Lookup for vulnerable packages by Package URL.

Purlpkg:ebuild/dev-db/mysql@10.0.28
Typeebuild
Namespacedev-db
Namemysql
Version10.0.28
Qualifiers
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version10.0.30-r1
Latest_non_vulnerable_version10.2.22
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-39rq-1cg5-9ueu
vulnerability_id VCID-39rq-1cg5-9ueu
summary
Multiple vulnerabilities have been found in MariaDB and MySQL, the
    worst of which could lead to the remote execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5633.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5633.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-5633
reference_id
reference_type
scores
0
value 0.01417
scoring_system epss
scoring_elements 0.80514
published_at 2026-04-01T12:55:00Z
1
value 0.01417
scoring_system epss
scoring_elements 0.806
published_at 2026-04-18T12:55:00Z
2
value 0.01417
scoring_system epss
scoring_elements 0.80591
published_at 2026-04-11T12:55:00Z
3
value 0.01417
scoring_system epss
scoring_elements 0.80577
published_at 2026-04-12T12:55:00Z
4
value 0.01417
scoring_system epss
scoring_elements 0.80569
published_at 2026-04-13T12:55:00Z
5
value 0.01417
scoring_system epss
scoring_elements 0.80598
published_at 2026-04-16T12:55:00Z
6
value 0.01417
scoring_system epss
scoring_elements 0.80521
published_at 2026-04-02T12:55:00Z
7
value 0.01417
scoring_system epss
scoring_elements 0.80543
published_at 2026-04-04T12:55:00Z
8
value 0.01417
scoring_system epss
scoring_elements 0.80535
published_at 2026-04-07T12:55:00Z
9
value 0.01417
scoring_system epss
scoring_elements 0.80564
published_at 2026-04-08T12:55:00Z
10
value 0.01417
scoring_system epss
scoring_elements 0.80574
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-5633
2
reference_url http://www.securitytracker.com/id/1037050
reference_id 1037050
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:28Z/
url http://www.securitytracker.com/id/1037050
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1386576
reference_id 1386576
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1386576
4
reference_url http://www.securityfocus.com/bid/93702
reference_id 93702
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:28Z/
url http://www.securityfocus.com/bid/93702
5
reference_url https://security.gentoo.org/glsa/201701-01
reference_id GLSA-201701-01
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:28Z/
url https://security.gentoo.org/glsa/201701-01
fixed_packages
0
url pkg:ebuild/dev-db/mysql@5.6.34
purl pkg:ebuild/dev-db/mysql@5.6.34
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.6.34
1
url pkg:ebuild/dev-db/mysql@10.0.28
purl pkg:ebuild/dev-db/mysql@10.0.28
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@10.0.28
aliases CVE-2016-5633
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-39rq-1cg5-9ueu
1
url VCID-3b6t-dn57-qbhb
vulnerability_id VCID-3b6t-dn57-qbhb
summary
Multiple vulnerabilities have been found in MariaDB and MySQL, the
    worst of which could lead to the remote execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8288.json
reference_id
reference_type
scores
0
value 3.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8288.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-8288
reference_id
reference_type
scores
0
value 0.00219
scoring_system epss
scoring_elements 0.44537
published_at 2026-04-18T12:55:00Z
1
value 0.00219
scoring_system epss
scoring_elements 0.44417
published_at 2026-04-01T12:55:00Z
2
value 0.00219
scoring_system epss
scoring_elements 0.44519
published_at 2026-04-11T12:55:00Z
3
value 0.00219
scoring_system epss
scoring_elements 0.44489
published_at 2026-04-12T12:55:00Z
4
value 0.00219
scoring_system epss
scoring_elements 0.4449
published_at 2026-04-13T12:55:00Z
5
value 0.00219
scoring_system epss
scoring_elements 0.44546
published_at 2026-04-16T12:55:00Z
6
value 0.00219
scoring_system epss
scoring_elements 0.44486
published_at 2026-04-02T12:55:00Z
7
value 0.00219
scoring_system epss
scoring_elements 0.44508
published_at 2026-04-04T12:55:00Z
8
value 0.00219
scoring_system epss
scoring_elements 0.44446
published_at 2026-04-07T12:55:00Z
9
value 0.00219
scoring_system epss
scoring_elements 0.44498
published_at 2026-04-08T12:55:00Z
10
value 0.00219
scoring_system epss
scoring_elements 0.44503
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-8288
2
reference_url http://www.securitytracker.com/id/1037050
reference_id 1037050
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:16Z/
url http://www.securitytracker.com/id/1037050
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1386590
reference_id 1386590
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1386590
4
reference_url http://www.securityfocus.com/bid/93740
reference_id 93740
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:16Z/
url http://www.securityfocus.com/bid/93740
5
reference_url https://security.gentoo.org/glsa/201701-01
reference_id GLSA-201701-01
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:16Z/
url https://security.gentoo.org/glsa/201701-01
6
reference_url https://access.redhat.com/errata/RHSA-2016:1601
reference_id RHSA-2016:1601
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1601
fixed_packages
0
url pkg:ebuild/dev-db/mysql@5.6.34
purl pkg:ebuild/dev-db/mysql@5.6.34
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.6.34
1
url pkg:ebuild/dev-db/mysql@10.0.28
purl pkg:ebuild/dev-db/mysql@10.0.28
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@10.0.28
aliases CVE-2016-8288
risk_score 1.4
exploitability 0.5
weighted_severity 2.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3b6t-dn57-qbhb
2
url VCID-3u5f-yadd-zkf7
vulnerability_id VCID-3u5f-yadd-zkf7
summary
Multiple vulnerabilities have been found in MariaDB and MySQL, the
    worst of which could lead to the remote execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5625.json
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5625.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-5625
reference_id
reference_type
scores
0
value 0.00043
scoring_system epss
scoring_elements 0.13148
published_at 2026-04-01T12:55:00Z
1
value 0.00043
scoring_system epss
scoring_elements 0.13038
published_at 2026-04-18T12:55:00Z
2
value 0.00043
scoring_system epss
scoring_elements 0.13222
published_at 2026-04-11T12:55:00Z
3
value 0.00043
scoring_system epss
scoring_elements 0.13185
published_at 2026-04-12T12:55:00Z
4
value 0.00043
scoring_system epss
scoring_elements 0.13133
published_at 2026-04-13T12:55:00Z
5
value 0.00043
scoring_system epss
scoring_elements 0.13035
published_at 2026-04-16T12:55:00Z
6
value 0.00043
scoring_system epss
scoring_elements 0.13257
published_at 2026-04-02T12:55:00Z
7
value 0.00043
scoring_system epss
scoring_elements 0.13323
published_at 2026-04-04T12:55:00Z
8
value 0.00043
scoring_system epss
scoring_elements 0.13121
published_at 2026-04-07T12:55:00Z
9
value 0.00043
scoring_system epss
scoring_elements 0.13202
published_at 2026-04-08T12:55:00Z
10
value 0.00043
scoring_system epss
scoring_elements 0.13253
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-5625
2
reference_url http://www.securitytracker.com/id/1037050
reference_id 1037050
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:36Z/
url http://www.securitytracker.com/id/1037050
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1386567
reference_id 1386567
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1386567
4
reference_url http://www.securityfocus.com/bid/93617
reference_id 93617
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:36Z/
url http://www.securityfocus.com/bid/93617
5
reference_url https://security.gentoo.org/glsa/201701-01
reference_id GLSA-201701-01
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:36Z/
url https://security.gentoo.org/glsa/201701-01
fixed_packages
0
url pkg:ebuild/dev-db/mysql@5.6.34
purl pkg:ebuild/dev-db/mysql@5.6.34
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.6.34
1
url pkg:ebuild/dev-db/mysql@10.0.28
purl pkg:ebuild/dev-db/mysql@10.0.28
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@10.0.28
aliases CVE-2016-5625
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3u5f-yadd-zkf7
3
url VCID-4maq-x6xs-x7gm
vulnerability_id VCID-4maq-x6xs-x7gm
summary
Multiple vulnerabilities have been found in MariaDB and MySQL, the
    worst of which could lead to the remote execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5507.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5507.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-5507
reference_id
reference_type
scores
0
value 0.00674
scoring_system epss
scoring_elements 0.7148
published_at 2026-04-18T12:55:00Z
1
value 0.00674
scoring_system epss
scoring_elements 0.71387
published_at 2026-04-07T12:55:00Z
2
value 0.00674
scoring_system epss
scoring_elements 0.71462
published_at 2026-04-11T12:55:00Z
3
value 0.00674
scoring_system epss
scoring_elements 0.71447
published_at 2026-04-12T12:55:00Z
4
value 0.00674
scoring_system epss
scoring_elements 0.71429
published_at 2026-04-13T12:55:00Z
5
value 0.00674
scoring_system epss
scoring_elements 0.71475
published_at 2026-04-16T12:55:00Z
6
value 0.00674
scoring_system epss
scoring_elements 0.71395
published_at 2026-04-02T12:55:00Z
7
value 0.00674
scoring_system epss
scoring_elements 0.71412
published_at 2026-04-04T12:55:00Z
8
value 0.00674
scoring_system epss
scoring_elements 0.71428
published_at 2026-04-08T12:55:00Z
9
value 0.00674
scoring_system epss
scoring_elements 0.7144
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-5507
2
reference_url http://www.securitytracker.com/id/1037050
reference_id 1037050
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:46Z/
url http://www.securitytracker.com/id/1037050
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1386556
reference_id 1386556
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1386556
4
reference_url http://www.securityfocus.com/bid/93678
reference_id 93678
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:46Z/
url http://www.securityfocus.com/bid/93678
5
reference_url https://security.gentoo.org/glsa/201701-01
reference_id GLSA-201701-01
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:46Z/
url https://security.gentoo.org/glsa/201701-01
6
reference_url https://access.redhat.com/errata/RHSA-2016:2749
reference_id RHSA-2016:2749
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2749
7
reference_url http://rhn.redhat.com/errata/RHSA-2016-2749.html
reference_id RHSA-2016-2749.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:46Z/
url http://rhn.redhat.com/errata/RHSA-2016-2749.html
fixed_packages
0
url pkg:ebuild/dev-db/mysql@5.6.34
purl pkg:ebuild/dev-db/mysql@5.6.34
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.6.34
1
url pkg:ebuild/dev-db/mysql@10.0.28
purl pkg:ebuild/dev-db/mysql@10.0.28
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@10.0.28
aliases CVE-2016-5507
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4maq-x6xs-x7gm
4
url VCID-8bs6-r11g-c3dx
vulnerability_id VCID-8bs6-r11g-c3dx
summary
Multiple vulnerabilities have been found in MariaDB and MySQL, the
    worst of which could lead to the remote execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5627.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5627.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-5627
reference_id
reference_type
scores
0
value 0.01357
scoring_system epss
scoring_elements 0.80164
published_at 2026-04-18T12:55:00Z
1
value 0.01357
scoring_system epss
scoring_elements 0.80087
published_at 2026-04-01T12:55:00Z
2
value 0.01357
scoring_system epss
scoring_elements 0.80157
published_at 2026-04-11T12:55:00Z
3
value 0.01357
scoring_system epss
scoring_elements 0.80142
published_at 2026-04-12T12:55:00Z
4
value 0.01357
scoring_system epss
scoring_elements 0.80134
published_at 2026-04-13T12:55:00Z
5
value 0.01357
scoring_system epss
scoring_elements 0.80163
published_at 2026-04-16T12:55:00Z
6
value 0.01357
scoring_system epss
scoring_elements 0.80095
published_at 2026-04-02T12:55:00Z
7
value 0.01357
scoring_system epss
scoring_elements 0.80115
published_at 2026-04-04T12:55:00Z
8
value 0.01357
scoring_system epss
scoring_elements 0.80103
published_at 2026-04-07T12:55:00Z
9
value 0.01357
scoring_system epss
scoring_elements 0.80132
published_at 2026-04-08T12:55:00Z
10
value 0.01357
scoring_system epss
scoring_elements 0.80139
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-5627
2
reference_url http://www.securitytracker.com/id/1037050
reference_id 1037050
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:35Z/
url http://www.securitytracker.com/id/1037050
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1386570
reference_id 1386570
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1386570
4
reference_url http://www.securityfocus.com/bid/93642
reference_id 93642
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:35Z/
url http://www.securityfocus.com/bid/93642
5
reference_url https://security.gentoo.org/glsa/201701-01
reference_id GLSA-201701-01
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:35Z/
url https://security.gentoo.org/glsa/201701-01
6
reference_url https://access.redhat.com/errata/RHSA-2016:1601
reference_id RHSA-2016:1601
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1601
fixed_packages
0
url pkg:ebuild/dev-db/mysql@5.6.34
purl pkg:ebuild/dev-db/mysql@5.6.34
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.6.34
1
url pkg:ebuild/dev-db/mysql@10.0.28
purl pkg:ebuild/dev-db/mysql@10.0.28
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@10.0.28
aliases CVE-2016-5627
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8bs6-r11g-c3dx
5
url VCID-8kvb-5u8c-zbc4
vulnerability_id VCID-8kvb-5u8c-zbc4
summary
Multiple vulnerabilities have been found in MariaDB and MySQL, the
    worst of which could lead to the remote execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5584.json
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5584.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-5584
reference_id
reference_type
scores
0
value 0.00442
scoring_system epss
scoring_elements 0.63214
published_at 2026-04-01T12:55:00Z
1
value 0.00442
scoring_system epss
scoring_elements 0.63345
published_at 2026-04-18T12:55:00Z
2
value 0.00442
scoring_system epss
scoring_elements 0.63273
published_at 2026-04-02T12:55:00Z
3
value 0.00442
scoring_system epss
scoring_elements 0.63302
published_at 2026-04-13T12:55:00Z
4
value 0.00442
scoring_system epss
scoring_elements 0.63268
published_at 2026-04-07T12:55:00Z
5
value 0.00442
scoring_system epss
scoring_elements 0.63319
published_at 2026-04-08T12:55:00Z
6
value 0.00442
scoring_system epss
scoring_elements 0.63337
published_at 2026-04-16T12:55:00Z
7
value 0.00442
scoring_system epss
scoring_elements 0.63355
published_at 2026-04-11T12:55:00Z
8
value 0.00442
scoring_system epss
scoring_elements 0.63338
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-5584
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3492
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3492
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5584
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5584
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5624
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5624
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5626
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5626
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5629
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5629
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6663
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6663
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7440
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7440
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8283
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8283
10
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:S/C:C/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
11
reference_url http://www.securitytracker.com/id/1037050
reference_id 1037050
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:08Z/
url http://www.securitytracker.com/id/1037050
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1386557
reference_id 1386557
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1386557
13
reference_url http://www.securityfocus.com/bid/93735
reference_id 93735
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:08Z/
url http://www.securityfocus.com/bid/93735
14
reference_url http://www.debian.org/security/2016/dsa-3706
reference_id dsa-3706
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:08Z/
url http://www.debian.org/security/2016/dsa-3706
15
reference_url https://security.gentoo.org/glsa/201701-01
reference_id GLSA-201701-01
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:08Z/
url https://security.gentoo.org/glsa/201701-01
16
reference_url https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/
reference_id mariadb-10028-release-notes
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:08Z/
url https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/
17
reference_url https://usn.ubuntu.com/3109-1/
reference_id USN-3109-1
reference_type
scores
url https://usn.ubuntu.com/3109-1/
fixed_packages
0
url pkg:ebuild/dev-db/mysql@5.6.34
purl pkg:ebuild/dev-db/mysql@5.6.34
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.6.34
1
url pkg:ebuild/dev-db/mysql@10.0.28
purl pkg:ebuild/dev-db/mysql@10.0.28
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@10.0.28
aliases CVE-2016-5584
risk_score 2.0
exploitability 0.5
weighted_severity 4.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8kvb-5u8c-zbc4
6
url VCID-b2aa-32zq-aqd5
vulnerability_id VCID-b2aa-32zq-aqd5
summary
Multiple vulnerabilities have been found in MariaDB and MySQL, the
    worst of which could lead to the remote execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5609.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5609.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-5609
reference_id
reference_type
scores
0
value 0.01357
scoring_system epss
scoring_elements 0.80164
published_at 2026-04-18T12:55:00Z
1
value 0.01357
scoring_system epss
scoring_elements 0.80087
published_at 2026-04-01T12:55:00Z
2
value 0.01357
scoring_system epss
scoring_elements 0.80157
published_at 2026-04-11T12:55:00Z
3
value 0.01357
scoring_system epss
scoring_elements 0.80142
published_at 2026-04-12T12:55:00Z
4
value 0.01357
scoring_system epss
scoring_elements 0.80134
published_at 2026-04-13T12:55:00Z
5
value 0.01357
scoring_system epss
scoring_elements 0.80163
published_at 2026-04-16T12:55:00Z
6
value 0.01357
scoring_system epss
scoring_elements 0.80095
published_at 2026-04-02T12:55:00Z
7
value 0.01357
scoring_system epss
scoring_elements 0.80115
published_at 2026-04-04T12:55:00Z
8
value 0.01357
scoring_system epss
scoring_elements 0.80103
published_at 2026-04-07T12:55:00Z
9
value 0.01357
scoring_system epss
scoring_elements 0.80132
published_at 2026-04-08T12:55:00Z
10
value 0.01357
scoring_system epss
scoring_elements 0.80139
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-5609
2
reference_url http://www.securitytracker.com/id/1037050
reference_id 1037050
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:51Z/
url http://www.securitytracker.com/id/1037050
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1386559
reference_id 1386559
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1386559
4
reference_url http://www.securityfocus.com/bid/93622
reference_id 93622
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:51Z/
url http://www.securityfocus.com/bid/93622
5
reference_url https://security.gentoo.org/glsa/201701-01
reference_id GLSA-201701-01
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:51Z/
url https://security.gentoo.org/glsa/201701-01
6
reference_url https://access.redhat.com/errata/RHSA-2016:1601
reference_id RHSA-2016:1601
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1601
fixed_packages
0
url pkg:ebuild/dev-db/mysql@5.6.34
purl pkg:ebuild/dev-db/mysql@5.6.34
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.6.34
1
url pkg:ebuild/dev-db/mysql@10.0.28
purl pkg:ebuild/dev-db/mysql@10.0.28
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@10.0.28
aliases CVE-2016-5609
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-b2aa-32zq-aqd5
7
url VCID-c66q-ap9s-57e1
vulnerability_id VCID-c66q-ap9s-57e1
summary
Multiple vulnerabilities have been found in MariaDB and MySQL, the
    worst of which could lead to the remote execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5631.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5631.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-5631
reference_id
reference_type
scores
0
value 0.01417
scoring_system epss
scoring_elements 0.80514
published_at 2026-04-01T12:55:00Z
1
value 0.01417
scoring_system epss
scoring_elements 0.806
published_at 2026-04-18T12:55:00Z
2
value 0.01417
scoring_system epss
scoring_elements 0.80591
published_at 2026-04-11T12:55:00Z
3
value 0.01417
scoring_system epss
scoring_elements 0.80577
published_at 2026-04-12T12:55:00Z
4
value 0.01417
scoring_system epss
scoring_elements 0.80569
published_at 2026-04-13T12:55:00Z
5
value 0.01417
scoring_system epss
scoring_elements 0.80598
published_at 2026-04-16T12:55:00Z
6
value 0.01417
scoring_system epss
scoring_elements 0.80521
published_at 2026-04-02T12:55:00Z
7
value 0.01417
scoring_system epss
scoring_elements 0.80543
published_at 2026-04-04T12:55:00Z
8
value 0.01417
scoring_system epss
scoring_elements 0.80535
published_at 2026-04-07T12:55:00Z
9
value 0.01417
scoring_system epss
scoring_elements 0.80564
published_at 2026-04-08T12:55:00Z
10
value 0.01417
scoring_system epss
scoring_elements 0.80574
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-5631
2
reference_url http://www.securitytracker.com/id/1037050
reference_id 1037050
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:31Z/
url http://www.securitytracker.com/id/1037050
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1386574
reference_id 1386574
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1386574
4
reference_url http://www.securityfocus.com/bid/93684
reference_id 93684
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:31Z/
url http://www.securityfocus.com/bid/93684
5
reference_url https://security.gentoo.org/glsa/201701-01
reference_id GLSA-201701-01
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:31Z/
url https://security.gentoo.org/glsa/201701-01
fixed_packages
0
url pkg:ebuild/dev-db/mysql@5.6.34
purl pkg:ebuild/dev-db/mysql@5.6.34
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.6.34
1
url pkg:ebuild/dev-db/mysql@10.0.28
purl pkg:ebuild/dev-db/mysql@10.0.28
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@10.0.28
aliases CVE-2016-5631
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-c66q-ap9s-57e1
8
url VCID-c9c7-nkt8-4baa
vulnerability_id VCID-c9c7-nkt8-4baa
summary
Multiple vulnerabilities have been found in MariaDB and MySQL, the
    worst of which could lead to the remote execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5632.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5632.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-5632
reference_id
reference_type
scores
0
value 0.01417
scoring_system epss
scoring_elements 0.80514
published_at 2026-04-01T12:55:00Z
1
value 0.01417
scoring_system epss
scoring_elements 0.806
published_at 2026-04-18T12:55:00Z
2
value 0.01417
scoring_system epss
scoring_elements 0.80591
published_at 2026-04-11T12:55:00Z
3
value 0.01417
scoring_system epss
scoring_elements 0.80577
published_at 2026-04-12T12:55:00Z
4
value 0.01417
scoring_system epss
scoring_elements 0.80569
published_at 2026-04-13T12:55:00Z
5
value 0.01417
scoring_system epss
scoring_elements 0.80598
published_at 2026-04-16T12:55:00Z
6
value 0.01417
scoring_system epss
scoring_elements 0.80521
published_at 2026-04-02T12:55:00Z
7
value 0.01417
scoring_system epss
scoring_elements 0.80543
published_at 2026-04-04T12:55:00Z
8
value 0.01417
scoring_system epss
scoring_elements 0.80535
published_at 2026-04-07T12:55:00Z
9
value 0.01417
scoring_system epss
scoring_elements 0.80564
published_at 2026-04-08T12:55:00Z
10
value 0.01417
scoring_system epss
scoring_elements 0.80574
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-5632
2
reference_url http://www.securitytracker.com/id/1037050
reference_id 1037050
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:29Z/
url http://www.securitytracker.com/id/1037050
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1386575
reference_id 1386575
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1386575
4
reference_url http://www.securityfocus.com/bid/93693
reference_id 93693
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:29Z/
url http://www.securityfocus.com/bid/93693
5
reference_url https://security.gentoo.org/glsa/201701-01
reference_id GLSA-201701-01
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:29Z/
url https://security.gentoo.org/glsa/201701-01
fixed_packages
0
url pkg:ebuild/dev-db/mysql@5.6.34
purl pkg:ebuild/dev-db/mysql@5.6.34
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.6.34
1
url pkg:ebuild/dev-db/mysql@10.0.28
purl pkg:ebuild/dev-db/mysql@10.0.28
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@10.0.28
aliases CVE-2016-5632
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-c9c7-nkt8-4baa
9
url VCID-dn63-evjx-5khp
vulnerability_id VCID-dn63-evjx-5khp
summary
Multiple vulnerabilities have been found in MariaDB and MySQL, the
    worst of which could lead to the remote execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8289.json
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8289.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-8289
reference_id
reference_type
scores
0
value 0.00075
scoring_system epss
scoring_elements 0.22534
published_at 2026-04-01T12:55:00Z
1
value 0.00075
scoring_system epss
scoring_elements 0.22602
published_at 2026-04-18T12:55:00Z
2
value 0.00075
scoring_system epss
scoring_elements 0.22686
published_at 2026-04-11T12:55:00Z
3
value 0.00075
scoring_system epss
scoring_elements 0.22645
published_at 2026-04-12T12:55:00Z
4
value 0.00075
scoring_system epss
scoring_elements 0.22589
published_at 2026-04-13T12:55:00Z
5
value 0.00075
scoring_system epss
scoring_elements 0.22605
published_at 2026-04-16T12:55:00Z
6
value 0.00075
scoring_system epss
scoring_elements 0.22706
published_at 2026-04-02T12:55:00Z
7
value 0.00075
scoring_system epss
scoring_elements 0.2275
published_at 2026-04-04T12:55:00Z
8
value 0.00075
scoring_system epss
scoring_elements 0.22537
published_at 2026-04-07T12:55:00Z
9
value 0.00075
scoring_system epss
scoring_elements 0.22615
published_at 2026-04-08T12:55:00Z
10
value 0.00075
scoring_system epss
scoring_elements 0.22668
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-8289
2
reference_url http://www.securitytracker.com/id/1037050
reference_id 1037050
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:15Z/
url http://www.securitytracker.com/id/1037050
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1386591
reference_id 1386591
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1386591
4
reference_url http://www.securityfocus.com/bid/93720
reference_id 93720
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:15Z/
url http://www.securityfocus.com/bid/93720
5
reference_url https://security.gentoo.org/glsa/201701-01
reference_id GLSA-201701-01
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:15Z/
url https://security.gentoo.org/glsa/201701-01
fixed_packages
0
url pkg:ebuild/dev-db/mysql@5.6.34
purl pkg:ebuild/dev-db/mysql@5.6.34
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.6.34
1
url pkg:ebuild/dev-db/mysql@10.0.28
purl pkg:ebuild/dev-db/mysql@10.0.28
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@10.0.28
aliases CVE-2016-8289
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dn63-evjx-5khp
10
url VCID-gp4w-bdxg-6kab
vulnerability_id VCID-gp4w-bdxg-6kab
summary
Multiple vulnerabilities have been found in MariaDB and MySQL, the
    worst of which could lead to the remote execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5629.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5629.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-5629
reference_id
reference_type
scores
0
value 0.00501
scoring_system epss
scoring_elements 0.66038
published_at 2026-04-18T12:55:00Z
1
value 0.00501
scoring_system epss
scoring_elements 0.65954
published_at 2026-04-02T12:55:00Z
2
value 0.00501
scoring_system epss
scoring_elements 0.65984
published_at 2026-04-04T12:55:00Z
3
value 0.00501
scoring_system epss
scoring_elements 0.6595
published_at 2026-04-07T12:55:00Z
4
value 0.00501
scoring_system epss
scoring_elements 0.66001
published_at 2026-04-08T12:55:00Z
5
value 0.00501
scoring_system epss
scoring_elements 0.66013
published_at 2026-04-09T12:55:00Z
6
value 0.00501
scoring_system epss
scoring_elements 0.66032
published_at 2026-04-11T12:55:00Z
7
value 0.00501
scoring_system epss
scoring_elements 0.66019
published_at 2026-04-12T12:55:00Z
8
value 0.00501
scoring_system epss
scoring_elements 0.65989
published_at 2026-04-13T12:55:00Z
9
value 0.00501
scoring_system epss
scoring_elements 0.66024
published_at 2026-04-16T12:55:00Z
10
value 0.00501
scoring_system epss
scoring_elements 0.65913
published_at 2026-04-01T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-5629
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3492
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3492
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5584
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5584
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5624
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5624
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5626
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5626
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5629
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5629
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6663
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6663
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7440
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7440
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8283
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8283
10
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:P
1
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
11
reference_url http://www.securitytracker.com/id/1037050
reference_id 1037050
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:33Z/
url http://www.securitytracker.com/id/1037050
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1386572
reference_id 1386572
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1386572
13
reference_url http://www.securityfocus.com/bid/93668
reference_id 93668
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:33Z/
url http://www.securityfocus.com/bid/93668
14
reference_url https://security.gentoo.org/glsa/201701-01
reference_id GLSA-201701-01
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:33Z/
url https://security.gentoo.org/glsa/201701-01
15
reference_url https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/
reference_id mariadb-10028-release-notes
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:33Z/
url https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/
16
reference_url https://mariadb.com/kb/en/mariadb/mariadb-10118-release-notes/
reference_id mariadb-10118-release-notes
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:33Z/
url https://mariadb.com/kb/en/mariadb/mariadb-10118-release-notes/
17
reference_url https://mariadb.com/kb/en/mariadb/mariadb-5552-release-notes/
reference_id mariadb-5552-release-notes
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:33Z/
url https://mariadb.com/kb/en/mariadb/mariadb-5552-release-notes/
18
reference_url https://access.redhat.com/errata/RHSA-2016:2130
reference_id RHSA-2016:2130
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2130
19
reference_url http://rhn.redhat.com/errata/RHSA-2016-2130.html
reference_id RHSA-2016-2130.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:33Z/
url http://rhn.redhat.com/errata/RHSA-2016-2130.html
20
reference_url https://access.redhat.com/errata/RHSA-2016:2131
reference_id RHSA-2016:2131
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2131
21
reference_url http://rhn.redhat.com/errata/RHSA-2016-2131.html
reference_id RHSA-2016-2131.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:33Z/
url http://rhn.redhat.com/errata/RHSA-2016-2131.html
22
reference_url https://access.redhat.com/errata/RHSA-2016:2595
reference_id RHSA-2016:2595
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2595
23
reference_url http://rhn.redhat.com/errata/RHSA-2016-2595.html
reference_id RHSA-2016-2595.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:33Z/
url http://rhn.redhat.com/errata/RHSA-2016-2595.html
24
reference_url https://access.redhat.com/errata/RHSA-2016:2749
reference_id RHSA-2016:2749
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2749
25
reference_url http://rhn.redhat.com/errata/RHSA-2016-2749.html
reference_id RHSA-2016-2749.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:33Z/
url http://rhn.redhat.com/errata/RHSA-2016-2749.html
26
reference_url https://access.redhat.com/errata/RHSA-2016:2927
reference_id RHSA-2016:2927
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2927
27
reference_url https://access.redhat.com/errata/RHSA-2016:2928
reference_id RHSA-2016:2928
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2928
fixed_packages
0
url pkg:ebuild/dev-db/mysql@5.6.34
purl pkg:ebuild/dev-db/mysql@5.6.34
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.6.34
1
url pkg:ebuild/dev-db/mysql@10.0.28
purl pkg:ebuild/dev-db/mysql@10.0.28
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@10.0.28
aliases CVE-2016-5629
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gp4w-bdxg-6kab
11
url VCID-gyjy-c8wc-qubd
vulnerability_id VCID-gyjy-c8wc-qubd
summary
Multiple vulnerabilities have been found in MariaDB and MySQL, the
    worst of which could lead to the remote execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5612.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5612.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-5612
reference_id
reference_type
scores
0
value 0.00712
scoring_system epss
scoring_elements 0.72311
published_at 2026-04-18T12:55:00Z
1
value 0.00712
scoring_system epss
scoring_elements 0.72217
published_at 2026-04-01T12:55:00Z
2
value 0.00712
scoring_system epss
scoring_elements 0.72289
published_at 2026-04-11T12:55:00Z
3
value 0.00712
scoring_system epss
scoring_elements 0.72273
published_at 2026-04-12T12:55:00Z
4
value 0.00712
scoring_system epss
scoring_elements 0.7226
published_at 2026-04-13T12:55:00Z
5
value 0.00712
scoring_system epss
scoring_elements 0.72302
published_at 2026-04-16T12:55:00Z
6
value 0.00712
scoring_system epss
scoring_elements 0.72222
published_at 2026-04-02T12:55:00Z
7
value 0.00712
scoring_system epss
scoring_elements 0.72242
published_at 2026-04-04T12:55:00Z
8
value 0.00712
scoring_system epss
scoring_elements 0.72218
published_at 2026-04-07T12:55:00Z
9
value 0.00712
scoring_system epss
scoring_elements 0.72255
published_at 2026-04-08T12:55:00Z
10
value 0.00712
scoring_system epss
scoring_elements 0.72267
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-5612
2
reference_url http://www.securitytracker.com/id/1037050
reference_id 1037050
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:48Z/
url http://www.securitytracker.com/id/1037050
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1386561
reference_id 1386561
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1386561
4
reference_url http://www.securityfocus.com/bid/93630
reference_id 93630
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:48Z/
url http://www.securityfocus.com/bid/93630
5
reference_url https://security.gentoo.org/glsa/201701-01
reference_id GLSA-201701-01
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:48Z/
url https://security.gentoo.org/glsa/201701-01
6
reference_url https://access.redhat.com/errata/RHSA-2016:1601
reference_id RHSA-2016:1601
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1601
7
reference_url https://access.redhat.com/errata/RHSA-2016:2130
reference_id RHSA-2016:2130
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2130
8
reference_url http://rhn.redhat.com/errata/RHSA-2016-2130.html
reference_id RHSA-2016-2130.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:48Z/
url http://rhn.redhat.com/errata/RHSA-2016-2130.html
9
reference_url https://access.redhat.com/errata/RHSA-2016:2131
reference_id RHSA-2016:2131
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2131
10
reference_url http://rhn.redhat.com/errata/RHSA-2016-2131.html
reference_id RHSA-2016-2131.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:48Z/
url http://rhn.redhat.com/errata/RHSA-2016-2131.html
11
reference_url https://access.redhat.com/errata/RHSA-2016:2595
reference_id RHSA-2016:2595
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2595
12
reference_url http://rhn.redhat.com/errata/RHSA-2016-2595.html
reference_id RHSA-2016-2595.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:48Z/
url http://rhn.redhat.com/errata/RHSA-2016-2595.html
13
reference_url https://access.redhat.com/errata/RHSA-2016:2927
reference_id RHSA-2016:2927
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2927
fixed_packages
0
url pkg:ebuild/dev-db/mysql@5.6.34
purl pkg:ebuild/dev-db/mysql@5.6.34
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.6.34
1
url pkg:ebuild/dev-db/mysql@10.0.28
purl pkg:ebuild/dev-db/mysql@10.0.28
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@10.0.28
aliases CVE-2016-5612
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gyjy-c8wc-qubd
12
url VCID-jj46-73tp-nub5
vulnerability_id VCID-jj46-73tp-nub5
summary
Multiple vulnerabilities have been found in MariaDB and MySQL, the
    worst of which could lead to the remote execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5630.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5630.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-5630
reference_id
reference_type
scores
0
value 0.00755
scoring_system epss
scoring_elements 0.73293
published_at 2026-04-18T12:55:00Z
1
value 0.00755
scoring_system epss
scoring_elements 0.73189
published_at 2026-04-01T12:55:00Z
2
value 0.00755
scoring_system epss
scoring_elements 0.73244
published_at 2026-04-09T12:55:00Z
3
value 0.00755
scoring_system epss
scoring_elements 0.73269
published_at 2026-04-11T12:55:00Z
4
value 0.00755
scoring_system epss
scoring_elements 0.73249
published_at 2026-04-12T12:55:00Z
5
value 0.00755
scoring_system epss
scoring_elements 0.73242
published_at 2026-04-13T12:55:00Z
6
value 0.00755
scoring_system epss
scoring_elements 0.73284
published_at 2026-04-16T12:55:00Z
7
value 0.00755
scoring_system epss
scoring_elements 0.73199
published_at 2026-04-02T12:55:00Z
8
value 0.00755
scoring_system epss
scoring_elements 0.7322
published_at 2026-04-04T12:55:00Z
9
value 0.00755
scoring_system epss
scoring_elements 0.73194
published_at 2026-04-07T12:55:00Z
10
value 0.00755
scoring_system epss
scoring_elements 0.7323
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-5630
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url http://www.securitytracker.com/id/1037050
reference_id 1037050
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:31Z/
url http://www.securitytracker.com/id/1037050
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1386573
reference_id 1386573
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1386573
5
reference_url http://www.securityfocus.com/bid/93674
reference_id 93674
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:31Z/
url http://www.securityfocus.com/bid/93674
6
reference_url https://security.gentoo.org/glsa/201701-01
reference_id GLSA-201701-01
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:31Z/
url https://security.gentoo.org/glsa/201701-01
7
reference_url https://access.redhat.com/errata/RHSA-2016:1601
reference_id RHSA-2016:1601
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1601
8
reference_url https://access.redhat.com/errata/RHSA-2016:2927
reference_id RHSA-2016:2927
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2927
fixed_packages
0
url pkg:ebuild/dev-db/mysql@5.6.34
purl pkg:ebuild/dev-db/mysql@5.6.34
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.6.34
1
url pkg:ebuild/dev-db/mysql@10.0.28
purl pkg:ebuild/dev-db/mysql@10.0.28
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@10.0.28
aliases CVE-2016-5630
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jj46-73tp-nub5
13
url VCID-jnue-w479-eqdw
vulnerability_id VCID-jnue-w479-eqdw
summary
Multiple vulnerabilities have been found in MariaDB and MySQL, the
    worst of which could lead to the remote execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3495.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3495.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-3495
reference_id
reference_type
scores
0
value 0.00739
scoring_system epss
scoring_elements 0.72837
published_at 2026-04-01T12:55:00Z
1
value 0.00739
scoring_system epss
scoring_elements 0.72942
published_at 2026-04-18T12:55:00Z
2
value 0.00739
scoring_system epss
scoring_elements 0.72891
published_at 2026-04-13T12:55:00Z
3
value 0.00739
scoring_system epss
scoring_elements 0.72915
published_at 2026-04-11T12:55:00Z
4
value 0.00739
scoring_system epss
scoring_elements 0.72899
published_at 2026-04-12T12:55:00Z
5
value 0.00739
scoring_system epss
scoring_elements 0.72932
published_at 2026-04-16T12:55:00Z
6
value 0.00739
scoring_system epss
scoring_elements 0.72843
published_at 2026-04-02T12:55:00Z
7
value 0.00739
scoring_system epss
scoring_elements 0.72864
published_at 2026-04-04T12:55:00Z
8
value 0.00739
scoring_system epss
scoring_elements 0.72839
published_at 2026-04-07T12:55:00Z
9
value 0.00739
scoring_system epss
scoring_elements 0.72877
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-3495
2
reference_url http://www.securitytracker.com/id/1037050
reference_id 1037050
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:50:06Z/
url http://www.securitytracker.com/id/1037050
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1386555
reference_id 1386555
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1386555
4
reference_url http://www.securityfocus.com/bid/93670
reference_id 93670
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:50:06Z/
url http://www.securityfocus.com/bid/93670
5
reference_url https://security.gentoo.org/glsa/201701-01
reference_id GLSA-201701-01
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:50:06Z/
url https://security.gentoo.org/glsa/201701-01
fixed_packages
0
url pkg:ebuild/dev-db/mysql@5.6.34
purl pkg:ebuild/dev-db/mysql@5.6.34
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.6.34
1
url pkg:ebuild/dev-db/mysql@10.0.28
purl pkg:ebuild/dev-db/mysql@10.0.28
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@10.0.28
aliases CVE-2016-3495
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jnue-w479-eqdw
14
url VCID-k7av-yra2-ckap
vulnerability_id VCID-k7av-yra2-ckap
summary
Multiple vulnerabilities have been found in MariaDB and MySQL, the
    worst of which could lead to the remote execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5635.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5635.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-5635
reference_id
reference_type
scores
0
value 0.01417
scoring_system epss
scoring_elements 0.80514
published_at 2026-04-01T12:55:00Z
1
value 0.01417
scoring_system epss
scoring_elements 0.806
published_at 2026-04-18T12:55:00Z
2
value 0.01417
scoring_system epss
scoring_elements 0.80591
published_at 2026-04-11T12:55:00Z
3
value 0.01417
scoring_system epss
scoring_elements 0.80577
published_at 2026-04-12T12:55:00Z
4
value 0.01417
scoring_system epss
scoring_elements 0.80569
published_at 2026-04-13T12:55:00Z
5
value 0.01417
scoring_system epss
scoring_elements 0.80598
published_at 2026-04-16T12:55:00Z
6
value 0.01417
scoring_system epss
scoring_elements 0.80521
published_at 2026-04-02T12:55:00Z
7
value 0.01417
scoring_system epss
scoring_elements 0.80543
published_at 2026-04-04T12:55:00Z
8
value 0.01417
scoring_system epss
scoring_elements 0.80535
published_at 2026-04-07T12:55:00Z
9
value 0.01417
scoring_system epss
scoring_elements 0.80564
published_at 2026-04-08T12:55:00Z
10
value 0.01417
scoring_system epss
scoring_elements 0.80574
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-5635
2
reference_url http://www.securitytracker.com/id/1037050
reference_id 1037050
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:25Z/
url http://www.securitytracker.com/id/1037050
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1386580
reference_id 1386580
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1386580
4
reference_url http://www.securityfocus.com/bid/93715
reference_id 93715
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:25Z/
url http://www.securityfocus.com/bid/93715
5
reference_url https://security.gentoo.org/glsa/201701-01
reference_id GLSA-201701-01
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:25Z/
url https://security.gentoo.org/glsa/201701-01
fixed_packages
0
url pkg:ebuild/dev-db/mysql@5.6.34
purl pkg:ebuild/dev-db/mysql@5.6.34
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.6.34
1
url pkg:ebuild/dev-db/mysql@10.0.28
purl pkg:ebuild/dev-db/mysql@10.0.28
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@10.0.28
aliases CVE-2016-5635
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-k7av-yra2-ckap
15
url VCID-kg6w-jbac-5yf8
vulnerability_id VCID-kg6w-jbac-5yf8
summary
Multiple vulnerabilities have been found in MariaDB and MySQL, the
    worst of which could lead to the remote execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8286.json
reference_id
reference_type
scores
0
value 3.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8286.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-8286
reference_id
reference_type
scores
0
value 0.00091
scoring_system epss
scoring_elements 0.25813
published_at 2026-04-11T12:55:00Z
1
value 0.00091
scoring_system epss
scoring_elements 0.25699
published_at 2026-04-18T12:55:00Z
2
value 0.00091
scoring_system epss
scoring_elements 0.25804
published_at 2026-04-09T12:55:00Z
3
value 0.00091
scoring_system epss
scoring_elements 0.25771
published_at 2026-04-12T12:55:00Z
4
value 0.00091
scoring_system epss
scoring_elements 0.25713
published_at 2026-04-13T12:55:00Z
5
value 0.00091
scoring_system epss
scoring_elements 0.25717
published_at 2026-04-16T12:55:00Z
6
value 0.00091
scoring_system epss
scoring_elements 0.25873
published_at 2026-04-02T12:55:00Z
7
value 0.00091
scoring_system epss
scoring_elements 0.25916
published_at 2026-04-04T12:55:00Z
8
value 0.00091
scoring_system epss
scoring_elements 0.25685
published_at 2026-04-07T12:55:00Z
9
value 0.00091
scoring_system epss
scoring_elements 0.25756
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-8286
2
reference_url http://www.securitytracker.com/id/1037050
reference_id 1037050
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:18Z/
url http://www.securitytracker.com/id/1037050
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1386588
reference_id 1386588
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1386588
4
reference_url http://www.securityfocus.com/bid/93745
reference_id 93745
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:18Z/
url http://www.securityfocus.com/bid/93745
5
reference_url https://security.gentoo.org/glsa/201701-01
reference_id GLSA-201701-01
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:18Z/
url https://security.gentoo.org/glsa/201701-01
fixed_packages
0
url pkg:ebuild/dev-db/mysql@5.6.34
purl pkg:ebuild/dev-db/mysql@5.6.34
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.6.34
1
url pkg:ebuild/dev-db/mysql@10.0.28
purl pkg:ebuild/dev-db/mysql@10.0.28
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@10.0.28
aliases CVE-2016-8286
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-kg6w-jbac-5yf8
16
url VCID-kvz9-pnmc-jfbp
vulnerability_id VCID-kvz9-pnmc-jfbp
summary
Multiple vulnerabilities have been found in MariaDB and MySQL, the
    worst of which could lead to the remote execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8287.json
reference_id
reference_type
scores
0
value 4.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8287.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-8287
reference_id
reference_type
scores
0
value 0.00274
scoring_system epss
scoring_elements 0.50745
published_at 2026-04-01T12:55:00Z
1
value 0.00274
scoring_system epss
scoring_elements 0.50886
published_at 2026-04-18T12:55:00Z
2
value 0.00274
scoring_system epss
scoring_elements 0.50839
published_at 2026-04-09T12:55:00Z
3
value 0.00274
scoring_system epss
scoring_elements 0.50881
published_at 2026-04-16T12:55:00Z
4
value 0.00274
scoring_system epss
scoring_elements 0.50858
published_at 2026-04-12T12:55:00Z
5
value 0.00274
scoring_system epss
scoring_elements 0.50843
published_at 2026-04-13T12:55:00Z
6
value 0.00274
scoring_system epss
scoring_elements 0.50801
published_at 2026-04-02T12:55:00Z
7
value 0.00274
scoring_system epss
scoring_elements 0.50827
published_at 2026-04-04T12:55:00Z
8
value 0.00274
scoring_system epss
scoring_elements 0.50784
published_at 2026-04-07T12:55:00Z
9
value 0.00274
scoring_system epss
scoring_elements 0.50841
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-8287
2
reference_url http://www.securitytracker.com/id/1037050
reference_id 1037050
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:17Z/
url http://www.securitytracker.com/id/1037050
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1386589
reference_id 1386589
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1386589
4
reference_url http://www.securityfocus.com/bid/93727
reference_id 93727
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:17Z/
url http://www.securityfocus.com/bid/93727
5
reference_url https://security.gentoo.org/glsa/201701-01
reference_id GLSA-201701-01
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:17Z/
url https://security.gentoo.org/glsa/201701-01
fixed_packages
0
url pkg:ebuild/dev-db/mysql@5.6.34
purl pkg:ebuild/dev-db/mysql@5.6.34
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.6.34
1
url pkg:ebuild/dev-db/mysql@10.0.28
purl pkg:ebuild/dev-db/mysql@10.0.28
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@10.0.28
aliases CVE-2016-8287
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-kvz9-pnmc-jfbp
17
url VCID-pchw-5h2a-27fk
vulnerability_id VCID-pchw-5h2a-27fk
summary
Multiple vulnerabilities have been found in MariaDB and MySQL, the
    worst of which could lead to the remote execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8290.json
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8290.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-8290
reference_id
reference_type
scores
0
value 0.00542
scoring_system epss
scoring_elements 0.6761
published_at 2026-04-01T12:55:00Z
1
value 0.00542
scoring_system epss
scoring_elements 0.67737
published_at 2026-04-18T12:55:00Z
2
value 0.00542
scoring_system epss
scoring_elements 0.67736
published_at 2026-04-11T12:55:00Z
3
value 0.00542
scoring_system epss
scoring_elements 0.67721
published_at 2026-04-12T12:55:00Z
4
value 0.00542
scoring_system epss
scoring_elements 0.67688
published_at 2026-04-13T12:55:00Z
5
value 0.00542
scoring_system epss
scoring_elements 0.67724
published_at 2026-04-16T12:55:00Z
6
value 0.00542
scoring_system epss
scoring_elements 0.67646
published_at 2026-04-02T12:55:00Z
7
value 0.00542
scoring_system epss
scoring_elements 0.67667
published_at 2026-04-04T12:55:00Z
8
value 0.00542
scoring_system epss
scoring_elements 0.67647
published_at 2026-04-07T12:55:00Z
9
value 0.00542
scoring_system epss
scoring_elements 0.67699
published_at 2026-04-08T12:55:00Z
10
value 0.00542
scoring_system epss
scoring_elements 0.67713
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-8290
2
reference_url http://www.securitytracker.com/id/1037050
reference_id 1037050
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:14Z/
url http://www.securitytracker.com/id/1037050
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1386592
reference_id 1386592
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1386592
4
reference_url http://www.securityfocus.com/bid/93733
reference_id 93733
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:14Z/
url http://www.securityfocus.com/bid/93733
5
reference_url https://security.gentoo.org/glsa/201701-01
reference_id GLSA-201701-01
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:14Z/
url https://security.gentoo.org/glsa/201701-01
fixed_packages
0
url pkg:ebuild/dev-db/mysql@5.6.34
purl pkg:ebuild/dev-db/mysql@5.6.34
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.6.34
1
url pkg:ebuild/dev-db/mysql@10.0.28
purl pkg:ebuild/dev-db/mysql@10.0.28
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@10.0.28
aliases CVE-2016-8290
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pchw-5h2a-27fk
18
url VCID-rted-6vzz-mbcv
vulnerability_id VCID-rted-6vzz-mbcv
summary
Multiple vulnerabilities have been found in MariaDB and MySQL, the
    worst of which could lead to the remote execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3492.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3492.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-3492
reference_id
reference_type
scores
0
value 0.00566
scoring_system epss
scoring_elements 0.68526
published_at 2026-04-18T12:55:00Z
1
value 0.00566
scoring_system epss
scoring_elements 0.68451
published_at 2026-04-04T12:55:00Z
2
value 0.00566
scoring_system epss
scoring_elements 0.68427
published_at 2026-04-07T12:55:00Z
3
value 0.00566
scoring_system epss
scoring_elements 0.68477
published_at 2026-04-08T12:55:00Z
4
value 0.00566
scoring_system epss
scoring_elements 0.68494
published_at 2026-04-09T12:55:00Z
5
value 0.00566
scoring_system epss
scoring_elements 0.6852
published_at 2026-04-11T12:55:00Z
6
value 0.00566
scoring_system epss
scoring_elements 0.68508
published_at 2026-04-12T12:55:00Z
7
value 0.00566
scoring_system epss
scoring_elements 0.68475
published_at 2026-04-13T12:55:00Z
8
value 0.00566
scoring_system epss
scoring_elements 0.68513
published_at 2026-04-16T12:55:00Z
9
value 0.00566
scoring_system epss
scoring_elements 0.68412
published_at 2026-04-01T12:55:00Z
10
value 0.00566
scoring_system epss
scoring_elements 0.68431
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-3492
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3492
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3492
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5584
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5584
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5624
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5624
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5626
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5626
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5629
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5629
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6663
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6663
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7440
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7440
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8283
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8283
10
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
11
reference_url http://www.securitytracker.com/id/1037050
reference_id 1037050
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:50:08Z/
url http://www.securitytracker.com/id/1037050
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1386554
reference_id 1386554
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1386554
13
reference_url http://www.securityfocus.com/bid/93650
reference_id 93650
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:50:08Z/
url http://www.securityfocus.com/bid/93650
14
reference_url https://security.gentoo.org/glsa/201701-01
reference_id GLSA-201701-01
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:50:08Z/
url https://security.gentoo.org/glsa/201701-01
15
reference_url https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/
reference_id mariadb-10028-release-notes
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:50:08Z/
url https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/
16
reference_url https://mariadb.com/kb/en/mariadb/mariadb-10118-release-notes/
reference_id mariadb-10118-release-notes
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:50:08Z/
url https://mariadb.com/kb/en/mariadb/mariadb-10118-release-notes/
17
reference_url https://mariadb.com/kb/en/mariadb/mariadb-5552-release-notes/
reference_id mariadb-5552-release-notes
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:50:08Z/
url https://mariadb.com/kb/en/mariadb/mariadb-5552-release-notes/
18
reference_url https://access.redhat.com/errata/RHSA-2016:2130
reference_id RHSA-2016:2130
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2130
19
reference_url http://rhn.redhat.com/errata/RHSA-2016-2130.html
reference_id RHSA-2016-2130.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:50:08Z/
url http://rhn.redhat.com/errata/RHSA-2016-2130.html
20
reference_url https://access.redhat.com/errata/RHSA-2016:2131
reference_id RHSA-2016:2131
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2131
21
reference_url http://rhn.redhat.com/errata/RHSA-2016-2131.html
reference_id RHSA-2016-2131.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:50:08Z/
url http://rhn.redhat.com/errata/RHSA-2016-2131.html
22
reference_url https://access.redhat.com/errata/RHSA-2016:2595
reference_id RHSA-2016:2595
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2595
23
reference_url http://rhn.redhat.com/errata/RHSA-2016-2595.html
reference_id RHSA-2016-2595.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:50:08Z/
url http://rhn.redhat.com/errata/RHSA-2016-2595.html
24
reference_url https://access.redhat.com/errata/RHSA-2016:2749
reference_id RHSA-2016:2749
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2749
25
reference_url http://rhn.redhat.com/errata/RHSA-2016-2749.html
reference_id RHSA-2016-2749.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:50:08Z/
url http://rhn.redhat.com/errata/RHSA-2016-2749.html
26
reference_url https://access.redhat.com/errata/RHSA-2016:2927
reference_id RHSA-2016:2927
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2927
27
reference_url https://access.redhat.com/errata/RHSA-2016:2928
reference_id RHSA-2016:2928
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2928
fixed_packages
0
url pkg:ebuild/dev-db/mysql@5.6.34
purl pkg:ebuild/dev-db/mysql@5.6.34
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.6.34
1
url pkg:ebuild/dev-db/mysql@10.0.28
purl pkg:ebuild/dev-db/mysql@10.0.28
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@10.0.28
aliases CVE-2016-3492
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rted-6vzz-mbcv
19
url VCID-skzt-r7sx-1ucv
vulnerability_id VCID-skzt-r7sx-1ucv
summary
Multiple vulnerabilities have been found in MariaDB and MySQL, the
    worst of which could lead to the remote execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-6662.json
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-6662.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-6662
reference_id
reference_type
scores
0
value 0.89577
scoring_system epss
scoring_elements 0.99554
published_at 2026-04-04T12:55:00Z
1
value 0.89577
scoring_system epss
scoring_elements 0.99553
published_at 2026-04-02T12:55:00Z
2
value 0.89577
scoring_system epss
scoring_elements 0.99555
published_at 2026-04-07T12:55:00Z
3
value 0.89577
scoring_system epss
scoring_elements 0.99556
published_at 2026-04-12T12:55:00Z
4
value 0.89577
scoring_system epss
scoring_elements 0.99557
published_at 2026-04-13T12:55:00Z
5
value 0.89577
scoring_system epss
scoring_elements 0.99559
published_at 2026-04-16T12:55:00Z
6
value 0.89577
scoring_system epss
scoring_elements 0.9956
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-6662
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6662
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6662
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.5
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:S/C:C/I:C/A:C
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1375198
reference_id 1375198
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1375198
5
reference_url http://legalhackers.com/advisories/MySQL-Exploit-Remote-Root-Code-Execution-Privesc-CVE-2016-6662.html
reference_id CVE-2016-6662
reference_type exploit
scores
url http://legalhackers.com/advisories/MySQL-Exploit-Remote-Root-Code-Execution-Privesc-CVE-2016-6662.html
6
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/40360.py
reference_id CVE-2016-6662
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/40360.py
7
reference_url https://security.gentoo.org/glsa/201701-01
reference_id GLSA-201701-01
reference_type
scores
url https://security.gentoo.org/glsa/201701-01
8
reference_url https://access.redhat.com/errata/RHSA-2016:2058
reference_id RHSA-2016:2058
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2058
9
reference_url https://access.redhat.com/errata/RHSA-2016:2059
reference_id RHSA-2016:2059
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2059
10
reference_url https://access.redhat.com/errata/RHSA-2016:2060
reference_id RHSA-2016:2060
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2060
11
reference_url https://access.redhat.com/errata/RHSA-2016:2061
reference_id RHSA-2016:2061
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2061
12
reference_url https://access.redhat.com/errata/RHSA-2016:2062
reference_id RHSA-2016:2062
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2062
13
reference_url https://access.redhat.com/errata/RHSA-2016:2077
reference_id RHSA-2016:2077
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2077
14
reference_url https://access.redhat.com/errata/RHSA-2016:2130
reference_id RHSA-2016:2130
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2130
15
reference_url https://access.redhat.com/errata/RHSA-2016:2131
reference_id RHSA-2016:2131
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2131
16
reference_url https://access.redhat.com/errata/RHSA-2016:2595
reference_id RHSA-2016:2595
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2595
17
reference_url https://access.redhat.com/errata/RHSA-2016:2749
reference_id RHSA-2016:2749
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2749
18
reference_url https://access.redhat.com/errata/RHSA-2016:2927
reference_id RHSA-2016:2927
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2927
19
reference_url https://access.redhat.com/errata/RHSA-2016:2928
reference_id RHSA-2016:2928
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2928
20
reference_url https://access.redhat.com/errata/RHSA-2017:0184
reference_id RHSA-2017:0184
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:0184
21
reference_url https://usn.ubuntu.com/3078-1/
reference_id USN-3078-1
reference_type
scores
url https://usn.ubuntu.com/3078-1/
fixed_packages
0
url pkg:ebuild/dev-db/mysql@5.6.34
purl pkg:ebuild/dev-db/mysql@5.6.34
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.6.34
1
url pkg:ebuild/dev-db/mysql@10.0.28
purl pkg:ebuild/dev-db/mysql@10.0.28
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@10.0.28
aliases CVE-2016-6662
risk_score 10.0
exploitability 2.0
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-skzt-r7sx-1ucv
20
url VCID-tdbv-p3up-vfgv
vulnerability_id VCID-tdbv-p3up-vfgv
summary SQL injection vulnerability in Pivotal Spring Data JPA before 1.9.6 (Gosling SR6) and 1.10.x before 1.10.4 (Hopper SR4), when used with a repository that defines a String query using the @Query annotation, allows attackers to execute arbitrary JPQL commands via a sort instance with a function call.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-6652
reference_id
reference_type
scores
0
value 0.00317
scoring_system epss
scoring_elements 0.54758
published_at 2026-04-04T12:55:00Z
1
value 0.00317
scoring_system epss
scoring_elements 0.54789
published_at 2026-04-18T12:55:00Z
2
value 0.00317
scoring_system epss
scoring_elements 0.54776
published_at 2026-04-09T12:55:00Z
3
value 0.00317
scoring_system epss
scoring_elements 0.54779
published_at 2026-04-08T12:55:00Z
4
value 0.00317
scoring_system epss
scoring_elements 0.54727
published_at 2026-04-07T12:55:00Z
5
value 0.00317
scoring_system epss
scoring_elements 0.54665
published_at 2026-04-01T12:55:00Z
6
value 0.00317
scoring_system epss
scoring_elements 0.54735
published_at 2026-04-02T12:55:00Z
7
value 0.00317
scoring_system epss
scoring_elements 0.54749
published_at 2026-04-13T12:55:00Z
8
value 0.00317
scoring_system epss
scoring_elements 0.54771
published_at 2026-04-12T12:55:00Z
9
value 0.00317
scoring_system epss
scoring_elements 0.54787
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-6652
1
reference_url https://github.com/spring-projects/spring-data-jpa/commit/b8e7fe
reference_id
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/spring-projects/spring-data-jpa/commit/b8e7fe
2
reference_url https://github.com/spring-projects/spring-data-jpa/commit/b8e7fecccc7dc8edcabb4704656a7abe6352c08f
reference_id
reference_type
scores
url https://github.com/spring-projects/spring-data-jpa/commit/b8e7fecccc7dc8edcabb4704656a7abe6352c08f
3
reference_url https://jira.spring.io/browse/DATAJPA-965
reference_id
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://jira.spring.io/browse/DATAJPA-965
4
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-6652
reference_id
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2016-6652
5
reference_url https://pivotal.io/security/cve-2016-6652
reference_id
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://pivotal.io/security/cve-2016-6652
6
reference_url http://www.securityfocus.com/bid/93276
reference_id
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.securityfocus.com/bid/93276
7
reference_url https://github.com/advisories/GHSA-xr4v-28rm-pvgw
reference_id GHSA-xr4v-28rm-pvgw
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-xr4v-28rm-pvgw
8
reference_url https://security.gentoo.org/glsa/201701-01
reference_id GLSA-201701-01
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://security.gentoo.org/glsa/201701-01
fixed_packages
0
url pkg:ebuild/dev-db/mysql@5.6.34
purl pkg:ebuild/dev-db/mysql@5.6.34
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.6.34
1
url pkg:ebuild/dev-db/mysql@10.0.28
purl pkg:ebuild/dev-db/mysql@10.0.28
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@10.0.28
aliases CVE-2016-6652, GHSA-xr4v-28rm-pvgw
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tdbv-p3up-vfgv
21
url VCID-teh5-9459-p7a8
vulnerability_id VCID-teh5-9459-p7a8
summary
Multiple vulnerabilities have been found in MariaDB and MySQL, the
    worst of which could lead to the remote execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5634.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5634.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-5634
reference_id
reference_type
scores
0
value 0.01417
scoring_system epss
scoring_elements 0.80514
published_at 2026-04-01T12:55:00Z
1
value 0.01417
scoring_system epss
scoring_elements 0.806
published_at 2026-04-18T12:55:00Z
2
value 0.01417
scoring_system epss
scoring_elements 0.80591
published_at 2026-04-11T12:55:00Z
3
value 0.01417
scoring_system epss
scoring_elements 0.80577
published_at 2026-04-12T12:55:00Z
4
value 0.01417
scoring_system epss
scoring_elements 0.80569
published_at 2026-04-13T12:55:00Z
5
value 0.01417
scoring_system epss
scoring_elements 0.80598
published_at 2026-04-16T12:55:00Z
6
value 0.01417
scoring_system epss
scoring_elements 0.80521
published_at 2026-04-02T12:55:00Z
7
value 0.01417
scoring_system epss
scoring_elements 0.80543
published_at 2026-04-04T12:55:00Z
8
value 0.01417
scoring_system epss
scoring_elements 0.80535
published_at 2026-04-07T12:55:00Z
9
value 0.01417
scoring_system epss
scoring_elements 0.80564
published_at 2026-04-08T12:55:00Z
10
value 0.01417
scoring_system epss
scoring_elements 0.80574
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-5634
2
reference_url http://www.securitytracker.com/id/1037050
reference_id 1037050
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:27Z/
url http://www.securitytracker.com/id/1037050
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1386579
reference_id 1386579
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1386579
4
reference_url http://www.securityfocus.com/bid/93709
reference_id 93709
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:27Z/
url http://www.securityfocus.com/bid/93709
5
reference_url https://security.gentoo.org/glsa/201701-01
reference_id GLSA-201701-01
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:27Z/
url https://security.gentoo.org/glsa/201701-01
fixed_packages
0
url pkg:ebuild/dev-db/mysql@5.6.34
purl pkg:ebuild/dev-db/mysql@5.6.34
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.6.34
1
url pkg:ebuild/dev-db/mysql@10.0.28
purl pkg:ebuild/dev-db/mysql@10.0.28
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@10.0.28
aliases CVE-2016-5634
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-teh5-9459-p7a8
22
url VCID-tvdv-3ed5-h3dt
vulnerability_id VCID-tvdv-3ed5-h3dt
summary
Multiple vulnerabilities have been found in MariaDB and MySQL, the
    worst of which could lead to the remote execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5626.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5626.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-5626
reference_id
reference_type
scores
0
value 0.00369
scoring_system epss
scoring_elements 0.58837
published_at 2026-04-16T12:55:00Z
1
value 0.00369
scoring_system epss
scoring_elements 0.58702
published_at 2026-04-01T12:55:00Z
2
value 0.00369
scoring_system epss
scoring_elements 0.58776
published_at 2026-04-02T12:55:00Z
3
value 0.00369
scoring_system epss
scoring_elements 0.58797
published_at 2026-04-04T12:55:00Z
4
value 0.00369
scoring_system epss
scoring_elements 0.58766
published_at 2026-04-07T12:55:00Z
5
value 0.00369
scoring_system epss
scoring_elements 0.58818
published_at 2026-04-08T12:55:00Z
6
value 0.00369
scoring_system epss
scoring_elements 0.58824
published_at 2026-04-12T12:55:00Z
7
value 0.00369
scoring_system epss
scoring_elements 0.58842
published_at 2026-04-18T12:55:00Z
8
value 0.00369
scoring_system epss
scoring_elements 0.58805
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-5626
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3492
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3492
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5584
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5584
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5624
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5624
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5626
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5626
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5629
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5629
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6663
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6663
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7440
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7440
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8283
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8283
10
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
11
reference_url http://www.securitytracker.com/id/1037050
reference_id 1037050
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:36Z/
url http://www.securitytracker.com/id/1037050
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1386568
reference_id 1386568
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1386568
13
reference_url http://www.securityfocus.com/bid/93638
reference_id 93638
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:36Z/
url http://www.securityfocus.com/bid/93638
14
reference_url https://security.gentoo.org/glsa/201701-01
reference_id GLSA-201701-01
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:36Z/
url https://security.gentoo.org/glsa/201701-01
15
reference_url https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/
reference_id mariadb-10028-release-notes
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:36Z/
url https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/
16
reference_url https://mariadb.com/kb/en/mariadb/mariadb-10118-release-notes/
reference_id mariadb-10118-release-notes
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:36Z/
url https://mariadb.com/kb/en/mariadb/mariadb-10118-release-notes/
17
reference_url https://mariadb.com/kb/en/mariadb/mariadb-5552-release-notes/
reference_id mariadb-5552-release-notes
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:36Z/
url https://mariadb.com/kb/en/mariadb/mariadb-5552-release-notes/
18
reference_url https://access.redhat.com/errata/RHSA-2016:2130
reference_id RHSA-2016:2130
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2130
19
reference_url http://rhn.redhat.com/errata/RHSA-2016-2130.html
reference_id RHSA-2016-2130.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:36Z/
url http://rhn.redhat.com/errata/RHSA-2016-2130.html
20
reference_url https://access.redhat.com/errata/RHSA-2016:2131
reference_id RHSA-2016:2131
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2131
21
reference_url http://rhn.redhat.com/errata/RHSA-2016-2131.html
reference_id RHSA-2016-2131.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:36Z/
url http://rhn.redhat.com/errata/RHSA-2016-2131.html
22
reference_url https://access.redhat.com/errata/RHSA-2016:2595
reference_id RHSA-2016:2595
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2595
23
reference_url http://rhn.redhat.com/errata/RHSA-2016-2595.html
reference_id RHSA-2016-2595.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:36Z/
url http://rhn.redhat.com/errata/RHSA-2016-2595.html
24
reference_url https://access.redhat.com/errata/RHSA-2016:2749
reference_id RHSA-2016:2749
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2749
25
reference_url http://rhn.redhat.com/errata/RHSA-2016-2749.html
reference_id RHSA-2016-2749.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:36Z/
url http://rhn.redhat.com/errata/RHSA-2016-2749.html
26
reference_url https://access.redhat.com/errata/RHSA-2016:2927
reference_id RHSA-2016:2927
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2927
27
reference_url https://access.redhat.com/errata/RHSA-2016:2928
reference_id RHSA-2016:2928
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2928
fixed_packages
0
url pkg:ebuild/dev-db/mysql@5.6.34
purl pkg:ebuild/dev-db/mysql@5.6.34
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.6.34
1
url pkg:ebuild/dev-db/mysql@10.0.28
purl pkg:ebuild/dev-db/mysql@10.0.28
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@10.0.28
aliases CVE-2016-5626
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tvdv-3ed5-h3dt
23
url VCID-vh5y-15tw-d7fd
vulnerability_id VCID-vh5y-15tw-d7fd
summary
Multiple vulnerabilities have been found in MariaDB and MySQL, the
    worst of which could lead to the remote execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8283.json
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8283.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-8283
reference_id
reference_type
scores
0
value 0.00361
scoring_system epss
scoring_elements 0.58292
published_at 2026-04-18T12:55:00Z
1
value 0.00361
scoring_system epss
scoring_elements 0.58229
published_at 2026-04-02T12:55:00Z
2
value 0.00361
scoring_system epss
scoring_elements 0.58249
published_at 2026-04-04T12:55:00Z
3
value 0.00361
scoring_system epss
scoring_elements 0.58223
published_at 2026-04-07T12:55:00Z
4
value 0.00361
scoring_system epss
scoring_elements 0.58277
published_at 2026-04-08T12:55:00Z
5
value 0.00361
scoring_system epss
scoring_elements 0.58283
published_at 2026-04-09T12:55:00Z
6
value 0.00361
scoring_system epss
scoring_elements 0.583
published_at 2026-04-11T12:55:00Z
7
value 0.00361
scoring_system epss
scoring_elements 0.58278
published_at 2026-04-12T12:55:00Z
8
value 0.00361
scoring_system epss
scoring_elements 0.58258
published_at 2026-04-13T12:55:00Z
9
value 0.00361
scoring_system epss
scoring_elements 0.5829
published_at 2026-04-16T12:55:00Z
10
value 0.00361
scoring_system epss
scoring_elements 0.58144
published_at 2026-04-01T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-8283
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3492
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3492
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5584
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5584
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5624
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5624
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5626
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5626
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5629
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5629
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6663
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6663
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7440
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7440
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8283
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8283
10
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:P
1
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
11
reference_url http://www.securitytracker.com/id/1037050
reference_id 1037050
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:22Z/
url http://www.securitytracker.com/id/1037050
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1386585
reference_id 1386585
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1386585
13
reference_url http://www.securityfocus.com/bid/93737
reference_id 93737
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:22Z/
url http://www.securityfocus.com/bid/93737
14
reference_url https://security.gentoo.org/glsa/201701-01
reference_id GLSA-201701-01
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:22Z/
url https://security.gentoo.org/glsa/201701-01
15
reference_url https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/
reference_id mariadb-10028-release-notes
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:22Z/
url https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/
16
reference_url https://mariadb.com/kb/en/mariadb/mariadb-10118-release-notes/
reference_id mariadb-10118-release-notes
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:22Z/
url https://mariadb.com/kb/en/mariadb/mariadb-10118-release-notes/
17
reference_url https://mariadb.com/kb/en/mariadb/mariadb-5552-release-notes/
reference_id mariadb-5552-release-notes
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:22Z/
url https://mariadb.com/kb/en/mariadb/mariadb-5552-release-notes/
18
reference_url https://access.redhat.com/errata/RHSA-2016:2130
reference_id RHSA-2016:2130
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2130
19
reference_url http://rhn.redhat.com/errata/RHSA-2016-2130.html
reference_id RHSA-2016-2130.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:22Z/
url http://rhn.redhat.com/errata/RHSA-2016-2130.html
20
reference_url https://access.redhat.com/errata/RHSA-2016:2131
reference_id RHSA-2016:2131
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2131
21
reference_url http://rhn.redhat.com/errata/RHSA-2016-2131.html
reference_id RHSA-2016-2131.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:22Z/
url http://rhn.redhat.com/errata/RHSA-2016-2131.html
22
reference_url https://access.redhat.com/errata/RHSA-2016:2595
reference_id RHSA-2016:2595
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2595
23
reference_url http://rhn.redhat.com/errata/RHSA-2016-2595.html
reference_id RHSA-2016-2595.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:22Z/
url http://rhn.redhat.com/errata/RHSA-2016-2595.html
24
reference_url https://access.redhat.com/errata/RHSA-2016:2749
reference_id RHSA-2016:2749
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2749
25
reference_url http://rhn.redhat.com/errata/RHSA-2016-2749.html
reference_id RHSA-2016-2749.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:22Z/
url http://rhn.redhat.com/errata/RHSA-2016-2749.html
26
reference_url https://access.redhat.com/errata/RHSA-2016:2927
reference_id RHSA-2016:2927
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2927
27
reference_url https://access.redhat.com/errata/RHSA-2016:2928
reference_id RHSA-2016:2928
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2928
fixed_packages
0
url pkg:ebuild/dev-db/mysql@5.6.34
purl pkg:ebuild/dev-db/mysql@5.6.34
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.6.34
1
url pkg:ebuild/dev-db/mysql@10.0.28
purl pkg:ebuild/dev-db/mysql@10.0.28
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@10.0.28
aliases CVE-2016-8283
risk_score 1.9
exploitability 0.5
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vh5y-15tw-d7fd
24
url VCID-wnpa-9f9q-dfbs
vulnerability_id VCID-wnpa-9f9q-dfbs
summary
Multiple vulnerabilities have been found in MariaDB and MySQL, the
    worst of which could lead to the remote execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8284.json
reference_id
reference_type
scores
0
value 1.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:H/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8284.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-8284
reference_id
reference_type
scores
0
value 0.00067
scoring_system epss
scoring_elements 0.20786
published_at 2026-04-18T12:55:00Z
1
value 0.00067
scoring_system epss
scoring_elements 0.20822
published_at 2026-04-01T12:55:00Z
2
value 0.00067
scoring_system epss
scoring_elements 0.209
published_at 2026-04-11T12:55:00Z
3
value 0.00067
scoring_system epss
scoring_elements 0.20856
published_at 2026-04-12T12:55:00Z
4
value 0.00067
scoring_system epss
scoring_elements 0.20804
published_at 2026-04-13T12:55:00Z
5
value 0.00067
scoring_system epss
scoring_elements 0.20794
published_at 2026-04-16T12:55:00Z
6
value 0.00067
scoring_system epss
scoring_elements 0.20972
published_at 2026-04-02T12:55:00Z
7
value 0.00067
scoring_system epss
scoring_elements 0.2103
published_at 2026-04-04T12:55:00Z
8
value 0.00067
scoring_system epss
scoring_elements 0.20745
published_at 2026-04-07T12:55:00Z
9
value 0.00067
scoring_system epss
scoring_elements 0.20823
published_at 2026-04-08T12:55:00Z
10
value 0.00067
scoring_system epss
scoring_elements 0.20884
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-8284
2
reference_url http://www.securitytracker.com/id/1037050
reference_id 1037050
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:21Z/
url http://www.securitytracker.com/id/1037050
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1386587
reference_id 1386587
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1386587
4
reference_url http://www.securityfocus.com/bid/93755
reference_id 93755
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:21Z/
url http://www.securityfocus.com/bid/93755
5
reference_url https://security.gentoo.org/glsa/201701-01
reference_id GLSA-201701-01
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:21Z/
url https://security.gentoo.org/glsa/201701-01
6
reference_url https://access.redhat.com/errata/RHSA-2016:1601
reference_id RHSA-2016:1601
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1601
fixed_packages
0
url pkg:ebuild/dev-db/mysql@5.6.34
purl pkg:ebuild/dev-db/mysql@5.6.34
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.6.34
1
url pkg:ebuild/dev-db/mysql@10.0.28
purl pkg:ebuild/dev-db/mysql@10.0.28
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@10.0.28
aliases CVE-2016-8284
risk_score 0.8
exploitability 0.5
weighted_severity 1.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wnpa-9f9q-dfbs
25
url VCID-zyjr-6hy7-k7ax
vulnerability_id VCID-zyjr-6hy7-k7ax
summary
Multiple vulnerabilities have been found in MariaDB and MySQL, the
    worst of which could lead to the remote execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5628.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5628.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-5628
reference_id
reference_type
scores
0
value 0.02921
scoring_system epss
scoring_elements 0.86329
published_at 2026-04-01T12:55:00Z
1
value 0.02921
scoring_system epss
scoring_elements 0.86415
published_at 2026-04-18T12:55:00Z
2
value 0.02921
scoring_system epss
scoring_elements 0.86401
published_at 2026-04-11T12:55:00Z
3
value 0.02921
scoring_system epss
scoring_elements 0.86399
published_at 2026-04-12T12:55:00Z
4
value 0.02921
scoring_system epss
scoring_elements 0.86394
published_at 2026-04-13T12:55:00Z
5
value 0.02921
scoring_system epss
scoring_elements 0.8641
published_at 2026-04-16T12:55:00Z
6
value 0.02921
scoring_system epss
scoring_elements 0.86339
published_at 2026-04-02T12:55:00Z
7
value 0.02921
scoring_system epss
scoring_elements 0.86357
published_at 2026-04-04T12:55:00Z
8
value 0.02921
scoring_system epss
scoring_elements 0.86359
published_at 2026-04-07T12:55:00Z
9
value 0.02921
scoring_system epss
scoring_elements 0.86377
published_at 2026-04-08T12:55:00Z
10
value 0.02921
scoring_system epss
scoring_elements 0.86387
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-5628
2
reference_url http://www.securitytracker.com/id/1037050
reference_id 1037050
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:34Z/
url http://www.securitytracker.com/id/1037050
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1386571
reference_id 1386571
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1386571
4
reference_url http://www.securityfocus.com/bid/93662
reference_id 93662
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:34Z/
url http://www.securityfocus.com/bid/93662
5
reference_url https://security.gentoo.org/glsa/201701-01
reference_id GLSA-201701-01
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:34Z/
url https://security.gentoo.org/glsa/201701-01
fixed_packages
0
url pkg:ebuild/dev-db/mysql@5.6.34
purl pkg:ebuild/dev-db/mysql@5.6.34
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.6.34
1
url pkg:ebuild/dev-db/mysql@10.0.28
purl pkg:ebuild/dev-db/mysql@10.0.28
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@10.0.28
aliases CVE-2016-5628
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zyjr-6hy7-k7ax
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@10.0.28