/RHSA-2015:1646
reference_id RHSA-2015:1646
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1646
21
reference_url https://access.redhat.com/errata/RHSA-2015:1647
reference_id RHSA-2015:1647
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1647
22
reference_url https://access.redhat.com/errata/RHSA-2015:1665
reference_id RHSA-2015:1665
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1665
23
reference_url https://usn.ubuntu.com/2575-1/
reference_id USN-2575-1
reference_type
scores
url https://usn.ubuntu.com/2575-1/
fixed_packages
0
url pkg:deb/debian/mysql-5.5@5.5.47-0%2Bdeb6u1
purl pkg:deb/debian/mysql-5.5@5.5.47-0%2Bdeb6u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1gmc-pj6y-rkfx
1
vulnerability VCID-1nvb-xd5n-gkh8
2
vulnerability VCID-2gyq-q761-h3br
3
vulnerability VCID-2jer-ss8p-7kbg
4
vulnerability VCID-2uxe-ep8b-y7b9
5
vulnerability VCID-2vp1-j324-dkat
6
vulnerability VCID-2yqz-qtv5-47hh
7
vulnerability VCID-2za2-cnwx-hbbw
8
vulnerability VCID-39gt-6dgh-wyar
9
vulnerability VCID-3qjy-4cen-7qev
10
vulnerability VCID-45hn-ezks-j7br
11
vulnerability VCID-4cnj-7fur-3qe3
12
vulnerability VCID-4yz4-vxnh-b3dp
13
vulnerability VCID-52w9-bgxr-nkba
14
vulnerability VCID-55fg-6c2c-6bg8
15
vulnerability VCID-5p65-gfsg-1ugq
16
vulnerability VCID-5q89-vg9j-k3as
17
vulnerability VCID-5sjj-599v-vybg
18
vulnerability VCID-64st-u4xn-z7g3
19
vulnerability VCID-6g4n-3xfu-hfee
20
vulnerability VCID-6gvj-hy6a-3qdx
21
vulnerability VCID-7tj3-dfxj-bke7
22
vulnerability VCID-7w3v-5s98-a7ec
23
vulnerability VCID-7yc3-7bkr-jfc9
24
vulnerability VCID-8krv-jqjg-uqc8
25
vulnerability VCID-8kvb-5u8c-zbc4
26
vulnerability VCID-8sya-wktg-dqa5
27
vulnerability VCID-9f48-53dz-13an
28
vulnerability VCID-9ff2-43rk-2ydj
29
vulnerability VCID-9w98-nfg2-muh2
30
vulnerability VCID-a3hx-qz7x-7ybk
31
vulnerability VCID-bfnh-7k45-nkg2
32
vulnerability VCID-bhxk-8byp-eyap
33
vulnerability VCID-ca85-vx8c-huht
34
vulnerability VCID-cnb3-dy3a-8bdp
35
vulnerability VCID-cyqa-e362-yyaf
36
vulnerability VCID-dfbz-5n6w-syd9
37
vulnerability VCID-dgtc-a2t2-k7f5
38
vulnerability VCID-dqg6-2gmj-judy
39
vulnerability VCID-ej67-ayfh-sqdt
40
vulnerability VCID-esfk-umc5-ska4
41
vulnerability VCID-f8p4-hpsh-2fcw
42
vulnerability VCID-f9vz-r6zv-t7ev
43
vulnerability VCID-fabc-rma2-myab
44
vulnerability VCID-fnks-p4e9-13es
45
vulnerability VCID-fuyw-1y1c-fkfp
46
vulnerability VCID-j2wu-2rx7-3yf2
47
vulnerability VCID-jgff-4jyp-9fgr
48
vulnerability VCID-kwrj-3fxz-g7c6
49
vulnerability VCID-mde2-1ynu-auh2
50
vulnerability VCID-mz71-vku8-ckbm
51
vulnerability VCID-nj41-1zpw-gkh9
52
vulnerability VCID-nkdd-suwp-4ffr
53
vulnerability VCID-p623-gxyv-g7fs
54
vulnerability VCID-pk7e-t26d-aqdm
55
vulnerability VCID-pv92-6p9x-v7bs
56
vulnerability VCID-qyb6-7ees-ukcm
57
vulnerability VCID-r2cz-9kjz-zbgu
58
vulnerability VCID-rfz7-vha1-e7gy
59
vulnerability VCID-rssq-mfc2-ckaf
60
vulnerability VCID-skzt-r7sx-1ucv
61
vulnerability VCID-sy6p-5km4-1kcy
62
vulnerability VCID-tazb-gd49-73b4
63
vulnerability VCID-u2c7-p86x-5bgf
64
vulnerability VCID-un5y-y9sq-1ufb
65
vulnerability VCID-v165-afmm-w3er
66
vulnerability VCID-v4gv-g9n5-ukgc
67
vulnerability VCID-wrna-cc9g-sqbe
68
vulnerability VCID-xuhv-wrut-wuez
69
vulnerability VCID-xvv1-nxs6-n7ab
70
vulnerability VCID-xyuf-au4f-57fr
71
vulnerability VCID-y6p4-vfkn-q7fc
72
vulnerability VCID-yx79-3g2x-pqex
73
vulnerability VCID-zb4s-9rj3-ebea
74
vulnerability VCID-zkvk-538h-w3b9
75
vulnerability VCID-zuxd-n3wn-s7hg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-5.5@5.5.47-0%252Bdeb6u1
aliases CVE-2015-0505
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-r5m9-kdvc-g3fv
82
url VCID-rfz7-vha1-e7gy
vulnerability_id VCID-rfz7-vha1-e7gy
summary security update
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:29Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:29Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:29Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:29Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:29Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:29Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html
6
reference_url http://rhn.redhat.com/errata/RHSA-2016-0705.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:29Z/
url http://rhn.redhat.com/errata/RHSA-2016-0705.html
7
reference_url http://rhn.redhat.com/errata/RHSA-2016-1480.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:29Z/
url http://rhn.redhat.com/errata/RHSA-2016-1480.html
8
reference_url http://rhn.redhat.com/errata/RHSA-2016-1481.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:29Z/
url http://rhn.redhat.com/errata/RHSA-2016-1481.html
9
reference_url http://rhn.redhat.com/errata/RHSA-2016-1602.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:29Z/
url http://rhn.redhat.com/errata/RHSA-2016-1602.html
10
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0641.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0641.json
11
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-0641
reference_id
reference_type
scores
0
value 0.0025
scoring_system epss
scoring_elements 0.48158
published_at 2026-04-01T12:55:00Z
1
value 0.0025
scoring_system epss
scoring_elements 0.48195
published_at 2026-04-02T12:55:00Z
2
value 0.0025
scoring_system epss
scoring_elements 0.48215
published_at 2026-04-04T12:55:00Z
3
value 0.0025
scoring_system epss
scoring_elements 0.48167
published_at 2026-04-07T12:55:00Z
4
value 0.0025
scoring_system epss
scoring_elements 0.4822
published_at 2026-04-08T12:55:00Z
5
value 0.0025
scoring_system epss
scoring_elements 0.48214
published_at 2026-04-09T12:55:00Z
6
value 0.0025
scoring_system epss
scoring_elements 0.48238
published_at 2026-04-11T12:55:00Z
7
value 0.0025
scoring_system epss
scoring_elements 0.48213
published_at 2026-04-12T12:55:00Z
8
value 0.0025
scoring_system epss
scoring_elements 0.48224
published_at 2026-04-13T12:55:00Z
9
value 0.0025
scoring_system epss
scoring_elements 0.48275
published_at 2026-04-16T12:55:00Z
10
value 0.0025
scoring_system epss
scoring_elements 0.4827
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-0641
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0640
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0640
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0641
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0641
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0642
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0642
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0643
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0643
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0644
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0644
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0646
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0646
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0647
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0647
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0648
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0648
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0649
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0649
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0650
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0650
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0655
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0655
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0666
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0666
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0668
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0668
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2047
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2047
26
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:M/C:P/I:N/A:C
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
27
reference_url https://mariadb.com/kb/en/mariadb/mariadb-10024-release-notes/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:29Z/
url https://mariadb.com/kb/en/mariadb/mariadb-10024-release-notes/
28
reference_url https://mariadb.com/kb/en/mariadb/mariadb-10112-release-notes/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:29Z/
url https://mariadb.com/kb/en/mariadb/mariadb-10112-release-notes/
29
reference_url https://mariadb.com/kb/en/mariadb/mariadb-5548-release-notes/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:29Z/
url https://mariadb.com/kb/en/mariadb/mariadb-5548-release-notes/
30
reference_url http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:29Z/
url http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168
31
reference_url http://www.debian.org/security/2016/dsa-3557
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:29Z/
url http://www.debian.org/security/2016/dsa-3557
32
reference_url http://www.debian.org/security/2016/dsa-3595
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:29Z/
url http://www.debian.org/security/2016/dsa-3595
33
reference_url http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:29Z/
url http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
34
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:29Z/
url http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
35
reference_url http://www.securityfocus.com/bid/86470
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:29Z/
url http://www.securityfocus.com/bid/86470
36
reference_url http://www.securitytracker.com/id/1035606
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:29Z/
url http://www.securitytracker.com/id/1035606
37
reference_url http://www.ubuntu.com/usn/USN-2953-1
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:29Z/
url http://www.ubuntu.com/usn/USN-2953-1
38
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1329241
reference_id 1329241
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1329241
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:powerkvm:2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ibm:powerkvm:2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:powerkvm:2.1:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:powerkvm:3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ibm:powerkvm:3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:powerkvm:3.1:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-0641
reference_id CVE-2016-0641
reference_type
scores
0
value 4.9
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:S/C:P/I:N/A:P
1
value 5.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2016-0641
49
reference_url https://access.redhat.com/errata/RHSA-2016:0705
reference_id RHSA-2016:0705
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0705
50
reference_url https://access.redhat.com/errata/RHSA-2016:1132
reference_id RHSA-2016:1132
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:29Z/
url https://access.redhat.com/errata/RHSA-2016:1132
51
reference_url https://access.redhat.com/errata/RHSA-2016:1480
reference_id RHSA-2016:1480
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1480
52
reference_url https://access.redhat.com/errata/RHSA-2016:1481
reference_id RHSA-2016:1481
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1481
53
reference_url https://access.redhat.com/errata/RHSA-2016:1602
reference_id RHSA-2016:1602
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1602
54
reference_url https://usn.ubuntu.com/2953-1/
reference_id USN-2953-1
reference_type
scores
url https://usn.ubuntu.com/2953-1/
fixed_packages
0
url pkg:deb/debian/mysql-5.5@5.5.60-0%2Bdeb8u1
purl pkg:deb/debian/mysql-5.5@5.5.60-0%2Bdeb8u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-5.5@5.5.60-0%252Bdeb8u1
aliases CVE-2016-0641
risk_score 2.3
exploitability 0.5
weighted_severity 4.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rfz7-vha1-e7gy
83
url VCID-rssq-mfc2-ckaf
vulnerability_id VCID-rssq-mfc2-ckaf
summary
Multiple vulnerabilities have been found in MariaDB, the worst of
    which could lead to privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3258.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3258.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-3258
reference_id
reference_type
scores
0
value 0.00312
scoring_system epss
scoring_elements 0.5445
published_at 2026-04-18T12:55:00Z
1
value 0.00312
scoring_system epss
scoring_elements 0.54327
published_at 2026-04-01T12:55:00Z
2
value 0.00312
scoring_system epss
scoring_elements 0.54347
published_at 2026-04-02T12:55:00Z
3
value 0.00312
scoring_system epss
scoring_elements 0.54377
published_at 2026-04-04T12:55:00Z
4
value 0.00312
scoring_system epss
scoring_elements 0.54351
published_at 2026-04-07T12:55:00Z
5
value 0.00312
scoring_system epss
scoring_elements 0.54403
published_at 2026-04-08T12:55:00Z
6
value 0.00312
scoring_system epss
scoring_elements 0.54398
published_at 2026-04-09T12:55:00Z
7
value 0.00312
scoring_system epss
scoring_elements 0.54446
published_at 2026-04-16T12:55:00Z
8
value 0.00312
scoring_system epss
scoring_elements 0.54429
published_at 2026-04-12T12:55:00Z
9
value 0.00312
scoring_system epss
scoring_elements 0.54407
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-3258
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6664
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6664
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3238
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3238
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3243
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3243
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3244
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3244
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3257
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3257
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3258
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3258
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3265
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3265
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3291
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3291
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3312
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3312
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3313
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3313
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3317
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3317
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3318
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3318
14
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:C
1
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1414351
reference_id 1414351
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1414351
16
reference_url http://www.securityfocus.com/bid/95560
reference_id 95560
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:10Z/
url http://www.securityfocus.com/bid/95560
17
reference_url http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
reference_id cpujan2017-2881727.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:10Z/
url http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
18
reference_url http://www.debian.org/security/2017/dsa-3767
reference_id dsa-3767
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:10Z/
url http://www.debian.org/security/2017/dsa-3767
19
reference_url http://www.debian.org/security/2017/dsa-3770
reference_id dsa-3770
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:10Z/
url http://www.debian.org/security/2017/dsa-3770
20
reference_url https://security.gentoo.org/glsa/201702-17
reference_id GLSA-201702-17
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:10Z/
url https://security.gentoo.org/glsa/201702-17
21
reference_url https://security.gentoo.org/glsa/201702-18
reference_id GLSA-201702-18
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:10Z/
url https://security.gentoo.org/glsa/201702-18
22
reference_url https://access.redhat.com/errata/RHSA-2017:2192
reference_id RHSA-2017:2192
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:10Z/
url https://access.redhat.com/errata/RHSA-2017:2192
23
reference_url https://access.redhat.com/errata/RHSA-2017:2787
reference_id RHSA-2017:2787
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:10Z/
url https://access.redhat.com/errata/RHSA-2017:2787
24
reference_url https://access.redhat.com/errata/RHSA-2017:2886
reference_id RHSA-2017:2886
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:10Z/
url https://access.redhat.com/errata/RHSA-2017:2886
25
reference_url https://access.redhat.com/errata/RHSA-2018:0279
reference_id RHSA-2018:0279
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:10Z/
url https://access.redhat.com/errata/RHSA-2018:0279
26
reference_url https://access.redhat.com/errata/RHSA-2018:0574
reference_id RHSA-2018:0574
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:10Z/
url https://access.redhat.com/errata/RHSA-2018:0574
27
reference_url https://usn.ubuntu.com/3174-1/
reference_id USN-3174-1
reference_type
scores
url https://usn.ubuntu.com/3174-1/
fixed_packages
0
url pkg:deb/debian/mysql-5.5@5.5.60-0%2Bdeb8u1
purl pkg:deb/debian/mysql-5.5@5.5.60-0%2Bdeb8u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-5.5@5.5.60-0%252Bdeb8u1
aliases CVE-2017-3258
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rssq-mfc2-ckaf
84
url VCID-s5bz-57vv-b7bz
vulnerability_id VCID-s5bz-57vv-b7bz
summary security update
references
0
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177539.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177539.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00010.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00010.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00011.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00011.html
3
reference_url http://lists.opensuse.org/opensuse-updates/2016-02/msg00039.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2016-02/msg00039.html
4
reference_url http://rhn.redhat.com/errata/RHSA-2016-0534.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0534.html
5
reference_url http://rhn.redhat.com/errata/RHSA-2016-0705.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0705.html
6
reference_url http://rhn.redhat.com/errata/RHSA-2016-1480.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-1480.html
7
reference_url http://rhn.redhat.com/errata/RHSA-2016-1481.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-1481.html
8
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4913.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4913.json
9
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-4913
reference_id
reference_type
scores
0
value 0.00392
scoring_system epss
scoring_elements 0.60251
published_at 2026-04-18T12:55:00Z
1
value 0.00392
scoring_system epss
scoring_elements 0.60078
published_at 2026-04-01T12:55:00Z
2
value 0.00392
scoring_system epss
scoring_elements 0.60156
published_at 2026-04-02T12:55:00Z
3
value 0.00392
scoring_system epss
scoring_elements 0.60181
published_at 2026-04-04T12:55:00Z
4
value 0.00392
scoring_system epss
scoring_elements 0.6015
published_at 2026-04-07T12:55:00Z
5
value 0.00392
scoring_system epss
scoring_elements 0.602
published_at 2026-04-08T12:55:00Z
6
value 0.00392
scoring_system epss
scoring_elements 0.60214
published_at 2026-04-09T12:55:00Z
7
value 0.00392
scoring_system epss
scoring_elements 0.60235
published_at 2026-04-11T12:55:00Z
8
value 0.00392
scoring_system epss
scoring_elements 0.60222
published_at 2026-04-12T12:55:00Z
9
value 0.00392
scoring_system epss
scoring_elements 0.60204
published_at 2026-04-13T12:55:00Z
10
value 0.00392
scoring_system epss
scoring_elements 0.60244
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-4913
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4792
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4792
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4802
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4802
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4815
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4815
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4816
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4816
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4819
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4819
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4826
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4826
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4830
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4830
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4836
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4836
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4858
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4858
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4861
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4861
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4870
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4870
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4879
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4879
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4895
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4895
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4913
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4913
24
reference_url https://www.suse.com/support/update/announcement/2016/suse-su-20160296-1.html
reference_id
reference_type
scores
url https://www.suse.com/support/update/announcement/2016/suse-su-20160296-1.html
25
reference_url http://www.debian.org/security/2015/dsa-3377
reference_id
reference_type
scores
url http://www.debian.org/security/2015/dsa-3377
26
reference_url http://www.debian.org/security/2015/dsa-3385
reference_id
reference_type
scores
url http://www.debian.org/security/2015/dsa-3385
27
reference_url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
28
reference_url http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
29
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
30
reference_url http://www.securityfocus.com/bid/77153
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/77153
31
reference_url http://www.securitytracker.com/id/1033894
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1033894
32
reference_url http://www.ubuntu.com/usn/USN-2781-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2781-1
33
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1274794
reference_id 1274794
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1274794
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-4913
reference_id CVE-2015-4913
reference_type
scores
0
value 3.5
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:S/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2015-4913
67
reference_url https://access.redhat.com/errata/RHSA-2016:0534
reference_id RHSA-2016:0534
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0534
68
reference_url https://access.redhat.com/errata/RHSA-2016:0705
reference_id RHSA-2016:0705
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0705
69
reference_url https://access.redhat.com/errata/RHSA-2016:1132
reference_id RHSA-2016:1132
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1132
70
reference_url https://access.redhat.com/errata/RHSA-2016:1480
reference_id RHSA-2016:1480
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1480
71
reference_url https://access.redhat.com/errata/RHSA-2016:1481
reference_id RHSA-2016:1481
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1481
72
reference_url https://usn.ubuntu.com/2781-1/
reference_id USN-2781-1
reference_type
scores
url https://usn.ubuntu.com/2781-1/
fixed_packages
0
url pkg:deb/debian/mysql-5.5@5.5.47-0%2Bdeb6u1
purl pkg:deb/debian/mysql-5.5@5.5.47-0%2Bdeb6u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1gmc-pj6y-rkfx
1
vulnerability VCID-1nvb-xd5n-gkh8
2
vulnerability VCID-2gyq-q761-h3br
3
vulnerability VCID-2jer-ss8p-7kbg
4
vulnerability VCID-2uxe-ep8b-y7b9
5
vulnerability VCID-2vp1-j324-dkat
6
vulnerability VCID-2yqz-qtv5-47hh
7
vulnerability VCID-2za2-cnwx-hbbw
8
vulnerability VCID-39gt-6dgh-wyar
9
vulnerability VCID-3qjy-4cen-7qev
10
vulnerability VCID-45hn-ezks-j7br
11
vulnerability VCID-4cnj-7fur-3qe3
12
vulnerability VCID-4yz4-vxnh-b3dp
13
vulnerability VCID-52w9-bgxr-nkba
14
vulnerability VCID-55fg-6c2c-6bg8
15
vulnerability VCID-5p65-gfsg-1ugq
16
vulnerability VCID-5q89-vg9j-k3as
17
vulnerability VCID-5sjj-599v-vybg
18
vulnerability VCID-64st-u4xn-z7g3
19
vulnerability VCID-6g4n-3xfu-hfee
20
vulnerability VCID-6gvj-hy6a-3qdx
21
vulnerability VCID-7tj3-dfxj-bke7
22
vulnerability VCID-7w3v-5s98-a7ec
23
vulnerability VCID-7yc3-7bkr-jfc9
24
vulnerability VCID-8krv-jqjg-uqc8
25
vulnerability VCID-8kvb-5u8c-zbc4
26
vulnerability VCID-8sya-wktg-dqa5
27
vulnerability VCID-9f48-53dz-13an
28
vulnerability VCID-9ff2-43rk-2ydj
29
vulnerability VCID-9w98-nfg2-muh2
30
vulnerability VCID-a3hx-qz7x-7ybk
31
vulnerability VCID-bfnh-7k45-nkg2
32
vulnerability VCID-bhxk-8byp-eyap
33
vulnerability VCID-ca85-vx8c-huht
34
vulnerability VCID-cnb3-dy3a-8bdp
35
vulnerability VCID-cyqa-e362-yyaf
36
vulnerability VCID-dfbz-5n6w-syd9
37
vulnerability VCID-dgtc-a2t2-k7f5
38
vulnerability VCID-dqg6-2gmj-judy
39
vulnerability VCID-ej67-ayfh-sqdt
40
vulnerability VCID-esfk-umc5-ska4
41
vulnerability VCID-f8p4-hpsh-2fcw
42
vulnerability VCID-f9vz-r6zv-t7ev
43
vulnerability VCID-fabc-rma2-myab
44
vulnerability VCID-fnks-p4e9-13es
45
vulnerability VCID-fuyw-1y1c-fkfp
46
vulnerability VCID-j2wu-2rx7-3yf2
47
vulnerability VCID-jgff-4jyp-9fgr
48
vulnerability VCID-kwrj-3fxz-g7c6
49
vulnerability VCID-mde2-1ynu-auh2
50
vulnerability VCID-mz71-vku8-ckbm
51
vulnerability VCID-nj41-1zpw-gkh9
52
vulnerability VCID-nkdd-suwp-4ffr
53
vulnerability VCID-p623-gxyv-g7fs
54
vulnerability VCID-pk7e-t26d-aqdm
55
vulnerability VCID-pv92-6p9x-v7bs
56
vulnerability VCID-qyb6-7ees-ukcm
57
vulnerability VCID-r2cz-9kjz-zbgu
58
vulnerability VCID-rfz7-vha1-e7gy
59
vulnerability VCID-rssq-mfc2-ckaf
60
vulnerability VCID-skzt-r7sx-1ucv
61
vulnerability VCID-sy6p-5km4-1kcy
62
vulnerability VCID-tazb-gd49-73b4
63
vulnerability VCID-u2c7-p86x-5bgf
64
vulnerability VCID-un5y-y9sq-1ufb
65
vulnerability VCID-v165-afmm-w3er
66
vulnerability VCID-v4gv-g9n5-ukgc
67
vulnerability VCID-wrna-cc9g-sqbe
68
vulnerability VCID-xuhv-wrut-wuez
69
vulnerability VCID-xvv1-nxs6-n7ab
70
vulnerability VCID-xyuf-au4f-57fr
71
vulnerability VCID-y6p4-vfkn-q7fc
72
vulnerability VCID-yx79-3g2x-pqex
73
vulnerability VCID-zb4s-9rj3-ebea
74
vulnerability VCID-zkvk-538h-w3b9
75
vulnerability VCID-zuxd-n3wn-s7hg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-5.5@5.5.47-0%252Bdeb6u1
aliases CVE-2015-4913
risk_score 1.6
exploitability 0.5
weighted_severity 3.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-s5bz-57vv-b7bz
85
url VCID-skzt-r7sx-1ucv
vulnerability_id VCID-skzt-r7sx-1ucv
summary
Multiple vulnerabilities have been found in MariaDB and MySQL, the
    worst of which could lead to the remote execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-6662.json
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-6662.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-6662
reference_id
reference_type
scores
0
value 0.89577
scoring_system epss
scoring_elements 0.99554
published_at 2026-04-04T12:55:00Z
1
value 0.89577
scoring_system epss
scoring_elements 0.99553
published_at 2026-04-02T12:55:00Z
2
value 0.89577
scoring_system epss
scoring_elements 0.99555
published_at 2026-04-07T12:55:00Z
3
value 0.89577
scoring_system epss
scoring_elements 0.99556
published_at 2026-04-12T12:55:00Z
4
value 0.89577
scoring_system epss
scoring_elements 0.99557
published_at 2026-04-13T12:55:00Z
5
value 0.89577
scoring_system epss
scoring_elements 0.99559
published_at 2026-04-16T12:55:00Z
6
value 0.89577
scoring_system epss
scoring_elements 0.9956
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-6662
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6662
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6662
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.5
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:S/C:C/I:C/A:C
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1375198
reference_id 1375198
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1375198
5
reference_url http://legalhackers.com/advisories/MySQL-Exploit-Remote-Root-Code-Execution-Privesc-CVE-2016-6662.html
reference_id CVE-2016-6662
reference_type exploit
scores
url http://legalhackers.com/advisories/MySQL-Exploit-Remote-Root-Code-Execution-Privesc-CVE-2016-6662.html
6
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/40360.py
reference_id CVE-2016-6662
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/40360.py
7
reference_url https://security.gentoo.org/glsa/201701-01
reference_id GLSA-201701-01
reference_type
scores
url https://security.gentoo.org/glsa/201701-01
8
reference_url https://access.redhat.com/errata/RHSA-2016:2058
reference_id RHSA-2016:2058
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2058
9
reference_url https://access.redhat.com/errata/RHSA-2016:2059
reference_id RHSA-2016:2059
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2059
10
reference_url https://access.redhat.com/errata/RHSA-2016:2060
reference_id RHSA-2016:2060
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2060
11
reference_url https://access.redhat.com/errata/RHSA-2016:2061
reference_id RHSA-2016:2061
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2061
12
reference_url https://access.redhat.com/errata/RHSA-2016:2062
reference_id RHSA-2016:2062
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2062
13
reference_url https://access.redhat.com/errata/RHSA-2016:2077
reference_id RHSA-2016:2077
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2077
14
reference_url https://access.redhat.com/errata/RHSA-2016:2130
reference_id RHSA-2016:2130
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2130
15
reference_url https://access.redhat.com/errata/RHSA-2016:2131
reference_id RHSA-2016:2131
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2131
16
reference_url https://access.redhat.com/errata/RHSA-2016:2595
reference_id RHSA-2016:2595
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2595
17
reference_url https://access.redhat.com/errata/RHSA-2016:2749
reference_id RHSA-2016:2749
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2749
18
reference_url https://access.redhat.com/errata/RHSA-2016:2927
reference_id RHSA-2016:2927
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2927
19
reference_url https://access.redhat.com/errata/RHSA-2016:2928
reference_id RHSA-2016:2928
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2928
20
reference_url https://access.redhat.com/errata/RHSA-2017:0184
reference_id RHSA-2017:0184
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:0184
21
reference_url https://usn.ubuntu.com/3078-1/
reference_id USN-3078-1
reference_type
scores
url https://usn.ubuntu.com/3078-1/
fixed_packages
0
url pkg:deb/debian/mysql-5.5@5.5.60-0%2Bdeb8u1
purl pkg:deb/debian/mysql-5.5@5.5.60-0%2Bdeb8u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-5.5@5.5.60-0%252Bdeb8u1
aliases CVE-2016-6662
risk_score 10.0
exploitability 2.0
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-skzt-r7sx-1ucv
86
url VCID-sy6p-5km4-1kcy
vulnerability_id VCID-sy6p-5km4-1kcy
summary
Multiple vulnerabilities have been found in MariaDB and MySQL, the
    worst of which could result in privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2771.json
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2771.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-2771
reference_id
reference_type
scores
0
value 0.00151
scoring_system epss
scoring_elements 0.35792
published_at 2026-04-18T12:55:00Z
1
value 0.00151
scoring_system epss
scoring_elements 0.35687
published_at 2026-04-01T12:55:00Z
2
value 0.00151
scoring_system epss
scoring_elements 0.35885
published_at 2026-04-02T12:55:00Z
3
value 0.00151
scoring_system epss
scoring_elements 0.35915
published_at 2026-04-04T12:55:00Z
4
value 0.00151
scoring_system epss
scoring_elements 0.35745
published_at 2026-04-07T12:55:00Z
5
value 0.00151
scoring_system epss
scoring_elements 0.35796
published_at 2026-04-08T12:55:00Z
6
value 0.00151
scoring_system epss
scoring_elements 0.35818
published_at 2026-04-09T12:55:00Z
7
value 0.00151
scoring_system epss
scoring_elements 0.35826
published_at 2026-04-11T12:55:00Z
8
value 0.00151
scoring_system epss
scoring_elements 0.35786
published_at 2026-04-12T12:55:00Z
9
value 0.00151
scoring_system epss
scoring_elements 0.35763
published_at 2026-04-13T12:55:00Z
10
value 0.00151
scoring_system epss
scoring_elements 0.35803
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-2771
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10268
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10268
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10378
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10378
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15365
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15365
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2562
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2562
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2612
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2612
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2622
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2622
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2640
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2640
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2665
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2665
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2668
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2668
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2755
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2755
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2761
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2761
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2766
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2766
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2767
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2767
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2771
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2771
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2773
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2773
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2781
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2781
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2782
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2782
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2784
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2784
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2787
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2787
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2813
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2813
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2817
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2817
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2818
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2818
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2819
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2819
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3058
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3058
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3063
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3063
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3064
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3064
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3066
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3066
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3081
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3081
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3143
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3143
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3156
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3156
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3174
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3174
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3251
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3251
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3282
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3282
35
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2503
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2503
36
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
37
reference_url https://lists.debian.org/debian-lts-announce/2018/04/msg00020.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:13Z/
url https://lists.debian.org/debian-lts-announce/2018/04/msg00020.html
38
reference_url https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:13Z/
url https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html
39
reference_url https://security.netapp.com/advisory/ntap-20180419-0002/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:13Z/
url https://security.netapp.com/advisory/ntap-20180419-0002/
40
reference_url https://www.debian.org/security/2018/dsa-4176
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:13Z/
url https://www.debian.org/security/2018/dsa-4176
41
reference_url https://www.debian.org/security/2018/dsa-4341
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:13Z/
url https://www.debian.org/security/2018/dsa-4341
42
reference_url http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:13Z/
url http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
43
reference_url http://www.securityfocus.com/bid/103828
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:13Z/
url http://www.securityfocus.com/bid/103828
44
reference_url http://www.securitytracker.com/id/1040698
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:13Z/
url http://www.securitytracker.com/id/1040698
45
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1568931
reference_id 1568931
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1568931
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
reference_id cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
reference_id cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openstack:12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:openstack:12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openstack:12:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
71
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
72
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-2771
reference_id CVE-2018-2771
reference_type
scores
0
value 3.5
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:S/C:N/I:N/A:P
1
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2018-2771
73
reference_url https://security.gentoo.org/glsa/201908-24
reference_id GLSA-201908-24
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:13Z/
url https://security.gentoo.org/glsa/201908-24
74
reference_url https://access.redhat.com/errata/RHSA-2018:1254
reference_id RHSA-2018:1254
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:13Z/
url https://access.redhat.com/errata/RHSA-2018:1254
75
reference_url https://access.redhat.com/errata/RHSA-2018:2439
reference_id RHSA-2018:2439
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:13Z/
url https://access.redhat.com/errata/RHSA-2018:2439
76
reference_url https://access.redhat.com/errata/RHSA-2018:2729
reference_id RHSA-2018:2729
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:13Z/
url https://access.redhat.com/errata/RHSA-2018:2729
77
reference_url https://access.redhat.com/errata/RHSA-2018:3655
reference_id RHSA-2018:3655
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:13Z/
url https://access.redhat.com/errata/RHSA-2018:3655
78
reference_url https://access.redhat.com/errata/RHSA-2019:1258
reference_id RHSA-2019:1258
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:13Z/
url https://access.redhat.com/errata/RHSA-2019:1258
79
reference_url https://usn.ubuntu.com/3629-1/
reference_id USN-3629-1
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:13Z/
url https://usn.ubuntu.com/3629-1/
80
reference_url https://usn.ubuntu.com/3629-2/
reference_id USN-3629-2
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:13Z/
url https://usn.ubuntu.com/3629-2/
81
reference_url https://usn.ubuntu.com/3629-3/
reference_id USN-3629-3
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:13Z/
url https://usn.ubuntu.com/3629-3/
fixed_packages
0
url pkg:deb/debian/mysql-5.5@5.5.60-0%2Bdeb8u1
purl pkg:deb/debian/mysql-5.5@5.5.60-0%2Bdeb8u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-5.5@5.5.60-0%252Bdeb8u1
aliases CVE-2018-2771
risk_score 2.0
exploitability 0.5
weighted_severity 4.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-sy6p-5km4-1kcy
87
url VCID-tazb-gd49-73b4
vulnerability_id VCID-tazb-gd49-73b4
summary security update
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:15Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:15Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:15Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:15Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:15Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:15Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html
6
reference_url http://rhn.redhat.com/errata/RHSA-2016-0705.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:15Z/
url http://rhn.redhat.com/errata/RHSA-2016-0705.html
7
reference_url http://rhn.redhat.com/errata/RHSA-2016-1480.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:15Z/
url http://rhn.redhat.com/errata/RHSA-2016-1480.html
8
reference_url http://rhn.redhat.com/errata/RHSA-2016-1481.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:15Z/
url http://rhn.redhat.com/errata/RHSA-2016-1481.html
9
reference_url http://rhn.redhat.com/errata/RHSA-2016-1602.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:15Z/
url http://rhn.redhat.com/errata/RHSA-2016-1602.html
10
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0648.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0648.json
11
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-0648
reference_id
reference_type
scores
0
value 0.00243
scoring_system epss
scoring_elements 0.47464
published_at 2026-04-07T12:55:00Z
1
value 0.00243
scoring_system epss
scoring_elements 0.47494
published_at 2026-04-02T12:55:00Z
2
value 0.00243
scoring_system epss
scoring_elements 0.47515
published_at 2026-04-09T12:55:00Z
3
value 0.00243
scoring_system epss
scoring_elements 0.47518
published_at 2026-04-08T12:55:00Z
4
value 0.00243
scoring_system epss
scoring_elements 0.47537
published_at 2026-04-11T12:55:00Z
5
value 0.00243
scoring_system epss
scoring_elements 0.47513
published_at 2026-04-12T12:55:00Z
6
value 0.00243
scoring_system epss
scoring_elements 0.47521
published_at 2026-04-13T12:55:00Z
7
value 0.00243
scoring_system epss
scoring_elements 0.4758
published_at 2026-04-16T12:55:00Z
8
value 0.00243
scoring_system epss
scoring_elements 0.47573
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-0648
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0640
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0640
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0641
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0641
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0642
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0642
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0643
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0643
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0644
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0644
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0646
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0646
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0647
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0647
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0648
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0648
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0649
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0649
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0650
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0650
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0655
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0655
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0666
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0666
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0668
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0668
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2047
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2047
26
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.6
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:S/C:N/I:N/A:C
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
27
reference_url https://mariadb.com/kb/en/mariadb/mariadb-10025-release-notes/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:15Z/
url https://mariadb.com/kb/en/mariadb/mariadb-10025-release-notes/
28
reference_url https://mariadb.com/kb/en/mariadb/mariadb-10114-release-notes/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:15Z/
url https://mariadb.com/kb/en/mariadb/mariadb-10114-release-notes/
29
reference_url https://mariadb.com/kb/en/mariadb/mariadb-5549-release-notes/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:15Z/
url https://mariadb.com/kb/en/mariadb/mariadb-5549-release-notes/
30
reference_url http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:15Z/
url http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168
31
reference_url http://www.debian.org/security/2016/dsa-3557
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:15Z/
url http://www.debian.org/security/2016/dsa-3557
32
reference_url http://www.debian.org/security/2016/dsa-3595
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:15Z/
url http://www.debian.org/security/2016/dsa-3595
33
reference_url http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:15Z/
url http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
34
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:15Z/
url http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
35
reference_url http://www.securityfocus.com/bid/86457
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:15Z/
url http://www.securityfocus.com/bid/86457
36
reference_url http://www.securitytracker.com/id/1035606
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:15Z/
url http://www.securitytracker.com/id/1035606
37
reference_url http://www.ubuntu.com/usn/USN-2953-1
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:15Z/
url http://www.ubuntu.com/usn/USN-2953-1
38
reference_url http://www.ubuntu.com/usn/USN-2954-1
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:15Z/
url http://www.ubuntu.com/usn/USN-2954-1
39
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1329251
reference_id 1329251
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1329251
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:powerkvm:2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ibm:powerkvm:2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:powerkvm:2.1:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:powerkvm:3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ibm:powerkvm:3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:powerkvm:3.1:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-0648
reference_id CVE-2016-0648
reference_type
scores
0
value 4.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:P
1
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2016-0648
50
reference_url https://access.redhat.com/errata/RHSA-2016:0705
reference_id RHSA-2016:0705
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0705
51
reference_url https://access.redhat.com/errata/RHSA-2016:1132
reference_id RHSA-2016:1132
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:15Z/
url https://access.redhat.com/errata/RHSA-2016:1132
52
reference_url https://access.redhat.com/errata/RHSA-2016:1480
reference_id RHSA-2016:1480
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1480
53
reference_url https://access.redhat.com/errata/RHSA-2016:1481
reference_id RHSA-2016:1481
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1481
54
reference_url https://access.redhat.com/errata/RHSA-2016:1602
reference_id RHSA-2016:1602
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1602
55
reference_url https://usn.ubuntu.com/2953-1/
reference_id USN-2953-1
reference_type
scores
url https://usn.ubuntu.com/2953-1/
56
reference_url https://usn.ubuntu.com/2954-1/
reference_id USN-2954-1
reference_type
scores
url https://usn.ubuntu.com/2954-1/
fixed_packages
0
url pkg:deb/debian/mysql-5.5@5.5.60-0%2Bdeb8u1
purl pkg:deb/debian/mysql-5.5@5.5.60-0%2Bdeb8u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-5.5@5.5.60-0%252Bdeb8u1
aliases CVE-2016-0648
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tazb-gd49-73b4
88
url VCID-u2c7-p86x-5bgf
vulnerability_id VCID-u2c7-p86x-5bgf
summary
Multiple vulnerabilities were found in MySQL, the worst of which
    may allow remote execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3652.json
reference_id
reference_type
scores
0
value 4.2
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3652.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-3652
reference_id
reference_type
scores
0
value 0.00426
scoring_system epss
scoring_elements 0.62335
published_at 2026-04-18T12:55:00Z
1
value 0.00426
scoring_system epss
scoring_elements 0.62173
published_at 2026-04-01T12:55:00Z
2
value 0.00426
scoring_system epss
scoring_elements 0.6223
published_at 2026-04-02T12:55:00Z
3
value 0.00426
scoring_system epss
scoring_elements 0.62278
published_at 2026-04-08T12:55:00Z
4
value 0.00426
scoring_system epss
scoring_elements 0.62295
published_at 2026-04-09T12:55:00Z
5
value 0.00426
scoring_system epss
scoring_elements 0.62314
published_at 2026-04-11T12:55:00Z
6
value 0.00426
scoring_system epss
scoring_elements 0.62304
published_at 2026-04-12T12:55:00Z
7
value 0.00426
scoring_system epss
scoring_elements 0.62282
published_at 2026-04-13T12:55:00Z
8
value 0.00426
scoring_system epss
scoring_elements 0.62328
published_at 2026-04-16T12:55:00Z
9
value 0.00426
scoring_system epss
scoring_elements 0.6226
published_at 2026-04-04T12:55:00Z
10
value 0.00426
scoring_system epss
scoring_elements 0.62227
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-3652
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3635
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3635
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3636
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3636
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3641
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3641
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3648
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3648
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3651
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3651
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3652
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3652
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3653
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3653
9
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.6
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:S/C:P/I:P/A:N
1
value 4.2
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
10
reference_url http://www.securitytracker.com/id/1038928
reference_id 1038928
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:47:43Z/
url http://www.securitytracker.com/id/1038928
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1472710
reference_id 1472710
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1472710
12
reference_url http://www.securityfocus.com/bid/99805
reference_id 99805
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:47:43Z/
url http://www.securityfocus.com/bid/99805
13
reference_url http://www.debian.org/security/2017/dsa-3922
reference_id dsa-3922
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:47:43Z/
url http://www.debian.org/security/2017/dsa-3922
14
reference_url https://security.gentoo.org/glsa/201802-04
reference_id GLSA-201802-04
reference_type
scores
url https://security.gentoo.org/glsa/201802-04
15
reference_url https://access.redhat.com/errata/RHSA-2017:2787
reference_id RHSA-2017:2787
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:47:43Z/
url https://access.redhat.com/errata/RHSA-2017:2787
16
reference_url https://access.redhat.com/errata/RHSA-2017:2886
reference_id RHSA-2017:2886
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:47:43Z/
url https://access.redhat.com/errata/RHSA-2017:2886
17
reference_url https://usn.ubuntu.com/3357-1/
reference_id USN-3357-1
reference_type
scores
url https://usn.ubuntu.com/3357-1/
18
reference_url https://usn.ubuntu.com/3357-2/
reference_id USN-3357-2
reference_type
scores
url https://usn.ubuntu.com/3357-2/
fixed_packages
0
url pkg:deb/debian/mysql-5.5@5.5.60-0%2Bdeb8u1
purl pkg:deb/debian/mysql-5.5@5.5.60-0%2Bdeb8u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-5.5@5.5.60-0%252Bdeb8u1
aliases CVE-2017-3652
risk_score 1.9
exploitability 0.5
weighted_severity 3.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-u2c7-p86x-5bgf
89
url VCID-un5y-y9sq-1ufb
vulnerability_id VCID-un5y-y9sq-1ufb
summary
Multiple vulnerabilities have been found in MariaDB, the worst of
    which could lead to privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3244.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3244.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-3244
reference_id
reference_type
scores
0
value 0.00314
scoring_system epss
scoring_elements 0.54598
published_at 2026-04-18T12:55:00Z
1
value 0.00314
scoring_system epss
scoring_elements 0.54572
published_at 2026-04-04T12:55:00Z
2
value 0.00314
scoring_system epss
scoring_elements 0.54541
published_at 2026-04-07T12:55:00Z
3
value 0.00314
scoring_system epss
scoring_elements 0.54592
published_at 2026-04-08T12:55:00Z
4
value 0.00314
scoring_system epss
scoring_elements 0.54587
published_at 2026-04-09T12:55:00Z
5
value 0.00314
scoring_system epss
scoring_elements 0.54599
published_at 2026-04-11T12:55:00Z
6
value 0.00314
scoring_system epss
scoring_elements 0.54581
published_at 2026-04-12T12:55:00Z
7
value 0.00314
scoring_system epss
scoring_elements 0.54559
published_at 2026-04-13T12:55:00Z
8
value 0.00314
scoring_system epss
scoring_elements 0.54596
published_at 2026-04-16T12:55:00Z
9
value 0.00314
scoring_system epss
scoring_elements 0.54548
published_at 2026-04-02T12:55:00Z
10
value 0.00314
scoring_system epss
scoring_elements 0.54473
published_at 2026-04-01T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-3244
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6664
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6664
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3238
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3238
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3243
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3243
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3244
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3244
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3257
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3257
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3258
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3258
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3265
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3265
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3291
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3291
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3312
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3312
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3313
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3313
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3317
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3317
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3318
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3318
14
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:C
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1414342
reference_id 1414342
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1414342
16
reference_url http://www.securityfocus.com/bid/95565
reference_id 95565
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:25Z/
url http://www.securityfocus.com/bid/95565
17
reference_url http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
reference_id cpujan2017-2881727.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:25Z/
url http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
18
reference_url http://www.debian.org/security/2017/dsa-3767
reference_id dsa-3767
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:25Z/
url http://www.debian.org/security/2017/dsa-3767
19
reference_url http://www.debian.org/security/2017/dsa-3770
reference_id dsa-3770
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:25Z/
url http://www.debian.org/security/2017/dsa-3770
20
reference_url https://security.gentoo.org/glsa/201702-17
reference_id GLSA-201702-17
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:25Z/
url https://security.gentoo.org/glsa/201702-17
21
reference_url https://security.gentoo.org/glsa/201702-18
reference_id GLSA-201702-18
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:25Z/
url https://security.gentoo.org/glsa/201702-18
22
reference_url https://access.redhat.com/errata/RHSA-2017:2192
reference_id RHSA-2017:2192
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:25Z/
url https://access.redhat.com/errata/RHSA-2017:2192
23
reference_url https://access.redhat.com/errata/RHSA-2017:2787
reference_id RHSA-2017:2787
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:25Z/
url https://access.redhat.com/errata/RHSA-2017:2787
24
reference_url https://access.redhat.com/errata/RHSA-2017:2886
reference_id RHSA-2017:2886
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:25Z/
url https://access.redhat.com/errata/RHSA-2017:2886
25
reference_url https://access.redhat.com/errata/RHSA-2018:0279
reference_id RHSA-2018:0279
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:25Z/
url https://access.redhat.com/errata/RHSA-2018:0279
26
reference_url https://access.redhat.com/errata/RHSA-2018:0574
reference_id RHSA-2018:0574
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:25Z/
url https://access.redhat.com/errata/RHSA-2018:0574
27
reference_url https://usn.ubuntu.com/3174-1/
reference_id USN-3174-1
reference_type
scores
url https://usn.ubuntu.com/3174-1/
fixed_packages
0
url pkg:deb/debian/mysql-5.5@5.5.60-0%2Bdeb8u1
purl pkg:deb/debian/mysql-5.5@5.5.60-0%2Bdeb8u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-5.5@5.5.60-0%252Bdeb8u1
aliases CVE-2017-3244
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-un5y-y9sq-1ufb
90
url VCID-v165-afmm-w3er
vulnerability_id VCID-v165-afmm-w3er
summary
Multiple vulnerabilities were found in MySQL, the worst of which
    may allow remote execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3651.json
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3651.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-3651
reference_id
reference_type
scores
0
value 0.00414
scoring_system epss
scoring_elements 0.61582
published_at 2026-04-18T12:55:00Z
1
value 0.00414
scoring_system epss
scoring_elements 0.61534
published_at 2026-04-08T12:55:00Z
2
value 0.00414
scoring_system epss
scoring_elements 0.61548
published_at 2026-04-09T12:55:00Z
3
value 0.00414
scoring_system epss
scoring_elements 0.61569
published_at 2026-04-11T12:55:00Z
4
value 0.00414
scoring_system epss
scoring_elements 0.61556
published_at 2026-04-12T12:55:00Z
5
value 0.00414
scoring_system epss
scoring_elements 0.61536
published_at 2026-04-13T12:55:00Z
6
value 0.00414
scoring_system epss
scoring_elements 0.61578
published_at 2026-04-16T12:55:00Z
7
value 0.00414
scoring_system epss
scoring_elements 0.61487
published_at 2026-04-02T12:55:00Z
8
value 0.00414
scoring_system epss
scoring_elements 0.6141
published_at 2026-04-01T12:55:00Z
9
value 0.00414
scoring_system epss
scoring_elements 0.61515
published_at 2026-04-04T12:55:00Z
10
value 0.00414
scoring_system epss
scoring_elements 0.61486
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-3651
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3635
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3635
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3636
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3636
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3641
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3641
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3648
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3648
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3651
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3651
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3652
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3652
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3653
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3653
9
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:P/A:N
1
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
10
reference_url http://www.securitytracker.com/id/1038928
reference_id 1038928
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:47:44Z/
url http://www.securitytracker.com/id/1038928
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1472708
reference_id 1472708
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1472708
12
reference_url http://www.securityfocus.com/bid/99802
reference_id 99802
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:47:44Z/
url http://www.securityfocus.com/bid/99802
13
reference_url http://www.debian.org/security/2017/dsa-3922
reference_id dsa-3922
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:47:44Z/
url http://www.debian.org/security/2017/dsa-3922
14
reference_url https://security.gentoo.org/glsa/201802-04
reference_id GLSA-201802-04
reference_type
scores
url https://security.gentoo.org/glsa/201802-04
15
reference_url https://access.redhat.com/errata/RHSA-2016:2927
reference_id RHSA-2016:2927
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2927
16
reference_url https://access.redhat.com/errata/RHSA-2016:2928
reference_id RHSA-2016:2928
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2928
17
reference_url https://access.redhat.com/errata/RHSA-2017:2192
reference_id RHSA-2017:2192
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:47:44Z/
url https://access.redhat.com/errata/RHSA-2017:2192
18
reference_url https://access.redhat.com/errata/RHSA-2017:2787
reference_id RHSA-2017:2787
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:47:44Z/
url https://access.redhat.com/errata/RHSA-2017:2787
19
reference_url https://access.redhat.com/errata/RHSA-2017:2886
reference_id RHSA-2017:2886
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:47:44Z/
url https://access.redhat.com/errata/RHSA-2017:2886
20
reference_url https://access.redhat.com/errata/RHSA-2018:2439
reference_id RHSA-2018:2439
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:47:44Z/
url https://access.redhat.com/errata/RHSA-2018:2439
21
reference_url https://access.redhat.com/errata/RHSA-2018:2729
reference_id RHSA-2018:2729
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:47:44Z/
url https://access.redhat.com/errata/RHSA-2018:2729
22
reference_url https://usn.ubuntu.com/3357-1/
reference_id USN-3357-1
reference_type
scores
url https://usn.ubuntu.com/3357-1/
23
reference_url https://usn.ubuntu.com/3357-2/
reference_id USN-3357-2
reference_type
scores
url https://usn.ubuntu.com/3357-2/
fixed_packages
0
url pkg:deb/debian/mysql-5.5@5.5.60-0%2Bdeb8u1
purl pkg:deb/debian/mysql-5.5@5.5.60-0%2Bdeb8u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-5.5@5.5.60-0%252Bdeb8u1
aliases CVE-2017-3651
risk_score 1.9
exploitability 0.5
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-v165-afmm-w3er
91
url VCID-v4gv-g9n5-ukgc
vulnerability_id VCID-v4gv-g9n5-ukgc
summary
Multiple vulnerabilities were found in MySQL, the worst of which
    may allow remote execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3453.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3453.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-3453
reference_id
reference_type
scores
0
value 0.00419
scoring_system epss
scoring_elements 0.61928
published_at 2026-04-18T12:55:00Z
1
value 0.00419
scoring_system epss
scoring_elements 0.61855
published_at 2026-04-04T12:55:00Z
2
value 0.00419
scoring_system epss
scoring_elements 0.61875
published_at 2026-04-08T12:55:00Z
3
value 0.00419
scoring_system epss
scoring_elements 0.6189
published_at 2026-04-09T12:55:00Z
4
value 0.00419
scoring_system epss
scoring_elements 0.61912
published_at 2026-04-11T12:55:00Z
5
value 0.00419
scoring_system epss
scoring_elements 0.619
published_at 2026-04-12T12:55:00Z
6
value 0.00419
scoring_system epss
scoring_elements 0.6188
published_at 2026-04-13T12:55:00Z
7
value 0.00419
scoring_system epss
scoring_elements 0.61923
published_at 2026-04-16T12:55:00Z
8
value 0.00419
scoring_system epss
scoring_elements 0.61825
published_at 2026-04-07T12:55:00Z
9
value 0.00419
scoring_system epss
scoring_elements 0.61751
published_at 2026-04-01T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-3453
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10286
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10286
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10379
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10379
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10384
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10384
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3302
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3302
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3305
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3305
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3308
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3308
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3309
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3309
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3329
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3329
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3453
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3453
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3456
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3456
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3461
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3461
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3462
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3462
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3463
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3463
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3464
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3464
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3600
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3600
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3636
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3636
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3641
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3641
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3653
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3653
20
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 2.1
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:S/C:N/I:N/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
21
reference_url http://www.debian.org/security/2017/dsa-3834
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:46:07Z/
url http://www.debian.org/security/2017/dsa-3834
22
reference_url http://www.debian.org/security/2017/dsa-3944
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:46:07Z/
url http://www.debian.org/security/2017/dsa-3944
23
reference_url http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:46:07Z/
url http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
24
reference_url http://www.securityfocus.com/bid/97776
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:46:07Z/
url http://www.securityfocus.com/bid/97776
25
reference_url http://www.securitytracker.com/id/1038287
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:46:07Z/
url http://www.securitytracker.com/id/1038287
26
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1443365
reference_id 1443365
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1443365
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-3453
reference_id CVE-2017-3453
reference_type
scores
0
value 4.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:P
1
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-3453
42
reference_url https://security.gentoo.org/glsa/201802-04
reference_id GLSA-201802-04
reference_type
scores
url https://security.gentoo.org/glsa/201802-04
43
reference_url https://access.redhat.com/errata/RHSA-2017:2192
reference_id RHSA-2017:2192
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:46:07Z/
url https://access.redhat.com/errata/RHSA-2017:2192
44
reference_url https://access.redhat.com/errata/RHSA-2017:2787
reference_id RHSA-2017:2787
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:46:07Z/
url https://access.redhat.com/errata/RHSA-2017:2787
45
reference_url https://access.redhat.com/errata/RHSA-2017:2886
reference_id RHSA-2017:2886
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:46:07Z/
url https://access.redhat.com/errata/RHSA-2017:2886
46
reference_url https://access.redhat.com/errata/RHSA-2018:0279
reference_id RHSA-2018:0279
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:46:07Z/
url https://access.redhat.com/errata/RHSA-2018:0279
47
reference_url https://access.redhat.com/errata/RHSA-2018:0574
reference_id RHSA-2018:0574
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:46:07Z/
url https://access.redhat.com/errata/RHSA-2018:0574
48
reference_url https://usn.ubuntu.com/3269-1/
reference_id USN-3269-1
reference_type
scores
url https://usn.ubuntu.com/3269-1/
49
reference_url https://usn.ubuntu.com/3357-2/
reference_id USN-3357-2
reference_type
scores
url https://usn.ubuntu.com/3357-2/
fixed_packages
0
url pkg:deb/debian/mysql-5.5@5.5.60-0%2Bdeb8u1
purl pkg:deb/debian/mysql-5.5@5.5.60-0%2Bdeb8u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-5.5@5.5.60-0%252Bdeb8u1
aliases CVE-2017-3453
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-v4gv-g9n5-ukgc
92
url VCID-wrna-cc9g-sqbe
vulnerability_id VCID-wrna-cc9g-sqbe
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could lead to privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3313.json
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3313.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-3313
reference_id
reference_type
scores
0
value 0.00053
scoring_system epss
scoring_elements 0.16564
published_at 2026-04-18T12:55:00Z
1
value 0.00053
scoring_system epss
scoring_elements 0.16579
published_at 2026-04-01T12:55:00Z
2
value 0.00053
scoring_system epss
scoring_elements 0.16758
published_at 2026-04-02T12:55:00Z
3
value 0.00053
scoring_system epss
scoring_elements 0.16603
published_at 2026-04-07T12:55:00Z
4
value 0.00053
scoring_system epss
scoring_elements 0.16688
published_at 2026-04-08T12:55:00Z
5
value 0.00053
scoring_system epss
scoring_elements 0.16742
published_at 2026-04-09T12:55:00Z
6
value 0.00053
scoring_system epss
scoring_elements 0.16722
published_at 2026-04-11T12:55:00Z
7
value 0.00053
scoring_system epss
scoring_elements 0.16679
published_at 2026-04-12T12:55:00Z
8
value 0.00053
scoring_system epss
scoring_elements 0.1662
published_at 2026-04-13T12:55:00Z
9
value 0.00053
scoring_system epss
scoring_elements 0.16556
published_at 2026-04-16T12:55:00Z
10
value 0.00053
scoring_system epss
scoring_elements 0.16818
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-3313
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3238
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3238
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3243
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3243
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3244
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3244
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3258
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3258
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3265
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3265
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3291
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3291
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3302
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3302
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3312
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3312
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3313
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3313
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3317
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3317
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3318
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3318
13
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.8
scoring_system cvssv2
scoring_elements AV:L/AC:H/Au:S/C:C/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
14
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1414353
reference_id 1414353
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1414353
15
reference_url http://www.securityfocus.com/bid/95527
reference_id 95527
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-08T20:09:35Z/
url http://www.securityfocus.com/bid/95527
16
reference_url http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
reference_id cpujan2017-2881727.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-08T20:09:35Z/
url http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
17
reference_url http://www.debian.org/security/2017/dsa-3767
reference_id dsa-3767
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-08T20:09:35Z/
url http://www.debian.org/security/2017/dsa-3767
18
reference_url http://www.debian.org/security/2017/dsa-3809
reference_id dsa-3809
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-08T20:09:35Z/
url http://www.debian.org/security/2017/dsa-3809
19
reference_url https://security.gentoo.org/glsa/201702-17
reference_id GLSA-201702-17
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-08T20:09:35Z/
url https://security.gentoo.org/glsa/201702-17
20
reference_url https://access.redhat.com/errata/RHSA-2017:2192
reference_id RHSA-2017:2192
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-08T20:09:35Z/
url https://access.redhat.com/errata/RHSA-2017:2192
21
reference_url https://access.redhat.com/errata/RHSA-2017:2787
reference_id RHSA-2017:2787
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-08T20:09:35Z/
url https://access.redhat.com/errata/RHSA-2017:2787
22
reference_url https://access.redhat.com/errata/RHSA-2017:2886
reference_id RHSA-2017:2886
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-08T20:09:35Z/
url https://access.redhat.com/errata/RHSA-2017:2886
23
reference_url https://access.redhat.com/errata/RHSA-2018:0279
reference_id RHSA-2018:0279
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-08T20:09:35Z/
url https://access.redhat.com/errata/RHSA-2018:0279
24
reference_url https://access.redhat.com/errata/RHSA-2018:0574
reference_id RHSA-2018:0574
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-08T20:09:35Z/
url https://access.redhat.com/errata/RHSA-2018:0574
25
reference_url https://usn.ubuntu.com/3174-1/
reference_id USN-3174-1
reference_type
scores
url https://usn.ubuntu.com/3174-1/
fixed_packages
0
url pkg:deb/debian/mysql-5.5@5.5.60-0%2Bdeb8u1
purl pkg:deb/debian/mysql-5.5@5.5.60-0%2Bdeb8u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-5.5@5.5.60-0%252Bdeb8u1
aliases CVE-2017-3313
risk_score 2.1
exploitability 0.5
weighted_severity 4.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wrna-cc9g-sqbe
93
url VCID-xegm-n9yj-ckhs
vulnerability_id VCID-xegm-n9yj-ckhs
summary security update
references
0
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177539.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177539.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00010.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00010.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00011.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00011.html
3
reference_url http://lists.opensuse.org/opensuse-updates/2016-02/msg00039.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2016-02/msg00039.html
4
reference_url http://packetstormsecurity.com/files/137232/MySQL-Procedure-Analyse-Denial-Of-Service.html
reference_id
reference_type
scores
url http://packetstormsecurity.com/files/137232/MySQL-Procedure-Analyse-Denial-Of-Service.html
5
reference_url http://rhn.redhat.com/errata/RHSA-2016-0534.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0534.html
6
reference_url http://rhn.redhat.com/errata/RHSA-2016-0705.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0705.html
7
reference_url http://rhn.redhat.com/errata/RHSA-2016-1480.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-1480.html
8
reference_url http://rhn.redhat.com/errata/RHSA-2016-1481.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-1481.html
9
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4870.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4870.json
10
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-4870
reference_id
reference_type
scores
0
value 0.2214
scoring_system epss
scoring_elements 0.9581
published_at 2026-04-18T12:55:00Z
1
value 0.2214
scoring_system epss
scoring_elements 0.95759
published_at 2026-04-01T12:55:00Z
2
value 0.2214
scoring_system epss
scoring_elements 0.95768
published_at 2026-04-02T12:55:00Z
3
value 0.2214
scoring_system epss
scoring_elements 0.95775
published_at 2026-04-04T12:55:00Z
4
value 0.2214
scoring_system epss
scoring_elements 0.95778
published_at 2026-04-07T12:55:00Z
5
value 0.2214
scoring_system epss
scoring_elements 0.95786
published_at 2026-04-08T12:55:00Z
6
value 0.2214
scoring_system epss
scoring_elements 0.9579
published_at 2026-04-09T12:55:00Z
7
value 0.2214
scoring_system epss
scoring_elements 0.95793
published_at 2026-04-12T12:55:00Z
8
value 0.2214
scoring_system epss
scoring_elements 0.95795
published_at 2026-04-13T12:55:00Z
9
value 0.2214
scoring_system epss
scoring_elements 0.95805
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-4870
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4792
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4792
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4802
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4802
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4815
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4815
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4816
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4816
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4819
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4819
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4826
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4826
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4830
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4830
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4836
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4836
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4858
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4858
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4861
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4861
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4870
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4870
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4879
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4879
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4895
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4895
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4913
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4913
25
reference_url https://www.exploit-db.com/exploits/39867/
reference_id
reference_type
scores
url https://www.exploit-db.com/exploits/39867/
26
reference_url https://www.suse.com/support/update/announcement/2016/suse-su-20160296-1.html
reference_id
reference_type
scores
url https://www.suse.com/support/update/announcement/2016/suse-su-20160296-1.html
27
reference_url http://www.debian.org/security/2015/dsa-3377
reference_id
reference_type
scores
url http://www.debian.org/security/2015/dsa-3377
28
reference_url http://www.debian.org/security/2015/dsa-3385
reference_id
reference_type
scores
url http://www.debian.org/security/2015/dsa-3385
29
reference_url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
30
reference_url http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
31
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
32
reference_url http://www.securityfocus.com/bid/77208
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/77208
33
reference_url http://www.securitytracker.com/id/1033894
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1033894
34
reference_url http://www.ubuntu.com/usn/USN-2781-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2781-1
35
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1274781
reference_id 1274781
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1274781
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:-:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:linux:7:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:-:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.1:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
67
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/39867.py
reference_id CVE-2015-4870
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/39867.py
68
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-4870
reference_id CVE-2015-4870
reference_type
scores
0
value 4.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2015-4870
69
reference_url https://access.redhat.com/errata/RHSA-2016:0534
reference_id RHSA-2016:0534
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0534
70
reference_url https://access.redhat.com/errata/RHSA-2016:0705
reference_id RHSA-2016:0705
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0705
71
reference_url https://access.redhat.com/errata/RHSA-2016:1132
reference_id RHSA-2016:1132
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1132
72
reference_url https://access.redhat.com/errata/RHSA-2016:1480
reference_id RHSA-2016:1480
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1480
73
reference_url https://access.redhat.com/errata/RHSA-2016:1481
reference_id RHSA-2016:1481
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1481
74
reference_url https://usn.ubuntu.com/2781-1/
reference_id USN-2781-1
reference_type
scores
url https://usn.ubuntu.com/2781-1/
fixed_packages
0
url pkg:deb/debian/mysql-5.5@5.5.47-0%2Bdeb6u1
purl pkg:deb/debian/mysql-5.5@5.5.47-0%2Bdeb6u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1gmc-pj6y-rkfx
1
vulnerability VCID-1nvb-xd5n-gkh8
2
vulnerability VCID-2gyq-q761-h3br
3
vulnerability VCID-2jer-ss8p-7kbg
4
vulnerability VCID-2uxe-ep8b-y7b9
5
vulnerability VCID-2vp1-j324-dkat
6
vulnerability VCID-2yqz-qtv5-47hh
7
vulnerability VCID-2za2-cnwx-hbbw
8
vulnerability VCID-39gt-6dgh-wyar
9
vulnerability VCID-3qjy-4cen-7qev
10
vulnerability VCID-45hn-ezks-j7br
11
vulnerability VCID-4cnj-7fur-3qe3
12
vulnerability VCID-4yz4-vxnh-b3dp
13
vulnerability VCID-52w9-bgxr-nkba
14
vulnerability VCID-55fg-6c2c-6bg8
15
vulnerability VCID-5p65-gfsg-1ugq
16
vulnerability VCID-5q89-vg9j-k3as
17
vulnerability VCID-5sjj-599v-vybg
18
vulnerability VCID-64st-u4xn-z7g3
19
vulnerability VCID-6g4n-3xfu-hfee
20
vulnerability VCID-6gvj-hy6a-3qdx
21
vulnerability VCID-7tj3-dfxj-bke7
22
vulnerability VCID-7w3v-5s98-a7ec
23
vulnerability VCID-7yc3-7bkr-jfc9
24
vulnerability VCID-8krv-jqjg-uqc8
25
vulnerability VCID-8kvb-5u8c-zbc4
26
vulnerability VCID-8sya-wktg-dqa5
27
vulnerability VCID-9f48-53dz-13an
28
vulnerability VCID-9ff2-43rk-2ydj
29
vulnerability VCID-9w98-nfg2-muh2
30
vulnerability VCID-a3hx-qz7x-7ybk
31
vulnerability VCID-bfnh-7k45-nkg2
32
vulnerability VCID-bhxk-8byp-eyap
33
vulnerability VCID-ca85-vx8c-huht
34
vulnerability VCID-cnb3-dy3a-8bdp
35
vulnerability VCID-cyqa-e362-yyaf
36
vulnerability VCID-dfbz-5n6w-syd9
37
vulnerability VCID-dgtc-a2t2-k7f5
38
vulnerability VCID-dqg6-2gmj-judy
39
vulnerability VCID-ej67-ayfh-sqdt
40
vulnerability VCID-esfk-umc5-ska4
41
vulnerability VCID-f8p4-hpsh-2fcw
42
vulnerability VCID-f9vz-r6zv-t7ev
43
vulnerability VCID-fabc-rma2-myab
44
vulnerability VCID-fnks-p4e9-13es
45
vulnerability VCID-fuyw-1y1c-fkfp
46
vulnerability VCID-j2wu-2rx7-3yf2
47
vulnerability VCID-jgff-4jyp-9fgr
48
vulnerability VCID-kwrj-3fxz-g7c6
49
vulnerability VCID-mde2-1ynu-auh2
50
vulnerability VCID-mz71-vku8-ckbm
51
vulnerability VCID-nj41-1zpw-gkh9
52
vulnerability VCID-nkdd-suwp-4ffr
53
vulnerability VCID-p623-gxyv-g7fs
54
vulnerability VCID-pk7e-t26d-aqdm
55
vulnerability VCID-pv92-6p9x-v7bs
56
vulnerability VCID-qyb6-7ees-ukcm
57
vulnerability VCID-r2cz-9kjz-zbgu
58
vulnerability VCID-rfz7-vha1-e7gy
59
vulnerability VCID-rssq-mfc2-ckaf
60
vulnerability VCID-skzt-r7sx-1ucv
61
vulnerability VCID-sy6p-5km4-1kcy
62
vulnerability VCID-tazb-gd49-73b4
63
vulnerability VCID-u2c7-p86x-5bgf
64
vulnerability VCID-un5y-y9sq-1ufb
65
vulnerability VCID-v165-afmm-w3er
66
vulnerability VCID-v4gv-g9n5-ukgc
67
vulnerability VCID-wrna-cc9g-sqbe
68
vulnerability VCID-xuhv-wrut-wuez
69
vulnerability VCID-xvv1-nxs6-n7ab
70
vulnerability VCID-xyuf-au4f-57fr
71
vulnerability VCID-y6p4-vfkn-q7fc
72
vulnerability VCID-yx79-3g2x-pqex
73
vulnerability VCID-zb4s-9rj3-ebea
74
vulnerability VCID-zkvk-538h-w3b9
75
vulnerability VCID-zuxd-n3wn-s7hg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-5.5@5.5.47-0%252Bdeb6u1
aliases CVE-2015-4870
risk_score 7.2
exploitability 2.0
weighted_severity 3.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xegm-n9yj-ckhs
94
url VCID-xuhv-wrut-wuez
vulnerability_id VCID-xuhv-wrut-wuez
summary
Multiple vulnerabilities have been found in MariaDB and MySQL, the
    worst of which could result in privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2819.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2819.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-2819
reference_id
reference_type
scores
0
value 0.00265
scoring_system epss
scoring_elements 0.4998
published_at 2026-04-18T12:55:00Z
1
value 0.00265
scoring_system epss
scoring_elements 0.49883
published_at 2026-04-01T12:55:00Z
2
value 0.00265
scoring_system epss
scoring_elements 0.49921
published_at 2026-04-02T12:55:00Z
3
value 0.00265
scoring_system epss
scoring_elements 0.49949
published_at 2026-04-04T12:55:00Z
4
value 0.00265
scoring_system epss
scoring_elements 0.49899
published_at 2026-04-07T12:55:00Z
5
value 0.00265
scoring_system epss
scoring_elements 0.49953
published_at 2026-04-08T12:55:00Z
6
value 0.00265
scoring_system epss
scoring_elements 0.49946
published_at 2026-04-09T12:55:00Z
7
value 0.00265
scoring_system epss
scoring_elements 0.49965
published_at 2026-04-11T12:55:00Z
8
value 0.00265
scoring_system epss
scoring_elements 0.49936
published_at 2026-04-12T12:55:00Z
9
value 0.00265
scoring_system epss
scoring_elements 0.49934
published_at 2026-04-13T12:55:00Z
10
value 0.00265
scoring_system epss
scoring_elements 0.49979
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-2819
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10268
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10268
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10378
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10378
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15365
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15365
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2562
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2562
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2612
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2612
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2622
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2622
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2640
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2640
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2665
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2665
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2668
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2668
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2755
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2755
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2761
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2761
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2766
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2766
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2767
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2767
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2771
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2771
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2773
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2773
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2781
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2781
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2782
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2782
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2784
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2784
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2787
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2787
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2813
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2813
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2817
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2817
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2818
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2818
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2819
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2819
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3058
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3058
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3063
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3063
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3064
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3064
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3066
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3066
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3081
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3081
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3143
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3143
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3156
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3156
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3174
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3174
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3251
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3251
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3282
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3282
35
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2503
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2503
36
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
37
reference_url https://lists.debian.org/debian-lts-announce/2018/04/msg00020.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:26:03Z/
url https://lists.debian.org/debian-lts-announce/2018/04/msg00020.html
38
reference_url https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:26:03Z/
url https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html
39
reference_url https://security.netapp.com/advisory/ntap-20180419-0002/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:26:03Z/
url https://security.netapp.com/advisory/ntap-20180419-0002/
40
reference_url https://www.debian.org/security/2018/dsa-4176
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:26:03Z/
url https://www.debian.org/security/2018/dsa-4176
41
reference_url https://www.debian.org/security/2018/dsa-4341
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:26:03Z/
url https://www.debian.org/security/2018/dsa-4341
42
reference_url http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:26:03Z/
url http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
43
reference_url http://www.securityfocus.com/bid/103814
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:26:03Z/
url http://www.securityfocus.com/bid/103814
44
reference_url http://www.securitytracker.com/id/1040698
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:26:03Z/
url http://www.securitytracker.com/id/1040698
45
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1568956
reference_id 1568956
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1568956
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
reference_id cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
reference_id cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openstack:12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:openstack:12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openstack:12:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
71
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
72
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-2819
reference_id CVE-2018-2819
reference_type
scores
0
value 4.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:P
1
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2018-2819
73
reference_url https://security.gentoo.org/glsa/201908-24
reference_id GLSA-201908-24
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:26:03Z/
url https://security.gentoo.org/glsa/201908-24
74
reference_url https://access.redhat.com/errata/RHSA-2018:1254
reference_id RHSA-2018:1254
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:26:03Z/
url https://access.redhat.com/errata/RHSA-2018:1254
75
reference_url https://access.redhat.com/errata/RHSA-2018:2439
reference_id RHSA-2018:2439
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:26:03Z/
url https://access.redhat.com/errata/RHSA-2018:2439
76
reference_url https://access.redhat.com/errata/RHSA-2018:2729
reference_id RHSA-2018:2729
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:26:03Z/
url https://access.redhat.com/errata/RHSA-2018:2729
77
reference_url https://access.redhat.com/errata/RHSA-2018:3655
reference_id RHSA-2018:3655
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:26:03Z/
url https://access.redhat.com/errata/RHSA-2018:3655
78
reference_url https://access.redhat.com/errata/RHSA-2019:1258
reference_id RHSA-2019:1258
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:26:03Z/
url https://access.redhat.com/errata/RHSA-2019:1258
79
reference_url https://usn.ubuntu.com/3629-1/
reference_id USN-3629-1
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:26:03Z/
url https://usn.ubuntu.com/3629-1/
80
reference_url https://usn.ubuntu.com/3629-2/
reference_id USN-3629-2
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:26:03Z/
url https://usn.ubuntu.com/3629-2/
81
reference_url https://usn.ubuntu.com/3629-3/
reference_id USN-3629-3
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:26:03Z/
url https://usn.ubuntu.com/3629-3/
fixed_packages
0
url pkg:deb/debian/mysql-5.5@5.5.60-0%2Bdeb8u1
purl pkg:deb/debian/mysql-5.5@5.5.60-0%2Bdeb8u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-5.5@5.5.60-0%252Bdeb8u1
aliases CVE-2018-2819
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xuhv-wrut-wuez
95
url VCID-xvv1-nxs6-n7ab
vulnerability_id VCID-xvv1-nxs6-n7ab
summary security update
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00015.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00015.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00016.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00016.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html
6
reference_url http://rhn.redhat.com/errata/RHSA-2016-0534.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0534.html
7
reference_url http://rhn.redhat.com/errata/RHSA-2016-0705.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0705.html
8
reference_url http://rhn.redhat.com/errata/RHSA-2016-1480.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-1480.html
9
reference_url http://rhn.redhat.com/errata/RHSA-2016-1481.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-1481.html
10
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0597.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0597.json
11
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-0597
reference_id
reference_type
scores
0
value 0.00361
scoring_system epss
scoring_elements 0.58298
published_at 2026-04-18T12:55:00Z
1
value 0.00361
scoring_system epss
scoring_elements 0.58296
published_at 2026-04-16T12:55:00Z
2
value 0.00361
scoring_system epss
scoring_elements 0.58149
published_at 2026-04-01T12:55:00Z
3
value 0.00361
scoring_system epss
scoring_elements 0.58235
published_at 2026-04-02T12:55:00Z
4
value 0.00361
scoring_system epss
scoring_elements 0.58255
published_at 2026-04-04T12:55:00Z
5
value 0.00361
scoring_system epss
scoring_elements 0.58229
published_at 2026-04-07T12:55:00Z
6
value 0.00361
scoring_system epss
scoring_elements 0.58283
published_at 2026-04-08T12:55:00Z
7
value 0.00361
scoring_system epss
scoring_elements 0.58288
published_at 2026-04-09T12:55:00Z
8
value 0.00361
scoring_system epss
scoring_elements 0.58307
published_at 2026-04-11T12:55:00Z
9
value 0.00361
scoring_system epss
scoring_elements 0.58284
published_at 2026-04-12T12:55:00Z
10
value 0.00361
scoring_system epss
scoring_elements 0.58264
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-0597
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0505
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0505
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0546
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0546
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0596
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0596
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0597
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0597
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0598
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0598
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0600
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0600
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0606
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0606
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0608
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0608
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0609
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0609
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0616
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0616
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2047
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2047
23
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
24
reference_url https://mariadb.com/kb/en/mariadb/mariadb-10110-release-notes/
reference_id
reference_type
scores
url https://mariadb.com/kb/en/mariadb/mariadb-10110-release-notes/
25
reference_url https://mariadb.com/kb/en/mariadb/mariadb-5547-release-notes/
reference_id
reference_type
scores
url https://mariadb.com/kb/en/mariadb/mariadb-5547-release-notes/
26
reference_url https://mariadb.com/kb/en/mdb-10023-rn/
reference_id
reference_type
scores
url https://mariadb.com/kb/en/mdb-10023-rn/
27
reference_url http://www.debian.org/security/2016/dsa-3453
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3453
28
reference_url http://www.debian.org/security/2016/dsa-3459
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3459
29
reference_url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
30
reference_url http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
31
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
32
reference_url http://www.securityfocus.com/bid/81151
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/81151
33
reference_url http://www.securitytracker.com/id/1034708
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1034708
34
reference_url http://www.ubuntu.com/usn/USN-2881-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2881-1
35
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1301497
reference_id 1301497
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1301497
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node_eus:7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_hpc_node_eus:7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node_eus:7.2:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-0597
reference_id CVE-2016-0597
reference_type
scores
0
value 4.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2016-0597
57
reference_url https://access.redhat.com/errata/RHSA-2016:0534
reference_id RHSA-2016:0534
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0534
58
reference_url https://access.redhat.com/errata/RHSA-2016:0705
reference_id RHSA-2016:0705
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0705
59
reference_url https://access.redhat.com/errata/RHSA-2016:1132
reference_id RHSA-2016:1132
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1132
60
reference_url https://access.redhat.com/errata/RHSA-2016:1480
reference_id RHSA-2016:1480
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1480
61
reference_url https://access.redhat.com/errata/RHSA-2016:1481
reference_id RHSA-2016:1481
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1481
62
reference_url https://usn.ubuntu.com/2881-1/
reference_id USN-2881-1
reference_type
scores
url https://usn.ubuntu.com/2881-1/
fixed_packages
0
url pkg:deb/debian/mysql-5.5@5.5.47-0%2Bdeb7u1
purl pkg:deb/debian/mysql-5.5@5.5.47-0%2Bdeb7u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1gmc-pj6y-rkfx
1
vulnerability VCID-1nvb-xd5n-gkh8
2
vulnerability VCID-2gyq-q761-h3br
3
vulnerability VCID-2jer-ss8p-7kbg
4
vulnerability VCID-2uxe-ep8b-y7b9
5
vulnerability VCID-2vp1-j324-dkat
6
vulnerability VCID-2yqz-qtv5-47hh
7
vulnerability VCID-2za2-cnwx-hbbw
8
vulnerability VCID-39gt-6dgh-wyar
9
vulnerability VCID-3qjy-4cen-7qev
10
vulnerability VCID-45hn-ezks-j7br
11
vulnerability VCID-4cnj-7fur-3qe3
12
vulnerability VCID-4yz4-vxnh-b3dp
13
vulnerability VCID-52w9-bgxr-nkba
14
vulnerability VCID-55fg-6c2c-6bg8
15
vulnerability VCID-5p65-gfsg-1ugq
16
vulnerability VCID-5q89-vg9j-k3as
17
vulnerability VCID-5sjj-599v-vybg
18
vulnerability VCID-64st-u4xn-z7g3
19
vulnerability VCID-6g4n-3xfu-hfee
20
vulnerability VCID-6gvj-hy6a-3qdx
21
vulnerability VCID-7tj3-dfxj-bke7
22
vulnerability VCID-7w3v-5s98-a7ec
23
vulnerability VCID-7yc3-7bkr-jfc9
24
vulnerability VCID-8krv-jqjg-uqc8
25
vulnerability VCID-8kvb-5u8c-zbc4
26
vulnerability VCID-8sya-wktg-dqa5
27
vulnerability VCID-9f48-53dz-13an
28
vulnerability VCID-9ff2-43rk-2ydj
29
vulnerability VCID-9w98-nfg2-muh2
30
vulnerability VCID-a3hx-qz7x-7ybk
31
vulnerability VCID-bfnh-7k45-nkg2
32
vulnerability VCID-bhxk-8byp-eyap
33
vulnerability VCID-ca85-vx8c-huht
34
vulnerability VCID-cnb3-dy3a-8bdp
35
vulnerability VCID-cyqa-e362-yyaf
36
vulnerability VCID-dfbz-5n6w-syd9
37
vulnerability VCID-dgtc-a2t2-k7f5
38
vulnerability VCID-dqg6-2gmj-judy
39
vulnerability VCID-ej67-ayfh-sqdt
40
vulnerability VCID-esfk-umc5-ska4
41
vulnerability VCID-f8p4-hpsh-2fcw
42
vulnerability VCID-f9vz-r6zv-t7ev
43
vulnerability VCID-fabc-rma2-myab
44
vulnerability VCID-fnks-p4e9-13es
45
vulnerability VCID-fuyw-1y1c-fkfp
46
vulnerability VCID-j2wu-2rx7-3yf2
47
vulnerability VCID-jgff-4jyp-9fgr
48
vulnerability VCID-kwrj-3fxz-g7c6
49
vulnerability VCID-mde2-1ynu-auh2
50
vulnerability VCID-mz71-vku8-ckbm
51
vulnerability VCID-nj41-1zpw-gkh9
52
vulnerability VCID-nkdd-suwp-4ffr
53
vulnerability VCID-p623-gxyv-g7fs
54
vulnerability VCID-pk7e-t26d-aqdm
55
vulnerability VCID-pv92-6p9x-v7bs
56
vulnerability VCID-qyb6-7ees-ukcm
57
vulnerability VCID-r2cz-9kjz-zbgu
58
vulnerability VCID-rfz7-vha1-e7gy
59
vulnerability VCID-rssq-mfc2-ckaf
60
vulnerability VCID-skzt-r7sx-1ucv
61
vulnerability VCID-sy6p-5km4-1kcy
62
vulnerability VCID-tazb-gd49-73b4
63
vulnerability VCID-u2c7-p86x-5bgf
64
vulnerability VCID-un5y-y9sq-1ufb
65
vulnerability VCID-v165-afmm-w3er
66
vulnerability VCID-v4gv-g9n5-ukgc
67
vulnerability VCID-wrna-cc9g-sqbe
68
vulnerability VCID-xuhv-wrut-wuez
69
vulnerability VCID-xvv1-nxs6-n7ab
70
vulnerability VCID-xyuf-au4f-57fr
71
vulnerability VCID-y6p4-vfkn-q7fc
72
vulnerability VCID-yx79-3g2x-pqex
73
vulnerability VCID-zb4s-9rj3-ebea
74
vulnerability VCID-zkvk-538h-w3b9
75
vulnerability VCID-zuxd-n3wn-s7hg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-5.5@5.5.47-0%252Bdeb7u1
1
url pkg:deb/debian/mysql-5.5@5.5.60-0%2Bdeb8u1
purl pkg:deb/debian/mysql-5.5@5.5.60-0%2Bdeb8u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-5.5@5.5.60-0%252Bdeb8u1
aliases CVE-2016-0597
risk_score 1.8
exploitability 0.5
weighted_severity 3.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xvv1-nxs6-n7ab
96
url VCID-xyuf-au4f-57fr
vulnerability_id VCID-xyuf-au4f-57fr
summary
Multiple vulnerabilities were found in MySQL, the worst of which
    may allow remote execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3648.json
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3648.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-3648
reference_id
reference_type
scores
0
value 0.00543
scoring_system epss
scoring_elements 0.67751
published_at 2026-04-16T12:55:00Z
1
value 0.00543
scoring_system epss
scoring_elements 0.67638
published_at 2026-04-01T12:55:00Z
2
value 0.00543
scoring_system epss
scoring_elements 0.67673
published_at 2026-04-07T12:55:00Z
3
value 0.00543
scoring_system epss
scoring_elements 0.67693
published_at 2026-04-04T12:55:00Z
4
value 0.00543
scoring_system epss
scoring_elements 0.67725
published_at 2026-04-08T12:55:00Z
5
value 0.00543
scoring_system epss
scoring_elements 0.67739
published_at 2026-04-09T12:55:00Z
6
value 0.00543
scoring_system epss
scoring_elements 0.67763
published_at 2026-04-18T12:55:00Z
7
value 0.00543
scoring_system epss
scoring_elements 0.67748
published_at 2026-04-12T12:55:00Z
8
value 0.00543
scoring_system epss
scoring_elements 0.67715
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-3648
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3635
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3635
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3636
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3636
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3641
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3641
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3648
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3648
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3651
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3651
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3652
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3652
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3653
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3653
9
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:S/C:N/I:N/A:C
1
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
10
reference_url http://www.securitytracker.com/id/1038928
reference_id 1038928
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:47:53Z/
url http://www.securitytracker.com/id/1038928
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1472704
reference_id 1472704
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1472704
12
reference_url http://www.securityfocus.com/bid/99789
reference_id 99789
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:47:53Z/
url http://www.securityfocus.com/bid/99789
13
reference_url http://www.debian.org/security/2017/dsa-3922
reference_id dsa-3922
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:47:53Z/
url http://www.debian.org/security/2017/dsa-3922
14
reference_url https://security.gentoo.org/glsa/201802-04
reference_id GLSA-201802-04
reference_type
scores
url https://security.gentoo.org/glsa/201802-04
15
reference_url https://access.redhat.com/errata/RHSA-2017:2787
reference_id RHSA-2017:2787
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:47:53Z/
url https://access.redhat.com/errata/RHSA-2017:2787
16
reference_url https://access.redhat.com/errata/RHSA-2017:2886
reference_id RHSA-2017:2886
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:47:53Z/
url https://access.redhat.com/errata/RHSA-2017:2886
17
reference_url https://usn.ubuntu.com/3357-1/
reference_id USN-3357-1
reference_type
scores
url https://usn.ubuntu.com/3357-1/
18
reference_url https://usn.ubuntu.com/3357-2/
reference_id USN-3357-2
reference_type
scores
url https://usn.ubuntu.com/3357-2/
fixed_packages
0
url pkg:deb/debian/mysql-5.5@5.5.60-0%2Bdeb8u1
purl pkg:deb/debian/mysql-5.5@5.5.60-0%2Bdeb8u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-5.5@5.5.60-0%252Bdeb8u1
aliases CVE-2017-3648
risk_score 2.0
exploitability 0.5
weighted_severity 4.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xyuf-au4f-57fr
97
url VCID-y6p4-vfkn-q7fc
vulnerability_id VCID-y6p4-vfkn-q7fc
summary security update
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00015.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00015.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00016.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00016.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html
6
reference_url http://rhn.redhat.com/errata/RHSA-2016-0534.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0534.html
7
reference_url http://rhn.redhat.com/errata/RHSA-2016-0705.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0705.html
8
reference_url http://rhn.redhat.com/errata/RHSA-2016-1480.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-1480.html
9
reference_url http://rhn.redhat.com/errata/RHSA-2016-1481.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-1481.html
10
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0598.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0598.json
11
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-0598
reference_id
reference_type
scores
0
value 0.00338
scoring_system epss
scoring_elements 0.56668
published_at 2026-04-18T12:55:00Z
1
value 0.00338
scoring_system epss
scoring_elements 0.56638
published_at 2026-04-13T12:55:00Z
2
value 0.00338
scoring_system epss
scoring_elements 0.56522
published_at 2026-04-01T12:55:00Z
3
value 0.00338
scoring_system epss
scoring_elements 0.56618
published_at 2026-04-07T12:55:00Z
4
value 0.00338
scoring_system epss
scoring_elements 0.56639
published_at 2026-04-04T12:55:00Z
5
value 0.00338
scoring_system epss
scoring_elements 0.56669
published_at 2026-04-16T12:55:00Z
6
value 0.00338
scoring_system epss
scoring_elements 0.56675
published_at 2026-04-09T12:55:00Z
7
value 0.00338
scoring_system epss
scoring_elements 0.56683
published_at 2026-04-11T12:55:00Z
8
value 0.00338
scoring_system epss
scoring_elements 0.56658
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-0598
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0505
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0505
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0546
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0546
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0596
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0596
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0597
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0597
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0598
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0598
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0600
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0600
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0606
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0606
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0608
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0608
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0609
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0609
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0616
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0616
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2047
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2047
23
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.5
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:S/C:N/I:N/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
24
reference_url https://mariadb.com/kb/en/mariadb/mariadb-10110-release-notes/
reference_id
reference_type
scores
url https://mariadb.com/kb/en/mariadb/mariadb-10110-release-notes/
25
reference_url https://mariadb.com/kb/en/mariadb/mariadb-5547-release-notes/
reference_id
reference_type
scores
url https://mariadb.com/kb/en/mariadb/mariadb-5547-release-notes/
26
reference_url https://mariadb.com/kb/en/mdb-10023-rn/
reference_id
reference_type
scores
url https://mariadb.com/kb/en/mdb-10023-rn/
27
reference_url http://www.debian.org/security/2016/dsa-3453
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3453
28
reference_url http://www.debian.org/security/2016/dsa-3459
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3459
29
reference_url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
30
reference_url http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
31
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
32
reference_url http://www.securityfocus.com/bid/81182
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/81182
33
reference_url http://www.securitytracker.com/id/1034708
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1034708
34
reference_url http://www.ubuntu.com/usn/USN-2881-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2881-1
35
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1301498
reference_id 1301498
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1301498
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node_eus:7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_hpc_node_eus:7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node_eus:7.2:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-0598
reference_id CVE-2016-0598
reference_type
scores
0
value 3.5
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:S/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2016-0598
57
reference_url https://access.redhat.com/errata/RHSA-2016:0534
reference_id RHSA-2016:0534
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0534
58
reference_url https://access.redhat.com/errata/RHSA-2016:0705
reference_id RHSA-2016:0705
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0705
59
reference_url https://access.redhat.com/errata/RHSA-2016:1132
reference_id RHSA-2016:1132
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1132
60
reference_url https://access.redhat.com/errata/RHSA-2016:1480
reference_id RHSA-2016:1480
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1480
61
reference_url https://access.redhat.com/errata/RHSA-2016:1481
reference_id RHSA-2016:1481
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1481
62
reference_url https://usn.ubuntu.com/2881-1/
reference_id USN-2881-1
reference_type
scores
url https://usn.ubuntu.com/2881-1/
fixed_packages
0
url pkg:deb/debian/mysql-5.5@5.5.47-0%2Bdeb7u1
purl pkg:deb/debian/mysql-5.5@5.5.47-0%2Bdeb7u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1gmc-pj6y-rkfx
1
vulnerability VCID-1nvb-xd5n-gkh8
2
vulnerability VCID-2gyq-q761-h3br
3
vulnerability VCID-2jer-ss8p-7kbg
4
vulnerability VCID-2uxe-ep8b-y7b9
5
vulnerability VCID-2vp1-j324-dkat
6
vulnerability VCID-2yqz-qtv5-47hh
7
vulnerability VCID-2za2-cnwx-hbbw
8
vulnerability VCID-39gt-6dgh-wyar
9
vulnerability VCID-3qjy-4cen-7qev
10
vulnerability VCID-45hn-ezks-j7br
11
vulnerability VCID-4cnj-7fur-3qe3
12
vulnerability VCID-4yz4-vxnh-b3dp
13
vulnerability VCID-52w9-bgxr-nkba
14
vulnerability VCID-55fg-6c2c-6bg8
15
vulnerability VCID-5p65-gfsg-1ugq
16
vulnerability VCID-5q89-vg9j-k3as
17
vulnerability VCID-5sjj-599v-vybg
18
vulnerability VCID-64st-u4xn-z7g3
19
vulnerability VCID-6g4n-3xfu-hfee
20
vulnerability VCID-6gvj-hy6a-3qdx
21
vulnerability VCID-7tj3-dfxj-bke7
22
vulnerability VCID-7w3v-5s98-a7ec
23
vulnerability VCID-7yc3-7bkr-jfc9
24
vulnerability VCID-8krv-jqjg-uqc8
25
vulnerability VCID-8kvb-5u8c-zbc4
26
vulnerability VCID-8sya-wktg-dqa5
27
vulnerability VCID-9f48-53dz-13an
28
vulnerability VCID-9ff2-43rk-2ydj
29
vulnerability VCID-9w98-nfg2-muh2
30
vulnerability VCID-a3hx-qz7x-7ybk
31
vulnerability VCID-bfnh-7k45-nkg2
32
vulnerability VCID-bhxk-8byp-eyap
33
vulnerability VCID-ca85-vx8c-huht
34
vulnerability VCID-cnb3-dy3a-8bdp
35
vulnerability VCID-cyqa-e362-yyaf
36
vulnerability VCID-dfbz-5n6w-syd9
37
vulnerability VCID-dgtc-a2t2-k7f5
38
vulnerability VCID-dqg6-2gmj-judy
39
vulnerability VCID-ej67-ayfh-sqdt
40
vulnerability VCID-esfk-umc5-ska4
41
vulnerability VCID-f8p4-hpsh-2fcw
42
vulnerability VCID-f9vz-r6zv-t7ev
43
vulnerability VCID-fabc-rma2-myab
44
vulnerability VCID-fnks-p4e9-13es
45
vulnerability VCID-fuyw-1y1c-fkfp
46
vulnerability VCID-j2wu-2rx7-3yf2
47
vulnerability VCID-jgff-4jyp-9fgr
48
vulnerability VCID-kwrj-3fxz-g7c6
49
vulnerability VCID-mde2-1ynu-auh2
50
vulnerability VCID-mz71-vku8-ckbm
51
vulnerability VCID-nj41-1zpw-gkh9
52
vulnerability VCID-nkdd-suwp-4ffr
53
vulnerability VCID-p623-gxyv-g7fs
54
vulnerability VCID-pk7e-t26d-aqdm
55
vulnerability VCID-pv92-6p9x-v7bs
56
vulnerability VCID-qyb6-7ees-ukcm
57
vulnerability VCID-r2cz-9kjz-zbgu
58
vulnerability VCID-rfz7-vha1-e7gy
59
vulnerability VCID-rssq-mfc2-ckaf
60
vulnerability VCID-skzt-r7sx-1ucv
61
vulnerability VCID-sy6p-5km4-1kcy
62
vulnerability VCID-tazb-gd49-73b4
63
vulnerability VCID-u2c7-p86x-5bgf
64
vulnerability VCID-un5y-y9sq-1ufb
65
vulnerability VCID-v165-afmm-w3er
66
vulnerability VCID-v4gv-g9n5-ukgc
67
vulnerability VCID-wrna-cc9g-sqbe
68
vulnerability VCID-xuhv-wrut-wuez
69
vulnerability VCID-xvv1-nxs6-n7ab
70
vulnerability VCID-xyuf-au4f-57fr
71
vulnerability VCID-y6p4-vfkn-q7fc
72
vulnerability VCID-yx79-3g2x-pqex
73
vulnerability VCID-zb4s-9rj3-ebea
74
vulnerability VCID-zkvk-538h-w3b9
75
vulnerability VCID-zuxd-n3wn-s7hg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-5.5@5.5.47-0%252Bdeb7u1
1
url pkg:deb/debian/mysql-5.5@5.5.60-0%2Bdeb8u1
purl pkg:deb/debian/mysql-5.5@5.5.60-0%2Bdeb8u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-5.5@5.5.60-0%252Bdeb8u1
aliases CVE-2016-0598
risk_score 1.6
exploitability 0.5
weighted_severity 3.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-y6p4-vfkn-q7fc
98
url VCID-yx79-3g2x-pqex
vulnerability_id VCID-yx79-3g2x-pqex
summary
Multiple vulnerabilities were found in MySQL, the worst of which
    may allow remote execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10384.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10384.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-10384
reference_id
reference_type
scores
0
value 0.0062
scoring_system epss
scoring_elements 0.70088
published_at 2026-04-18T12:55:00Z
1
value 0.0062
scoring_system epss
scoring_elements 0.7005
published_at 2026-04-12T12:55:00Z
2
value 0.0062
scoring_system epss
scoring_elements 0.70036
published_at 2026-04-13T12:55:00Z
3
value 0.0062
scoring_system epss
scoring_elements 0.70079
published_at 2026-04-16T12:55:00Z
4
value 0.00666
scoring_system epss
scoring_elements 0.71187
published_at 2026-04-01T12:55:00Z
5
value 0.00869
scoring_system epss
scoring_elements 0.75139
published_at 2026-04-02T12:55:00Z
6
value 0.00869
scoring_system epss
scoring_elements 0.75169
published_at 2026-04-04T12:55:00Z
7
value 0.00869
scoring_system epss
scoring_elements 0.75146
published_at 2026-04-07T12:55:00Z
8
value 0.00869
scoring_system epss
scoring_elements 0.7518
published_at 2026-04-08T12:55:00Z
9
value 0.00869
scoring_system epss
scoring_elements 0.75192
published_at 2026-04-09T12:55:00Z
10
value 0.00869
scoring_system epss
scoring_elements 0.75214
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-10384
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10268
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10268
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10286
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10286
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10378
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10378
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10379
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10379
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10384
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10384
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3308
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3308
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3309
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3309
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3453
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3453
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3456
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3456
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3464
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3464
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3636
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3636
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3641
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3641
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3653
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3653
15
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:C
1
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
16
reference_url https://security.netapp.com/advisory/ntap-20171019-0002/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:42:34Z/
url https://security.netapp.com/advisory/ntap-20171019-0002/
17
reference_url http://www.debian.org/security/2017/dsa-4002
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:42:34Z/
url http://www.debian.org/security/2017/dsa-4002
18
reference_url http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:42:34Z/
url http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
19
reference_url http://www.securityfocus.com/bid/101406
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:42:34Z/
url http://www.securityfocus.com/bid/101406
20
reference_url http://www.securitytracker.com/id/1039597
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:42:34Z/
url http://www.securitytracker.com/id/1039597
21
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1503686
reference_id 1503686
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1503686
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
reference_id cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
reference_id cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_balance:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_balance:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_balance:-:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_performance_manager:-:*:*:*:*:vmware_vsphere:*:*
reference_id cpe:2.3:a:netapp:oncommand_performance_manager:-:*:*:*:*:vmware_vsphere:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_performance_manager:-:*:*:*:*:vmware_vsphere:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vsphere:*:*
reference_id cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vsphere:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vsphere:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:windows:*:*
reference_id cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:windows:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:windows:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openstack:12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:openstack:12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openstack:12:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-10384
reference_id CVE-2017-10384
reference_type
scores
0
value 4.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:P
1
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-10384
46
reference_url https://security.gentoo.org/glsa/201802-04
reference_id GLSA-201802-04
reference_type
scores
url https://security.gentoo.org/glsa/201802-04
47
reference_url https://access.redhat.com/errata/RHSA-2017:3265
reference_id RHSA-2017:3265
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:42:34Z/
url https://access.redhat.com/errata/RHSA-2017:3265
48
reference_url https://access.redhat.com/errata/RHSA-2017:3442
reference_id RHSA-2017:3442
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:42:34Z/
url https://access.redhat.com/errata/RHSA-2017:3442
49
reference_url https://access.redhat.com/errata/RHSA-2018:0279
reference_id RHSA-2018:0279
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:42:34Z/
url https://access.redhat.com/errata/RHSA-2018:0279
50
reference_url https://access.redhat.com/errata/RHSA-2018:0574
reference_id RHSA-2018:0574
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:42:34Z/
url https://access.redhat.com/errata/RHSA-2018:0574
51
reference_url https://access.redhat.com/errata/RHSA-2018:2439
reference_id RHSA-2018:2439
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:42:34Z/
url https://access.redhat.com/errata/RHSA-2018:2439
52
reference_url https://access.redhat.com/errata/RHSA-2018:2729
reference_id RHSA-2018:2729
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:42:34Z/
url https://access.redhat.com/errata/RHSA-2018:2729
53
reference_url https://usn.ubuntu.com/3459-1/
reference_id USN-3459-1
reference_type
scores
url https://usn.ubuntu.com/3459-1/
54
reference_url https://usn.ubuntu.com/3459-2/
reference_id USN-3459-2
reference_type
scores
url https://usn.ubuntu.com/3459-2/
fixed_packages
0
url pkg:deb/debian/mysql-5.5@5.5.60-0%2Bdeb8u1
purl pkg:deb/debian/mysql-5.5@5.5.60-0%2Bdeb8u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-5.5@5.5.60-0%252Bdeb8u1
aliases CVE-2017-10384
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-yx79-3g2x-pqex
99
url VCID-yzzc-qh9x-pfd6
vulnerability_id VCID-yzzc-qh9x-pfd6
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4802.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4802.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-4802
reference_id
reference_type
scores
0
value 0.00419
scoring_system epss
scoring_elements 0.6176
published_at 2026-04-01T12:55:00Z
1
value 0.00419
scoring_system epss
scoring_elements 0.61834
published_at 2026-04-02T12:55:00Z
2
value 0.00419
scoring_system epss
scoring_elements 0.61865
published_at 2026-04-04T12:55:00Z
3
value 0.00419
scoring_system epss
scoring_elements 0.61837
published_at 2026-04-07T12:55:00Z
4
value 0.00419
scoring_system epss
scoring_elements 0.61886
published_at 2026-04-08T12:55:00Z
5
value 0.00419
scoring_system epss
scoring_elements 0.61902
published_at 2026-04-09T12:55:00Z
6
value 0.00419
scoring_system epss
scoring_elements 0.61923
published_at 2026-04-11T12:55:00Z
7
value 0.00419
scoring_system epss
scoring_elements 0.61911
published_at 2026-04-12T12:55:00Z
8
value 0.00419
scoring_system epss
scoring_elements 0.61891
published_at 2026-04-13T12:55:00Z
9
value 0.00419
scoring_system epss
scoring_elements 0.61934
published_at 2026-04-16T12:55:00Z
10
value 0.00419
scoring_system epss
scoring_elements 0.61939
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-4802
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4792
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4792
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4802
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4802
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4815
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4815
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4816
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4816
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4819
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4819
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4826
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4826
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4830
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4830
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4836
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4836
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4858
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4858
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4861
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4861
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4870
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4870
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4879
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4879
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4895
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4895
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4913
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4913
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1274756
reference_id 1274756
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1274756
17
reference_url https://access.redhat.com/errata/RHSA-2016:0534
reference_id RHSA-2016:0534
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0534
18
reference_url https://access.redhat.com/errata/RHSA-2016:0705
reference_id RHSA-2016:0705
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0705
19
reference_url https://access.redhat.com/errata/RHSA-2016:1132
reference_id RHSA-2016:1132
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1132
20
reference_url https://access.redhat.com/errata/RHSA-2016:1480
reference_id RHSA-2016:1480
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1480
21
reference_url https://access.redhat.com/errata/RHSA-2016:1481
reference_id RHSA-2016:1481
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1481
22
reference_url https://usn.ubuntu.com/2781-1/
reference_id USN-2781-1
reference_type
scores
url https://usn.ubuntu.com/2781-1/
fixed_packages
0
url pkg:deb/debian/mysql-5.5@5.5.47-0%2Bdeb6u1
purl pkg:deb/debian/mysql-5.5@5.5.47-0%2Bdeb6u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1gmc-pj6y-rkfx
1
vulnerability VCID-1nvb-xd5n-gkh8
2
vulnerability VCID-2gyq-q761-h3br
3
vulnerability VCID-2jer-ss8p-7kbg
4
vulnerability VCID-2uxe-ep8b-y7b9
5
vulnerability VCID-2vp1-j324-dkat
6
vulnerability VCID-2yqz-qtv5-47hh
7
vulnerability VCID-2za2-cnwx-hbbw
8
vulnerability VCID-39gt-6dgh-wyar
9
vulnerability VCID-3qjy-4cen-7qev
10
vulnerability VCID-45hn-ezks-j7br
11
vulnerability VCID-4cnj-7fur-3qe3
12
vulnerability VCID-4yz4-vxnh-b3dp
13
vulnerability VCID-52w9-bgxr-nkba
14
vulnerability VCID-55fg-6c2c-6bg8
15
vulnerability VCID-5p65-gfsg-1ugq
16
vulnerability VCID-5q89-vg9j-k3as
17
vulnerability VCID-5sjj-599v-vybg
18
vulnerability VCID-64st-u4xn-z7g3
19
vulnerability VCID-6g4n-3xfu-hfee
20
vulnerability VCID-6gvj-hy6a-3qdx
21
vulnerability VCID-7tj3-dfxj-bke7
22
vulnerability VCID-7w3v-5s98-a7ec
23
vulnerability VCID-7yc3-7bkr-jfc9
24
vulnerability VCID-8krv-jqjg-uqc8
25
vulnerability VCID-8kvb-5u8c-zbc4
26
vulnerability VCID-8sya-wktg-dqa5
27
vulnerability VCID-9f48-53dz-13an
28
vulnerability VCID-9ff2-43rk-2ydj
29
vulnerability VCID-9w98-nfg2-muh2
30
vulnerability VCID-a3hx-qz7x-7ybk
31
vulnerability VCID-bfnh-7k45-nkg2
32
vulnerability VCID-bhxk-8byp-eyap
33
vulnerability VCID-ca85-vx8c-huht
34
vulnerability VCID-cnb3-dy3a-8bdp
35
vulnerability VCID-cyqa-e362-yyaf
36
vulnerability VCID-dfbz-5n6w-syd9
37
vulnerability VCID-dgtc-a2t2-k7f5
38
vulnerability VCID-dqg6-2gmj-judy
39
vulnerability VCID-ej67-ayfh-sqdt
40
vulnerability VCID-esfk-umc5-ska4
41
vulnerability VCID-f8p4-hpsh-2fcw
42
vulnerability VCID-f9vz-r6zv-t7ev
43
vulnerability VCID-fabc-rma2-myab
44
vulnerability VCID-fnks-p4e9-13es
45
vulnerability VCID-fuyw-1y1c-fkfp
46
vulnerability VCID-j2wu-2rx7-3yf2
47
vulnerability VCID-jgff-4jyp-9fgr
48
vulnerability VCID-kwrj-3fxz-g7c6
49
vulnerability VCID-mde2-1ynu-auh2
50
vulnerability VCID-mz71-vku8-ckbm
51
vulnerability VCID-nj41-1zpw-gkh9
52
vulnerability VCID-nkdd-suwp-4ffr
53
vulnerability VCID-p623-gxyv-g7fs
54
vulnerability VCID-pk7e-t26d-aqdm
55
vulnerability VCID-pv92-6p9x-v7bs
56
vulnerability VCID-qyb6-7ees-ukcm
57
vulnerability VCID-r2cz-9kjz-zbgu
58
vulnerability VCID-rfz7-vha1-e7gy
59
vulnerability VCID-rssq-mfc2-ckaf
60
vulnerability VCID-skzt-r7sx-1ucv
61
vulnerability VCID-sy6p-5km4-1kcy
62
vulnerability VCID-tazb-gd49-73b4
63
vulnerability VCID-u2c7-p86x-5bgf
64
vulnerability VCID-un5y-y9sq-1ufb
65
vulnerability VCID-v165-afmm-w3er
66
vulnerability VCID-v4gv-g9n5-ukgc
67
vulnerability VCID-wrna-cc9g-sqbe
68
vulnerability VCID-xuhv-wrut-wuez
69
vulnerability VCID-xvv1-nxs6-n7ab
70
vulnerability VCID-xyuf-au4f-57fr
71
vulnerability VCID-y6p4-vfkn-q7fc
72
vulnerability VCID-yx79-3g2x-pqex
73
vulnerability VCID-zb4s-9rj3-ebea
74
vulnerability VCID-zkvk-538h-w3b9
75
vulnerability VCID-zuxd-n3wn-s7hg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-5.5@5.5.47-0%252Bdeb6u1
aliases CVE-2015-4802
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-yzzc-qh9x-pfd6
100
url VCID-zb4s-9rj3-ebea
vulnerability_id VCID-zb4s-9rj3-ebea
summary security update
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:31Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:31Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:31Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:31Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:31Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:31Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html
6
reference_url http://rhn.redhat.com/errata/RHSA-2016-0705.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:31Z/
url http://rhn.redhat.com/errata/RHSA-2016-0705.html
7
reference_url http://rhn.redhat.com/errata/RHSA-2016-1480.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:31Z/
url http://rhn.redhat.com/errata/RHSA-2016-1480.html
8
reference_url http://rhn.redhat.com/errata/RHSA-2016-1481.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:31Z/
url http://rhn.redhat.com/errata/RHSA-2016-1481.html
9
reference_url http://rhn.redhat.com/errata/RHSA-2016-1602.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:31Z/
url http://rhn.redhat.com/errata/RHSA-2016-1602.html
10
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0640.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0640.json
11
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-0640
reference_id
reference_type
scores
0
value 0.00225
scoring_system epss
scoring_elements 0.45224
published_at 2026-04-01T12:55:00Z
1
value 0.00225
scoring_system epss
scoring_elements 0.45304
published_at 2026-04-02T12:55:00Z
2
value 0.00225
scoring_system epss
scoring_elements 0.45326
published_at 2026-04-04T12:55:00Z
3
value 0.00225
scoring_system epss
scoring_elements 0.45268
published_at 2026-04-07T12:55:00Z
4
value 0.00225
scoring_system epss
scoring_elements 0.45324
published_at 2026-04-08T12:55:00Z
5
value 0.00225
scoring_system epss
scoring_elements 0.45323
published_at 2026-04-09T12:55:00Z
6
value 0.00225
scoring_system epss
scoring_elements 0.45345
published_at 2026-04-11T12:55:00Z
7
value 0.00225
scoring_system epss
scoring_elements 0.45313
published_at 2026-04-12T12:55:00Z
8
value 0.00225
scoring_system epss
scoring_elements 0.45315
published_at 2026-04-13T12:55:00Z
9
value 0.00225
scoring_system epss
scoring_elements 0.45366
published_at 2026-04-16T12:55:00Z
10
value 0.00225
scoring_system epss
scoring_elements 0.4536
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-0640
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0640
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0640
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0641
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0641
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0642
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0642
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0643
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0643
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0644
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0644
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0646
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0646
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0647
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0647
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0648
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0648
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0649
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0649
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0650
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0650
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0655
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0655
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0666
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0666
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0668
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0668
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2047
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2047
26
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.2
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:S/C:N/I:P/A:C
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
27
reference_url https://mariadb.com/kb/en/mariadb/mariadb-10024-release-notes/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:31Z/
url https://mariadb.com/kb/en/mariadb/mariadb-10024-release-notes/
28
reference_url https://mariadb.com/kb/en/mariadb/mariadb-10112-release-notes/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:31Z/
url https://mariadb.com/kb/en/mariadb/mariadb-10112-release-notes/
29
reference_url https://mariadb.com/kb/en/mariadb/mariadb-5548-release-notes/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:31Z/
url https://mariadb.com/kb/en/mariadb/mariadb-5548-release-notes/
30
reference_url http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:31Z/
url http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168
31
reference_url http://www.debian.org/security/2016/dsa-3557
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:31Z/
url http://www.debian.org/security/2016/dsa-3557
32
reference_url http://www.debian.org/security/2016/dsa-3595
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:31Z/
url http://www.debian.org/security/2016/dsa-3595
33
reference_url http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:31Z/
url http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
34
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:31Z/
url http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
35
reference_url http://www.securityfocus.com/bid/86427
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:31Z/
url http://www.securityfocus.com/bid/86427
36
reference_url http://www.securitytracker.com/id/1035606
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:31Z/
url http://www.securitytracker.com/id/1035606
37
reference_url http://www.ubuntu.com/usn/USN-2953-1
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:31Z/
url http://www.ubuntu.com/usn/USN-2953-1
38
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1329239
reference_id 1329239
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1329239
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:powerkvm:2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ibm:powerkvm:2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:powerkvm:2.1:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:powerkvm:3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ibm:powerkvm:3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:powerkvm:3.1:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-0640
reference_id CVE-2016-0640
reference_type
scores
0
value 4.9
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:S/C:N/I:P/A:P
1
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2016-0640
49
reference_url https://access.redhat.com/errata/RHSA-2016:0705
reference_id RHSA-2016:0705
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0705
50
reference_url https://access.redhat.com/errata/RHSA-2016:1132
reference_id RHSA-2016:1132
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:31Z/
url https://access.redhat.com/errata/RHSA-2016:1132
51
reference_url https://access.redhat.com/errata/RHSA-2016:1480
reference_id RHSA-2016:1480
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1480
52
reference_url https://access.redhat.com/errata/RHSA-2016:1481
reference_id RHSA-2016:1481
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1481
53
reference_url https://access.redhat.com/errata/RHSA-2016:1602
reference_id RHSA-2016:1602
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1602
54
reference_url https://usn.ubuntu.com/2953-1/
reference_id USN-2953-1
reference_type
scores
url https://usn.ubuntu.com/2953-1/
fixed_packages
0
url pkg:deb/debian/mysql-5.5@5.5.60-0%2Bdeb8u1
purl pkg:deb/debian/mysql-5.5@5.5.60-0%2Bdeb8u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-5.5@5.5.60-0%252Bdeb8u1
aliases CVE-2016-0640
risk_score 2.8
exploitability 0.5
weighted_severity 5.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zb4s-9rj3-ebea
101
url VCID-zkvk-538h-w3b9
vulnerability_id VCID-zkvk-538h-w3b9
summary
Multiple vulnerabilities have been found in MariaDB and MySQL, the
    worst of which could result in privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2817.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2817.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-2817
reference_id
reference_type
scores
0
value 0.00265
scoring_system epss
scoring_elements 0.4998
published_at 2026-04-18T12:55:00Z
1
value 0.00265
scoring_system epss
scoring_elements 0.49883
published_at 2026-04-01T12:55:00Z
2
value 0.00265
scoring_system epss
scoring_elements 0.49921
published_at 2026-04-02T12:55:00Z
3
value 0.00265
scoring_system epss
scoring_elements 0.49949
published_at 2026-04-04T12:55:00Z
4
value 0.00265
scoring_system epss
scoring_elements 0.49899
published_at 2026-04-07T12:55:00Z
5
value 0.00265
scoring_system epss
scoring_elements 0.49953
published_at 2026-04-08T12:55:00Z
6
value 0.00265
scoring_system epss
scoring_elements 0.49946
published_at 2026-04-09T12:55:00Z
7
value 0.00265
scoring_system epss
scoring_elements 0.49965
published_at 2026-04-11T12:55:00Z
8
value 0.00265
scoring_system epss
scoring_elements 0.49936
published_at 2026-04-12T12:55:00Z
9
value 0.00265
scoring_system epss
scoring_elements 0.49934
published_at 2026-04-13T12:55:00Z
10
value 0.00265
scoring_system epss
scoring_elements 0.49979
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-2817
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10268
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10268
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10378
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10378
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15365
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15365
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2562
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2562
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2612
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2612
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2622
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2622
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2640
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2640
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2665
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2665
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2668
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2668
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2755
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2755
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2761
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2761
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2766
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2766
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2767
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2767
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2771
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2771
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2773
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2773
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2781
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2781
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2782
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2782
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2784
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2784
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2787
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2787
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2813
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2813
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2817
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2817
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2818
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2818
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2819
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2819
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3058
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3058
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3063
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3063
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3064
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3064
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3066
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3066
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3081
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3081
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3143
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3143
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3156
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3156
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3174
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3174
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3251
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3251
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3282
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3282
35
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2503
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2503
36
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
37
reference_url https://lists.debian.org/debian-lts-announce/2018/04/msg00020.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:54Z/
url https://lists.debian.org/debian-lts-announce/2018/04/msg00020.html
38
reference_url https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:54Z/
url https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html
39
reference_url https://security.netapp.com/advisory/ntap-20180419-0002/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:54Z/
url https://security.netapp.com/advisory/ntap-20180419-0002/
40
reference_url https://www.debian.org/security/2018/dsa-4176
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:54Z/
url https://www.debian.org/security/2018/dsa-4176
41
reference_url https://www.debian.org/security/2018/dsa-4341
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:54Z/
url https://www.debian.org/security/2018/dsa-4341
42
reference_url http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:54Z/
url http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
43
reference_url http://www.securityfocus.com/bid/103818
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:54Z/
url http://www.securityfocus.com/bid/103818
44
reference_url http://www.securitytracker.com/id/1040698
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:54Z/
url http://www.securitytracker.com/id/1040698
45
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1568954
reference_id 1568954
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1568954
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
reference_id cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
reference_id cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openstack:12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:openstack:12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openstack:12:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
71
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
72
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-2817
reference_id CVE-2018-2817
reference_type
scores
0
value 4.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:P
1
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2018-2817
73
reference_url https://security.gentoo.org/glsa/201908-24
reference_id GLSA-201908-24
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:54Z/
url https://security.gentoo.org/glsa/201908-24
74
reference_url https://access.redhat.com/errata/RHSA-2018:1254
reference_id RHSA-2018:1254
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:54Z/
url https://access.redhat.com/errata/RHSA-2018:1254
75
reference_url https://access.redhat.com/errata/RHSA-2018:2439
reference_id RHSA-2018:2439
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:54Z/
url https://access.redhat.com/errata/RHSA-2018:2439
76
reference_url https://access.redhat.com/errata/RHSA-2018:2729
reference_id RHSA-2018:2729
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:54Z/
url https://access.redhat.com/errata/RHSA-2018:2729
77
reference_url https://access.redhat.com/errata/RHSA-2018:3655
reference_id RHSA-2018:3655
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:54Z/
url https://access.redhat.com/errata/RHSA-2018:3655
78
reference_url https://access.redhat.com/errata/RHSA-2019:1258
reference_id RHSA-2019:1258
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:54Z/
url https://access.redhat.com/errata/RHSA-2019:1258
79
reference_url https://usn.ubuntu.com/3629-1/
reference_id USN-3629-1
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:54Z/
url https://usn.ubuntu.com/3629-1/
80
reference_url https://usn.ubuntu.com/3629-2/
reference_id USN-3629-2
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:54Z/
url https://usn.ubuntu.com/3629-2/
81
reference_url https://usn.ubuntu.com/3629-3/
reference_id USN-3629-3
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:54Z/
url https://usn.ubuntu.com/3629-3/
fixed_packages
0
url pkg:deb/debian/mysql-5.5@5.5.60-0%2Bdeb8u1
purl pkg:deb/debian/mysql-5.5@5.5.60-0%2Bdeb8u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-5.5@5.5.60-0%252Bdeb8u1
aliases CVE-2018-2817
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zkvk-538h-w3b9
102
url VCID-zuxd-n3wn-s7hg
vulnerability_id VCID-zuxd-n3wn-s7hg
summary mysql: pid file can be created in a world-writeable directory (CPU Apr 2018)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2773.json
reference_id
reference_type
scores
0
value 4.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2773.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-2773
reference_id
reference_type
scores
0
value 0.0004
scoring_system epss
scoring_elements 0.12115
published_at 2026-04-11T12:55:00Z
1
value 0.0004
scoring_system epss
scoring_elements 0.12127
published_at 2026-04-02T12:55:00Z
2
value 0.0004
scoring_system epss
scoring_elements 0.12108
published_at 2026-04-09T12:55:00Z
3
value 0.0004
scoring_system epss
scoring_elements 0.12056
published_at 2026-04-08T12:55:00Z
4
value 0.0004
scoring_system epss
scoring_elements 0.11974
published_at 2026-04-07T12:55:00Z
5
value 0.0004
scoring_system epss
scoring_elements 0.12173
published_at 2026-04-04T12:55:00Z
6
value 0.0004
scoring_system epss
scoring_elements 0.12014
published_at 2026-04-01T12:55:00Z
7
value 0.0004
scoring_system epss
scoring_elements 0.12079
published_at 2026-04-12T12:55:00Z
8
value 0.00041
scoring_system epss
scoring_elements 0.1239
published_at 2026-04-18T12:55:00Z
9
value 0.00041
scoring_system epss
scoring_elements 0.12483
published_at 2026-04-13T12:55:00Z
10
value 0.00041
scoring_system epss
scoring_elements 0.12386
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-2773
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2755
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2755
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2761
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2761
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2771
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2771
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2773
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2773
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2781
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2781
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2813
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2813
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2817
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2817
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2818
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2818
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2819
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2819
11
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
12
reference_url https://lists.debian.org/debian-lts-announce/2018/04/msg00020.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:26:02Z/
url https://lists.debian.org/debian-lts-announce/2018/04/msg00020.html
13
reference_url https://security.netapp.com/advisory/ntap-20180419-0002/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:26:02Z/
url https://security.netapp.com/advisory/ntap-20180419-0002/
14
reference_url https://www.debian.org/security/2018/dsa-4176
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:26:02Z/
url https://www.debian.org/security/2018/dsa-4176
15
reference_url http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:26:02Z/
url http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
16
reference_url http://www.securityfocus.com/bid/103811
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:26:02Z/
url http://www.securityfocus.com/bid/103811
17
reference_url http://www.securitytracker.com/id/1040698
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:26:02Z/
url http://www.securitytracker.com/id/1040698
18
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1568932
reference_id 1568932
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1568932
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-2773
reference_id CVE-2018-2773
reference_type
scores
0
value 1.9
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:N/I:N/A:P
1
value 4.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2018-2773
26
reference_url https://access.redhat.com/errata/RHSA-2018:1254
reference_id RHSA-2018:1254
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:26:02Z/
url https://access.redhat.com/errata/RHSA-2018:1254
27
reference_url https://access.redhat.com/errata/RHSA-2018:3655
reference_id RHSA-2018:3655
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:26:02Z/
url https://access.redhat.com/errata/RHSA-2018:3655
28
reference_url https://usn.ubuntu.com/3629-1/
reference_id USN-3629-1
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:26:02Z/
url https://usn.ubuntu.com/3629-1/
29
reference_url https://usn.ubuntu.com/3629-2/
reference_id USN-3629-2
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:26:02Z/
url https://usn.ubuntu.com/3629-2/
30
reference_url https://usn.ubuntu.com/3629-3/
reference_id USN-3629-3
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:26:02Z/
url https://usn.ubuntu.com/3629-3/
fixed_packages
0
url pkg:deb/debian/mysql-5.5@5.5.60-0%2Bdeb8u1
purl pkg:deb/debian/mysql-5.5@5.5.60-0%2Bdeb8u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-5.5@5.5.60-0%252Bdeb8u1
aliases CVE-2018-2773
risk_score 1.9
exploitability 0.5
weighted_severity 3.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zuxd-n3wn-s7hg
Fixing_vulnerabilities
Risk_score10.0
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-5.5@5.5.42-1