{"url":"http://public2.vulnerablecode.io/api/packages/1035582?format=json","purl":"pkg:deb/debian/mariadb-10.0@10.0.25-0%2Bdeb8u1","type":"deb","namespace":"debian","name":"mariadb-10.0","version":"10.0.25-0+deb8u1","qualifiers":{},"subpath":"","is_vulnerable":true,"next_non_vulnerable_version":"10.0.32-0+deb8u1","latest_non_vulnerable_version":"10.0.32-0+deb8u1","affected_by_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49083?format=json","vulnerability_id":"VCID-1gmc-pj6y-rkfx","summary":"Multiple vulnerabilities were found in MySQL, the worst of which\n    may allow remote execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3636.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3636.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-3636","reference_id":"","reference_type":"","scores":[{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22441","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22458","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22632","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22326","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22316","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22314","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22215","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22299","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22377","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22346","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22362","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22675","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22465","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22547","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22601","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22617","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22576","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22522","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22536","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22531","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22481","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-3636"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10286","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10286"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10379","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10379"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10384","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10384"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3308","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3308"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3309","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3309"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3453","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3453"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3456","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3456"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3464","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3464"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3635","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3635"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3636","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3636"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3641","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3641"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3648","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3648"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3651","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3651"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3652","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3652"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3653","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3653"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:S/C:P/I:P/A:P"},{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.securitytracker.com/id/1038928","reference_id":"1038928","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:48:23Z/"}],"url":"http://www.securitytracker.com/id/1038928"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1472686","reference_id":"1472686","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1472686"},{"reference_url":"http://www.securityfocus.com/bid/99736","reference_id":"99736","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:48:23Z/"}],"url":"http://www.securityfocus.com/bid/99736"},{"reference_url":"http://www.debian.org/security/2017/dsa-3922","reference_id":"dsa-3922","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:48:23Z/"}],"url":"http://www.debian.org/security/2017/dsa-3922"},{"reference_url":"https://www.debian.org/security/2017/dsa-3955","reference_id":"dsa-3955","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:48:23Z/"}],"url":"https://www.debian.org/security/2017/dsa-3955"},{"reference_url":"https://security.gentoo.org/glsa/201802-04","reference_id":"GLSA-201802-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201802-04"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:2787","reference_id":"RHSA-2017:2787","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:48:23Z/"}],"url":"https://access.redhat.com/errata/RHSA-2017:2787"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0279","reference_id":"RHSA-2018:0279","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:48:23Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:0279"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0574","reference_id":"RHSA-2018:0574","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:48:23Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:0574"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2439","reference_id":"RHSA-2018:2439","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:48:23Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:2439"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2729","reference_id":"RHSA-2018:2729","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:48:23Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:2729"},{"reference_url":"https://usn.ubuntu.com/3357-1/","reference_id":"USN-3357-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3357-1/"},{"reference_url":"https://usn.ubuntu.com/3357-2/","reference_id":"USN-3357-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3357-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035614?format=json","purl":"pkg:deb/debian/mariadb-10.0@10.0.32-0%2Bdeb8u1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.0@10.0.32-0%252Bdeb8u1"}],"aliases":["CVE-2017-3636"],"risk_score":2.4,"exploitability":"0.5","weighted_severity":"4.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-1gmc-pj6y-rkfx"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31723?format=json","vulnerability_id":"VCID-2gyq-q761-h3br","summary":"Multiple vulnerabilities have been found in MariaDB, the worst of\n    which could lead to privilege escalation.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3312.json","reference_id":"","reference_type":"","scores":[{"value":"6.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3312.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-3312","reference_id":"","reference_type":"","scores":[{"value":"0.00123","scoring_system":"epss","scoring_elements":"0.30926","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00123","scoring_system":"epss","scoring_elements":"0.31376","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00123","scoring_system":"epss","scoring_elements":"0.31513","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00123","scoring_system":"epss","scoring_elements":"0.31366","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00123","scoring_system":"epss","scoring_elements":"0.31197","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00123","scoring_system":"epss","scoring_elements":"0.31073","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00123","scoring_system":"epss","scoring_elements":"0.30994","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00123","scoring_system":"epss","scoring_elements":"0.30842","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00123","scoring_system":"epss","scoring_elements":"0.30911","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00123","scoring_system":"epss","scoring_elements":"0.30916","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00123","scoring_system":"epss","scoring_elements":"0.30831","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00123","scoring_system":"epss","scoring_elements":"0.30855","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00123","scoring_system":"epss","scoring_elements":"0.31555","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00123","scoring_system":"epss","scoring_elements":"0.31373","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00123","scoring_system":"epss","scoring_elements":"0.31426","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00123","scoring_system":"epss","scoring_elements":"0.31457","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00123","scoring_system":"epss","scoring_elements":"0.3146","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00123","scoring_system":"epss","scoring_elements":"0.31417","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00123","scoring_system":"epss","scoring_elements":"0.31381","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00123","scoring_system":"epss","scoring_elements":"0.31415","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00123","scoring_system":"epss","scoring_elements":"0.31395","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-3312"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6664","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6664"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3238","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3238"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3243","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3243"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3244","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3244"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3257","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3257"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3258","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3258"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3265","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3265"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3291","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3291"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3312","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3312"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3313","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3313"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3317","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3317"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3318","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3318"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.2","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:H/Au:N/C:C/I:C/A:C"},{"value":"6.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1414133","reference_id":"1414133","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1414133"},{"reference_url":"http://www.securityfocus.com/bid/95491","reference_id":"95491","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:06:01Z/"}],"url":"http://www.securityfocus.com/bid/95491"},{"reference_url":"http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html","reference_id":"cpujan2017-2881727.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:06:01Z/"}],"url":"http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html"},{"reference_url":"http://www.debian.org/security/2017/dsa-3767","reference_id":"dsa-3767","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:06:01Z/"}],"url":"http://www.debian.org/security/2017/dsa-3767"},{"reference_url":"http://www.debian.org/security/2017/dsa-3770","reference_id":"dsa-3770","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:06:01Z/"}],"url":"http://www.debian.org/security/2017/dsa-3770"},{"reference_url":"https://security.gentoo.org/glsa/201702-17","reference_id":"GLSA-201702-17","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:06:01Z/"}],"url":"https://security.gentoo.org/glsa/201702-17"},{"reference_url":"https://security.gentoo.org/glsa/201702-18","reference_id":"GLSA-201702-18","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:06:01Z/"}],"url":"https://security.gentoo.org/glsa/201702-18"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:2192","reference_id":"RHSA-2017:2192","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:06:01Z/"}],"url":"https://access.redhat.com/errata/RHSA-2017:2192"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:2787","reference_id":"RHSA-2017:2787","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:06:01Z/"}],"url":"https://access.redhat.com/errata/RHSA-2017:2787"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:2886","reference_id":"RHSA-2017:2886","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:06:01Z/"}],"url":"https://access.redhat.com/errata/RHSA-2017:2886"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0279","reference_id":"RHSA-2018:0279","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:06:01Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:0279"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0574","reference_id":"RHSA-2018:0574","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:06:01Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:0574"},{"reference_url":"https://usn.ubuntu.com/3174-1/","reference_id":"USN-3174-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3174-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035613?format=json","purl":"pkg:deb/debian/mariadb-10.0@10.0.30-0%2Bdeb8u2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1gmc-pj6y-rkfx"},{"vulnerability":"VCID-4yz4-vxnh-b3dp"},{"vulnerability":"VCID-5sjj-599v-vybg"},{"vulnerability":"VCID-6g4n-3xfu-hfee"},{"vulnerability":"VCID-6muh-rg1z-pqab"},{"vulnerability":"VCID-bhxk-8byp-eyap"},{"vulnerability":"VCID-ej67-ayfh-sqdt"},{"vulnerability":"VCID-jgff-4jyp-9fgr"},{"vulnerability":"VCID-mde2-1ynu-auh2"},{"vulnerability":"VCID-v4gv-g9n5-ukgc"},{"vulnerability":"VCID-yx79-3g2x-pqex"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.0@10.0.30-0%252Bdeb8u2"}],"aliases":["CVE-2017-3312"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"6.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2gyq-q761-h3br"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31719?format=json","vulnerability_id":"VCID-2rf6-qaey-1ubn","summary":"Multiple vulnerabilities have been found in MariaDB, the worst of\n    which could lead to privilege escalation.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3257.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3257.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-3257","reference_id":"","reference_type":"","scores":[{"value":"0.0029","scoring_system":"epss","scoring_elements":"0.52514","published_at":"2026-05-14T12:55:00Z"},{"value":"0.0029","scoring_system":"epss","scoring_elements":"0.52357","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0029","scoring_system":"epss","scoring_elements":"0.52402","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0029","scoring_system":"epss","scoring_elements":"0.52439","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0029","scoring_system":"epss","scoring_elements":"0.5245","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0029","scoring_system":"epss","scoring_elements":"0.52411","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0029","scoring_system":"epss","scoring_elements":"0.52352","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0029","scoring_system":"epss","scoring_elements":"0.52405","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0029","scoring_system":"epss","scoring_elements":"0.5241","published_at":"2026-05-11T12:55:00Z"},{"value":"0.0029","scoring_system":"epss","scoring_elements":"0.52435","published_at":"2026-05-12T12:55:00Z"},{"value":"0.0029","scoring_system":"epss","scoring_elements":"0.5243","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0029","scoring_system":"epss","scoring_elements":"0.52395","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0029","scoring_system":"epss","scoring_elements":"0.52448","published_at":"2026-05-09T12:55:00Z"},{"value":"0.0029","scoring_system":"epss","scoring_elements":"0.52442","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0029","scoring_system":"epss","scoring_elements":"0.52493","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0029","scoring_system":"epss","scoring_elements":"0.52477","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0029","scoring_system":"epss","scoring_elements":"0.5246","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0029","scoring_system":"epss","scoring_elements":"0.52501","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0029","scoring_system":"epss","scoring_elements":"0.52507","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0029","scoring_system":"epss","scoring_elements":"0.52492","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-3257"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6664","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6664"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3238","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3238"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3243","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3243"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3244","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3244"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3257","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3257"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3258","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3258"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3265","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3265"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3291","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3291"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3312","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3312"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3317","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3317"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3318","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3318"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:S/C:N/I:N/A:C"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1414350","reference_id":"1414350","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1414350"},{"reference_url":"http://www.securityfocus.com/bid/95589","reference_id":"95589","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:12Z/"}],"url":"http://www.securityfocus.com/bid/95589"},{"reference_url":"http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html","reference_id":"cpujan2017-2881727.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:12Z/"}],"url":"http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html"},{"reference_url":"http://www.debian.org/security/2017/dsa-3770","reference_id":"dsa-3770","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:12Z/"}],"url":"http://www.debian.org/security/2017/dsa-3770"},{"reference_url":"https://security.gentoo.org/glsa/201702-17","reference_id":"GLSA-201702-17","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:12Z/"}],"url":"https://security.gentoo.org/glsa/201702-17"},{"reference_url":"https://security.gentoo.org/glsa/201702-18","reference_id":"GLSA-201702-18","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:12Z/"}],"url":"https://security.gentoo.org/glsa/201702-18"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:2787","reference_id":"RHSA-2017:2787","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:12Z/"}],"url":"https://access.redhat.com/errata/RHSA-2017:2787"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:2886","reference_id":"RHSA-2017:2886","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:12Z/"}],"url":"https://access.redhat.com/errata/RHSA-2017:2886"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0279","reference_id":"RHSA-2018:0279","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:12Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:0279"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0574","reference_id":"RHSA-2018:0574","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:12Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:0574"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035613?format=json","purl":"pkg:deb/debian/mariadb-10.0@10.0.30-0%2Bdeb8u2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1gmc-pj6y-rkfx"},{"vulnerability":"VCID-4yz4-vxnh-b3dp"},{"vulnerability":"VCID-5sjj-599v-vybg"},{"vulnerability":"VCID-6g4n-3xfu-hfee"},{"vulnerability":"VCID-6muh-rg1z-pqab"},{"vulnerability":"VCID-bhxk-8byp-eyap"},{"vulnerability":"VCID-ej67-ayfh-sqdt"},{"vulnerability":"VCID-jgff-4jyp-9fgr"},{"vulnerability":"VCID-mde2-1ynu-auh2"},{"vulnerability":"VCID-v4gv-g9n5-ukgc"},{"vulnerability":"VCID-yx79-3g2x-pqex"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.0@10.0.30-0%252Bdeb8u2"}],"aliases":["CVE-2017-3257"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2rf6-qaey-1ubn"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/81537?format=json","vulnerability_id":"VCID-45hn-ezks-j7br","summary":"security update","references":[{"reference_url":"http://lists.opensuse.org/opensuse-updates/2016-09/msg00042.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:47:47Z/"}],"url":"http://lists.opensuse.org/opensuse-updates/2016-09/msg00042.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-1480.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:47:47Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-1480.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-1601.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:47:47Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-1601.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-1602.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:47:47Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-1602.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-1603.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:47:47Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-1603.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-1604.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:47:47Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-1604.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-1637.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:47:47Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-1637.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3615.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3615.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-3615","reference_id":"","reference_type":"","scores":[{"value":"0.01357","scoring_system":"epss","scoring_elements":"0.80327","published_at":"2026-05-14T12:55:00Z"},{"value":"0.01357","scoring_system":"epss","scoring_elements":"0.80221","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01357","scoring_system":"epss","scoring_elements":"0.80235","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01357","scoring_system":"epss","scoring_elements":"0.80257","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01357","scoring_system":"epss","scoring_elements":"0.80273","published_at":"2026-05-09T12:55:00Z"},{"value":"0.01357","scoring_system":"epss","scoring_elements":"0.80268","published_at":"2026-05-11T12:55:00Z"},{"value":"0.01357","scoring_system":"epss","scoring_elements":"0.80285","published_at":"2026-05-12T12:55:00Z"},{"value":"0.01847","scoring_system":"epss","scoring_elements":"0.83025","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01847","scoring_system":"epss","scoring_elements":"0.82977","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01847","scoring_system":"epss","scoring_elements":"0.82992","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01847","scoring_system":"epss","scoring_elements":"0.82987","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01847","scoring_system":"epss","scoring_elements":"0.82983","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01847","scoring_system":"epss","scoring_elements":"0.83022","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01847","scoring_system":"epss","scoring_elements":"0.83048","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01847","scoring_system":"epss","scoring_elements":"0.82919","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01847","scoring_system":"epss","scoring_elements":"0.83056","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01847","scoring_system":"epss","scoring_elements":"0.82935","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01847","scoring_system":"epss","scoring_elements":"0.82948","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01847","scoring_system":"epss","scoring_elements":"0.82945","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01847","scoring_system":"epss","scoring_elements":"0.8297","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-3615"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3477","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3477"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3521","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3521"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3615","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3615"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5440","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5440"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:S/C:N/I:N/A:C"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://mariadb.com/kb/en/mariadb/mariadb-10026-release-notes/","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:47:47Z/"}],"url":"https://mariadb.com/kb/en/mariadb/mariadb-10026-release-notes/"},{"reference_url":"https://mariadb.com/kb/en/mariadb/mariadb-10115-release-notes/","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:47:47Z/"}],"url":"https://mariadb.com/kb/en/mariadb/mariadb-10115-release-notes/"},{"reference_url":"https://mariadb.com/kb/en/mariadb/mariadb-5550-release-notes/","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:47:47Z/"}],"url":"https://mariadb.com/kb/en/mariadb/mariadb-5550-release-notes/"},{"reference_url":"http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:47:47Z/"}],"url":"http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168"},{"reference_url":"http://www.debian.org/security/2016/dsa-3624","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:47:47Z/"}],"url":"http://www.debian.org/security/2016/dsa-3624"},{"reference_url":"http://www.debian.org/security/2016/dsa-3632","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:47:47Z/"}],"url":"http://www.debian.org/security/2016/dsa-3632"},{"reference_url":"http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:47:47Z/"}],"url":"http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:47:47Z/"}],"url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html"},{"reference_url":"http://www.securityfocus.com/bid/91787","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:47:47Z/"}],"url":"http://www.securityfocus.com/bid/91787"},{"reference_url":"http://www.securityfocus.com/bid/91960","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:47:47Z/"}],"url":"http://www.securityfocus.com/bid/91960"},{"reference_url":"http://www.securitytracker.com/id/1036362","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:47:47Z/"}],"url":"http://www.securitytracker.com/id/1036362"},{"reference_url":"http://www.ubuntu.com/usn/USN-3040-1","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:47:47Z/"}],"url":"http://www.ubuntu.com/usn/USN-3040-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1358212","reference_id":"1358212","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1358212"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:powerkvm:2.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ibm:powerkvm:2.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:powerkvm:2.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:powerkvm:3.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ibm:powerkvm:3.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:powerkvm:3.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-3615","reference_id":"CVE-2016-3615","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:N/A:P"},{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-3615"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1480","reference_id":"RHSA-2016:1480","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1480"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1601","reference_id":"RHSA-2016:1601","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1601"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1602","reference_id":"RHSA-2016:1602","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1602"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1603","reference_id":"RHSA-2016:1603","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1603"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1604","reference_id":"RHSA-2016:1604","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1604"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1637","reference_id":"RHSA-2016:1637","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1637"},{"reference_url":"https://usn.ubuntu.com/3040-1/","reference_id":"USN-3040-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3040-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035613?format=json","purl":"pkg:deb/debian/mariadb-10.0@10.0.30-0%2Bdeb8u2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1gmc-pj6y-rkfx"},{"vulnerability":"VCID-4yz4-vxnh-b3dp"},{"vulnerability":"VCID-5sjj-599v-vybg"},{"vulnerability":"VCID-6g4n-3xfu-hfee"},{"vulnerability":"VCID-6muh-rg1z-pqab"},{"vulnerability":"VCID-bhxk-8byp-eyap"},{"vulnerability":"VCID-ej67-ayfh-sqdt"},{"vulnerability":"VCID-jgff-4jyp-9fgr"},{"vulnerability":"VCID-mde2-1ynu-auh2"},{"vulnerability":"VCID-v4gv-g9n5-ukgc"},{"vulnerability":"VCID-yx79-3g2x-pqex"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.0@10.0.30-0%252Bdeb8u2"}],"aliases":["CVE-2016-3615"],"risk_score":2.4,"exploitability":"0.5","weighted_severity":"4.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-45hn-ezks-j7br"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31721?format=json","vulnerability_id":"VCID-4cnj-7fur-3qe3","summary":"Multiple vulnerabilities have been found in MariaDB, the worst of\n    which could lead to privilege escalation.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3265.json","reference_id":"","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3265.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-3265","reference_id":"","reference_type":"","scores":[{"value":"0.00225","scoring_system":"epss","scoring_elements":"0.45089","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00225","scoring_system":"epss","scoring_elements":"0.45118","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00225","scoring_system":"epss","scoring_elements":"0.452","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00225","scoring_system":"epss","scoring_elements":"0.45117","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00225","scoring_system":"epss","scoring_elements":"0.45125","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00225","scoring_system":"epss","scoring_elements":"0.45065","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00225","scoring_system":"epss","scoring_elements":"0.44962","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00225","scoring_system":"epss","scoring_elements":"0.45028","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00225","scoring_system":"epss","scoring_elements":"0.45046","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00225","scoring_system":"epss","scoring_elements":"0.44988","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00225","scoring_system":"epss","scoring_elements":"0.45015","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00225","scoring_system":"epss","scoring_elements":"0.45222","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00225","scoring_system":"epss","scoring_elements":"0.45164","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00225","scoring_system":"epss","scoring_elements":"0.45218","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00225","scoring_system":"epss","scoring_elements":"0.45239","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00225","scoring_system":"epss","scoring_elements":"0.45207","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00225","scoring_system":"epss","scoring_elements":"0.45209","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00225","scoring_system":"epss","scoring_elements":"0.4526","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00225","scoring_system":"epss","scoring_elements":"0.45254","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00225","scoring_system":"epss","scoring_elements":"0.45205","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-3265"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6664","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6664"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3238","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3238"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3243","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3243"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3244","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3244"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3257","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3257"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3258","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3258"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3265","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3265"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3291","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3291"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3312","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3312"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3313","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3313"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3317","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3317"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3318","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3318"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:H/Au:S/C:C/I:N/A:C"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1414423","reference_id":"1414423","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1414423"},{"reference_url":"http://www.securityfocus.com/bid/95520","reference_id":"95520","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:05Z/"}],"url":"http://www.securityfocus.com/bid/95520"},{"reference_url":"http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html","reference_id":"cpujan2017-2881727.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:05Z/"}],"url":"http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html"},{"reference_url":"http://www.debian.org/security/2017/dsa-3767","reference_id":"dsa-3767","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:05Z/"}],"url":"http://www.debian.org/security/2017/dsa-3767"},{"reference_url":"http://www.debian.org/security/2017/dsa-3770","reference_id":"dsa-3770","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:05Z/"}],"url":"http://www.debian.org/security/2017/dsa-3770"},{"reference_url":"https://security.gentoo.org/glsa/201702-17","reference_id":"GLSA-201702-17","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:05Z/"}],"url":"https://security.gentoo.org/glsa/201702-17"},{"reference_url":"https://security.gentoo.org/glsa/201702-18","reference_id":"GLSA-201702-18","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:05Z/"}],"url":"https://security.gentoo.org/glsa/201702-18"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:2192","reference_id":"RHSA-2017:2192","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:05Z/"}],"url":"https://access.redhat.com/errata/RHSA-2017:2192"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:2787","reference_id":"RHSA-2017:2787","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:05Z/"}],"url":"https://access.redhat.com/errata/RHSA-2017:2787"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0279","reference_id":"RHSA-2018:0279","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:05Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:0279"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0574","reference_id":"RHSA-2018:0574","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:05Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:0574"},{"reference_url":"https://usn.ubuntu.com/3174-1/","reference_id":"USN-3174-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3174-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035613?format=json","purl":"pkg:deb/debian/mariadb-10.0@10.0.30-0%2Bdeb8u2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1gmc-pj6y-rkfx"},{"vulnerability":"VCID-4yz4-vxnh-b3dp"},{"vulnerability":"VCID-5sjj-599v-vybg"},{"vulnerability":"VCID-6g4n-3xfu-hfee"},{"vulnerability":"VCID-6muh-rg1z-pqab"},{"vulnerability":"VCID-bhxk-8byp-eyap"},{"vulnerability":"VCID-ej67-ayfh-sqdt"},{"vulnerability":"VCID-jgff-4jyp-9fgr"},{"vulnerability":"VCID-mde2-1ynu-auh2"},{"vulnerability":"VCID-v4gv-g9n5-ukgc"},{"vulnerability":"VCID-yx79-3g2x-pqex"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.0@10.0.30-0%252Bdeb8u2"}],"aliases":["CVE-2017-3265"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-4cnj-7fur-3qe3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49077?format=json","vulnerability_id":"VCID-4yz4-vxnh-b3dp","summary":"Multiple vulnerabilities were found in MySQL, the worst of which\n    may allow remote execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3464.json","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3464.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-3464","reference_id":"","reference_type":"","scores":[{"value":"0.00217","scoring_system":"epss","scoring_elements":"0.44079","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00217","scoring_system":"epss","scoring_elements":"0.44193","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00217","scoring_system":"epss","scoring_elements":"0.4426","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00217","scoring_system":"epss","scoring_elements":"0.44154","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00217","scoring_system":"epss","scoring_elements":"0.44157","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00217","scoring_system":"epss","scoring_elements":"0.44074","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00217","scoring_system":"epss","scoring_elements":"0.4395","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00217","scoring_system":"epss","scoring_elements":"0.44028","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00217","scoring_system":"epss","scoring_elements":"0.44044","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00217","scoring_system":"epss","scoring_elements":"0.43982","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00217","scoring_system":"epss","scoring_elements":"0.44012","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00217","scoring_system":"epss","scoring_elements":"0.44283","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00217","scoring_system":"epss","scoring_elements":"0.44216","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00217","scoring_system":"epss","scoring_elements":"0.44268","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00217","scoring_system":"epss","scoring_elements":"0.44272","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00217","scoring_system":"epss","scoring_elements":"0.4429","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00217","scoring_system":"epss","scoring_elements":"0.44258","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00217","scoring_system":"epss","scoring_elements":"0.44316","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00217","scoring_system":"epss","scoring_elements":"0.44307","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00217","scoring_system":"epss","scoring_elements":"0.44235","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-3464"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10286","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10286"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10379","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10379"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10384","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10384"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3302","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3302"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3305","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3305"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3308","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3308"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3309","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3309"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3329","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3329"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3453","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3453"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3456","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3456"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3461","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3461"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3462","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3462"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3463","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3463"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3464","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3464"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3600","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3600"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3636","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3636"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3641","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3641"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3653","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3653"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"2.1","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:S/C:N/I:P/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.debian.org/security/2017/dsa-3834","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:55Z/"}],"url":"http://www.debian.org/security/2017/dsa-3834"},{"reference_url":"http://www.debian.org/security/2017/dsa-3944","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:55Z/"}],"url":"http://www.debian.org/security/2017/dsa-3944"},{"reference_url":"http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:55Z/"}],"url":"http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html"},{"reference_url":"http://www.securityfocus.com/bid/97818","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:55Z/"}],"url":"http://www.securityfocus.com/bid/97818"},{"reference_url":"http://www.securitytracker.com/id/1038287","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:55Z/"}],"url":"http://www.securitytracker.com/id/1038287"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1443379","reference_id":"1443379","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1443379"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2017-3464","reference_id":"CVE-2017-3464","reference_type":"","scores":[{"value":"4.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:S/C:N/I:P/A:N"},{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2017-3464"},{"reference_url":"https://security.gentoo.org/glsa/201802-04","reference_id":"GLSA-201802-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201802-04"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:2192","reference_id":"RHSA-2017:2192","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:55Z/"}],"url":"https://access.redhat.com/errata/RHSA-2017:2192"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:2787","reference_id":"RHSA-2017:2787","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:55Z/"}],"url":"https://access.redhat.com/errata/RHSA-2017:2787"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:2886","reference_id":"RHSA-2017:2886","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:55Z/"}],"url":"https://access.redhat.com/errata/RHSA-2017:2886"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0279","reference_id":"RHSA-2018:0279","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:55Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:0279"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0574","reference_id":"RHSA-2018:0574","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:55Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:0574"},{"reference_url":"https://usn.ubuntu.com/3269-1/","reference_id":"USN-3269-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3269-1/"},{"reference_url":"https://usn.ubuntu.com/3357-2/","reference_id":"USN-3357-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3357-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035614?format=json","purl":"pkg:deb/debian/mariadb-10.0@10.0.32-0%2Bdeb8u1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.0@10.0.32-0%252Bdeb8u1"}],"aliases":["CVE-2017-3464"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-4yz4-vxnh-b3dp"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49091?format=json","vulnerability_id":"VCID-5sjj-599v-vybg","summary":"Multiple vulnerabilities were found in MySQL, the worst of which\n    may allow remote execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3653.json","reference_id":"","reference_type":"","scores":[{"value":"3.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3653.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-3653","reference_id":"","reference_type":"","scores":[{"value":"0.00248","scoring_system":"epss","scoring_elements":"0.48109","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00248","scoring_system":"epss","scoring_elements":"0.47971","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00248","scoring_system":"epss","scoring_elements":"0.48036","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00248","scoring_system":"epss","scoring_elements":"0.48059","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00248","scoring_system":"epss","scoring_elements":"0.48005","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00248","scoring_system":"epss","scoring_elements":"0.48034","published_at":"2026-05-12T12:55:00Z"},{"value":"0.0027","scoring_system":"epss","scoring_elements":"0.50471","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0027","scoring_system":"epss","scoring_elements":"0.50454","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0027","scoring_system":"epss","scoring_elements":"0.50425","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0027","scoring_system":"epss","scoring_elements":"0.50399","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0027","scoring_system":"epss","scoring_elements":"0.50483","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0027","scoring_system":"epss","scoring_elements":"0.50436","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0027","scoring_system":"epss","scoring_elements":"0.5049","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0027","scoring_system":"epss","scoring_elements":"0.50487","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0027","scoring_system":"epss","scoring_elements":"0.5053","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0027","scoring_system":"epss","scoring_elements":"0.50507","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0027","scoring_system":"epss","scoring_elements":"0.50492","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0027","scoring_system":"epss","scoring_elements":"0.50534","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0027","scoring_system":"epss","scoring_elements":"0.5054","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0027","scoring_system":"epss","scoring_elements":"0.50516","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0027","scoring_system":"epss","scoring_elements":"0.50462","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-3653"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10286","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10286"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10379","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10379"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10384","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10384"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3308","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3308"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3309","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3309"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3453","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3453"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3456","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3456"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3464","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3464"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3635","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3635"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3636","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3636"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3641","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3641"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3648","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3648"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3651","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3651"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3652","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3652"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3653","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3653"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"2.1","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:S/C:N/I:P/A:N"},{"value":"3.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.securitytracker.com/id/1038928","reference_id":"1038928","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:47:41Z/"}],"url":"http://www.securitytracker.com/id/1038928"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1472711","reference_id":"1472711","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1472711"},{"reference_url":"http://www.securityfocus.com/bid/99810","reference_id":"99810","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:47:41Z/"}],"url":"http://www.securityfocus.com/bid/99810"},{"reference_url":"http://www.debian.org/security/2017/dsa-3922","reference_id":"dsa-3922","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:47:41Z/"}],"url":"http://www.debian.org/security/2017/dsa-3922"},{"reference_url":"https://www.debian.org/security/2017/dsa-3955","reference_id":"dsa-3955","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:47:41Z/"}],"url":"https://www.debian.org/security/2017/dsa-3955"},{"reference_url":"https://security.gentoo.org/glsa/201802-04","reference_id":"GLSA-201802-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201802-04"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:2787","reference_id":"RHSA-2017:2787","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:47:41Z/"}],"url":"https://access.redhat.com/errata/RHSA-2017:2787"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:2886","reference_id":"RHSA-2017:2886","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:47:41Z/"}],"url":"https://access.redhat.com/errata/RHSA-2017:2886"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0279","reference_id":"RHSA-2018:0279","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:47:41Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:0279"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0574","reference_id":"RHSA-2018:0574","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:47:41Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:0574"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2439","reference_id":"RHSA-2018:2439","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:47:41Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:2439"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2729","reference_id":"RHSA-2018:2729","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:47:41Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:2729"},{"reference_url":"https://usn.ubuntu.com/3357-1/","reference_id":"USN-3357-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3357-1/"},{"reference_url":"https://usn.ubuntu.com/3357-2/","reference_id":"USN-3357-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3357-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035614?format=json","purl":"pkg:deb/debian/mariadb-10.0@10.0.32-0%2Bdeb8u1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.0@10.0.32-0%252Bdeb8u1"}],"aliases":["CVE-2017-3653"],"risk_score":1.4,"exploitability":"0.5","weighted_severity":"2.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-5sjj-599v-vybg"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49067?format=json","vulnerability_id":"VCID-6g4n-3xfu-hfee","summary":"Multiple vulnerabilities were found in MySQL, the worst of which\n    may allow remote execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3308.json","reference_id":"","reference_type":"","scores":[{"value":"7.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3308.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-3308","reference_id":"","reference_type":"","scores":[{"value":"0.00321","scoring_system":"epss","scoring_elements":"0.55163","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00321","scoring_system":"epss","scoring_elements":"0.54995","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00321","scoring_system":"epss","scoring_elements":"0.55096","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00321","scoring_system":"epss","scoring_elements":"0.55141","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00321","scoring_system":"epss","scoring_elements":"0.55077","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00321","scoring_system":"epss","scoring_elements":"0.55068","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00321","scoring_system":"epss","scoring_elements":"0.55019","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00321","scoring_system":"epss","scoring_elements":"0.5506","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00321","scoring_system":"epss","scoring_elements":"0.55118","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00321","scoring_system":"epss","scoring_elements":"0.55078","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00321","scoring_system":"epss","scoring_elements":"0.55104","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00321","scoring_system":"epss","scoring_elements":"0.5512","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00321","scoring_system":"epss","scoring_elements":"0.55095","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00321","scoring_system":"epss","scoring_elements":"0.55146","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00321","scoring_system":"epss","scoring_elements":"0.55145","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00321","scoring_system":"epss","scoring_elements":"0.55157","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00321","scoring_system":"epss","scoring_elements":"0.55137","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00321","scoring_system":"epss","scoring_elements":"0.55119","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00321","scoring_system":"epss","scoring_elements":"0.55158","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00321","scoring_system":"epss","scoring_elements":"0.55162","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-3308"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10286","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10286"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10379","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10379"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10384","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10384"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3302","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3302"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3305","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3305"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3308","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3308"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3309","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3309"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3329","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3329"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3453","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3453"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3456","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3456"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3461","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3461"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3462","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3462"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3463","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3463"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3464","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3464"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3600","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3600"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3636","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3636"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3641","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3641"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3653","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3653"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"2.1","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:S/C:N/I:N/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.debian.org/security/2017/dsa-3834","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:46:18Z/"}],"url":"http://www.debian.org/security/2017/dsa-3834"},{"reference_url":"http://www.debian.org/security/2017/dsa-3944","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:46:18Z/"}],"url":"http://www.debian.org/security/2017/dsa-3944"},{"reference_url":"http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:46:18Z/"}],"url":"http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html"},{"reference_url":"http://www.securityfocus.com/bid/97725","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:46:18Z/"}],"url":"http://www.securityfocus.com/bid/97725"},{"reference_url":"http://www.securitytracker.com/id/1038287","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:46:18Z/"}],"url":"http://www.securitytracker.com/id/1038287"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1443358","reference_id":"1443358","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1443358"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2017-3308","reference_id":"CVE-2017-3308","reference_type":"","scores":[{"value":"4.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:S/C:N/I:N/A:P"},{"value":"7.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2017-3308"},{"reference_url":"https://security.gentoo.org/glsa/201802-04","reference_id":"GLSA-201802-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201802-04"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:2192","reference_id":"RHSA-2017:2192","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:46:18Z/"}],"url":"https://access.redhat.com/errata/RHSA-2017:2192"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:2787","reference_id":"RHSA-2017:2787","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:46:18Z/"}],"url":"https://access.redhat.com/errata/RHSA-2017:2787"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:2886","reference_id":"RHSA-2017:2886","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:46:18Z/"}],"url":"https://access.redhat.com/errata/RHSA-2017:2886"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0279","reference_id":"RHSA-2018:0279","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:46:18Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:0279"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0574","reference_id":"RHSA-2018:0574","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:46:18Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:0574"},{"reference_url":"https://usn.ubuntu.com/3269-1/","reference_id":"USN-3269-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3269-1/"},{"reference_url":"https://usn.ubuntu.com/3357-2/","reference_id":"USN-3357-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3357-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035614?format=json","purl":"pkg:deb/debian/mariadb-10.0@10.0.32-0%2Bdeb8u1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.0@10.0.32-0%252Bdeb8u1"}],"aliases":["CVE-2017-3308"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"6.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-6g4n-3xfu-hfee"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49061?format=json","vulnerability_id":"VCID-6muh-rg1z-pqab","summary":"Multiple vulnerabilities were found in MySQL, the worst of which\n    may allow remote execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10286.json","reference_id":"","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10286.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-10286","reference_id":"","reference_type":"","scores":[{"value":"0.00326","scoring_system":"epss","scoring_elements":"0.55559","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00326","scoring_system":"epss","scoring_elements":"0.55599","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00326","scoring_system":"epss","scoring_elements":"0.55582","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00326","scoring_system":"epss","scoring_elements":"0.5562","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00326","scoring_system":"epss","scoring_elements":"0.55623","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00326","scoring_system":"epss","scoring_elements":"0.55602","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00326","scoring_system":"epss","scoring_elements":"0.5553","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00326","scoring_system":"epss","scoring_elements":"0.55548","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00326","scoring_system":"epss","scoring_elements":"0.55522","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00326","scoring_system":"epss","scoring_elements":"0.55469","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00326","scoring_system":"epss","scoring_elements":"0.55516","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00326","scoring_system":"epss","scoring_elements":"0.55573","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00326","scoring_system":"epss","scoring_elements":"0.55532","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00514","scoring_system":"epss","scoring_elements":"0.66607","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00514","scoring_system":"epss","scoring_elements":"0.66626","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00514","scoring_system":"epss","scoring_elements":"0.66548","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00514","scoring_system":"epss","scoring_elements":"0.66573","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00514","scoring_system":"epss","scoring_elements":"0.66546","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00514","scoring_system":"epss","scoring_elements":"0.66593","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00534","scoring_system":"epss","scoring_elements":"0.67342","published_at":"2026-04-01T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-10286"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10286","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10286"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10379","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10379"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10384","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10384"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3308","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3308"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3309","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3309"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3453","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3453"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3456","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3456"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3464","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3464"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3636","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3636"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3641","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3641"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3653","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3653"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.6","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:M/C:N/I:N/A:C"},{"value":"4.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://security.netapp.com/advisory/ntap-20171019-0002/","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:45:47Z/"}],"url":"https://security.netapp.com/advisory/ntap-20171019-0002/"},{"reference_url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:45:47Z/"}],"url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html"},{"reference_url":"http://www.securityfocus.com/bid/101397","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:45:47Z/"}],"url":"http://www.securityfocus.com/bid/101397"},{"reference_url":"http://www.securitytracker.com/id/1039597","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:45:47Z/"}],"url":"http://www.securitytracker.com/id/1039597"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1503669","reference_id":"1503669","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1503669"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*","reference_id":"cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*","reference_id":"cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_balance:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:oncommand_balance:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_balance:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_performance_manager:-:*:*:*:*:vmware_vsphere:*:*","reference_id":"cpe:2.3:a:netapp:oncommand_performance_manager:-:*:*:*:*:vmware_vsphere:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_performance_manager:-:*:*:*:*:vmware_vsphere:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vsphere:*:*","reference_id":"cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vsphere:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vsphere:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:windows:*:*","reference_id":"cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:windows:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:windows:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2017-10286","reference_id":"CVE-2017-10286","reference_type":"","scores":[{"value":"3.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:S/C:N/I:N/A:P"},{"value":"4.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2017-10286"},{"reference_url":"https://security.gentoo.org/glsa/201802-04","reference_id":"GLSA-201802-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201802-04"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:3265","reference_id":"RHSA-2017:3265","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:45:47Z/"}],"url":"https://access.redhat.com/errata/RHSA-2017:3265"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:3442","reference_id":"RHSA-2017:3442","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:45:47Z/"}],"url":"https://access.redhat.com/errata/RHSA-2017:3442"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0279","reference_id":"RHSA-2018:0279","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:45:47Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:0279"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0574","reference_id":"RHSA-2018:0574","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:45:47Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:0574"},{"reference_url":"https://usn.ubuntu.com/3459-1/","reference_id":"USN-3459-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3459-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035614?format=json","purl":"pkg:deb/debian/mariadb-10.0@10.0.32-0%2Bdeb8u1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.0@10.0.32-0%252Bdeb8u1"}],"aliases":["CVE-2017-10286"],"risk_score":2.0,"exploitability":"0.5","weighted_severity":"4.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-6muh-rg1z-pqab"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31715?format=json","vulnerability_id":"VCID-8djb-knkk-s3c8","summary":"Multiple vulnerabilities have been found in MariaDB, the worst of\n    which could lead to privilege escalation.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-6664.json","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-6664.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-6664","reference_id":"","reference_type":"","scores":[{"value":"0.54393","scoring_system":"epss","scoring_elements":"0.98006","published_at":"2026-04-01T12:55:00Z"},{"value":"0.54393","scoring_system":"epss","scoring_elements":"0.98049","published_at":"2026-05-14T12:55:00Z"},{"value":"0.54393","scoring_system":"epss","scoring_elements":"0.98042","published_at":"2026-05-11T12:55:00Z"},{"value":"0.54393","scoring_system":"epss","scoring_elements":"0.98044","published_at":"2026-05-12T12:55:00Z"},{"value":"0.54393","scoring_system":"epss","scoring_elements":"0.98011","published_at":"2026-04-02T12:55:00Z"},{"value":"0.54393","scoring_system":"epss","scoring_elements":"0.98014","published_at":"2026-04-04T12:55:00Z"},{"value":"0.54393","scoring_system":"epss","scoring_elements":"0.98015","published_at":"2026-04-07T12:55:00Z"},{"value":"0.54393","scoring_system":"epss","scoring_elements":"0.9802","published_at":"2026-04-09T12:55:00Z"},{"value":"0.54393","scoring_system":"epss","scoring_elements":"0.98024","published_at":"2026-04-11T12:55:00Z"},{"value":"0.54393","scoring_system":"epss","scoring_elements":"0.98025","published_at":"2026-04-13T12:55:00Z"},{"value":"0.54393","scoring_system":"epss","scoring_elements":"0.98032","published_at":"2026-04-18T12:55:00Z"},{"value":"0.54393","scoring_system":"epss","scoring_elements":"0.9803","published_at":"2026-04-26T12:55:00Z"},{"value":"0.54393","scoring_system":"epss","scoring_elements":"0.98029","published_at":"2026-04-24T12:55:00Z"},{"value":"0.54393","scoring_system":"epss","scoring_elements":"0.98034","published_at":"2026-04-29T12:55:00Z"},{"value":"0.54393","scoring_system":"epss","scoring_elements":"0.98041","published_at":"2026-05-05T12:55:00Z"},{"value":"0.54393","scoring_system":"epss","scoring_elements":"0.9804","published_at":"2026-05-07T12:55:00Z"},{"value":"0.54393","scoring_system":"epss","scoring_elements":"0.98043","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-6664"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6664","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6664"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3238","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3238"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3243","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3243"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3244","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3244"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3257","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3257"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3258","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3258"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3265","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3265"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3291","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3291"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3312","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3312"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3317","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3317"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3318","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3318"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:S/C:C/I:C/A:C"},{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1386564","reference_id":"1386564","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1386564"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/40679.sh","reference_id":"CVE-2016-6664;CVE-2016-5617","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/40679.sh"},{"reference_url":"https://legalhackers.com/advisories/MySQL-Maria-Percona-RootPrivEsc-CVE-2016-6664-5617-Exploit.html","reference_id":"CVE-2016-6664;CVE-2016-5617","reference_type":"exploit","scores":[],"url":"https://legalhackers.com/advisories/MySQL-Maria-Percona-RootPrivEsc-CVE-2016-6664-5617-Exploit.html"},{"reference_url":"https://security.gentoo.org/glsa/201702-18","reference_id":"GLSA-201702-18","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201702-18"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2130","reference_id":"RHSA-2016:2130","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2130"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2749","reference_id":"RHSA-2016:2749","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2749"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:2192","reference_id":"RHSA-2017:2192","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:2192"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0279","reference_id":"RHSA-2018:0279","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:0279"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0574","reference_id":"RHSA-2018:0574","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:0574"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035613?format=json","purl":"pkg:deb/debian/mariadb-10.0@10.0.30-0%2Bdeb8u2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1gmc-pj6y-rkfx"},{"vulnerability":"VCID-4yz4-vxnh-b3dp"},{"vulnerability":"VCID-5sjj-599v-vybg"},{"vulnerability":"VCID-6g4n-3xfu-hfee"},{"vulnerability":"VCID-6muh-rg1z-pqab"},{"vulnerability":"VCID-bhxk-8byp-eyap"},{"vulnerability":"VCID-ej67-ayfh-sqdt"},{"vulnerability":"VCID-jgff-4jyp-9fgr"},{"vulnerability":"VCID-mde2-1ynu-auh2"},{"vulnerability":"VCID-v4gv-g9n5-ukgc"},{"vulnerability":"VCID-yx79-3g2x-pqex"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.0@10.0.30-0%252Bdeb8u2"}],"aliases":["CVE-2016-6664"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-8djb-knkk-s3c8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/81541?format=json","vulnerability_id":"VCID-8krv-jqjg-uqc8","summary":"security update","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7440.json","reference_id":"","reference_type":"","scores":[{"value":"5.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7440.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-7440","reference_id":"","reference_type":"","scores":[{"value":"0.0008","scoring_system":"epss","scoring_elements":"0.23554","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0008","scoring_system":"epss","scoring_elements":"0.23711","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0008","scoring_system":"epss","scoring_elements":"0.23754","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0008","scoring_system":"epss","scoring_elements":"0.23535","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0008","scoring_system":"epss","scoring_elements":"0.23606","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0008","scoring_system":"epss","scoring_elements":"0.23651","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0008","scoring_system":"epss","scoring_elements":"0.23667","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0008","scoring_system":"epss","scoring_elements":"0.23625","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0008","scoring_system":"epss","scoring_elements":"0.23568","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0008","scoring_system":"epss","scoring_elements":"0.2358","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0008","scoring_system":"epss","scoring_elements":"0.23569","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0008","scoring_system":"epss","scoring_elements":"0.2355","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0008","scoring_system":"epss","scoring_elements":"0.23368","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0008","scoring_system":"epss","scoring_elements":"0.23357","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0008","scoring_system":"epss","scoring_elements":"0.2334","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0008","scoring_system":"epss","scoring_elements":"0.23237","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0008","scoring_system":"epss","scoring_elements":"0.23321","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0008","scoring_system":"epss","scoring_elements":"0.23392","published_at":"2026-05-09T12:55:00Z"},{"value":"0.0008","scoring_system":"epss","scoring_elements":"0.23354","published_at":"2026-05-11T12:55:00Z"},{"value":"0.0008","scoring_system":"epss","scoring_elements":"0.23371","published_at":"2026-05-12T12:55:00Z"},{"value":"0.0008","scoring_system":"epss","scoring_elements":"0.23453","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-7440"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3492","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3492"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5584","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5584"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5624","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5624"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5626","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5626"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5629","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5629"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6663","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6663"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7440","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7440"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8283","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8283"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:H/Au:N/C:C/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1386584","reference_id":"1386584","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1386584"},{"reference_url":"https://usn.ubuntu.com/3109-1/","reference_id":"USN-3109-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3109-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035613?format=json","purl":"pkg:deb/debian/mariadb-10.0@10.0.30-0%2Bdeb8u2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1gmc-pj6y-rkfx"},{"vulnerability":"VCID-4yz4-vxnh-b3dp"},{"vulnerability":"VCID-5sjj-599v-vybg"},{"vulnerability":"VCID-6g4n-3xfu-hfee"},{"vulnerability":"VCID-6muh-rg1z-pqab"},{"vulnerability":"VCID-bhxk-8byp-eyap"},{"vulnerability":"VCID-ej67-ayfh-sqdt"},{"vulnerability":"VCID-jgff-4jyp-9fgr"},{"vulnerability":"VCID-mde2-1ynu-auh2"},{"vulnerability":"VCID-v4gv-g9n5-ukgc"},{"vulnerability":"VCID-yx79-3g2x-pqex"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.0@10.0.30-0%252Bdeb8u2"}],"aliases":["CVE-2016-7440"],"risk_score":2.3,"exploitability":"0.5","weighted_severity":"4.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-8krv-jqjg-uqc8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41725?format=json","vulnerability_id":"VCID-8kvb-5u8c-zbc4","summary":"Multiple vulnerabilities have been found in MariaDB and MySQL, the\n    worst of which could lead to the remote execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5584.json","reference_id":"","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5584.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-5584","reference_id":"","reference_type":"","scores":[{"value":"0.00442","scoring_system":"epss","scoring_elements":"0.63214","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00442","scoring_system":"epss","scoring_elements":"0.63468","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00442","scoring_system":"epss","scoring_elements":"0.63356","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00442","scoring_system":"epss","scoring_elements":"0.63354","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00442","scoring_system":"epss","scoring_elements":"0.63326","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00442","scoring_system":"epss","scoring_elements":"0.6337","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00442","scoring_system":"epss","scoring_elements":"0.63423","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00442","scoring_system":"epss","scoring_elements":"0.63387","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00442","scoring_system":"epss","scoring_elements":"0.63414","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00442","scoring_system":"epss","scoring_elements":"0.63273","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00442","scoring_system":"epss","scoring_elements":"0.63302","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00442","scoring_system":"epss","scoring_elements":"0.63268","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00442","scoring_system":"epss","scoring_elements":"0.63319","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00442","scoring_system":"epss","scoring_elements":"0.63337","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00442","scoring_system":"epss","scoring_elements":"0.63355","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00442","scoring_system":"epss","scoring_elements":"0.63338","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00442","scoring_system":"epss","scoring_elements":"0.63345","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00442","scoring_system":"epss","scoring_elements":"0.63324","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00442","scoring_system":"epss","scoring_elements":"0.63343","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-5584"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3492","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3492"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5584","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5584"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5624","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5624"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5626","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5626"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5629","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5629"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6663","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6663"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7440","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7440"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8283","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8283"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:S/C:C/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.securitytracker.com/id/1037050","reference_id":"1037050","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:08Z/"}],"url":"http://www.securitytracker.com/id/1037050"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1386557","reference_id":"1386557","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1386557"},{"reference_url":"http://www.securityfocus.com/bid/93735","reference_id":"93735","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:08Z/"}],"url":"http://www.securityfocus.com/bid/93735"},{"reference_url":"http://www.debian.org/security/2016/dsa-3706","reference_id":"dsa-3706","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:08Z/"}],"url":"http://www.debian.org/security/2016/dsa-3706"},{"reference_url":"https://security.gentoo.org/glsa/201701-01","reference_id":"GLSA-201701-01","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:08Z/"}],"url":"https://security.gentoo.org/glsa/201701-01"},{"reference_url":"https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/","reference_id":"mariadb-10028-release-notes","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:08Z/"}],"url":"https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/"},{"reference_url":"https://usn.ubuntu.com/3109-1/","reference_id":"USN-3109-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3109-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035613?format=json","purl":"pkg:deb/debian/mariadb-10.0@10.0.30-0%2Bdeb8u2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1gmc-pj6y-rkfx"},{"vulnerability":"VCID-4yz4-vxnh-b3dp"},{"vulnerability":"VCID-5sjj-599v-vybg"},{"vulnerability":"VCID-6g4n-3xfu-hfee"},{"vulnerability":"VCID-6muh-rg1z-pqab"},{"vulnerability":"VCID-bhxk-8byp-eyap"},{"vulnerability":"VCID-ej67-ayfh-sqdt"},{"vulnerability":"VCID-jgff-4jyp-9fgr"},{"vulnerability":"VCID-mde2-1ynu-auh2"},{"vulnerability":"VCID-v4gv-g9n5-ukgc"},{"vulnerability":"VCID-yx79-3g2x-pqex"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.0@10.0.30-0%252Bdeb8u2"}],"aliases":["CVE-2016-5584"],"risk_score":2.0,"exploitability":"0.5","weighted_severity":"4.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-8kvb-5u8c-zbc4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/81538?format=json","vulnerability_id":"VCID-8sya-wktg-dqa5","summary":"security update","references":[{"reference_url":"http://lists.opensuse.org/opensuse-updates/2016-09/msg00042.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:47:35Z/"}],"url":"http://lists.opensuse.org/opensuse-updates/2016-09/msg00042.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-1480.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:47:35Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-1480.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-1601.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:47:35Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-1601.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-1602.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:47:35Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-1602.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-1603.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:47:35Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-1603.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-1604.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:47:35Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-1604.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-1637.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:47:35Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-1637.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5440.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5440.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-5440","reference_id":"","reference_type":"","scores":[{"value":"0.00621","scoring_system":"epss","scoring_elements":"0.70253","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00621","scoring_system":"epss","scoring_elements":"0.70159","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00621","scoring_system":"epss","scoring_elements":"0.70134","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00621","scoring_system":"epss","scoring_elements":"0.70176","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00621","scoring_system":"epss","scoring_elements":"0.70207","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00621","scoring_system":"epss","scoring_elements":"0.70203","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00854","scoring_system":"epss","scoring_elements":"0.74982","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00854","scoring_system":"epss","scoring_elements":"0.74946","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00854","scoring_system":"epss","scoring_elements":"0.74969","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00854","scoring_system":"epss","scoring_elements":"0.74947","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00854","scoring_system":"epss","scoring_elements":"0.74938","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00854","scoring_system":"epss","scoring_elements":"0.74975","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00854","scoring_system":"epss","scoring_elements":"0.74974","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00854","scoring_system":"epss","scoring_elements":"0.74897","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00854","scoring_system":"epss","scoring_elements":"0.75016","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00854","scoring_system":"epss","scoring_elements":"0.7501","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00854","scoring_system":"epss","scoring_elements":"0.74898","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00854","scoring_system":"epss","scoring_elements":"0.74927","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00854","scoring_system":"epss","scoring_elements":"0.749","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00854","scoring_system":"epss","scoring_elements":"0.74934","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-5440"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3477","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3477"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3521","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3521"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3615","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3615"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5440","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5440"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:S/C:N/I:N/A:C"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://mariadb.com/kb/en/mariadb/mariadb-10026-release-notes/","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:47:35Z/"}],"url":"https://mariadb.com/kb/en/mariadb/mariadb-10026-release-notes/"},{"reference_url":"https://mariadb.com/kb/en/mariadb/mariadb-10115-release-notes/","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:47:35Z/"}],"url":"https://mariadb.com/kb/en/mariadb/mariadb-10115-release-notes/"},{"reference_url":"https://mariadb.com/kb/en/mariadb/mariadb-5550-release-notes/","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:47:35Z/"}],"url":"https://mariadb.com/kb/en/mariadb/mariadb-5550-release-notes/"},{"reference_url":"http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:47:35Z/"}],"url":"http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168"},{"reference_url":"http://www.debian.org/security/2016/dsa-3624","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:47:35Z/"}],"url":"http://www.debian.org/security/2016/dsa-3624"},{"reference_url":"http://www.debian.org/security/2016/dsa-3632","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:47:35Z/"}],"url":"http://www.debian.org/security/2016/dsa-3632"},{"reference_url":"http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:47:35Z/"}],"url":"http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:47:35Z/"}],"url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html"},{"reference_url":"http://www.securityfocus.com/bid/91787","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:47:35Z/"}],"url":"http://www.securityfocus.com/bid/91787"},{"reference_url":"http://www.securityfocus.com/bid/91953","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:47:35Z/"}],"url":"http://www.securityfocus.com/bid/91953"},{"reference_url":"http://www.securitytracker.com/id/1036362","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:47:35Z/"}],"url":"http://www.securitytracker.com/id/1036362"},{"reference_url":"http://www.ubuntu.com/usn/USN-3040-1","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:47:35Z/"}],"url":"http://www.ubuntu.com/usn/USN-3040-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1358218","reference_id":"1358218","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1358218"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:powerkvm:2.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ibm:powerkvm:2.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:powerkvm:2.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:powerkvm:3.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ibm:powerkvm:3.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:powerkvm:3.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-5440","reference_id":"CVE-2016-5440","reference_type":"","scores":[{"value":"4.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:S/C:N/I:N/A:P"},{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-5440"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1480","reference_id":"RHSA-2016:1480","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1480"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1601","reference_id":"RHSA-2016:1601","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1601"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1602","reference_id":"RHSA-2016:1602","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1602"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1603","reference_id":"RHSA-2016:1603","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1603"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1604","reference_id":"RHSA-2016:1604","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1604"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1637","reference_id":"RHSA-2016:1637","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1637"},{"reference_url":"https://usn.ubuntu.com/3040-1/","reference_id":"USN-3040-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3040-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035613?format=json","purl":"pkg:deb/debian/mariadb-10.0@10.0.30-0%2Bdeb8u2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1gmc-pj6y-rkfx"},{"vulnerability":"VCID-4yz4-vxnh-b3dp"},{"vulnerability":"VCID-5sjj-599v-vybg"},{"vulnerability":"VCID-6g4n-3xfu-hfee"},{"vulnerability":"VCID-6muh-rg1z-pqab"},{"vulnerability":"VCID-bhxk-8byp-eyap"},{"vulnerability":"VCID-ej67-ayfh-sqdt"},{"vulnerability":"VCID-jgff-4jyp-9fgr"},{"vulnerability":"VCID-mde2-1ynu-auh2"},{"vulnerability":"VCID-v4gv-g9n5-ukgc"},{"vulnerability":"VCID-yx79-3g2x-pqex"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.0@10.0.30-0%252Bdeb8u2"}],"aliases":["CVE-2016-5440"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-8sya-wktg-dqa5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31725?format=json","vulnerability_id":"VCID-9f48-53dz-13an","summary":"Multiple vulnerabilities have been found in MariaDB, the worst of\n    which could lead to privilege escalation.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3318.json","reference_id":"","reference_type":"","scores":[{"value":"4.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3318.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-3318","reference_id":"","reference_type":"","scores":[{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16371","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.1629","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16472","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16349","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16242","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16238","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16197","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.1607","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16185","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16293","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16264","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16297","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16533","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.1633","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16416","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16474","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16459","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16419","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16358","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16294","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16314","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-3318"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6664","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6664"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3238","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3238"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3243","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3243"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3244","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3244"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3257","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3257"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3258","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3258"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3265","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3265"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3291","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3291"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3312","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3312"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3313","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3313"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3317","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3317"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3318","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3318"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"1","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:H/Au:S/C:P/I:N/A:N"},{"value":"4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1414357","reference_id":"1414357","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1414357"},{"reference_url":"http://www.securityfocus.com/bid/95588","reference_id":"95588","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-08T20:09:30Z/"}],"url":"http://www.securityfocus.com/bid/95588"},{"reference_url":"http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html","reference_id":"cpujan2017-2881727.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-08T20:09:30Z/"}],"url":"http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html"},{"reference_url":"http://www.debian.org/security/2017/dsa-3767","reference_id":"dsa-3767","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-08T20:09:30Z/"}],"url":"http://www.debian.org/security/2017/dsa-3767"},{"reference_url":"http://www.debian.org/security/2017/dsa-3770","reference_id":"dsa-3770","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-08T20:09:30Z/"}],"url":"http://www.debian.org/security/2017/dsa-3770"},{"reference_url":"https://security.gentoo.org/glsa/201702-17","reference_id":"GLSA-201702-17","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-08T20:09:30Z/"}],"url":"https://security.gentoo.org/glsa/201702-17"},{"reference_url":"https://security.gentoo.org/glsa/201702-18","reference_id":"GLSA-201702-18","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-08T20:09:30Z/"}],"url":"https://security.gentoo.org/glsa/201702-18"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:2192","reference_id":"RHSA-2017:2192","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-08T20:09:30Z/"}],"url":"https://access.redhat.com/errata/RHSA-2017:2192"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:2787","reference_id":"RHSA-2017:2787","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-08T20:09:30Z/"}],"url":"https://access.redhat.com/errata/RHSA-2017:2787"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:2886","reference_id":"RHSA-2017:2886","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-08T20:09:30Z/"}],"url":"https://access.redhat.com/errata/RHSA-2017:2886"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0279","reference_id":"RHSA-2018:0279","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-08T20:09:30Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:0279"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0574","reference_id":"RHSA-2018:0574","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-08T20:09:30Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:0574"},{"reference_url":"https://usn.ubuntu.com/3174-1/","reference_id":"USN-3174-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3174-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035613?format=json","purl":"pkg:deb/debian/mariadb-10.0@10.0.30-0%2Bdeb8u2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1gmc-pj6y-rkfx"},{"vulnerability":"VCID-4yz4-vxnh-b3dp"},{"vulnerability":"VCID-5sjj-599v-vybg"},{"vulnerability":"VCID-6g4n-3xfu-hfee"},{"vulnerability":"VCID-6muh-rg1z-pqab"},{"vulnerability":"VCID-bhxk-8byp-eyap"},{"vulnerability":"VCID-ej67-ayfh-sqdt"},{"vulnerability":"VCID-jgff-4jyp-9fgr"},{"vulnerability":"VCID-mde2-1ynu-auh2"},{"vulnerability":"VCID-v4gv-g9n5-ukgc"},{"vulnerability":"VCID-yx79-3g2x-pqex"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.0@10.0.30-0%252Bdeb8u2"}],"aliases":["CVE-2017-3318"],"risk_score":1.8,"exploitability":"0.5","weighted_severity":"3.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-9f48-53dz-13an"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/81536?format=json","vulnerability_id":"VCID-9ff2-43rk-2ydj","summary":"security update","references":[{"reference_url":"http://lists.opensuse.org/opensuse-updates/2016-09/msg00042.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:49:14Z/"}],"url":"http://lists.opensuse.org/opensuse-updates/2016-09/msg00042.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-1480.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:49:14Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-1480.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-1601.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:49:14Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-1601.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-1602.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:49:14Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-1602.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-1603.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:49:14Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-1603.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-1604.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:49:14Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-1604.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-1637.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:49:14Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-1637.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3521.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3521.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-3521","reference_id":"","reference_type":"","scores":[{"value":"0.00835","scoring_system":"epss","scoring_elements":"0.74795","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00835","scoring_system":"epss","scoring_elements":"0.74697","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00835","scoring_system":"epss","scoring_elements":"0.74702","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00835","scoring_system":"epss","scoring_elements":"0.74731","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00835","scoring_system":"epss","scoring_elements":"0.74755","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00835","scoring_system":"epss","scoring_elements":"0.74722","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00835","scoring_system":"epss","scoring_elements":"0.74741","published_at":"2026-05-12T12:55:00Z"},{"value":"0.01349","scoring_system":"epss","scoring_elements":"0.80097","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01349","scoring_system":"epss","scoring_elements":"0.80043","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01349","scoring_system":"epss","scoring_elements":"0.80158","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01349","scoring_system":"epss","scoring_elements":"0.80151","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01349","scoring_system":"epss","scoring_elements":"0.80124","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01349","scoring_system":"epss","scoring_elements":"0.80122","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01349","scoring_system":"epss","scoring_elements":"0.80092","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01349","scoring_system":"epss","scoring_elements":"0.80101","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01349","scoring_system":"epss","scoring_elements":"0.80116","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01349","scoring_system":"epss","scoring_elements":"0.80051","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01349","scoring_system":"epss","scoring_elements":"0.80072","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01349","scoring_system":"epss","scoring_elements":"0.80061","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01349","scoring_system":"epss","scoring_elements":"0.80089","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-3521"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3477","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3477"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3521","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3521"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3615","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3615"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5440","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5440"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:S/C:N/I:N/A:C"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://mariadb.com/kb/en/mariadb/mariadb-10026-release-notes/","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:49:14Z/"}],"url":"https://mariadb.com/kb/en/mariadb/mariadb-10026-release-notes/"},{"reference_url":"https://mariadb.com/kb/en/mariadb/mariadb-10115-release-notes/","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:49:14Z/"}],"url":"https://mariadb.com/kb/en/mariadb/mariadb-10115-release-notes/"},{"reference_url":"https://mariadb.com/kb/en/mariadb/mariadb-5550-release-notes/","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:49:14Z/"}],"url":"https://mariadb.com/kb/en/mariadb/mariadb-5550-release-notes/"},{"reference_url":"http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:49:14Z/"}],"url":"http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168"},{"reference_url":"http://www.debian.org/security/2016/dsa-3624","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:49:14Z/"}],"url":"http://www.debian.org/security/2016/dsa-3624"},{"reference_url":"http://www.debian.org/security/2016/dsa-3632","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:49:14Z/"}],"url":"http://www.debian.org/security/2016/dsa-3632"},{"reference_url":"http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:49:14Z/"}],"url":"http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:49:14Z/"}],"url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html"},{"reference_url":"http://www.securityfocus.com/bid/91787","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:49:14Z/"}],"url":"http://www.securityfocus.com/bid/91787"},{"reference_url":"http://www.securityfocus.com/bid/91932","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:49:14Z/"}],"url":"http://www.securityfocus.com/bid/91932"},{"reference_url":"http://www.securitytracker.com/id/1036362","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:49:14Z/"}],"url":"http://www.securitytracker.com/id/1036362"},{"reference_url":"http://www.ubuntu.com/usn/USN-3040-1","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:49:14Z/"}],"url":"http://www.ubuntu.com/usn/USN-3040-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1358209","reference_id":"1358209","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1358209"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:powerkvm:2.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ibm:powerkvm:2.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:powerkvm:2.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:powerkvm:3.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ibm:powerkvm:3.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:powerkvm:3.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-3521","reference_id":"CVE-2016-3521","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:S/C:N/I:N/A:C"},{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-3521"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1480","reference_id":"RHSA-2016:1480","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1480"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1601","reference_id":"RHSA-2016:1601","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1601"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1602","reference_id":"RHSA-2016:1602","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1602"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1603","reference_id":"RHSA-2016:1603","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1603"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1604","reference_id":"RHSA-2016:1604","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1604"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1637","reference_id":"RHSA-2016:1637","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1637"},{"reference_url":"https://usn.ubuntu.com/3040-1/","reference_id":"USN-3040-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3040-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035613?format=json","purl":"pkg:deb/debian/mariadb-10.0@10.0.30-0%2Bdeb8u2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1gmc-pj6y-rkfx"},{"vulnerability":"VCID-4yz4-vxnh-b3dp"},{"vulnerability":"VCID-5sjj-599v-vybg"},{"vulnerability":"VCID-6g4n-3xfu-hfee"},{"vulnerability":"VCID-6muh-rg1z-pqab"},{"vulnerability":"VCID-bhxk-8byp-eyap"},{"vulnerability":"VCID-ej67-ayfh-sqdt"},{"vulnerability":"VCID-jgff-4jyp-9fgr"},{"vulnerability":"VCID-mde2-1ynu-auh2"},{"vulnerability":"VCID-v4gv-g9n5-ukgc"},{"vulnerability":"VCID-yx79-3g2x-pqex"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.0@10.0.30-0%252Bdeb8u2"}],"aliases":["CVE-2016-3521"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"6.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-9ff2-43rk-2ydj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31716?format=json","vulnerability_id":"VCID-9w98-nfg2-muh2","summary":"Multiple vulnerabilities have been found in MariaDB, the worst of\n    which could lead to privilege escalation.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3238.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3238.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-3238","reference_id":"","reference_type":"","scores":[{"value":"0.02525","scoring_system":"epss","scoring_elements":"0.85587","published_at":"2026-05-14T12:55:00Z"},{"value":"0.02525","scoring_system":"epss","scoring_elements":"0.85353","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02525","scoring_system":"epss","scoring_elements":"0.85366","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02525","scoring_system":"epss","scoring_elements":"0.85475","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02525","scoring_system":"epss","scoring_elements":"0.85484","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02525","scoring_system":"epss","scoring_elements":"0.85482","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02525","scoring_system":"epss","scoring_elements":"0.85499","published_at":"2026-05-05T12:55:00Z"},{"value":"0.02525","scoring_system":"epss","scoring_elements":"0.85523","published_at":"2026-05-07T12:55:00Z"},{"value":"0.02525","scoring_system":"epss","scoring_elements":"0.85541","published_at":"2026-05-09T12:55:00Z"},{"value":"0.02525","scoring_system":"epss","scoring_elements":"0.85537","published_at":"2026-05-11T12:55:00Z"},{"value":"0.02525","scoring_system":"epss","scoring_elements":"0.85549","published_at":"2026-05-12T12:55:00Z"},{"value":"0.02525","scoring_system":"epss","scoring_elements":"0.85385","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02525","scoring_system":"epss","scoring_elements":"0.85387","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02525","scoring_system":"epss","scoring_elements":"0.85409","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02525","scoring_system":"epss","scoring_elements":"0.85417","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02525","scoring_system":"epss","scoring_elements":"0.85432","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02525","scoring_system":"epss","scoring_elements":"0.8543","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02525","scoring_system":"epss","scoring_elements":"0.85427","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02525","scoring_system":"epss","scoring_elements":"0.85451","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02525","scoring_system":"epss","scoring_elements":"0.85455","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02525","scoring_system":"epss","scoring_elements":"0.85452","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-3238"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6664","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6664"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3238","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3238"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3243","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3243"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3244","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3244"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3257","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3257"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3258","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3258"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3265","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3265"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3291","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3291"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3312","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3312"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3313","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3313"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3317","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3317"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3318","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3318"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:S/C:N/I:N/A:C"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1414338","reference_id":"1414338","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1414338"},{"reference_url":"http://www.securityfocus.com/bid/95571","reference_id":"95571","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:35Z/"}],"url":"http://www.securityfocus.com/bid/95571"},{"reference_url":"http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html","reference_id":"cpujan2017-2881727.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:35Z/"}],"url":"http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html"},{"reference_url":"http://www.debian.org/security/2017/dsa-3767","reference_id":"dsa-3767","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:35Z/"}],"url":"http://www.debian.org/security/2017/dsa-3767"},{"reference_url":"http://www.debian.org/security/2017/dsa-3770","reference_id":"dsa-3770","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:35Z/"}],"url":"http://www.debian.org/security/2017/dsa-3770"},{"reference_url":"https://security.gentoo.org/glsa/201702-17","reference_id":"GLSA-201702-17","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:35Z/"}],"url":"https://security.gentoo.org/glsa/201702-17"},{"reference_url":"https://security.gentoo.org/glsa/201702-18","reference_id":"GLSA-201702-18","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:35Z/"}],"url":"https://security.gentoo.org/glsa/201702-18"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:2192","reference_id":"RHSA-2017:2192","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:35Z/"}],"url":"https://access.redhat.com/errata/RHSA-2017:2192"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:2787","reference_id":"RHSA-2017:2787","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:35Z/"}],"url":"https://access.redhat.com/errata/RHSA-2017:2787"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:2886","reference_id":"RHSA-2017:2886","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:35Z/"}],"url":"https://access.redhat.com/errata/RHSA-2017:2886"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0279","reference_id":"RHSA-2018:0279","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:35Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:0279"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0574","reference_id":"RHSA-2018:0574","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:35Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:0574"},{"reference_url":"https://usn.ubuntu.com/3174-1/","reference_id":"USN-3174-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3174-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035613?format=json","purl":"pkg:deb/debian/mariadb-10.0@10.0.30-0%2Bdeb8u2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1gmc-pj6y-rkfx"},{"vulnerability":"VCID-4yz4-vxnh-b3dp"},{"vulnerability":"VCID-5sjj-599v-vybg"},{"vulnerability":"VCID-6g4n-3xfu-hfee"},{"vulnerability":"VCID-6muh-rg1z-pqab"},{"vulnerability":"VCID-bhxk-8byp-eyap"},{"vulnerability":"VCID-ej67-ayfh-sqdt"},{"vulnerability":"VCID-jgff-4jyp-9fgr"},{"vulnerability":"VCID-mde2-1ynu-auh2"},{"vulnerability":"VCID-v4gv-g9n5-ukgc"},{"vulnerability":"VCID-yx79-3g2x-pqex"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.0@10.0.30-0%252Bdeb8u2"}],"aliases":["CVE-2017-3238"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-9w98-nfg2-muh2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49068?format=json","vulnerability_id":"VCID-bhxk-8byp-eyap","summary":"Multiple vulnerabilities were found in MySQL, the worst of which\n    may allow remote execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3309.json","reference_id":"","reference_type":"","scores":[{"value":"7.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3309.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-3309","reference_id":"","reference_type":"","scores":[{"value":"0.00319","scoring_system":"epss","scoring_elements":"0.54977","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00319","scoring_system":"epss","scoring_elements":"0.54809","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00319","scoring_system":"epss","scoring_elements":"0.54879","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00319","scoring_system":"epss","scoring_elements":"0.54932","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00319","scoring_system":"epss","scoring_elements":"0.54915","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00319","scoring_system":"epss","scoring_elements":"0.5489","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00319","scoring_system":"epss","scoring_elements":"0.54909","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00319","scoring_system":"epss","scoring_elements":"0.54884","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00319","scoring_system":"epss","scoring_elements":"0.54832","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00319","scoring_system":"epss","scoring_elements":"0.54874","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00319","scoring_system":"epss","scoring_elements":"0.54891","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00319","scoring_system":"epss","scoring_elements":"0.54905","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00319","scoring_system":"epss","scoring_elements":"0.54875","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00319","scoring_system":"epss","scoring_elements":"0.54924","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00319","scoring_system":"epss","scoring_elements":"0.54923","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00319","scoring_system":"epss","scoring_elements":"0.54935","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00319","scoring_system":"epss","scoring_elements":"0.54917","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00319","scoring_system":"epss","scoring_elements":"0.54894","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-3309"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10286","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10286"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10379","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10379"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10384","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10384"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3302","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3302"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3305","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3305"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3308","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3308"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3309","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3309"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3329","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3329"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3453","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3453"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3456","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3456"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3461","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3461"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3462","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3462"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3463","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3463"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3464","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3464"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3600","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3600"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3636","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3636"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3641","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3641"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3653","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3653"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"2.1","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:S/C:N/I:N/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.debian.org/security/2017/dsa-3834","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:46:17Z/"}],"url":"http://www.debian.org/security/2017/dsa-3834"},{"reference_url":"http://www.debian.org/security/2017/dsa-3944","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:46:17Z/"}],"url":"http://www.debian.org/security/2017/dsa-3944"},{"reference_url":"http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:46:17Z/"}],"url":"http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html"},{"reference_url":"http://www.securityfocus.com/bid/97742","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:46:17Z/"}],"url":"http://www.securityfocus.com/bid/97742"},{"reference_url":"http://www.securitytracker.com/id/1038287","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:46:17Z/"}],"url":"http://www.securitytracker.com/id/1038287"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1443359","reference_id":"1443359","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1443359"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2017-3309","reference_id":"CVE-2017-3309","reference_type":"","scores":[{"value":"4.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:S/C:N/I:N/A:P"},{"value":"7.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2017-3309"},{"reference_url":"https://security.gentoo.org/glsa/201802-04","reference_id":"GLSA-201802-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201802-04"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:2192","reference_id":"RHSA-2017:2192","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:46:17Z/"}],"url":"https://access.redhat.com/errata/RHSA-2017:2192"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:2787","reference_id":"RHSA-2017:2787","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:46:17Z/"}],"url":"https://access.redhat.com/errata/RHSA-2017:2787"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:2886","reference_id":"RHSA-2017:2886","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:46:17Z/"}],"url":"https://access.redhat.com/errata/RHSA-2017:2886"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0279","reference_id":"RHSA-2018:0279","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:46:17Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:0279"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0574","reference_id":"RHSA-2018:0574","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:46:17Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:0574"},{"reference_url":"https://usn.ubuntu.com/3269-1/","reference_id":"USN-3269-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3269-1/"},{"reference_url":"https://usn.ubuntu.com/3357-2/","reference_id":"USN-3357-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3357-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035614?format=json","purl":"pkg:deb/debian/mariadb-10.0@10.0.32-0%2Bdeb8u1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.0@10.0.32-0%252Bdeb8u1"}],"aliases":["CVE-2017-3309"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"6.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-bhxk-8byp-eyap"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49065?format=json","vulnerability_id":"VCID-ej67-ayfh-sqdt","summary":"Multiple vulnerabilities were found in MySQL, the worst of which\n    may allow remote execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10379.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10379.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-10379","reference_id":"","reference_type":"","scores":[{"value":"0.00326","scoring_system":"epss","scoring_elements":"0.55659","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00326","scoring_system":"epss","scoring_elements":"0.55641","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00326","scoring_system":"epss","scoring_elements":"0.55624","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00326","scoring_system":"epss","scoring_elements":"0.55663","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00326","scoring_system":"epss","scoring_elements":"0.55667","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00326","scoring_system":"epss","scoring_elements":"0.55646","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00326","scoring_system":"epss","scoring_elements":"0.55573","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00326","scoring_system":"epss","scoring_elements":"0.5559","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00326","scoring_system":"epss","scoring_elements":"0.55565","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00326","scoring_system":"epss","scoring_elements":"0.55511","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00326","scoring_system":"epss","scoring_elements":"0.55558","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00326","scoring_system":"epss","scoring_elements":"0.55616","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00326","scoring_system":"epss","scoring_elements":"0.556","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00351","scoring_system":"epss","scoring_elements":"0.57419","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00458","scoring_system":"epss","scoring_elements":"0.64019","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00458","scoring_system":"epss","scoring_elements":"0.64031","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00458","scoring_system":"epss","scoring_elements":"0.64002","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00458","scoring_system":"epss","scoring_elements":"0.63965","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00458","scoring_system":"epss","scoring_elements":"0.63992","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00458","scoring_system":"epss","scoring_elements":"0.63952","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-10379"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10268","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10268"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10286","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10286"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10378","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10378"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10379","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10379"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10384","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10384"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3308","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3308"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3309","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3309"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3453","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3453"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3456","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3456"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3464","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3464"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3636","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3636"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3641","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3641"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3653","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3653"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:S/C:N/I:N/A:C"},{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://security.netapp.com/advisory/ntap-20171019-0002/","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:42:50Z/"}],"url":"https://security.netapp.com/advisory/ntap-20171019-0002/"},{"reference_url":"http://www.debian.org/security/2017/dsa-4002","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:42:50Z/"}],"url":"http://www.debian.org/security/2017/dsa-4002"},{"reference_url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:42:50Z/"}],"url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html"},{"reference_url":"http://www.securityfocus.com/bid/101415","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:42:50Z/"}],"url":"http://www.securityfocus.com/bid/101415"},{"reference_url":"http://www.securitytracker.com/id/1039597","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:42:50Z/"}],"url":"http://www.securitytracker.com/id/1039597"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1503685","reference_id":"1503685","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1503685"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*","reference_id":"cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*","reference_id":"cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_balance:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:oncommand_balance:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_balance:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_performance_manager:-:*:*:*:*:vmware_vsphere:*:*","reference_id":"cpe:2.3:a:netapp:oncommand_performance_manager:-:*:*:*:*:vmware_vsphere:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_performance_manager:-:*:*:*:*:vmware_vsphere:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vsphere:*:*","reference_id":"cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vsphere:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vsphere:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:windows:*:*","reference_id":"cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:windows:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:windows:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openstack:12:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:openstack:12:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openstack:12:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2017-10379","reference_id":"CVE-2017-10379","reference_type":"","scores":[{"value":"4.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:S/C:P/I:N/A:N"},{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2017-10379"},{"reference_url":"https://security.gentoo.org/glsa/201802-04","reference_id":"GLSA-201802-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201802-04"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:3265","reference_id":"RHSA-2017:3265","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:42:50Z/"}],"url":"https://access.redhat.com/errata/RHSA-2017:3265"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:3442","reference_id":"RHSA-2017:3442","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:42:50Z/"}],"url":"https://access.redhat.com/errata/RHSA-2017:3442"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0279","reference_id":"RHSA-2018:0279","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:42:50Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:0279"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0574","reference_id":"RHSA-2018:0574","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:42:50Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:0574"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2439","reference_id":"RHSA-2018:2439","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:42:50Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:2439"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2729","reference_id":"RHSA-2018:2729","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:42:50Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:2729"},{"reference_url":"https://usn.ubuntu.com/3459-1/","reference_id":"USN-3459-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3459-1/"},{"reference_url":"https://usn.ubuntu.com/3459-2/","reference_id":"USN-3459-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3459-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035614?format=json","purl":"pkg:deb/debian/mariadb-10.0@10.0.32-0%2Bdeb8u1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.0@10.0.32-0%252Bdeb8u1"}],"aliases":["CVE-2017-10379"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ej67-ayfh-sqdt"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/81540?format=json","vulnerability_id":"VCID-g1pp-9qqg-1beb","summary":"security update","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-6663.json","reference_id":"","reference_type":"","scores":[{"value":"7.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-6663.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-6663","reference_id":"","reference_type":"","scores":[{"value":"0.02334","scoring_system":"epss","scoring_elements":"0.84783","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02334","scoring_system":"epss","scoring_elements":"0.84802","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02334","scoring_system":"epss","scoring_elements":"0.84768","published_at":"2026-04-01T12:55:00Z"},{"value":"0.03137","scoring_system":"epss","scoring_elements":"0.86886","published_at":"2026-04-11T12:55:00Z"},{"value":"0.03137","scoring_system":"epss","scoring_elements":"0.86882","published_at":"2026-04-12T12:55:00Z"},{"value":"0.03137","scoring_system":"epss","scoring_elements":"0.86877","published_at":"2026-04-13T12:55:00Z"},{"value":"0.03137","scoring_system":"epss","scoring_elements":"0.86845","published_at":"2026-04-07T12:55:00Z"},{"value":"0.03137","scoring_system":"epss","scoring_elements":"0.86865","published_at":"2026-04-08T12:55:00Z"},{"value":"0.03137","scoring_system":"epss","scoring_elements":"0.86873","published_at":"2026-04-09T12:55:00Z"},{"value":"0.03137","scoring_system":"epss","scoring_elements":"0.86894","published_at":"2026-04-16T12:55:00Z"},{"value":"0.03137","scoring_system":"epss","scoring_elements":"0.86899","published_at":"2026-04-21T12:55:00Z"},{"value":"0.03137","scoring_system":"epss","scoring_elements":"0.86917","published_at":"2026-04-24T12:55:00Z"},{"value":"0.03395","scoring_system":"epss","scoring_elements":"0.875","published_at":"2026-05-12T12:55:00Z"},{"value":"0.03395","scoring_system":"epss","scoring_elements":"0.87446","published_at":"2026-04-29T12:55:00Z"},{"value":"0.03395","scoring_system":"epss","scoring_elements":"0.8746","published_at":"2026-05-05T12:55:00Z"},{"value":"0.03395","scoring_system":"epss","scoring_elements":"0.87474","published_at":"2026-05-07T12:55:00Z"},{"value":"0.03395","scoring_system":"epss","scoring_elements":"0.87492","published_at":"2026-05-09T12:55:00Z"},{"value":"0.03395","scoring_system":"epss","scoring_elements":"0.87535","published_at":"2026-05-14T12:55:00Z"},{"value":"0.03395","scoring_system":"epss","scoring_elements":"0.87487","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-6663"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3492","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3492"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5584","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5584"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5624","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5624"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5626","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5626"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5629","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5629"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6663","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6663"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7440","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7440"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8283","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8283"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.5","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:H/Au:S/C:P/I:P/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1378936","reference_id":"1378936","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1378936"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/40678.c","reference_id":"CVE-2016-6663;CVE-2016-5616","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/40678.c"},{"reference_url":"https://legalhackers.com/advisories/MySQL-Maria-Percona-PrivEscRace-CVE-2016-6663-5616-Exploit.html","reference_id":"CVE-2016-6663;CVE-2016-5616","reference_type":"exploit","scores":[],"url":"https://legalhackers.com/advisories/MySQL-Maria-Percona-PrivEscRace-CVE-2016-6663-5616-Exploit.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2130","reference_id":"RHSA-2016:2130","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2130"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2131","reference_id":"RHSA-2016:2131","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2131"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2595","reference_id":"RHSA-2016:2595","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2595"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2749","reference_id":"RHSA-2016:2749","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2749"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2927","reference_id":"RHSA-2016:2927","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2927"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2928","reference_id":"RHSA-2016:2928","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2928"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0184","reference_id":"RHSA-2017:0184","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0184"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035613?format=json","purl":"pkg:deb/debian/mariadb-10.0@10.0.30-0%2Bdeb8u2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1gmc-pj6y-rkfx"},{"vulnerability":"VCID-4yz4-vxnh-b3dp"},{"vulnerability":"VCID-5sjj-599v-vybg"},{"vulnerability":"VCID-6g4n-3xfu-hfee"},{"vulnerability":"VCID-6muh-rg1z-pqab"},{"vulnerability":"VCID-bhxk-8byp-eyap"},{"vulnerability":"VCID-ej67-ayfh-sqdt"},{"vulnerability":"VCID-jgff-4jyp-9fgr"},{"vulnerability":"VCID-mde2-1ynu-auh2"},{"vulnerability":"VCID-v4gv-g9n5-ukgc"},{"vulnerability":"VCID-yx79-3g2x-pqex"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.0@10.0.30-0%252Bdeb8u2"}],"aliases":["CVE-2016-6663"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"6.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-g1pp-9qqg-1beb"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41732?format=json","vulnerability_id":"VCID-gp4w-bdxg-6kab","summary":"Multiple vulnerabilities have been found in MariaDB and MySQL, the\n    worst of which could lead to the remote execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5629.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5629.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-5629","reference_id":"","reference_type":"","scores":[{"value":"0.00501","scoring_system":"epss","scoring_elements":"0.66171","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00501","scoring_system":"epss","scoring_elements":"0.65913","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00501","scoring_system":"epss","scoring_elements":"0.66025","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00501","scoring_system":"epss","scoring_elements":"0.66046","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00501","scoring_system":"epss","scoring_elements":"0.66057","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00501","scoring_system":"epss","scoring_elements":"0.66055","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00501","scoring_system":"epss","scoring_elements":"0.66033","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00501","scoring_system":"epss","scoring_elements":"0.66079","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00501","scoring_system":"epss","scoring_elements":"0.66122","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00501","scoring_system":"epss","scoring_elements":"0.66093","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00501","scoring_system":"epss","scoring_elements":"0.66114","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00501","scoring_system":"epss","scoring_elements":"0.65954","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00501","scoring_system":"epss","scoring_elements":"0.65984","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00501","scoring_system":"epss","scoring_elements":"0.6595","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00501","scoring_system":"epss","scoring_elements":"0.66001","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00501","scoring_system":"epss","scoring_elements":"0.66013","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00501","scoring_system":"epss","scoring_elements":"0.66032","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00501","scoring_system":"epss","scoring_elements":"0.66019","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00501","scoring_system":"epss","scoring_elements":"0.65989","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00501","scoring_system":"epss","scoring_elements":"0.66024","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00501","scoring_system":"epss","scoring_elements":"0.66038","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-5629"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3492","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3492"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5584","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5584"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5624","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5624"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5626","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5626"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5629","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5629"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6663","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6663"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7440","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7440"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8283","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8283"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:S/C:N/I:N/A:P"},{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.securitytracker.com/id/1037050","reference_id":"1037050","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:33Z/"}],"url":"http://www.securitytracker.com/id/1037050"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1386572","reference_id":"1386572","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1386572"},{"reference_url":"http://www.securityfocus.com/bid/93668","reference_id":"93668","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:33Z/"}],"url":"http://www.securityfocus.com/bid/93668"},{"reference_url":"https://security.gentoo.org/glsa/201701-01","reference_id":"GLSA-201701-01","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:33Z/"}],"url":"https://security.gentoo.org/glsa/201701-01"},{"reference_url":"https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/","reference_id":"mariadb-10028-release-notes","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:33Z/"}],"url":"https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/"},{"reference_url":"https://mariadb.com/kb/en/mariadb/mariadb-10118-release-notes/","reference_id":"mariadb-10118-release-notes","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:33Z/"}],"url":"https://mariadb.com/kb/en/mariadb/mariadb-10118-release-notes/"},{"reference_url":"https://mariadb.com/kb/en/mariadb/mariadb-5552-release-notes/","reference_id":"mariadb-5552-release-notes","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:33Z/"}],"url":"https://mariadb.com/kb/en/mariadb/mariadb-5552-release-notes/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2130","reference_id":"RHSA-2016:2130","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2130"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-2130.html","reference_id":"RHSA-2016-2130.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:33Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-2130.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2131","reference_id":"RHSA-2016:2131","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2131"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-2131.html","reference_id":"RHSA-2016-2131.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:33Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-2131.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2595","reference_id":"RHSA-2016:2595","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2595"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-2595.html","reference_id":"RHSA-2016-2595.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:33Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-2595.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2749","reference_id":"RHSA-2016:2749","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2749"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-2749.html","reference_id":"RHSA-2016-2749.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:33Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-2749.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2927","reference_id":"RHSA-2016:2927","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2927"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2928","reference_id":"RHSA-2016:2928","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2928"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035613?format=json","purl":"pkg:deb/debian/mariadb-10.0@10.0.30-0%2Bdeb8u2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1gmc-pj6y-rkfx"},{"vulnerability":"VCID-4yz4-vxnh-b3dp"},{"vulnerability":"VCID-5sjj-599v-vybg"},{"vulnerability":"VCID-6g4n-3xfu-hfee"},{"vulnerability":"VCID-6muh-rg1z-pqab"},{"vulnerability":"VCID-bhxk-8byp-eyap"},{"vulnerability":"VCID-ej67-ayfh-sqdt"},{"vulnerability":"VCID-jgff-4jyp-9fgr"},{"vulnerability":"VCID-mde2-1ynu-auh2"},{"vulnerability":"VCID-v4gv-g9n5-ukgc"},{"vulnerability":"VCID-yx79-3g2x-pqex"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.0@10.0.30-0%252Bdeb8u2"}],"aliases":["CVE-2016-5629"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-gp4w-bdxg-6kab"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49085?format=json","vulnerability_id":"VCID-jgff-4jyp-9fgr","summary":"Multiple vulnerabilities were found in MySQL, the worst of which\n    may allow remote execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3641.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3641.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-3641","reference_id":"","reference_type":"","scores":[{"value":"0.0018","scoring_system":"epss","scoring_elements":"0.39236","published_at":"2026-05-14T12:55:00Z"},{"value":"0.0018","scoring_system":"epss","scoring_elements":"0.39151","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0018","scoring_system":"epss","scoring_elements":"0.39217","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0018","scoring_system":"epss","scoring_elements":"0.39233","published_at":"2026-05-09T12:55:00Z"},{"value":"0.0018","scoring_system":"epss","scoring_elements":"0.39141","published_at":"2026-05-11T12:55:00Z"},{"value":"0.0018","scoring_system":"epss","scoring_elements":"0.39164","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00187","scoring_system":"epss","scoring_elements":"0.40565","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00187","scoring_system":"epss","scoring_elements":"0.40537","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00187","scoring_system":"epss","scoring_elements":"0.40585","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00187","scoring_system":"epss","scoring_elements":"0.40555","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00187","scoring_system":"epss","scoring_elements":"0.40477","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00187","scoring_system":"epss","scoring_elements":"0.40375","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00187","scoring_system":"epss","scoring_elements":"0.40363","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00187","scoring_system":"epss","scoring_elements":"0.40281","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00187","scoring_system":"epss","scoring_elements":"0.40485","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00187","scoring_system":"epss","scoring_elements":"0.40593","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00187","scoring_system":"epss","scoring_elements":"0.40514","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00187","scoring_system":"epss","scoring_elements":"0.40564","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00187","scoring_system":"epss","scoring_elements":"0.40575","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00187","scoring_system":"epss","scoring_elements":"0.40557","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-3641"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10286","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10286"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10379","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10379"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10384","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10384"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3308","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3308"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3309","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3309"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3453","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3453"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3456","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3456"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3464","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3464"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3635","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3635"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3636","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3636"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3641","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3641"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3648","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3648"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3651","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3651"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3652","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3652"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3653","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3653"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:S/C:N/I:N/A:C"},{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.securitytracker.com/id/1038928","reference_id":"1038928","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:48:15Z/"}],"url":"http://www.securitytracker.com/id/1038928"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1472693","reference_id":"1472693","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1472693"},{"reference_url":"http://www.securityfocus.com/bid/99767","reference_id":"99767","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:48:15Z/"}],"url":"http://www.securityfocus.com/bid/99767"},{"reference_url":"http://www.debian.org/security/2017/dsa-3922","reference_id":"dsa-3922","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:48:15Z/"}],"url":"http://www.debian.org/security/2017/dsa-3922"},{"reference_url":"https://www.debian.org/security/2017/dsa-3955","reference_id":"dsa-3955","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:48:15Z/"}],"url":"https://www.debian.org/security/2017/dsa-3955"},{"reference_url":"https://security.gentoo.org/glsa/201802-04","reference_id":"GLSA-201802-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201802-04"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:2787","reference_id":"RHSA-2017:2787","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:48:15Z/"}],"url":"https://access.redhat.com/errata/RHSA-2017:2787"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:2886","reference_id":"RHSA-2017:2886","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:48:15Z/"}],"url":"https://access.redhat.com/errata/RHSA-2017:2886"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0279","reference_id":"RHSA-2018:0279","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:48:15Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:0279"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0574","reference_id":"RHSA-2018:0574","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:48:15Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:0574"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2439","reference_id":"RHSA-2018:2439","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:48:15Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:2439"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2729","reference_id":"RHSA-2018:2729","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:48:15Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:2729"},{"reference_url":"https://usn.ubuntu.com/3357-1/","reference_id":"USN-3357-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3357-1/"},{"reference_url":"https://usn.ubuntu.com/3357-2/","reference_id":"USN-3357-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3357-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035614?format=json","purl":"pkg:deb/debian/mariadb-10.0@10.0.32-0%2Bdeb8u1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.0@10.0.32-0%252Bdeb8u1"}],"aliases":["CVE-2017-3641"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-jgff-4jyp-9fgr"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49073?format=json","vulnerability_id":"VCID-mde2-1ynu-auh2","summary":"Multiple vulnerabilities were found in MySQL, the worst of which\n    may allow remote execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3456.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3456.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-3456","reference_id":"","reference_type":"","scores":[{"value":"0.0018","scoring_system":"epss","scoring_elements":"0.39289","published_at":"2026-05-14T12:55:00Z"},{"value":"0.0018","scoring_system":"epss","scoring_elements":"0.39555","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0018","scoring_system":"epss","scoring_elements":"0.39704","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0018","scoring_system":"epss","scoring_elements":"0.39429","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0018","scoring_system":"epss","scoring_elements":"0.39416","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0018","scoring_system":"epss","scoring_elements":"0.39333","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0018","scoring_system":"epss","scoring_elements":"0.39205","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0018","scoring_system":"epss","scoring_elements":"0.3927","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0018","scoring_system":"epss","scoring_elements":"0.39286","published_at":"2026-05-09T12:55:00Z"},{"value":"0.0018","scoring_system":"epss","scoring_elements":"0.39194","published_at":"2026-05-11T12:55:00Z"},{"value":"0.0018","scoring_system":"epss","scoring_elements":"0.39218","published_at":"2026-05-12T12:55:00Z"},{"value":"0.0018","scoring_system":"epss","scoring_elements":"0.39726","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0018","scoring_system":"epss","scoring_elements":"0.39644","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0018","scoring_system":"epss","scoring_elements":"0.39699","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0018","scoring_system":"epss","scoring_elements":"0.39713","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0018","scoring_system":"epss","scoring_elements":"0.39723","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0018","scoring_system":"epss","scoring_elements":"0.39687","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0018","scoring_system":"epss","scoring_elements":"0.3967","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0018","scoring_system":"epss","scoring_elements":"0.39721","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0018","scoring_system":"epss","scoring_elements":"0.39692","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0018","scoring_system":"epss","scoring_elements":"0.39608","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-3456"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10286","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10286"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10379","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10379"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10384","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10384"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3302","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3302"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3305","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3305"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3308","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3308"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3309","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3309"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3329","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3329"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3453","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3453"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3456","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3456"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3461","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3461"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3462","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3462"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3463","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3463"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3464","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3464"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3600","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3600"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3636","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3636"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3641","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3641"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3653","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3653"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"2.1","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:S/C:N/I:N/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.debian.org/security/2017/dsa-3834","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:46:04Z/"}],"url":"http://www.debian.org/security/2017/dsa-3834"},{"reference_url":"http://www.debian.org/security/2017/dsa-3944","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:46:04Z/"}],"url":"http://www.debian.org/security/2017/dsa-3944"},{"reference_url":"http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:46:04Z/"}],"url":"http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html"},{"reference_url":"http://www.securityfocus.com/bid/97831","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:46:04Z/"}],"url":"http://www.securityfocus.com/bid/97831"},{"reference_url":"http://www.securitytracker.com/id/1038287","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:46:04Z/"}],"url":"http://www.securitytracker.com/id/1038287"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1443369","reference_id":"1443369","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1443369"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2017-3456","reference_id":"CVE-2017-3456","reference_type":"","scores":[{"value":"4.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:S/C:N/I:N/A:P"},{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2017-3456"},{"reference_url":"https://security.gentoo.org/glsa/201802-04","reference_id":"GLSA-201802-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201802-04"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:2192","reference_id":"RHSA-2017:2192","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:46:04Z/"}],"url":"https://access.redhat.com/errata/RHSA-2017:2192"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:2787","reference_id":"RHSA-2017:2787","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:46:04Z/"}],"url":"https://access.redhat.com/errata/RHSA-2017:2787"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:2886","reference_id":"RHSA-2017:2886","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:46:04Z/"}],"url":"https://access.redhat.com/errata/RHSA-2017:2886"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0279","reference_id":"RHSA-2018:0279","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:46:04Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:0279"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0574","reference_id":"RHSA-2018:0574","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:46:04Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:0574"},{"reference_url":"https://usn.ubuntu.com/3269-1/","reference_id":"USN-3269-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3269-1/"},{"reference_url":"https://usn.ubuntu.com/3357-2/","reference_id":"USN-3357-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3357-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035614?format=json","purl":"pkg:deb/debian/mariadb-10.0@10.0.32-0%2Bdeb8u1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.0@10.0.32-0%252Bdeb8u1"}],"aliases":["CVE-2017-3456"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-mde2-1ynu-auh2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/81539?format=json","vulnerability_id":"VCID-mfgg-7s54-gqg8","summary":"security update","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5624.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5624.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-5624","reference_id":"","reference_type":"","scores":[{"value":"0.0069","scoring_system":"epss","scoring_elements":"0.71966","published_at":"2026-05-14T12:55:00Z"},{"value":"0.0069","scoring_system":"epss","scoring_elements":"0.71734","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0069","scoring_system":"epss","scoring_elements":"0.71852","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0069","scoring_system":"epss","scoring_elements":"0.71857","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0069","scoring_system":"epss","scoring_elements":"0.7186","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0069","scoring_system":"epss","scoring_elements":"0.71847","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0069","scoring_system":"epss","scoring_elements":"0.71881","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0069","scoring_system":"epss","scoring_elements":"0.71914","published_at":"2026-05-09T12:55:00Z"},{"value":"0.0069","scoring_system":"epss","scoring_elements":"0.71878","published_at":"2026-05-11T12:55:00Z"},{"value":"0.0069","scoring_system":"epss","scoring_elements":"0.71908","published_at":"2026-05-12T12:55:00Z"},{"value":"0.0069","scoring_system":"epss","scoring_elements":"0.71741","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0069","scoring_system":"epss","scoring_elements":"0.7176","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0069","scoring_system":"epss","scoring_elements":"0.71735","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0069","scoring_system":"epss","scoring_elements":"0.71774","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0069","scoring_system":"epss","scoring_elements":"0.71785","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0069","scoring_system":"epss","scoring_elements":"0.71809","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0069","scoring_system":"epss","scoring_elements":"0.71792","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0069","scoring_system":"epss","scoring_elements":"0.71775","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0069","scoring_system":"epss","scoring_elements":"0.71817","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0069","scoring_system":"epss","scoring_elements":"0.71823","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0069","scoring_system":"epss","scoring_elements":"0.71806","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-5624"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3492","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3492"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5584","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5584"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5624","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5624"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5626","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5626"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5629","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5629"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6663","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6663"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7440","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7440"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8283","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8283"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:S/C:N/I:N/A:P"},{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.securitytracker.com/id/1037050","reference_id":"1037050","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:38Z/"}],"url":"http://www.securitytracker.com/id/1037050"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1386566","reference_id":"1386566","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1386566"},{"reference_url":"http://www.securityfocus.com/bid/93635","reference_id":"93635","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:38Z/"}],"url":"http://www.securityfocus.com/bid/93635"},{"reference_url":"https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/","reference_id":"mariadb-10028-release-notes","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:38Z/"}],"url":"https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/"},{"reference_url":"https://mariadb.com/kb/en/mariadb/mariadb-10118-release-notes/","reference_id":"mariadb-10118-release-notes","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:38Z/"}],"url":"https://mariadb.com/kb/en/mariadb/mariadb-10118-release-notes/"},{"reference_url":"https://mariadb.com/kb/en/mariadb/mariadb-5552-release-notes/","reference_id":"mariadb-5552-release-notes","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:38Z/"}],"url":"https://mariadb.com/kb/en/mariadb/mariadb-5552-release-notes/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2130","reference_id":"RHSA-2016:2130","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2130"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-2130.html","reference_id":"RHSA-2016-2130.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:38Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-2130.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2131","reference_id":"RHSA-2016:2131","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2131"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-2131.html","reference_id":"RHSA-2016-2131.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:38Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-2131.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2595","reference_id":"RHSA-2016:2595","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2595"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-2595.html","reference_id":"RHSA-2016-2595.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:38Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-2595.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2927","reference_id":"RHSA-2016:2927","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2927"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2928","reference_id":"RHSA-2016:2928","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2928"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035613?format=json","purl":"pkg:deb/debian/mariadb-10.0@10.0.30-0%2Bdeb8u2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1gmc-pj6y-rkfx"},{"vulnerability":"VCID-4yz4-vxnh-b3dp"},{"vulnerability":"VCID-5sjj-599v-vybg"},{"vulnerability":"VCID-6g4n-3xfu-hfee"},{"vulnerability":"VCID-6muh-rg1z-pqab"},{"vulnerability":"VCID-bhxk-8byp-eyap"},{"vulnerability":"VCID-ej67-ayfh-sqdt"},{"vulnerability":"VCID-jgff-4jyp-9fgr"},{"vulnerability":"VCID-mde2-1ynu-auh2"},{"vulnerability":"VCID-v4gv-g9n5-ukgc"},{"vulnerability":"VCID-yx79-3g2x-pqex"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.0@10.0.30-0%252Bdeb8u2"}],"aliases":["CVE-2016-5624"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-mfgg-7s54-gqg8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31717?format=json","vulnerability_id":"VCID-nkdd-suwp-4ffr","summary":"Multiple vulnerabilities have been found in MariaDB, the worst of\n    which could lead to privilege escalation.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3243.json","reference_id":"","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3243.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-3243","reference_id":"","reference_type":"","scores":[{"value":"0.05555","scoring_system":"epss","scoring_elements":"0.90359","published_at":"2026-05-14T12:55:00Z"},{"value":"0.05555","scoring_system":"epss","scoring_elements":"0.90233","published_at":"2026-04-01T12:55:00Z"},{"value":"0.05555","scoring_system":"epss","scoring_elements":"0.90236","published_at":"2026-04-02T12:55:00Z"},{"value":"0.05555","scoring_system":"epss","scoring_elements":"0.90305","published_at":"2026-04-24T12:55:00Z"},{"value":"0.05555","scoring_system":"epss","scoring_elements":"0.90304","published_at":"2026-04-26T12:55:00Z"},{"value":"0.05555","scoring_system":"epss","scoring_elements":"0.90301","published_at":"2026-04-29T12:55:00Z"},{"value":"0.05555","scoring_system":"epss","scoring_elements":"0.90313","published_at":"2026-05-05T12:55:00Z"},{"value":"0.05555","scoring_system":"epss","scoring_elements":"0.90329","published_at":"2026-05-07T12:55:00Z"},{"value":"0.05555","scoring_system":"epss","scoring_elements":"0.9034","published_at":"2026-05-09T12:55:00Z"},{"value":"0.05555","scoring_system":"epss","scoring_elements":"0.90336","published_at":"2026-05-11T12:55:00Z"},{"value":"0.05555","scoring_system":"epss","scoring_elements":"0.90345","published_at":"2026-05-12T12:55:00Z"},{"value":"0.05555","scoring_system":"epss","scoring_elements":"0.90249","published_at":"2026-04-04T12:55:00Z"},{"value":"0.05555","scoring_system":"epss","scoring_elements":"0.90253","published_at":"2026-04-07T12:55:00Z"},{"value":"0.05555","scoring_system":"epss","scoring_elements":"0.90269","published_at":"2026-04-08T12:55:00Z"},{"value":"0.05555","scoring_system":"epss","scoring_elements":"0.90275","published_at":"2026-04-09T12:55:00Z"},{"value":"0.05555","scoring_system":"epss","scoring_elements":"0.90284","published_at":"2026-04-11T12:55:00Z"},{"value":"0.05555","scoring_system":"epss","scoring_elements":"0.90283","published_at":"2026-04-12T12:55:00Z"},{"value":"0.05555","scoring_system":"epss","scoring_elements":"0.90277","published_at":"2026-04-13T12:55:00Z"},{"value":"0.05555","scoring_system":"epss","scoring_elements":"0.90293","published_at":"2026-04-18T12:55:00Z"},{"value":"0.05555","scoring_system":"epss","scoring_elements":"0.9029","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-3243"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6664","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6664"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3238","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3238"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3243","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3243"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3244","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3244"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3257","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3257"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3258","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3258"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3265","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3265"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3291","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3291"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3312","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3312"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3313","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3313"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3317","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3317"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3318","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3318"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:S/C:N/I:N/A:C"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1414340","reference_id":"1414340","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1414340"},{"reference_url":"http://www.securityfocus.com/bid/95538","reference_id":"95538","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:27Z/"}],"url":"http://www.securityfocus.com/bid/95538"},{"reference_url":"http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html","reference_id":"cpujan2017-2881727.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:27Z/"}],"url":"http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html"},{"reference_url":"http://www.debian.org/security/2017/dsa-3767","reference_id":"dsa-3767","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:27Z/"}],"url":"http://www.debian.org/security/2017/dsa-3767"},{"reference_url":"http://www.debian.org/security/2017/dsa-3770","reference_id":"dsa-3770","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:27Z/"}],"url":"http://www.debian.org/security/2017/dsa-3770"},{"reference_url":"https://security.gentoo.org/glsa/201702-17","reference_id":"GLSA-201702-17","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:27Z/"}],"url":"https://security.gentoo.org/glsa/201702-17"},{"reference_url":"https://security.gentoo.org/glsa/201702-18","reference_id":"GLSA-201702-18","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:27Z/"}],"url":"https://security.gentoo.org/glsa/201702-18"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:2192","reference_id":"RHSA-2017:2192","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:27Z/"}],"url":"https://access.redhat.com/errata/RHSA-2017:2192"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0279","reference_id":"RHSA-2018:0279","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:27Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:0279"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0574","reference_id":"RHSA-2018:0574","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:27Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:0574"},{"reference_url":"https://usn.ubuntu.com/3174-1/","reference_id":"USN-3174-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3174-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035613?format=json","purl":"pkg:deb/debian/mariadb-10.0@10.0.30-0%2Bdeb8u2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1gmc-pj6y-rkfx"},{"vulnerability":"VCID-4yz4-vxnh-b3dp"},{"vulnerability":"VCID-5sjj-599v-vybg"},{"vulnerability":"VCID-6g4n-3xfu-hfee"},{"vulnerability":"VCID-6muh-rg1z-pqab"},{"vulnerability":"VCID-bhxk-8byp-eyap"},{"vulnerability":"VCID-ej67-ayfh-sqdt"},{"vulnerability":"VCID-jgff-4jyp-9fgr"},{"vulnerability":"VCID-mde2-1ynu-auh2"},{"vulnerability":"VCID-v4gv-g9n5-ukgc"},{"vulnerability":"VCID-yx79-3g2x-pqex"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.0@10.0.30-0%252Bdeb8u2"}],"aliases":["CVE-2017-3243"],"risk_score":2.0,"exploitability":"0.5","weighted_severity":"4.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-nkdd-suwp-4ffr"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31722?format=json","vulnerability_id":"VCID-p623-gxyv-g7fs","summary":"Multiple vulnerabilities have been found in MariaDB, the worst of\n    which could lead to privilege escalation.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3291.json","reference_id":"","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3291.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-3291","reference_id":"","reference_type":"","scores":[{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25462","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25664","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25734","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25489","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25481","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25433","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25318","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25386","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25447","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25368","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25385","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25775","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25545","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25618","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25665","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25676","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25635","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25578","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.2558","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25565","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25537","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-3291"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6664","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6664"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3238","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3238"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3243","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3243"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3244","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3244"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3257","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3257"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3258","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3258"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3265","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3265"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3291","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3291"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3312","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3312"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3313","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3313"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3317","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3317"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3318","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3318"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:H/Au:S/C:C/I:C/A:C"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1414429","reference_id":"1414429","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1414429"},{"reference_url":"http://www.securityfocus.com/bid/95501","reference_id":"95501","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:06:04Z/"}],"url":"http://www.securityfocus.com/bid/95501"},{"reference_url":"http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html","reference_id":"cpujan2017-2881727.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:06:04Z/"}],"url":"http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html"},{"reference_url":"http://www.debian.org/security/2017/dsa-3767","reference_id":"dsa-3767","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:06:04Z/"}],"url":"http://www.debian.org/security/2017/dsa-3767"},{"reference_url":"http://www.debian.org/security/2017/dsa-3770","reference_id":"dsa-3770","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:06:04Z/"}],"url":"http://www.debian.org/security/2017/dsa-3770"},{"reference_url":"https://security.gentoo.org/glsa/201702-17","reference_id":"GLSA-201702-17","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:06:04Z/"}],"url":"https://security.gentoo.org/glsa/201702-17"},{"reference_url":"https://security.gentoo.org/glsa/201702-18","reference_id":"GLSA-201702-18","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:06:04Z/"}],"url":"https://security.gentoo.org/glsa/201702-18"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:2192","reference_id":"RHSA-2017:2192","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:06:04Z/"}],"url":"https://access.redhat.com/errata/RHSA-2017:2192"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:2787","reference_id":"RHSA-2017:2787","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:06:04Z/"}],"url":"https://access.redhat.com/errata/RHSA-2017:2787"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:2886","reference_id":"RHSA-2017:2886","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:06:04Z/"}],"url":"https://access.redhat.com/errata/RHSA-2017:2886"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0279","reference_id":"RHSA-2018:0279","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:06:04Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:0279"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0574","reference_id":"RHSA-2018:0574","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:06:04Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:0574"},{"reference_url":"https://usn.ubuntu.com/3174-1/","reference_id":"USN-3174-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3174-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035613?format=json","purl":"pkg:deb/debian/mariadb-10.0@10.0.30-0%2Bdeb8u2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1gmc-pj6y-rkfx"},{"vulnerability":"VCID-4yz4-vxnh-b3dp"},{"vulnerability":"VCID-5sjj-599v-vybg"},{"vulnerability":"VCID-6g4n-3xfu-hfee"},{"vulnerability":"VCID-6muh-rg1z-pqab"},{"vulnerability":"VCID-bhxk-8byp-eyap"},{"vulnerability":"VCID-ej67-ayfh-sqdt"},{"vulnerability":"VCID-jgff-4jyp-9fgr"},{"vulnerability":"VCID-mde2-1ynu-auh2"},{"vulnerability":"VCID-v4gv-g9n5-ukgc"},{"vulnerability":"VCID-yx79-3g2x-pqex"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.0@10.0.30-0%252Bdeb8u2"}],"aliases":["CVE-2017-3291"],"risk_score":2.9,"exploitability":"0.5","weighted_severity":"5.7","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-p623-gxyv-g7fs"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/81535?format=json","vulnerability_id":"VCID-pk7e-t26d-aqdm","summary":"security update","references":[{"reference_url":"http://lists.opensuse.org/opensuse-updates/2016-09/msg00042.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:28Z/"}],"url":"http://lists.opensuse.org/opensuse-updates/2016-09/msg00042.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-1480.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:28Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-1480.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-1601.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:28Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-1601.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-1602.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:28Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-1602.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-1603.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:28Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-1603.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-1604.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:28Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-1604.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-1637.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:28Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-1637.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3477.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3477.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-3477","reference_id":"","reference_type":"","scores":[{"value":"0.00088","scoring_system":"epss","scoring_elements":"0.25076","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00088","scoring_system":"epss","scoring_elements":"0.2505","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00088","scoring_system":"epss","scoring_elements":"0.24929","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00088","scoring_system":"epss","scoring_elements":"0.24993","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00088","scoring_system":"epss","scoring_elements":"0.25052","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00088","scoring_system":"epss","scoring_elements":"0.2498","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00088","scoring_system":"epss","scoring_elements":"0.25","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00115","scoring_system":"epss","scoring_elements":"0.30042","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00115","scoring_system":"epss","scoring_elements":"0.30184","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00115","scoring_system":"epss","scoring_elements":"0.30186","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00115","scoring_system":"epss","scoring_elements":"0.30143","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00115","scoring_system":"epss","scoring_elements":"0.30093","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00115","scoring_system":"epss","scoring_elements":"0.30108","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00115","scoring_system":"epss","scoring_elements":"0.29972","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00115","scoring_system":"epss","scoring_elements":"0.30191","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00115","scoring_system":"epss","scoring_elements":"0.29857","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00115","scoring_system":"epss","scoring_elements":"0.30221","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00115","scoring_system":"epss","scoring_elements":"0.3027","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00115","scoring_system":"epss","scoring_elements":"0.30088","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00115","scoring_system":"epss","scoring_elements":"0.30148","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-3477"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3477","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3477"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3521","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3521"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3615","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3615"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5440","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5440"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:S/C:C/I:C/A:C"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://mariadb.com/kb/en/mariadb/mariadb-10026-release-notes/","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:28Z/"}],"url":"https://mariadb.com/kb/en/mariadb/mariadb-10026-release-notes/"},{"reference_url":"https://mariadb.com/kb/en/mariadb/mariadb-10115-release-notes/","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:28Z/"}],"url":"https://mariadb.com/kb/en/mariadb/mariadb-10115-release-notes/"},{"reference_url":"https://mariadb.com/kb/en/mariadb/mariadb-5550-release-notes/","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:28Z/"}],"url":"https://mariadb.com/kb/en/mariadb/mariadb-5550-release-notes/"},{"reference_url":"http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:28Z/"}],"url":"http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168"},{"reference_url":"http://www.debian.org/security/2016/dsa-3624","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:28Z/"}],"url":"http://www.debian.org/security/2016/dsa-3624"},{"reference_url":"http://www.debian.org/security/2016/dsa-3632","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:28Z/"}],"url":"http://www.debian.org/security/2016/dsa-3632"},{"reference_url":"http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:28Z/"}],"url":"http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:28Z/"}],"url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html"},{"reference_url":"http://www.securityfocus.com/bid/91787","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:28Z/"}],"url":"http://www.securityfocus.com/bid/91787"},{"reference_url":"http://www.securityfocus.com/bid/91902","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:28Z/"}],"url":"http://www.securityfocus.com/bid/91902"},{"reference_url":"http://www.securitytracker.com/id/1036362","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:28Z/"}],"url":"http://www.securitytracker.com/id/1036362"},{"reference_url":"http://www.ubuntu.com/usn/USN-3040-1","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:28Z/"}],"url":"http://www.ubuntu.com/usn/USN-3040-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1358205","reference_id":"1358205","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1358205"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:powerkvm:2.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ibm:powerkvm:2.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:powerkvm:2.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:powerkvm:3.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ibm:powerkvm:3.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:powerkvm:3.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-3477","reference_id":"CVE-2016-3477","reference_type":"","scores":[{"value":"4.1","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:M/Au:S/C:P/I:P/A:P"},{"value":"8.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-3477"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1480","reference_id":"RHSA-2016:1480","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1480"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1601","reference_id":"RHSA-2016:1601","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1601"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1602","reference_id":"RHSA-2016:1602","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1602"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1603","reference_id":"RHSA-2016:1603","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1603"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1604","reference_id":"RHSA-2016:1604","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1604"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1637","reference_id":"RHSA-2016:1637","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1637"},{"reference_url":"https://usn.ubuntu.com/3040-1/","reference_id":"USN-3040-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3040-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035613?format=json","purl":"pkg:deb/debian/mariadb-10.0@10.0.30-0%2Bdeb8u2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1gmc-pj6y-rkfx"},{"vulnerability":"VCID-4yz4-vxnh-b3dp"},{"vulnerability":"VCID-5sjj-599v-vybg"},{"vulnerability":"VCID-6g4n-3xfu-hfee"},{"vulnerability":"VCID-6muh-rg1z-pqab"},{"vulnerability":"VCID-bhxk-8byp-eyap"},{"vulnerability":"VCID-ej67-ayfh-sqdt"},{"vulnerability":"VCID-jgff-4jyp-9fgr"},{"vulnerability":"VCID-mde2-1ynu-auh2"},{"vulnerability":"VCID-v4gv-g9n5-ukgc"},{"vulnerability":"VCID-yx79-3g2x-pqex"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.0@10.0.30-0%252Bdeb8u2"}],"aliases":["CVE-2016-3477"],"risk_score":3.6,"exploitability":"0.5","weighted_severity":"7.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-pk7e-t26d-aqdm"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31724?format=json","vulnerability_id":"VCID-pv92-6p9x-v7bs","summary":"Multiple vulnerabilities have been found in MariaDB, the worst of\n    which could lead to privilege escalation.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3317.json","reference_id":"","reference_type":"","scores":[{"value":"4.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:H/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3317.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-3317","reference_id":"","reference_type":"","scores":[{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.06425","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.05903","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.05935","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.06143","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.06175","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.06182","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.06202","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.06312","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.06384","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.06398","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.06407","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.05968","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.05951","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.0599","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.06028","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.06019","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.0601","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.06002","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.05967","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.05978","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.0613","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-3317"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6664","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6664"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3238","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3238"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3243","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3243"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3244","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3244"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3257","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3257"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3258","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3258"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3265","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3265"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3291","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3291"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3312","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3312"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3313","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3313"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3317","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3317"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3318","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3318"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.8","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:H/Au:S/C:N/I:N/A:C"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1414355","reference_id":"1414355","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1414355"},{"reference_url":"http://www.securityfocus.com/bid/95585","reference_id":"95585","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-08T20:09:31Z/"}],"url":"http://www.securityfocus.com/bid/95585"},{"reference_url":"http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html","reference_id":"cpujan2017-2881727.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-08T20:09:31Z/"}],"url":"http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html"},{"reference_url":"http://www.debian.org/security/2017/dsa-3767","reference_id":"dsa-3767","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-08T20:09:31Z/"}],"url":"http://www.debian.org/security/2017/dsa-3767"},{"reference_url":"http://www.debian.org/security/2017/dsa-3770","reference_id":"dsa-3770","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-08T20:09:31Z/"}],"url":"http://www.debian.org/security/2017/dsa-3770"},{"reference_url":"https://security.gentoo.org/glsa/201702-17","reference_id":"GLSA-201702-17","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-08T20:09:31Z/"}],"url":"https://security.gentoo.org/glsa/201702-17"},{"reference_url":"https://security.gentoo.org/glsa/201702-18","reference_id":"GLSA-201702-18","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-08T20:09:31Z/"}],"url":"https://security.gentoo.org/glsa/201702-18"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:2192","reference_id":"RHSA-2017:2192","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-08T20:09:31Z/"}],"url":"https://access.redhat.com/errata/RHSA-2017:2192"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:2787","reference_id":"RHSA-2017:2787","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-08T20:09:31Z/"}],"url":"https://access.redhat.com/errata/RHSA-2017:2787"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:2886","reference_id":"RHSA-2017:2886","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-08T20:09:31Z/"}],"url":"https://access.redhat.com/errata/RHSA-2017:2886"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0279","reference_id":"RHSA-2018:0279","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-08T20:09:31Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:0279"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0574","reference_id":"RHSA-2018:0574","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-08T20:09:31Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:0574"},{"reference_url":"https://usn.ubuntu.com/3174-1/","reference_id":"USN-3174-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3174-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035613?format=json","purl":"pkg:deb/debian/mariadb-10.0@10.0.30-0%2Bdeb8u2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1gmc-pj6y-rkfx"},{"vulnerability":"VCID-4yz4-vxnh-b3dp"},{"vulnerability":"VCID-5sjj-599v-vybg"},{"vulnerability":"VCID-6g4n-3xfu-hfee"},{"vulnerability":"VCID-6muh-rg1z-pqab"},{"vulnerability":"VCID-bhxk-8byp-eyap"},{"vulnerability":"VCID-ej67-ayfh-sqdt"},{"vulnerability":"VCID-jgff-4jyp-9fgr"},{"vulnerability":"VCID-mde2-1ynu-auh2"},{"vulnerability":"VCID-v4gv-g9n5-ukgc"},{"vulnerability":"VCID-yx79-3g2x-pqex"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.0@10.0.30-0%252Bdeb8u2"}],"aliases":["CVE-2017-3317"],"risk_score":1.8,"exploitability":"0.5","weighted_severity":"3.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-pv92-6p9x-v7bs"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/84624?format=json","vulnerability_id":"VCID-r2cz-9kjz-zbgu","summary":"mysql: prepared statement handle use-after-free after disconnect","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3302.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3302.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-3302","reference_id":"","reference_type":"","scores":[{"value":"0.025","scoring_system":"epss","scoring_elements":"0.85491","published_at":"2026-05-14T12:55:00Z"},{"value":"0.025","scoring_system":"epss","scoring_elements":"0.85265","published_at":"2026-04-01T12:55:00Z"},{"value":"0.025","scoring_system":"epss","scoring_elements":"0.85277","published_at":"2026-04-02T12:55:00Z"},{"value":"0.025","scoring_system":"epss","scoring_elements":"0.85388","published_at":"2026-04-26T12:55:00Z"},{"value":"0.025","scoring_system":"epss","scoring_elements":"0.85387","published_at":"2026-04-29T12:55:00Z"},{"value":"0.025","scoring_system":"epss","scoring_elements":"0.85401","published_at":"2026-05-05T12:55:00Z"},{"value":"0.025","scoring_system":"epss","scoring_elements":"0.85427","published_at":"2026-05-07T12:55:00Z"},{"value":"0.025","scoring_system":"epss","scoring_elements":"0.85445","published_at":"2026-05-09T12:55:00Z"},{"value":"0.025","scoring_system":"epss","scoring_elements":"0.85441","published_at":"2026-05-11T12:55:00Z"},{"value":"0.025","scoring_system":"epss","scoring_elements":"0.85453","published_at":"2026-05-12T12:55:00Z"},{"value":"0.025","scoring_system":"epss","scoring_elements":"0.85296","published_at":"2026-04-04T12:55:00Z"},{"value":"0.025","scoring_system":"epss","scoring_elements":"0.85298","published_at":"2026-04-07T12:55:00Z"},{"value":"0.025","scoring_system":"epss","scoring_elements":"0.8532","published_at":"2026-04-08T12:55:00Z"},{"value":"0.025","scoring_system":"epss","scoring_elements":"0.85328","published_at":"2026-04-09T12:55:00Z"},{"value":"0.025","scoring_system":"epss","scoring_elements":"0.85342","published_at":"2026-04-11T12:55:00Z"},{"value":"0.025","scoring_system":"epss","scoring_elements":"0.85341","published_at":"2026-04-12T12:55:00Z"},{"value":"0.025","scoring_system":"epss","scoring_elements":"0.85337","published_at":"2026-04-13T12:55:00Z"},{"value":"0.025","scoring_system":"epss","scoring_elements":"0.85357","published_at":"2026-04-21T12:55:00Z"},{"value":"0.025","scoring_system":"epss","scoring_elements":"0.85359","published_at":"2026-04-18T12:55:00Z"},{"value":"0.025","scoring_system":"epss","scoring_elements":"0.85379","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-3302"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3302","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3302"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3305","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3305"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3308","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3308"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3309","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3309"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3313","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3313"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3329","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3329"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3453","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3453"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3456","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3456"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3461","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3461"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3462","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3462"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3463","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3463"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3464","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3464"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3600","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3600"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.openwall.com/lists/oss-security/2017/02/11/11","reference_id":"11","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-08T20:04:48Z/"}],"url":"http://www.openwall.com/lists/oss-security/2017/02/11/11"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1422119","reference_id":"1422119","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1422119"},{"reference_url":"http://www.securityfocus.com/bid/96162","reference_id":"96162","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-08T20:04:48Z/"}],"url":"http://www.securityfocus.com/bid/96162"},{"reference_url":"http://www.debian.org/security/2017/dsa-3809","reference_id":"dsa-3809","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-08T20:04:48Z/"}],"url":"http://www.debian.org/security/2017/dsa-3809"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:2192","reference_id":"RHSA-2017:2192","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-08T20:04:48Z/"}],"url":"https://access.redhat.com/errata/RHSA-2017:2192"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:2787","reference_id":"RHSA-2017:2787","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-08T20:04:48Z/"}],"url":"https://access.redhat.com/errata/RHSA-2017:2787"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0279","reference_id":"RHSA-2018:0279","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-08T20:04:48Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:0279"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0574","reference_id":"RHSA-2018:0574","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-08T20:04:48Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:0574"},{"reference_url":"https://usn.ubuntu.com/3269-1/","reference_id":"USN-3269-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3269-1/"},{"reference_url":"https://usn.ubuntu.com/3357-2/","reference_id":"USN-3357-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3357-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035613?format=json","purl":"pkg:deb/debian/mariadb-10.0@10.0.30-0%2Bdeb8u2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1gmc-pj6y-rkfx"},{"vulnerability":"VCID-4yz4-vxnh-b3dp"},{"vulnerability":"VCID-5sjj-599v-vybg"},{"vulnerability":"VCID-6g4n-3xfu-hfee"},{"vulnerability":"VCID-6muh-rg1z-pqab"},{"vulnerability":"VCID-bhxk-8byp-eyap"},{"vulnerability":"VCID-ej67-ayfh-sqdt"},{"vulnerability":"VCID-jgff-4jyp-9fgr"},{"vulnerability":"VCID-mde2-1ynu-auh2"},{"vulnerability":"VCID-v4gv-g9n5-ukgc"},{"vulnerability":"VCID-yx79-3g2x-pqex"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.0@10.0.30-0%252Bdeb8u2"}],"aliases":["CVE-2017-3302"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-r2cz-9kjz-zbgu"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31720?format=json","vulnerability_id":"VCID-rssq-mfc2-ckaf","summary":"Multiple vulnerabilities have been found in MariaDB, the worst of\n    which could lead to privilege escalation.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3258.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3258.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-3258","reference_id":"","reference_type":"","scores":[{"value":"0.00312","scoring_system":"epss","scoring_elements":"0.54489","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00312","scoring_system":"epss","scoring_elements":"0.54327","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00312","scoring_system":"epss","scoring_elements":"0.54347","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00312","scoring_system":"epss","scoring_elements":"0.54432","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00312","scoring_system":"epss","scoring_elements":"0.54395","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00312","scoring_system":"epss","scoring_elements":"0.5441","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00312","scoring_system":"epss","scoring_elements":"0.54387","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00312","scoring_system":"epss","scoring_elements":"0.54337","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00312","scoring_system":"epss","scoring_elements":"0.5438","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00312","scoring_system":"epss","scoring_elements":"0.54437","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00312","scoring_system":"epss","scoring_elements":"0.54396","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00312","scoring_system":"epss","scoring_elements":"0.54422","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00312","scoring_system":"epss","scoring_elements":"0.54377","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00312","scoring_system":"epss","scoring_elements":"0.54351","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00312","scoring_system":"epss","scoring_elements":"0.54403","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00312","scoring_system":"epss","scoring_elements":"0.54398","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00312","scoring_system":"epss","scoring_elements":"0.54446","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00312","scoring_system":"epss","scoring_elements":"0.54429","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00312","scoring_system":"epss","scoring_elements":"0.54407","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00312","scoring_system":"epss","scoring_elements":"0.5445","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-3258"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6664","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6664"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3238","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3238"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3243","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3243"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3244","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3244"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3257","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3257"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3258","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3258"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3265","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3265"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3291","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3291"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3312","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3312"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3313","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3313"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3317","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3317"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3318","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3318"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:S/C:N/I:N/A:C"},{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1414351","reference_id":"1414351","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1414351"},{"reference_url":"http://www.securityfocus.com/bid/95560","reference_id":"95560","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:10Z/"}],"url":"http://www.securityfocus.com/bid/95560"},{"reference_url":"http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html","reference_id":"cpujan2017-2881727.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:10Z/"}],"url":"http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html"},{"reference_url":"http://www.debian.org/security/2017/dsa-3767","reference_id":"dsa-3767","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:10Z/"}],"url":"http://www.debian.org/security/2017/dsa-3767"},{"reference_url":"http://www.debian.org/security/2017/dsa-3770","reference_id":"dsa-3770","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:10Z/"}],"url":"http://www.debian.org/security/2017/dsa-3770"},{"reference_url":"https://security.gentoo.org/glsa/201702-17","reference_id":"GLSA-201702-17","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:10Z/"}],"url":"https://security.gentoo.org/glsa/201702-17"},{"reference_url":"https://security.gentoo.org/glsa/201702-18","reference_id":"GLSA-201702-18","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:10Z/"}],"url":"https://security.gentoo.org/glsa/201702-18"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:2192","reference_id":"RHSA-2017:2192","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:10Z/"}],"url":"https://access.redhat.com/errata/RHSA-2017:2192"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:2787","reference_id":"RHSA-2017:2787","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:10Z/"}],"url":"https://access.redhat.com/errata/RHSA-2017:2787"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:2886","reference_id":"RHSA-2017:2886","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:10Z/"}],"url":"https://access.redhat.com/errata/RHSA-2017:2886"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0279","reference_id":"RHSA-2018:0279","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:10Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:0279"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0574","reference_id":"RHSA-2018:0574","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:10Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:0574"},{"reference_url":"https://usn.ubuntu.com/3174-1/","reference_id":"USN-3174-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3174-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035613?format=json","purl":"pkg:deb/debian/mariadb-10.0@10.0.30-0%2Bdeb8u2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1gmc-pj6y-rkfx"},{"vulnerability":"VCID-4yz4-vxnh-b3dp"},{"vulnerability":"VCID-5sjj-599v-vybg"},{"vulnerability":"VCID-6g4n-3xfu-hfee"},{"vulnerability":"VCID-6muh-rg1z-pqab"},{"vulnerability":"VCID-bhxk-8byp-eyap"},{"vulnerability":"VCID-ej67-ayfh-sqdt"},{"vulnerability":"VCID-jgff-4jyp-9fgr"},{"vulnerability":"VCID-mde2-1ynu-auh2"},{"vulnerability":"VCID-v4gv-g9n5-ukgc"},{"vulnerability":"VCID-yx79-3g2x-pqex"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.0@10.0.30-0%252Bdeb8u2"}],"aliases":["CVE-2017-3258"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-rssq-mfc2-ckaf"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41722?format=json","vulnerability_id":"VCID-rted-6vzz-mbcv","summary":"Multiple vulnerabilities have been found in MariaDB and MySQL, the\n    worst of which could lead to the remote execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3492.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3492.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-3492","reference_id":"","reference_type":"","scores":[{"value":"0.00566","scoring_system":"epss","scoring_elements":"0.68669","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00566","scoring_system":"epss","scoring_elements":"0.68412","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00566","scoring_system":"epss","scoring_elements":"0.68554","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00566","scoring_system":"epss","scoring_elements":"0.68559","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00566","scoring_system":"epss","scoring_elements":"0.68565","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00566","scoring_system":"epss","scoring_elements":"0.68542","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00566","scoring_system":"epss","scoring_elements":"0.68585","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00566","scoring_system":"epss","scoring_elements":"0.68622","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00566","scoring_system":"epss","scoring_elements":"0.68589","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00566","scoring_system":"epss","scoring_elements":"0.68614","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00566","scoring_system":"epss","scoring_elements":"0.68431","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00566","scoring_system":"epss","scoring_elements":"0.68451","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00566","scoring_system":"epss","scoring_elements":"0.68427","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00566","scoring_system":"epss","scoring_elements":"0.68477","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00566","scoring_system":"epss","scoring_elements":"0.68494","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00566","scoring_system":"epss","scoring_elements":"0.6852","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00566","scoring_system":"epss","scoring_elements":"0.68508","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00566","scoring_system":"epss","scoring_elements":"0.68475","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00566","scoring_system":"epss","scoring_elements":"0.68513","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00566","scoring_system":"epss","scoring_elements":"0.68526","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00566","scoring_system":"epss","scoring_elements":"0.68505","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-3492"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3492","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3492"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5584","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5584"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5624","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5624"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5626","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5626"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5629","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5629"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6663","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6663"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7440","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7440"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8283","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8283"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:S/C:N/I:N/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.securitytracker.com/id/1037050","reference_id":"1037050","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:50:08Z/"}],"url":"http://www.securitytracker.com/id/1037050"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1386554","reference_id":"1386554","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1386554"},{"reference_url":"http://www.securityfocus.com/bid/93650","reference_id":"93650","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:50:08Z/"}],"url":"http://www.securityfocus.com/bid/93650"},{"reference_url":"https://security.gentoo.org/glsa/201701-01","reference_id":"GLSA-201701-01","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:50:08Z/"}],"url":"https://security.gentoo.org/glsa/201701-01"},{"reference_url":"https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/","reference_id":"mariadb-10028-release-notes","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:50:08Z/"}],"url":"https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/"},{"reference_url":"https://mariadb.com/kb/en/mariadb/mariadb-10118-release-notes/","reference_id":"mariadb-10118-release-notes","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:50:08Z/"}],"url":"https://mariadb.com/kb/en/mariadb/mariadb-10118-release-notes/"},{"reference_url":"https://mariadb.com/kb/en/mariadb/mariadb-5552-release-notes/","reference_id":"mariadb-5552-release-notes","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:50:08Z/"}],"url":"https://mariadb.com/kb/en/mariadb/mariadb-5552-release-notes/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2130","reference_id":"RHSA-2016:2130","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2130"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-2130.html","reference_id":"RHSA-2016-2130.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:50:08Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-2130.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2131","reference_id":"RHSA-2016:2131","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2131"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-2131.html","reference_id":"RHSA-2016-2131.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:50:08Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-2131.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2595","reference_id":"RHSA-2016:2595","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2595"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-2595.html","reference_id":"RHSA-2016-2595.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:50:08Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-2595.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2749","reference_id":"RHSA-2016:2749","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2749"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-2749.html","reference_id":"RHSA-2016-2749.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:50:08Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-2749.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2927","reference_id":"RHSA-2016:2927","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2927"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2928","reference_id":"RHSA-2016:2928","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2928"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035613?format=json","purl":"pkg:deb/debian/mariadb-10.0@10.0.30-0%2Bdeb8u2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1gmc-pj6y-rkfx"},{"vulnerability":"VCID-4yz4-vxnh-b3dp"},{"vulnerability":"VCID-5sjj-599v-vybg"},{"vulnerability":"VCID-6g4n-3xfu-hfee"},{"vulnerability":"VCID-6muh-rg1z-pqab"},{"vulnerability":"VCID-bhxk-8byp-eyap"},{"vulnerability":"VCID-ej67-ayfh-sqdt"},{"vulnerability":"VCID-jgff-4jyp-9fgr"},{"vulnerability":"VCID-mde2-1ynu-auh2"},{"vulnerability":"VCID-v4gv-g9n5-ukgc"},{"vulnerability":"VCID-yx79-3g2x-pqex"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.0@10.0.30-0%252Bdeb8u2"}],"aliases":["CVE-2016-3492"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-rted-6vzz-mbcv"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41729?format=json","vulnerability_id":"VCID-tvdv-3ed5-h3dt","summary":"Multiple vulnerabilities have been found in MariaDB and MySQL, the\n    worst of which could lead to the remote execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5626.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5626.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-5626","reference_id":"","reference_type":"","scores":[{"value":"0.00369","scoring_system":"epss","scoring_elements":"0.58921","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00369","scoring_system":"epss","scoring_elements":"0.58702","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00369","scoring_system":"epss","scoring_elements":"0.58837","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00369","scoring_system":"epss","scoring_elements":"0.58811","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00369","scoring_system":"epss","scoring_elements":"0.58796","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00369","scoring_system":"epss","scoring_elements":"0.58763","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00369","scoring_system":"epss","scoring_elements":"0.58807","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00369","scoring_system":"epss","scoring_elements":"0.58866","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00369","scoring_system":"epss","scoring_elements":"0.58822","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00369","scoring_system":"epss","scoring_elements":"0.58849","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00369","scoring_system":"epss","scoring_elements":"0.58776","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00369","scoring_system":"epss","scoring_elements":"0.58797","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00369","scoring_system":"epss","scoring_elements":"0.58766","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00369","scoring_system":"epss","scoring_elements":"0.58818","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00369","scoring_system":"epss","scoring_elements":"0.58824","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00369","scoring_system":"epss","scoring_elements":"0.58842","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00369","scoring_system":"epss","scoring_elements":"0.58805","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-5626"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3492","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3492"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5584","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5584"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5624","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5624"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5626","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5626"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5629","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5629"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6663","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6663"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7440","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7440"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8283","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8283"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:S/C:N/I:N/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.securitytracker.com/id/1037050","reference_id":"1037050","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:36Z/"}],"url":"http://www.securitytracker.com/id/1037050"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1386568","reference_id":"1386568","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1386568"},{"reference_url":"http://www.securityfocus.com/bid/93638","reference_id":"93638","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:36Z/"}],"url":"http://www.securityfocus.com/bid/93638"},{"reference_url":"https://security.gentoo.org/glsa/201701-01","reference_id":"GLSA-201701-01","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:36Z/"}],"url":"https://security.gentoo.org/glsa/201701-01"},{"reference_url":"https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/","reference_id":"mariadb-10028-release-notes","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:36Z/"}],"url":"https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/"},{"reference_url":"https://mariadb.com/kb/en/mariadb/mariadb-10118-release-notes/","reference_id":"mariadb-10118-release-notes","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:36Z/"}],"url":"https://mariadb.com/kb/en/mariadb/mariadb-10118-release-notes/"},{"reference_url":"https://mariadb.com/kb/en/mariadb/mariadb-5552-release-notes/","reference_id":"mariadb-5552-release-notes","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:36Z/"}],"url":"https://mariadb.com/kb/en/mariadb/mariadb-5552-release-notes/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2130","reference_id":"RHSA-2016:2130","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2130"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-2130.html","reference_id":"RHSA-2016-2130.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:36Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-2130.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2131","reference_id":"RHSA-2016:2131","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2131"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-2131.html","reference_id":"RHSA-2016-2131.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:36Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-2131.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2595","reference_id":"RHSA-2016:2595","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2595"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-2595.html","reference_id":"RHSA-2016-2595.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:36Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-2595.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2749","reference_id":"RHSA-2016:2749","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2749"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-2749.html","reference_id":"RHSA-2016-2749.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:36Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-2749.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2927","reference_id":"RHSA-2016:2927","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2927"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2928","reference_id":"RHSA-2016:2928","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2928"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035613?format=json","purl":"pkg:deb/debian/mariadb-10.0@10.0.30-0%2Bdeb8u2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1gmc-pj6y-rkfx"},{"vulnerability":"VCID-4yz4-vxnh-b3dp"},{"vulnerability":"VCID-5sjj-599v-vybg"},{"vulnerability":"VCID-6g4n-3xfu-hfee"},{"vulnerability":"VCID-6muh-rg1z-pqab"},{"vulnerability":"VCID-bhxk-8byp-eyap"},{"vulnerability":"VCID-ej67-ayfh-sqdt"},{"vulnerability":"VCID-jgff-4jyp-9fgr"},{"vulnerability":"VCID-mde2-1ynu-auh2"},{"vulnerability":"VCID-v4gv-g9n5-ukgc"},{"vulnerability":"VCID-yx79-3g2x-pqex"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.0@10.0.30-0%252Bdeb8u2"}],"aliases":["CVE-2016-5626"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-tvdv-3ed5-h3dt"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31718?format=json","vulnerability_id":"VCID-un5y-y9sq-1ufb","summary":"Multiple vulnerabilities have been found in MariaDB, the worst of\n    which could lead to privilege escalation.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3244.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3244.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-3244","reference_id":"","reference_type":"","scores":[{"value":"0.00314","scoring_system":"epss","scoring_elements":"0.5463","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00314","scoring_system":"epss","scoring_elements":"0.54473","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00314","scoring_system":"epss","scoring_elements":"0.54548","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00314","scoring_system":"epss","scoring_elements":"0.5454","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00314","scoring_system":"epss","scoring_elements":"0.54555","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00314","scoring_system":"epss","scoring_elements":"0.54534","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00314","scoring_system":"epss","scoring_elements":"0.54483","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00314","scoring_system":"epss","scoring_elements":"0.54525","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00314","scoring_system":"epss","scoring_elements":"0.54579","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00314","scoring_system":"epss","scoring_elements":"0.54538","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00314","scoring_system":"epss","scoring_elements":"0.54564","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00314","scoring_system":"epss","scoring_elements":"0.54572","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00314","scoring_system":"epss","scoring_elements":"0.54541","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00314","scoring_system":"epss","scoring_elements":"0.54592","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00314","scoring_system":"epss","scoring_elements":"0.54587","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00314","scoring_system":"epss","scoring_elements":"0.54599","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00314","scoring_system":"epss","scoring_elements":"0.54581","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00314","scoring_system":"epss","scoring_elements":"0.54559","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00314","scoring_system":"epss","scoring_elements":"0.54596","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00314","scoring_system":"epss","scoring_elements":"0.54598","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00314","scoring_system":"epss","scoring_elements":"0.54576","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-3244"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6664","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6664"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3238","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3238"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3243","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3243"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3244","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3244"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3257","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3257"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3258","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3258"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3265","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3265"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3291","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3291"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3312","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3312"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3313","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3313"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3317","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3317"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3318","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3318"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:S/C:N/I:N/A:C"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1414342","reference_id":"1414342","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1414342"},{"reference_url":"http://www.securityfocus.com/bid/95565","reference_id":"95565","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:25Z/"}],"url":"http://www.securityfocus.com/bid/95565"},{"reference_url":"http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html","reference_id":"cpujan2017-2881727.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:25Z/"}],"url":"http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html"},{"reference_url":"http://www.debian.org/security/2017/dsa-3767","reference_id":"dsa-3767","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:25Z/"}],"url":"http://www.debian.org/security/2017/dsa-3767"},{"reference_url":"http://www.debian.org/security/2017/dsa-3770","reference_id":"dsa-3770","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:25Z/"}],"url":"http://www.debian.org/security/2017/dsa-3770"},{"reference_url":"https://security.gentoo.org/glsa/201702-17","reference_id":"GLSA-201702-17","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:25Z/"}],"url":"https://security.gentoo.org/glsa/201702-17"},{"reference_url":"https://security.gentoo.org/glsa/201702-18","reference_id":"GLSA-201702-18","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:25Z/"}],"url":"https://security.gentoo.org/glsa/201702-18"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:2192","reference_id":"RHSA-2017:2192","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:25Z/"}],"url":"https://access.redhat.com/errata/RHSA-2017:2192"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:2787","reference_id":"RHSA-2017:2787","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:25Z/"}],"url":"https://access.redhat.com/errata/RHSA-2017:2787"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:2886","reference_id":"RHSA-2017:2886","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:25Z/"}],"url":"https://access.redhat.com/errata/RHSA-2017:2886"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0279","reference_id":"RHSA-2018:0279","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:25Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:0279"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0574","reference_id":"RHSA-2018:0574","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:25Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:0574"},{"reference_url":"https://usn.ubuntu.com/3174-1/","reference_id":"USN-3174-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3174-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035613?format=json","purl":"pkg:deb/debian/mariadb-10.0@10.0.30-0%2Bdeb8u2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1gmc-pj6y-rkfx"},{"vulnerability":"VCID-4yz4-vxnh-b3dp"},{"vulnerability":"VCID-5sjj-599v-vybg"},{"vulnerability":"VCID-6g4n-3xfu-hfee"},{"vulnerability":"VCID-6muh-rg1z-pqab"},{"vulnerability":"VCID-bhxk-8byp-eyap"},{"vulnerability":"VCID-ej67-ayfh-sqdt"},{"vulnerability":"VCID-jgff-4jyp-9fgr"},{"vulnerability":"VCID-mde2-1ynu-auh2"},{"vulnerability":"VCID-v4gv-g9n5-ukgc"},{"vulnerability":"VCID-yx79-3g2x-pqex"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.0@10.0.30-0%252Bdeb8u2"}],"aliases":["CVE-2017-3244"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-un5y-y9sq-1ufb"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49072?format=json","vulnerability_id":"VCID-v4gv-g9n5-ukgc","summary":"Multiple vulnerabilities were found in MySQL, the worst of which\n    may allow remote execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3453.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3453.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-3453","reference_id":"","reference_type":"","scores":[{"value":"0.00419","scoring_system":"epss","scoring_elements":"0.62006","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00419","scoring_system":"epss","scoring_elements":"0.61751","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00419","scoring_system":"epss","scoring_elements":"0.61825","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00419","scoring_system":"epss","scoring_elements":"0.61911","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00419","scoring_system":"epss","scoring_elements":"0.61907","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00419","scoring_system":"epss","scoring_elements":"0.61924","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00419","scoring_system":"epss","scoring_elements":"0.61917","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00419","scoring_system":"epss","scoring_elements":"0.61861","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00419","scoring_system":"epss","scoring_elements":"0.61908","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00419","scoring_system":"epss","scoring_elements":"0.6197","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00419","scoring_system":"epss","scoring_elements":"0.61951","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00419","scoring_system":"epss","scoring_elements":"0.61855","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00419","scoring_system":"epss","scoring_elements":"0.61875","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00419","scoring_system":"epss","scoring_elements":"0.6189","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00419","scoring_system":"epss","scoring_elements":"0.61912","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00419","scoring_system":"epss","scoring_elements":"0.619","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00419","scoring_system":"epss","scoring_elements":"0.6188","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00419","scoring_system":"epss","scoring_elements":"0.61923","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00419","scoring_system":"epss","scoring_elements":"0.61928","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-3453"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10286","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10286"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10379","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10379"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10384","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10384"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3302","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3302"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3305","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3305"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3308","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3308"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3309","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3309"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3329","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3329"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3453","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3453"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3456","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3456"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3461","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3461"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3462","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3462"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3463","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3463"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3464","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3464"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3600","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3600"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3636","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3636"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3641","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3641"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3653","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3653"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"2.1","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:S/C:N/I:N/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.debian.org/security/2017/dsa-3834","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:46:07Z/"}],"url":"http://www.debian.org/security/2017/dsa-3834"},{"reference_url":"http://www.debian.org/security/2017/dsa-3944","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:46:07Z/"}],"url":"http://www.debian.org/security/2017/dsa-3944"},{"reference_url":"http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:46:07Z/"}],"url":"http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html"},{"reference_url":"http://www.securityfocus.com/bid/97776","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:46:07Z/"}],"url":"http://www.securityfocus.com/bid/97776"},{"reference_url":"http://www.securitytracker.com/id/1038287","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:46:07Z/"}],"url":"http://www.securitytracker.com/id/1038287"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1443365","reference_id":"1443365","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1443365"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2017-3453","reference_id":"CVE-2017-3453","reference_type":"","scores":[{"value":"4.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:S/C:N/I:N/A:P"},{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2017-3453"},{"reference_url":"https://security.gentoo.org/glsa/201802-04","reference_id":"GLSA-201802-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201802-04"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:2192","reference_id":"RHSA-2017:2192","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:46:07Z/"}],"url":"https://access.redhat.com/errata/RHSA-2017:2192"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:2787","reference_id":"RHSA-2017:2787","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:46:07Z/"}],"url":"https://access.redhat.com/errata/RHSA-2017:2787"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:2886","reference_id":"RHSA-2017:2886","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:46:07Z/"}],"url":"https://access.redhat.com/errata/RHSA-2017:2886"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0279","reference_id":"RHSA-2018:0279","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:46:07Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:0279"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0574","reference_id":"RHSA-2018:0574","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:46:07Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:0574"},{"reference_url":"https://usn.ubuntu.com/3269-1/","reference_id":"USN-3269-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3269-1/"},{"reference_url":"https://usn.ubuntu.com/3357-2/","reference_id":"USN-3357-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3357-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035614?format=json","purl":"pkg:deb/debian/mariadb-10.0@10.0.32-0%2Bdeb8u1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.0@10.0.32-0%252Bdeb8u1"}],"aliases":["CVE-2017-3453"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-v4gv-g9n5-ukgc"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41741?format=json","vulnerability_id":"VCID-vh5y-15tw-d7fd","summary":"Multiple vulnerabilities have been found in MariaDB and MySQL, the\n    worst of which could lead to the remote execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8283.json","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8283.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-8283","reference_id":"","reference_type":"","scores":[{"value":"0.00361","scoring_system":"epss","scoring_elements":"0.58343","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00361","scoring_system":"epss","scoring_elements":"0.58144","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00361","scoring_system":"epss","scoring_elements":"0.58292","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00361","scoring_system":"epss","scoring_elements":"0.58269","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00361","scoring_system":"epss","scoring_elements":"0.58231","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00361","scoring_system":"epss","scoring_elements":"0.58244","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00361","scoring_system":"epss","scoring_elements":"0.5823","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00361","scoring_system":"epss","scoring_elements":"0.58195","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00361","scoring_system":"epss","scoring_elements":"0.58236","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00361","scoring_system":"epss","scoring_elements":"0.58297","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00361","scoring_system":"epss","scoring_elements":"0.58276","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00361","scoring_system":"epss","scoring_elements":"0.58229","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00361","scoring_system":"epss","scoring_elements":"0.58249","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00361","scoring_system":"epss","scoring_elements":"0.58223","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00361","scoring_system":"epss","scoring_elements":"0.58277","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00361","scoring_system":"epss","scoring_elements":"0.58283","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00361","scoring_system":"epss","scoring_elements":"0.583","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00361","scoring_system":"epss","scoring_elements":"0.58278","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00361","scoring_system":"epss","scoring_elements":"0.58258","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00361","scoring_system":"epss","scoring_elements":"0.5829","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-8283"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3492","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3492"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5584","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5584"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5624","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5624"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5626","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5626"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5629","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5629"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6663","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6663"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7440","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7440"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8283","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8283"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:S/C:N/I:N/A:P"},{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.securitytracker.com/id/1037050","reference_id":"1037050","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:22Z/"}],"url":"http://www.securitytracker.com/id/1037050"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1386585","reference_id":"1386585","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1386585"},{"reference_url":"http://www.securityfocus.com/bid/93737","reference_id":"93737","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:22Z/"}],"url":"http://www.securityfocus.com/bid/93737"},{"reference_url":"https://security.gentoo.org/glsa/201701-01","reference_id":"GLSA-201701-01","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:22Z/"}],"url":"https://security.gentoo.org/glsa/201701-01"},{"reference_url":"https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/","reference_id":"mariadb-10028-release-notes","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:22Z/"}],"url":"https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/"},{"reference_url":"https://mariadb.com/kb/en/mariadb/mariadb-10118-release-notes/","reference_id":"mariadb-10118-release-notes","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:22Z/"}],"url":"https://mariadb.com/kb/en/mariadb/mariadb-10118-release-notes/"},{"reference_url":"https://mariadb.com/kb/en/mariadb/mariadb-5552-release-notes/","reference_id":"mariadb-5552-release-notes","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:22Z/"}],"url":"https://mariadb.com/kb/en/mariadb/mariadb-5552-release-notes/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2130","reference_id":"RHSA-2016:2130","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2130"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-2130.html","reference_id":"RHSA-2016-2130.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:22Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-2130.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2131","reference_id":"RHSA-2016:2131","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2131"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-2131.html","reference_id":"RHSA-2016-2131.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:22Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-2131.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2595","reference_id":"RHSA-2016:2595","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2595"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-2595.html","reference_id":"RHSA-2016-2595.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:22Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-2595.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2749","reference_id":"RHSA-2016:2749","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2749"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-2749.html","reference_id":"RHSA-2016-2749.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:22Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-2749.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2927","reference_id":"RHSA-2016:2927","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2927"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2928","reference_id":"RHSA-2016:2928","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2928"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035613?format=json","purl":"pkg:deb/debian/mariadb-10.0@10.0.30-0%2Bdeb8u2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1gmc-pj6y-rkfx"},{"vulnerability":"VCID-4yz4-vxnh-b3dp"},{"vulnerability":"VCID-5sjj-599v-vybg"},{"vulnerability":"VCID-6g4n-3xfu-hfee"},{"vulnerability":"VCID-6muh-rg1z-pqab"},{"vulnerability":"VCID-bhxk-8byp-eyap"},{"vulnerability":"VCID-ej67-ayfh-sqdt"},{"vulnerability":"VCID-jgff-4jyp-9fgr"},{"vulnerability":"VCID-mde2-1ynu-auh2"},{"vulnerability":"VCID-v4gv-g9n5-ukgc"},{"vulnerability":"VCID-yx79-3g2x-pqex"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.0@10.0.30-0%252Bdeb8u2"}],"aliases":["CVE-2016-8283"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-vh5y-15tw-d7fd"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49722?format=json","vulnerability_id":"VCID-wrna-cc9g-sqbe","summary":"Multiple vulnerabilities have been found in MySQL, the worst of\n    which could lead to privilege escalation.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3313.json","reference_id":"","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3313.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-3313","reference_id":"","reference_type":"","scores":[{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16604","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16579","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16758","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16488","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16444","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16311","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16429","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16536","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.165","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16533","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16818","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16603","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16688","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16742","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16722","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16679","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.1662","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16556","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16564","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16602","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16499","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-3313"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3238","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3238"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3243","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3243"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3244","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3244"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3258","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3258"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3265","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3265"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3291","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3291"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3302","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3302"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3312","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3312"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3313","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3313"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3317","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3317"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3318","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3318"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.8","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:H/Au:S/C:C/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1414353","reference_id":"1414353","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1414353"},{"reference_url":"http://www.securityfocus.com/bid/95527","reference_id":"95527","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-08T20:09:35Z/"}],"url":"http://www.securityfocus.com/bid/95527"},{"reference_url":"http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html","reference_id":"cpujan2017-2881727.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-08T20:09:35Z/"}],"url":"http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html"},{"reference_url":"http://www.debian.org/security/2017/dsa-3767","reference_id":"dsa-3767","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-08T20:09:35Z/"}],"url":"http://www.debian.org/security/2017/dsa-3767"},{"reference_url":"http://www.debian.org/security/2017/dsa-3809","reference_id":"dsa-3809","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-08T20:09:35Z/"}],"url":"http://www.debian.org/security/2017/dsa-3809"},{"reference_url":"https://security.gentoo.org/glsa/201702-17","reference_id":"GLSA-201702-17","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-08T20:09:35Z/"}],"url":"https://security.gentoo.org/glsa/201702-17"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:2192","reference_id":"RHSA-2017:2192","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-08T20:09:35Z/"}],"url":"https://access.redhat.com/errata/RHSA-2017:2192"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:2787","reference_id":"RHSA-2017:2787","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-08T20:09:35Z/"}],"url":"https://access.redhat.com/errata/RHSA-2017:2787"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:2886","reference_id":"RHSA-2017:2886","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-08T20:09:35Z/"}],"url":"https://access.redhat.com/errata/RHSA-2017:2886"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0279","reference_id":"RHSA-2018:0279","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-08T20:09:35Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:0279"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0574","reference_id":"RHSA-2018:0574","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-08T20:09:35Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:0574"},{"reference_url":"https://usn.ubuntu.com/3174-1/","reference_id":"USN-3174-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3174-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035613?format=json","purl":"pkg:deb/debian/mariadb-10.0@10.0.30-0%2Bdeb8u2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1gmc-pj6y-rkfx"},{"vulnerability":"VCID-4yz4-vxnh-b3dp"},{"vulnerability":"VCID-5sjj-599v-vybg"},{"vulnerability":"VCID-6g4n-3xfu-hfee"},{"vulnerability":"VCID-6muh-rg1z-pqab"},{"vulnerability":"VCID-bhxk-8byp-eyap"},{"vulnerability":"VCID-ej67-ayfh-sqdt"},{"vulnerability":"VCID-jgff-4jyp-9fgr"},{"vulnerability":"VCID-mde2-1ynu-auh2"},{"vulnerability":"VCID-v4gv-g9n5-ukgc"},{"vulnerability":"VCID-yx79-3g2x-pqex"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.0@10.0.30-0%252Bdeb8u2"}],"aliases":["CVE-2017-3313"],"risk_score":2.1,"exploitability":"0.5","weighted_severity":"4.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-wrna-cc9g-sqbe"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49066?format=json","vulnerability_id":"VCID-yx79-3g2x-pqex","summary":"Multiple vulnerabilities were found in MySQL, the worst of which\n    may allow remote execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10384.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10384.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-10384","reference_id":"","reference_type":"","scores":[{"value":"0.0062","scoring_system":"epss","scoring_elements":"0.70172","published_at":"2026-05-12T12:55:00Z"},{"value":"0.0062","scoring_system":"epss","scoring_elements":"0.70088","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0062","scoring_system":"epss","scoring_elements":"0.70145","published_at":"2026-05-11T12:55:00Z"},{"value":"0.0062","scoring_system":"epss","scoring_elements":"0.7005","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0062","scoring_system":"epss","scoring_elements":"0.70036","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0062","scoring_system":"epss","scoring_elements":"0.70079","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0062","scoring_system":"epss","scoring_elements":"0.70103","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0062","scoring_system":"epss","scoring_elements":"0.70128","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0062","scoring_system":"epss","scoring_elements":"0.70121","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0062","scoring_system":"epss","scoring_elements":"0.70069","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0062","scoring_system":"epss","scoring_elements":"0.70176","published_at":"2026-05-09T12:55:00Z"},{"value":"0.0062","scoring_system":"epss","scoring_elements":"0.70222","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00666","scoring_system":"epss","scoring_elements":"0.71187","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00869","scoring_system":"epss","scoring_elements":"0.75192","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00869","scoring_system":"epss","scoring_elements":"0.75139","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00869","scoring_system":"epss","scoring_elements":"0.75169","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00869","scoring_system":"epss","scoring_elements":"0.75146","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00869","scoring_system":"epss","scoring_elements":"0.7518","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00869","scoring_system":"epss","scoring_elements":"0.75214","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-10384"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10268","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10268"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10286","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10286"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10378","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10378"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10379","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10379"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10384","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10384"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3308","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3308"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3309","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3309"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3453","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3453"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3456","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3456"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3464","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3464"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3636","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3636"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3641","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3641"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3653","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3653"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:S/C:N/I:N/A:C"},{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://security.netapp.com/advisory/ntap-20171019-0002/","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:42:34Z/"}],"url":"https://security.netapp.com/advisory/ntap-20171019-0002/"},{"reference_url":"http://www.debian.org/security/2017/dsa-4002","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:42:34Z/"}],"url":"http://www.debian.org/security/2017/dsa-4002"},{"reference_url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:42:34Z/"}],"url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html"},{"reference_url":"http://www.securityfocus.com/bid/101406","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:42:34Z/"}],"url":"http://www.securityfocus.com/bid/101406"},{"reference_url":"http://www.securitytracker.com/id/1039597","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:42:34Z/"}],"url":"http://www.securitytracker.com/id/1039597"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1503686","reference_id":"1503686","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1503686"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*","reference_id":"cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*","reference_id":"cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_balance:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:oncommand_balance:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_balance:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_performance_manager:-:*:*:*:*:vmware_vsphere:*:*","reference_id":"cpe:2.3:a:netapp:oncommand_performance_manager:-:*:*:*:*:vmware_vsphere:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_performance_manager:-:*:*:*:*:vmware_vsphere:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vsphere:*:*","reference_id":"cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vsphere:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vsphere:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:windows:*:*","reference_id":"cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:windows:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:windows:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openstack:12:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:openstack:12:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openstack:12:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2017-10384","reference_id":"CVE-2017-10384","reference_type":"","scores":[{"value":"4.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:S/C:N/I:N/A:P"},{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2017-10384"},{"reference_url":"https://security.gentoo.org/glsa/201802-04","reference_id":"GLSA-201802-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201802-04"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:3265","reference_id":"RHSA-2017:3265","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:42:34Z/"}],"url":"https://access.redhat.com/errata/RHSA-2017:3265"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:3442","reference_id":"RHSA-2017:3442","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:42:34Z/"}],"url":"https://access.redhat.com/errata/RHSA-2017:3442"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0279","reference_id":"RHSA-2018:0279","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:42:34Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:0279"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0574","reference_id":"RHSA-2018:0574","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:42:34Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:0574"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2439","reference_id":"RHSA-2018:2439","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:42:34Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:2439"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2729","reference_id":"RHSA-2018:2729","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:42:34Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:2729"},{"reference_url":"https://usn.ubuntu.com/3459-1/","reference_id":"USN-3459-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3459-1/"},{"reference_url":"https://usn.ubuntu.com/3459-2/","reference_id":"USN-3459-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3459-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035614?format=json","purl":"pkg:deb/debian/mariadb-10.0@10.0.32-0%2Bdeb8u1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.0@10.0.32-0%252Bdeb8u1"}],"aliases":["CVE-2017-10384"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-yx79-3g2x-pqex"}],"fixing_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41369?format=json","vulnerability_id":"VCID-1k52-9nbh-1qdj","summary":"Multiple vulnerabilities have been found in MySQL and MariaDB, the\n    worst of which could allow remote attackers to cause a Denial of Service\n    condition or obtain sensitive information.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2648.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2648.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-2648","reference_id":"","reference_type":"","scores":[{"value":"0.00598","scoring_system":"epss","scoring_elements":"0.69334","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00598","scoring_system":"epss","scoring_elements":"0.69347","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00598","scoring_system":"epss","scoring_elements":"0.69363","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00598","scoring_system":"epss","scoring_elements":"0.69343","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00598","scoring_system":"epss","scoring_elements":"0.69393","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00598","scoring_system":"epss","scoring_elements":"0.69409","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00598","scoring_system":"epss","scoring_elements":"0.69432","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00598","scoring_system":"epss","scoring_elements":"0.69417","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00598","scoring_system":"epss","scoring_elements":"0.69402","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00598","scoring_system":"epss","scoring_elements":"0.69442","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00598","scoring_system":"epss","scoring_elements":"0.69452","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00598","scoring_system":"epss","scoring_elements":"0.69434","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00598","scoring_system":"epss","scoring_elements":"0.69486","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00598","scoring_system":"epss","scoring_elements":"0.69492","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00598","scoring_system":"epss","scoring_elements":"0.69497","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00598","scoring_system":"epss","scoring_elements":"0.69476","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00598","scoring_system":"epss","scoring_elements":"0.69518","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00598","scoring_system":"epss","scoring_elements":"0.69553","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00598","scoring_system":"epss","scoring_elements":"0.69524","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00598","scoring_system":"epss","scoring_elements":"0.69548","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00598","scoring_system":"epss","scoring_elements":"0.69596","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-2648"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0433","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0433"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0441","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0441"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0499","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0499"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0501","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0501"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0505","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0505"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2568","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2568"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2571","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2571"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2573","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2573"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2582","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2582"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2620","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2620"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2643","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2643"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2648","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2648"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3152","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3152"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4737","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4737"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4752","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4752"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4757","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4757"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1244775","reference_id":"1244775","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1244775"},{"reference_url":"https://security.gentoo.org/glsa/201610-06","reference_id":"GLSA-201610-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201610-06"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1628","reference_id":"RHSA-2015:1628","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1628"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1629","reference_id":"RHSA-2015:1629","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1629"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1630","reference_id":"RHSA-2015:1630","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1630"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1646","reference_id":"RHSA-2015:1646","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1646"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1647","reference_id":"RHSA-2015:1647","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1647"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1665","reference_id":"RHSA-2015:1665","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1665"},{"reference_url":"https://usn.ubuntu.com/2674-1/","reference_id":"USN-2674-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2674-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035582?format=json","purl":"pkg:deb/debian/mariadb-10.0@10.0.25-0%2Bdeb8u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1gmc-pj6y-rkfx"},{"vulnerability":"VCID-2gyq-q761-h3br"},{"vulnerability":"VCID-2rf6-qaey-1ubn"},{"vulnerability":"VCID-45hn-ezks-j7br"},{"vulnerability":"VCID-4cnj-7fur-3qe3"},{"vulnerability":"VCID-4yz4-vxnh-b3dp"},{"vulnerability":"VCID-5sjj-599v-vybg"},{"vulnerability":"VCID-6g4n-3xfu-hfee"},{"vulnerability":"VCID-6muh-rg1z-pqab"},{"vulnerability":"VCID-8djb-knkk-s3c8"},{"vulnerability":"VCID-8krv-jqjg-uqc8"},{"vulnerability":"VCID-8kvb-5u8c-zbc4"},{"vulnerability":"VCID-8sya-wktg-dqa5"},{"vulnerability":"VCID-9f48-53dz-13an"},{"vulnerability":"VCID-9ff2-43rk-2ydj"},{"vulnerability":"VCID-9w98-nfg2-muh2"},{"vulnerability":"VCID-bhxk-8byp-eyap"},{"vulnerability":"VCID-ej67-ayfh-sqdt"},{"vulnerability":"VCID-g1pp-9qqg-1beb"},{"vulnerability":"VCID-gp4w-bdxg-6kab"},{"vulnerability":"VCID-jgff-4jyp-9fgr"},{"vulnerability":"VCID-mde2-1ynu-auh2"},{"vulnerability":"VCID-mfgg-7s54-gqg8"},{"vulnerability":"VCID-nkdd-suwp-4ffr"},{"vulnerability":"VCID-p623-gxyv-g7fs"},{"vulnerability":"VCID-pk7e-t26d-aqdm"},{"vulnerability":"VCID-pv92-6p9x-v7bs"},{"vulnerability":"VCID-r2cz-9kjz-zbgu"},{"vulnerability":"VCID-rssq-mfc2-ckaf"},{"vulnerability":"VCID-rted-6vzz-mbcv"},{"vulnerability":"VCID-tvdv-3ed5-h3dt"},{"vulnerability":"VCID-un5y-y9sq-1ufb"},{"vulnerability":"VCID-v4gv-g9n5-ukgc"},{"vulnerability":"VCID-vh5y-15tw-d7fd"},{"vulnerability":"VCID-wrna-cc9g-sqbe"},{"vulnerability":"VCID-yx79-3g2x-pqex"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.0@10.0.25-0%252Bdeb8u1"}],"aliases":["CVE-2015-2648"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-1k52-9nbh-1qdj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/36453?format=json","vulnerability_id":"VCID-1xy7-2n6j-jfdq","summary":"Multiple vulnerabilities have been found in MySQL, allowing\n    attackers to execute arbitrary code or cause Denial of Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0501.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0501.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-0501","reference_id":"","reference_type":"","scores":[{"value":"0.0172","scoring_system":"epss","scoring_elements":"0.82324","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0172","scoring_system":"epss","scoring_elements":"0.82338","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0172","scoring_system":"epss","scoring_elements":"0.82356","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0172","scoring_system":"epss","scoring_elements":"0.8235","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0172","scoring_system":"epss","scoring_elements":"0.82378","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0172","scoring_system":"epss","scoring_elements":"0.82385","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0172","scoring_system":"epss","scoring_elements":"0.82404","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0172","scoring_system":"epss","scoring_elements":"0.824","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0172","scoring_system":"epss","scoring_elements":"0.82395","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0172","scoring_system":"epss","scoring_elements":"0.82429","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0172","scoring_system":"epss","scoring_elements":"0.8243","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0172","scoring_system":"epss","scoring_elements":"0.82434","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0172","scoring_system":"epss","scoring_elements":"0.82456","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0172","scoring_system":"epss","scoring_elements":"0.82466","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0172","scoring_system":"epss","scoring_elements":"0.8247","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0172","scoring_system":"epss","scoring_elements":"0.8249","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0172","scoring_system":"epss","scoring_elements":"0.82511","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0172","scoring_system":"epss","scoring_elements":"0.82531","published_at":"2026-05-09T12:55:00Z"},{"value":"0.0172","scoring_system":"epss","scoring_elements":"0.8253","published_at":"2026-05-11T12:55:00Z"},{"value":"0.0172","scoring_system":"epss","scoring_elements":"0.82546","published_at":"2026-05-12T12:55:00Z"},{"value":"0.0172","scoring_system":"epss","scoring_elements":"0.82586","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-0501"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0433","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0433"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0441","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0441"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0499","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0499"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0501","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0501"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0505","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0505"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2568","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2568"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2571","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2571"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2573","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2573"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2582","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2582"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2643","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2643"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2648","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2648"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3152","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3152"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4752","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4752"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4757","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4757"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1212758","reference_id":"1212758","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1212758"},{"reference_url":"https://security.gentoo.org/glsa/201507-19","reference_id":"GLSA-201507-19","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201507-19"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1628","reference_id":"RHSA-2015:1628","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1628"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1629","reference_id":"RHSA-2015:1629","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1629"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1646","reference_id":"RHSA-2015:1646","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1646"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1647","reference_id":"RHSA-2015:1647","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1647"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1665","reference_id":"RHSA-2015:1665","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1665"},{"reference_url":"https://usn.ubuntu.com/2575-1/","reference_id":"USN-2575-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2575-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035582?format=json","purl":"pkg:deb/debian/mariadb-10.0@10.0.25-0%2Bdeb8u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1gmc-pj6y-rkfx"},{"vulnerability":"VCID-2gyq-q761-h3br"},{"vulnerability":"VCID-2rf6-qaey-1ubn"},{"vulnerability":"VCID-45hn-ezks-j7br"},{"vulnerability":"VCID-4cnj-7fur-3qe3"},{"vulnerability":"VCID-4yz4-vxnh-b3dp"},{"vulnerability":"VCID-5sjj-599v-vybg"},{"vulnerability":"VCID-6g4n-3xfu-hfee"},{"vulnerability":"VCID-6muh-rg1z-pqab"},{"vulnerability":"VCID-8djb-knkk-s3c8"},{"vulnerability":"VCID-8krv-jqjg-uqc8"},{"vulnerability":"VCID-8kvb-5u8c-zbc4"},{"vulnerability":"VCID-8sya-wktg-dqa5"},{"vulnerability":"VCID-9f48-53dz-13an"},{"vulnerability":"VCID-9ff2-43rk-2ydj"},{"vulnerability":"VCID-9w98-nfg2-muh2"},{"vulnerability":"VCID-bhxk-8byp-eyap"},{"vulnerability":"VCID-ej67-ayfh-sqdt"},{"vulnerability":"VCID-g1pp-9qqg-1beb"},{"vulnerability":"VCID-gp4w-bdxg-6kab"},{"vulnerability":"VCID-jgff-4jyp-9fgr"},{"vulnerability":"VCID-mde2-1ynu-auh2"},{"vulnerability":"VCID-mfgg-7s54-gqg8"},{"vulnerability":"VCID-nkdd-suwp-4ffr"},{"vulnerability":"VCID-p623-gxyv-g7fs"},{"vulnerability":"VCID-pk7e-t26d-aqdm"},{"vulnerability":"VCID-pv92-6p9x-v7bs"},{"vulnerability":"VCID-r2cz-9kjz-zbgu"},{"vulnerability":"VCID-rssq-mfc2-ckaf"},{"vulnerability":"VCID-rted-6vzz-mbcv"},{"vulnerability":"VCID-tvdv-3ed5-h3dt"},{"vulnerability":"VCID-un5y-y9sq-1ufb"},{"vulnerability":"VCID-v4gv-g9n5-ukgc"},{"vulnerability":"VCID-vh5y-15tw-d7fd"},{"vulnerability":"VCID-wrna-cc9g-sqbe"},{"vulnerability":"VCID-yx79-3g2x-pqex"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.0@10.0.25-0%252Bdeb8u1"}],"aliases":["CVE-2015-0501"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-1xy7-2n6j-jfdq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/36465?format=json","vulnerability_id":"VCID-2t35-z6yq-uyg9","summary":"Multiple vulnerabilities have been found in MySQL, allowing\n    attackers to execute arbitrary code or cause Denial of Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2573.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2573.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-2573","reference_id":"","reference_type":"","scores":[{"value":"0.00406","scoring_system":"epss","scoring_elements":"0.60959","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00406","scoring_system":"epss","scoring_elements":"0.61036","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00406","scoring_system":"epss","scoring_elements":"0.61064","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00406","scoring_system":"epss","scoring_elements":"0.6103","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00406","scoring_system":"epss","scoring_elements":"0.61078","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00406","scoring_system":"epss","scoring_elements":"0.61094","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00406","scoring_system":"epss","scoring_elements":"0.61115","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00406","scoring_system":"epss","scoring_elements":"0.61102","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00406","scoring_system":"epss","scoring_elements":"0.61083","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00406","scoring_system":"epss","scoring_elements":"0.61125","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00406","scoring_system":"epss","scoring_elements":"0.61131","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00406","scoring_system":"epss","scoring_elements":"0.61114","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00406","scoring_system":"epss","scoring_elements":"0.61108","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00406","scoring_system":"epss","scoring_elements":"0.61057","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00406","scoring_system":"epss","scoring_elements":"0.61106","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00406","scoring_system":"epss","scoring_elements":"0.61165","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00406","scoring_system":"epss","scoring_elements":"0.61127","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00406","scoring_system":"epss","scoring_elements":"0.61154","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00406","scoring_system":"epss","scoring_elements":"0.61212","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-2573"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0433","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0433"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0441","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0441"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0499","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0499"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0501","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0501"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0505","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0505"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2568","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2568"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2571","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2571"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2573","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2573"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2582","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2582"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2643","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2643"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2648","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2648"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3152","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3152"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4752","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4752"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4757","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4757"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1212783","reference_id":"1212783","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1212783"},{"reference_url":"https://security.gentoo.org/glsa/201507-19","reference_id":"GLSA-201507-19","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201507-19"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1628","reference_id":"RHSA-2015:1628","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1628"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1629","reference_id":"RHSA-2015:1629","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1629"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1647","reference_id":"RHSA-2015:1647","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1647"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1665","reference_id":"RHSA-2015:1665","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1665"},{"reference_url":"https://usn.ubuntu.com/2575-1/","reference_id":"USN-2575-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2575-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035582?format=json","purl":"pkg:deb/debian/mariadb-10.0@10.0.25-0%2Bdeb8u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1gmc-pj6y-rkfx"},{"vulnerability":"VCID-2gyq-q761-h3br"},{"vulnerability":"VCID-2rf6-qaey-1ubn"},{"vulnerability":"VCID-45hn-ezks-j7br"},{"vulnerability":"VCID-4cnj-7fur-3qe3"},{"vulnerability":"VCID-4yz4-vxnh-b3dp"},{"vulnerability":"VCID-5sjj-599v-vybg"},{"vulnerability":"VCID-6g4n-3xfu-hfee"},{"vulnerability":"VCID-6muh-rg1z-pqab"},{"vulnerability":"VCID-8djb-knkk-s3c8"},{"vulnerability":"VCID-8krv-jqjg-uqc8"},{"vulnerability":"VCID-8kvb-5u8c-zbc4"},{"vulnerability":"VCID-8sya-wktg-dqa5"},{"vulnerability":"VCID-9f48-53dz-13an"},{"vulnerability":"VCID-9ff2-43rk-2ydj"},{"vulnerability":"VCID-9w98-nfg2-muh2"},{"vulnerability":"VCID-bhxk-8byp-eyap"},{"vulnerability":"VCID-ej67-ayfh-sqdt"},{"vulnerability":"VCID-g1pp-9qqg-1beb"},{"vulnerability":"VCID-gp4w-bdxg-6kab"},{"vulnerability":"VCID-jgff-4jyp-9fgr"},{"vulnerability":"VCID-mde2-1ynu-auh2"},{"vulnerability":"VCID-mfgg-7s54-gqg8"},{"vulnerability":"VCID-nkdd-suwp-4ffr"},{"vulnerability":"VCID-p623-gxyv-g7fs"},{"vulnerability":"VCID-pk7e-t26d-aqdm"},{"vulnerability":"VCID-pv92-6p9x-v7bs"},{"vulnerability":"VCID-r2cz-9kjz-zbgu"},{"vulnerability":"VCID-rssq-mfc2-ckaf"},{"vulnerability":"VCID-rted-6vzz-mbcv"},{"vulnerability":"VCID-tvdv-3ed5-h3dt"},{"vulnerability":"VCID-un5y-y9sq-1ufb"},{"vulnerability":"VCID-v4gv-g9n5-ukgc"},{"vulnerability":"VCID-vh5y-15tw-d7fd"},{"vulnerability":"VCID-wrna-cc9g-sqbe"},{"vulnerability":"VCID-yx79-3g2x-pqex"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.0@10.0.25-0%252Bdeb8u1"}],"aliases":["CVE-2015-2573"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2t35-z6yq-uyg9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/81267?format=json","vulnerability_id":"VCID-2vp1-j324-dkat","summary":"security update","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:58:48Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:58:48Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:58:48Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:58:48Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:58:48Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:58:48Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0705.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:58:48Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-0705.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-1480.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:58:48Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-1480.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-1481.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:58:48Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-1481.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-1602.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:58:48Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-1602.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0666.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0666.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-0666","reference_id":"","reference_type":"","scores":[{"value":"0.00243","scoring_system":"epss","scoring_elements":"0.47516","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00243","scoring_system":"epss","scoring_elements":"0.47518","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00243","scoring_system":"epss","scoring_elements":"0.47537","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00243","scoring_system":"epss","scoring_elements":"0.47513","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00243","scoring_system":"epss","scoring_elements":"0.47521","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00243","scoring_system":"epss","scoring_elements":"0.4758","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00243","scoring_system":"epss","scoring_elements":"0.47573","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00243","scoring_system":"epss","scoring_elements":"0.47524","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00243","scoring_system":"epss","scoring_elements":"0.47522","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00243","scoring_system":"epss","scoring_elements":"0.47471","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00243","scoring_system":"epss","scoring_elements":"0.47387","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00243","scoring_system":"epss","scoring_elements":"0.47452","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00243","scoring_system":"epss","scoring_elements":"0.47473","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00243","scoring_system":"epss","scoring_elements":"0.47415","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00243","scoring_system":"epss","scoring_elements":"0.47443","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00243","scoring_system":"epss","scoring_elements":"0.47464","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00243","scoring_system":"epss","scoring_elements":"0.47494","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00243","scoring_system":"epss","scoring_elements":"0.47515","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-0666"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0640","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0640"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0641","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0641"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0642","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0642"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0643","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0643"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0644","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0644"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0646","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0646"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0647","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0647"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0648","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0648"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0649","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0649"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0650","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0650"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0655","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0655"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0666","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0666"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0668","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0668"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2047","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2047"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.6","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:S/C:N/I:N/A:C"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://mariadb.com/kb/en/mariadb/mariadb-10025-release-notes/","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:58:48Z/"}],"url":"https://mariadb.com/kb/en/mariadb/mariadb-10025-release-notes/"},{"reference_url":"https://mariadb.com/kb/en/mariadb/mariadb-10114-release-notes/","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:58:48Z/"}],"url":"https://mariadb.com/kb/en/mariadb/mariadb-10114-release-notes/"},{"reference_url":"https://mariadb.com/kb/en/mariadb/mariadb-5549-release-notes/","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:58:48Z/"}],"url":"https://mariadb.com/kb/en/mariadb/mariadb-5549-release-notes/"},{"reference_url":"http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:58:48Z/"}],"url":"http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168"},{"reference_url":"http://www.debian.org/security/2016/dsa-3557","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:58:48Z/"}],"url":"http://www.debian.org/security/2016/dsa-3557"},{"reference_url":"http://www.debian.org/security/2016/dsa-3595","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:58:48Z/"}],"url":"http://www.debian.org/security/2016/dsa-3595"},{"reference_url":"http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:58:48Z/"}],"url":"http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:58:48Z/"}],"url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html"},{"reference_url":"http://www.securityfocus.com/bid/86509","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:58:48Z/"}],"url":"http://www.securityfocus.com/bid/86509"},{"reference_url":"http://www.securitytracker.com/id/1035606","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:58:48Z/"}],"url":"http://www.securitytracker.com/id/1035606"},{"reference_url":"http://www.ubuntu.com/usn/USN-2953-1","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:58:48Z/"}],"url":"http://www.ubuntu.com/usn/USN-2953-1"},{"reference_url":"http://www.ubuntu.com/usn/USN-2954-1","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:58:48Z/"}],"url":"http://www.ubuntu.com/usn/USN-2954-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1329270","reference_id":"1329270","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1329270"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:powerkvm:2.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ibm:powerkvm:2.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:powerkvm:2.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:powerkvm:3.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ibm:powerkvm:3.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:powerkvm:3.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-0666","reference_id":"CVE-2016-0666","reference_type":"","scores":[{"value":"3.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:S/C:N/I:N/A:P"},{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-0666"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0705","reference_id":"RHSA-2016:0705","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0705"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1132","reference_id":"RHSA-2016:1132","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:58:48Z/"}],"url":"https://access.redhat.com/errata/RHSA-2016:1132"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1480","reference_id":"RHSA-2016:1480","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1480"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1481","reference_id":"RHSA-2016:1481","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1481"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1602","reference_id":"RHSA-2016:1602","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1602"},{"reference_url":"https://usn.ubuntu.com/2953-1/","reference_id":"USN-2953-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2953-1/"},{"reference_url":"https://usn.ubuntu.com/2954-1/","reference_id":"USN-2954-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2954-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035582?format=json","purl":"pkg:deb/debian/mariadb-10.0@10.0.25-0%2Bdeb8u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1gmc-pj6y-rkfx"},{"vulnerability":"VCID-2gyq-q761-h3br"},{"vulnerability":"VCID-2rf6-qaey-1ubn"},{"vulnerability":"VCID-45hn-ezks-j7br"},{"vulnerability":"VCID-4cnj-7fur-3qe3"},{"vulnerability":"VCID-4yz4-vxnh-b3dp"},{"vulnerability":"VCID-5sjj-599v-vybg"},{"vulnerability":"VCID-6g4n-3xfu-hfee"},{"vulnerability":"VCID-6muh-rg1z-pqab"},{"vulnerability":"VCID-8djb-knkk-s3c8"},{"vulnerability":"VCID-8krv-jqjg-uqc8"},{"vulnerability":"VCID-8kvb-5u8c-zbc4"},{"vulnerability":"VCID-8sya-wktg-dqa5"},{"vulnerability":"VCID-9f48-53dz-13an"},{"vulnerability":"VCID-9ff2-43rk-2ydj"},{"vulnerability":"VCID-9w98-nfg2-muh2"},{"vulnerability":"VCID-bhxk-8byp-eyap"},{"vulnerability":"VCID-ej67-ayfh-sqdt"},{"vulnerability":"VCID-g1pp-9qqg-1beb"},{"vulnerability":"VCID-gp4w-bdxg-6kab"},{"vulnerability":"VCID-jgff-4jyp-9fgr"},{"vulnerability":"VCID-mde2-1ynu-auh2"},{"vulnerability":"VCID-mfgg-7s54-gqg8"},{"vulnerability":"VCID-nkdd-suwp-4ffr"},{"vulnerability":"VCID-p623-gxyv-g7fs"},{"vulnerability":"VCID-pk7e-t26d-aqdm"},{"vulnerability":"VCID-pv92-6p9x-v7bs"},{"vulnerability":"VCID-r2cz-9kjz-zbgu"},{"vulnerability":"VCID-rssq-mfc2-ckaf"},{"vulnerability":"VCID-rted-6vzz-mbcv"},{"vulnerability":"VCID-tvdv-3ed5-h3dt"},{"vulnerability":"VCID-un5y-y9sq-1ufb"},{"vulnerability":"VCID-v4gv-g9n5-ukgc"},{"vulnerability":"VCID-vh5y-15tw-d7fd"},{"vulnerability":"VCID-wrna-cc9g-sqbe"},{"vulnerability":"VCID-yx79-3g2x-pqex"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.0@10.0.25-0%252Bdeb8u1"}],"aliases":["CVE-2016-0666"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2vp1-j324-dkat"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/36463?format=json","vulnerability_id":"VCID-31ay-j78r-5ybm","summary":"Multiple vulnerabilities have been found in MySQL, allowing\n    attackers to execute arbitrary code or cause Denial of Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2568.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2568.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-2568","reference_id":"","reference_type":"","scores":[{"value":"0.03957","scoring_system":"epss","scoring_elements":"0.88306","published_at":"2026-04-01T12:55:00Z"},{"value":"0.03957","scoring_system":"epss","scoring_elements":"0.88314","published_at":"2026-04-02T12:55:00Z"},{"value":"0.03957","scoring_system":"epss","scoring_elements":"0.88328","published_at":"2026-04-04T12:55:00Z"},{"value":"0.03957","scoring_system":"epss","scoring_elements":"0.88333","published_at":"2026-04-07T12:55:00Z"},{"value":"0.03957","scoring_system":"epss","scoring_elements":"0.88352","published_at":"2026-04-08T12:55:00Z"},{"value":"0.03957","scoring_system":"epss","scoring_elements":"0.88359","published_at":"2026-04-09T12:55:00Z"},{"value":"0.03957","scoring_system":"epss","scoring_elements":"0.88369","published_at":"2026-04-11T12:55:00Z"},{"value":"0.03957","scoring_system":"epss","scoring_elements":"0.88361","published_at":"2026-04-13T12:55:00Z"},{"value":"0.03957","scoring_system":"epss","scoring_elements":"0.88376","published_at":"2026-04-16T12:55:00Z"},{"value":"0.03957","scoring_system":"epss","scoring_elements":"0.88373","published_at":"2026-04-21T12:55:00Z"},{"value":"0.03957","scoring_system":"epss","scoring_elements":"0.88389","published_at":"2026-04-24T12:55:00Z"},{"value":"0.03957","scoring_system":"epss","scoring_elements":"0.88394","published_at":"2026-04-26T12:55:00Z"},{"value":"0.03957","scoring_system":"epss","scoring_elements":"0.88395","published_at":"2026-04-29T12:55:00Z"},{"value":"0.03957","scoring_system":"epss","scoring_elements":"0.88406","published_at":"2026-05-05T12:55:00Z"},{"value":"0.03957","scoring_system":"epss","scoring_elements":"0.88421","published_at":"2026-05-07T12:55:00Z"},{"value":"0.03957","scoring_system":"epss","scoring_elements":"0.88435","published_at":"2026-05-09T12:55:00Z"},{"value":"0.03957","scoring_system":"epss","scoring_elements":"0.88433","published_at":"2026-05-11T12:55:00Z"},{"value":"0.03957","scoring_system":"epss","scoring_elements":"0.88446","published_at":"2026-05-12T12:55:00Z"},{"value":"0.03957","scoring_system":"epss","scoring_elements":"0.88474","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-2568"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0433","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0433"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0441","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0441"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0499","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0499"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0501","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0501"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0505","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0505"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2568","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2568"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2571","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2571"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2573","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2573"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2582","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2582"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2643","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2643"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2648","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2648"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3152","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3152"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4752","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4752"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4757","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4757"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1212763","reference_id":"1212763","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1212763"},{"reference_url":"https://security.gentoo.org/glsa/201507-19","reference_id":"GLSA-201507-19","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201507-19"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1628","reference_id":"RHSA-2015:1628","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1628"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1629","reference_id":"RHSA-2015:1629","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1629"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1647","reference_id":"RHSA-2015:1647","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1647"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1665","reference_id":"RHSA-2015:1665","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1665"},{"reference_url":"https://usn.ubuntu.com/2575-1/","reference_id":"USN-2575-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2575-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035582?format=json","purl":"pkg:deb/debian/mariadb-10.0@10.0.25-0%2Bdeb8u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1gmc-pj6y-rkfx"},{"vulnerability":"VCID-2gyq-q761-h3br"},{"vulnerability":"VCID-2rf6-qaey-1ubn"},{"vulnerability":"VCID-45hn-ezks-j7br"},{"vulnerability":"VCID-4cnj-7fur-3qe3"},{"vulnerability":"VCID-4yz4-vxnh-b3dp"},{"vulnerability":"VCID-5sjj-599v-vybg"},{"vulnerability":"VCID-6g4n-3xfu-hfee"},{"vulnerability":"VCID-6muh-rg1z-pqab"},{"vulnerability":"VCID-8djb-knkk-s3c8"},{"vulnerability":"VCID-8krv-jqjg-uqc8"},{"vulnerability":"VCID-8kvb-5u8c-zbc4"},{"vulnerability":"VCID-8sya-wktg-dqa5"},{"vulnerability":"VCID-9f48-53dz-13an"},{"vulnerability":"VCID-9ff2-43rk-2ydj"},{"vulnerability":"VCID-9w98-nfg2-muh2"},{"vulnerability":"VCID-bhxk-8byp-eyap"},{"vulnerability":"VCID-ej67-ayfh-sqdt"},{"vulnerability":"VCID-g1pp-9qqg-1beb"},{"vulnerability":"VCID-gp4w-bdxg-6kab"},{"vulnerability":"VCID-jgff-4jyp-9fgr"},{"vulnerability":"VCID-mde2-1ynu-auh2"},{"vulnerability":"VCID-mfgg-7s54-gqg8"},{"vulnerability":"VCID-nkdd-suwp-4ffr"},{"vulnerability":"VCID-p623-gxyv-g7fs"},{"vulnerability":"VCID-pk7e-t26d-aqdm"},{"vulnerability":"VCID-pv92-6p9x-v7bs"},{"vulnerability":"VCID-r2cz-9kjz-zbgu"},{"vulnerability":"VCID-rssq-mfc2-ckaf"},{"vulnerability":"VCID-rted-6vzz-mbcv"},{"vulnerability":"VCID-tvdv-3ed5-h3dt"},{"vulnerability":"VCID-un5y-y9sq-1ufb"},{"vulnerability":"VCID-v4gv-g9n5-ukgc"},{"vulnerability":"VCID-vh5y-15tw-d7fd"},{"vulnerability":"VCID-wrna-cc9g-sqbe"},{"vulnerability":"VCID-yx79-3g2x-pqex"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.0@10.0.25-0%252Bdeb8u1"}],"aliases":["CVE-2015-2568"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-31ay-j78r-5ybm"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41372?format=json","vulnerability_id":"VCID-34h2-5ygu-6fdc","summary":"Multiple vulnerabilities have been found in MySQL and MariaDB, the\n    worst of which could allow remote attackers to cause a Denial of Service\n    condition or obtain sensitive information.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4752.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4752.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-4752","reference_id":"","reference_type":"","scores":[{"value":"0.00598","scoring_system":"epss","scoring_elements":"0.69334","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00598","scoring_system":"epss","scoring_elements":"0.69347","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00598","scoring_system":"epss","scoring_elements":"0.69363","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00598","scoring_system":"epss","scoring_elements":"0.69343","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00598","scoring_system":"epss","scoring_elements":"0.69393","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00598","scoring_system":"epss","scoring_elements":"0.69409","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00598","scoring_system":"epss","scoring_elements":"0.69432","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00598","scoring_system":"epss","scoring_elements":"0.69417","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00598","scoring_system":"epss","scoring_elements":"0.69402","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00598","scoring_system":"epss","scoring_elements":"0.69442","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00598","scoring_system":"epss","scoring_elements":"0.69452","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00598","scoring_system":"epss","scoring_elements":"0.69434","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00598","scoring_system":"epss","scoring_elements":"0.69486","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00598","scoring_system":"epss","scoring_elements":"0.69492","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00598","scoring_system":"epss","scoring_elements":"0.69497","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00598","scoring_system":"epss","scoring_elements":"0.69476","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00598","scoring_system":"epss","scoring_elements":"0.69518","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00598","scoring_system":"epss","scoring_elements":"0.69553","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00598","scoring_system":"epss","scoring_elements":"0.69524","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00598","scoring_system":"epss","scoring_elements":"0.69548","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00598","scoring_system":"epss","scoring_elements":"0.69596","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-4752"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0433","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0433"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0441","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0441"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0499","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0499"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0501","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0501"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0505","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0505"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2568","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2568"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2571","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2571"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2573","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2573"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2582","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2582"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2620","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2620"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2643","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2643"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2648","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2648"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3152","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3152"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4737","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4737"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4752","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4752"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4757","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4757"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1244779","reference_id":"1244779","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1244779"},{"reference_url":"https://security.gentoo.org/glsa/201610-06","reference_id":"GLSA-201610-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201610-06"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1628","reference_id":"RHSA-2015:1628","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1628"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1629","reference_id":"RHSA-2015:1629","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1629"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1630","reference_id":"RHSA-2015:1630","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1630"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1646","reference_id":"RHSA-2015:1646","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1646"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1647","reference_id":"RHSA-2015:1647","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1647"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1665","reference_id":"RHSA-2015:1665","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1665"},{"reference_url":"https://usn.ubuntu.com/2674-1/","reference_id":"USN-2674-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2674-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035582?format=json","purl":"pkg:deb/debian/mariadb-10.0@10.0.25-0%2Bdeb8u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1gmc-pj6y-rkfx"},{"vulnerability":"VCID-2gyq-q761-h3br"},{"vulnerability":"VCID-2rf6-qaey-1ubn"},{"vulnerability":"VCID-45hn-ezks-j7br"},{"vulnerability":"VCID-4cnj-7fur-3qe3"},{"vulnerability":"VCID-4yz4-vxnh-b3dp"},{"vulnerability":"VCID-5sjj-599v-vybg"},{"vulnerability":"VCID-6g4n-3xfu-hfee"},{"vulnerability":"VCID-6muh-rg1z-pqab"},{"vulnerability":"VCID-8djb-knkk-s3c8"},{"vulnerability":"VCID-8krv-jqjg-uqc8"},{"vulnerability":"VCID-8kvb-5u8c-zbc4"},{"vulnerability":"VCID-8sya-wktg-dqa5"},{"vulnerability":"VCID-9f48-53dz-13an"},{"vulnerability":"VCID-9ff2-43rk-2ydj"},{"vulnerability":"VCID-9w98-nfg2-muh2"},{"vulnerability":"VCID-bhxk-8byp-eyap"},{"vulnerability":"VCID-ej67-ayfh-sqdt"},{"vulnerability":"VCID-g1pp-9qqg-1beb"},{"vulnerability":"VCID-gp4w-bdxg-6kab"},{"vulnerability":"VCID-jgff-4jyp-9fgr"},{"vulnerability":"VCID-mde2-1ynu-auh2"},{"vulnerability":"VCID-mfgg-7s54-gqg8"},{"vulnerability":"VCID-nkdd-suwp-4ffr"},{"vulnerability":"VCID-p623-gxyv-g7fs"},{"vulnerability":"VCID-pk7e-t26d-aqdm"},{"vulnerability":"VCID-pv92-6p9x-v7bs"},{"vulnerability":"VCID-r2cz-9kjz-zbgu"},{"vulnerability":"VCID-rssq-mfc2-ckaf"},{"vulnerability":"VCID-rted-6vzz-mbcv"},{"vulnerability":"VCID-tvdv-3ed5-h3dt"},{"vulnerability":"VCID-un5y-y9sq-1ufb"},{"vulnerability":"VCID-v4gv-g9n5-ukgc"},{"vulnerability":"VCID-vh5y-15tw-d7fd"},{"vulnerability":"VCID-wrna-cc9g-sqbe"},{"vulnerability":"VCID-yx79-3g2x-pqex"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.0@10.0.25-0%252Bdeb8u1"}],"aliases":["CVE-2015-4752"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-34h2-5ygu-6fdc"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/81268?format=json","vulnerability_id":"VCID-3fnd-29cd-2bhu","summary":"security update","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:58:44Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:58:44Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:58:44Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:58:44Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:58:44Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0705.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:58:44Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-0705.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0668.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0668.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-0668","reference_id":"","reference_type":"","scores":[{"value":"0.00357","scoring_system":"epss","scoring_elements":"0.58079","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00357","scoring_system":"epss","scoring_elements":"0.5803","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00357","scoring_system":"epss","scoring_elements":"0.58028","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00357","scoring_system":"epss","scoring_elements":"0.58006","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00357","scoring_system":"epss","scoring_elements":"0.57969","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00357","scoring_system":"epss","scoring_elements":"0.57985","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00357","scoring_system":"epss","scoring_elements":"0.57926","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00357","scoring_system":"epss","scoring_elements":"0.58031","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00357","scoring_system":"epss","scoring_elements":"0.57981","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00357","scoring_system":"epss","scoring_elements":"0.5801","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00357","scoring_system":"epss","scoring_elements":"0.57888","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00357","scoring_system":"epss","scoring_elements":"0.57972","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00357","scoring_system":"epss","scoring_elements":"0.57991","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00357","scoring_system":"epss","scoring_elements":"0.57967","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00357","scoring_system":"epss","scoring_elements":"0.58023","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00357","scoring_system":"epss","scoring_elements":"0.58025","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00357","scoring_system":"epss","scoring_elements":"0.58042","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00357","scoring_system":"epss","scoring_elements":"0.5802","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00357","scoring_system":"epss","scoring_elements":"0.58","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-0668"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0640","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0640"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0641","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0641"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0643","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0643"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0644","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0644"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0646","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0646"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0647","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0647"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0648","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0648"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0649","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0649"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0650","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0650"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0655","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0655"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0666","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0666"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0668","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0668"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:H/Au:M/C:N/I:N/A:C"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://mariadb.com/kb/en/mariadb/mariadb-10024-release-notes/","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:58:44Z/"}],"url":"https://mariadb.com/kb/en/mariadb/mariadb-10024-release-notes/"},{"reference_url":"https://mariadb.com/kb/en/mariadb/mariadb-10112-release-notes/","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:58:44Z/"}],"url":"https://mariadb.com/kb/en/mariadb/mariadb-10112-release-notes/"},{"reference_url":"http://www.debian.org/security/2016/dsa-3595","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:58:44Z/"}],"url":"http://www.debian.org/security/2016/dsa-3595"},{"reference_url":"http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:58:44Z/"}],"url":"http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html"},{"reference_url":"http://www.securityfocus.com/bid/86467","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:58:44Z/"}],"url":"http://www.securityfocus.com/bid/86467"},{"reference_url":"http://www.securitytracker.com/id/1035606","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:58:44Z/"}],"url":"http://www.securitytracker.com/id/1035606"},{"reference_url":"http://www.ubuntu.com/usn/USN-2953-1","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:58:44Z/"}],"url":"http://www.ubuntu.com/usn/USN-2953-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1329273","reference_id":"1329273","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1329273"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:12:-:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_desktop:12:-:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:12:-:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:12:sp1:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_desktop:12:sp1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:12:sp1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:12:-:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_server:12:-:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:12:-:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:12:sp1:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_server:12:sp1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:12:sp1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:-:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:-:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:-:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:sp1:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:sp1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:sp1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_workstation_extension:12:-:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_workstation_extension:12:-:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_workstation_extension:12:-:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_workstation_extension:12:sp1:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_workstation_extension:12:sp1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_workstation_extension:12:sp1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-0668","reference_id":"CVE-2016-0668","reference_type":"","scores":[{"value":"1.7","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:M/C:N/I:N/A:P"},{"value":"4.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-0668"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0705","reference_id":"RHSA-2016:0705","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0705"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1132","reference_id":"RHSA-2016:1132","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:58:44Z/"}],"url":"https://access.redhat.com/errata/RHSA-2016:1132"},{"reference_url":"https://usn.ubuntu.com/2953-1/","reference_id":"USN-2953-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2953-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035582?format=json","purl":"pkg:deb/debian/mariadb-10.0@10.0.25-0%2Bdeb8u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1gmc-pj6y-rkfx"},{"vulnerability":"VCID-2gyq-q761-h3br"},{"vulnerability":"VCID-2rf6-qaey-1ubn"},{"vulnerability":"VCID-45hn-ezks-j7br"},{"vulnerability":"VCID-4cnj-7fur-3qe3"},{"vulnerability":"VCID-4yz4-vxnh-b3dp"},{"vulnerability":"VCID-5sjj-599v-vybg"},{"vulnerability":"VCID-6g4n-3xfu-hfee"},{"vulnerability":"VCID-6muh-rg1z-pqab"},{"vulnerability":"VCID-8djb-knkk-s3c8"},{"vulnerability":"VCID-8krv-jqjg-uqc8"},{"vulnerability":"VCID-8kvb-5u8c-zbc4"},{"vulnerability":"VCID-8sya-wktg-dqa5"},{"vulnerability":"VCID-9f48-53dz-13an"},{"vulnerability":"VCID-9ff2-43rk-2ydj"},{"vulnerability":"VCID-9w98-nfg2-muh2"},{"vulnerability":"VCID-bhxk-8byp-eyap"},{"vulnerability":"VCID-ej67-ayfh-sqdt"},{"vulnerability":"VCID-g1pp-9qqg-1beb"},{"vulnerability":"VCID-gp4w-bdxg-6kab"},{"vulnerability":"VCID-jgff-4jyp-9fgr"},{"vulnerability":"VCID-mde2-1ynu-auh2"},{"vulnerability":"VCID-mfgg-7s54-gqg8"},{"vulnerability":"VCID-nkdd-suwp-4ffr"},{"vulnerability":"VCID-p623-gxyv-g7fs"},{"vulnerability":"VCID-pk7e-t26d-aqdm"},{"vulnerability":"VCID-pv92-6p9x-v7bs"},{"vulnerability":"VCID-r2cz-9kjz-zbgu"},{"vulnerability":"VCID-rssq-mfc2-ckaf"},{"vulnerability":"VCID-rted-6vzz-mbcv"},{"vulnerability":"VCID-tvdv-3ed5-h3dt"},{"vulnerability":"VCID-un5y-y9sq-1ufb"},{"vulnerability":"VCID-v4gv-g9n5-ukgc"},{"vulnerability":"VCID-vh5y-15tw-d7fd"},{"vulnerability":"VCID-wrna-cc9g-sqbe"},{"vulnerability":"VCID-yx79-3g2x-pqex"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.0@10.0.25-0%252Bdeb8u1"}],"aliases":["CVE-2016-0668"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.7","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3fnd-29cd-2bhu"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/62570?format=json","vulnerability_id":"VCID-3qjy-4cen-7qev","summary":"security update","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00015.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00015.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00016.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00016.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0534.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-0534.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0705.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-0705.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-1480.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-1480.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-1481.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-1481.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0606.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0606.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-0606","reference_id":"","reference_type":"","scores":[{"value":"0.00166","scoring_system":"epss","scoring_elements":"0.3731","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00166","scoring_system":"epss","scoring_elements":"0.3723","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00166","scoring_system":"epss","scoring_elements":"0.3765","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00166","scoring_system":"epss","scoring_elements":"0.37832","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00166","scoring_system":"epss","scoring_elements":"0.37857","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00166","scoring_system":"epss","scoring_elements":"0.37736","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00166","scoring_system":"epss","scoring_elements":"0.37786","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00166","scoring_system":"epss","scoring_elements":"0.37799","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00166","scoring_system":"epss","scoring_elements":"0.37813","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00166","scoring_system":"epss","scoring_elements":"0.37778","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00166","scoring_system":"epss","scoring_elements":"0.37753","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00166","scoring_system":"epss","scoring_elements":"0.37801","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00166","scoring_system":"epss","scoring_elements":"0.37781","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00166","scoring_system":"epss","scoring_elements":"0.37721","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00166","scoring_system":"epss","scoring_elements":"0.37483","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00166","scoring_system":"epss","scoring_elements":"0.37461","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00166","scoring_system":"epss","scoring_elements":"0.3737","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00166","scoring_system":"epss","scoring_elements":"0.37252","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00166","scoring_system":"epss","scoring_elements":"0.3732","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00166","scoring_system":"epss","scoring_elements":"0.3734","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00166","scoring_system":"epss","scoring_elements":"0.37259","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-0606"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0505","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0505"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0546","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0546"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0596","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0596"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0597","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0597"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0598","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0598"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0600","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0600"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0606","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0606"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0608","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0608"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0609","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0609"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0616","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0616"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2047","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2047"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:S/C:N/I:P/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://mariadb.com/kb/en/mariadb/mariadb-10110-release-notes/","reference_id":"","reference_type":"","scores":[],"url":"https://mariadb.com/kb/en/mariadb/mariadb-10110-release-notes/"},{"reference_url":"https://mariadb.com/kb/en/mariadb/mariadb-5547-release-notes/","reference_id":"","reference_type":"","scores":[],"url":"https://mariadb.com/kb/en/mariadb/mariadb-5547-release-notes/"},{"reference_url":"https://mariadb.com/kb/en/mdb-10023-rn/","reference_id":"","reference_type":"","scores":[],"url":"https://mariadb.com/kb/en/mdb-10023-rn/"},{"reference_url":"http://www.debian.org/security/2016/dsa-3453","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2016/dsa-3453"},{"reference_url":"http://www.debian.org/security/2016/dsa-3459","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2016/dsa-3459"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html"},{"reference_url":"http://www.securitytracker.com/id/1034708","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1034708"},{"reference_url":"http://www.ubuntu.com/usn/USN-2881-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2881-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1301504","reference_id":"1301504","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1301504"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node_eus:7.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_hpc_node_eus:7.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node_eus:7.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-0606","reference_id":"CVE-2016-0606","reference_type":"","scores":[{"value":"3.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:S/C:N/I:P/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-0606"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0534","reference_id":"RHSA-2016:0534","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0534"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0705","reference_id":"RHSA-2016:0705","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0705"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1132","reference_id":"RHSA-2016:1132","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1132"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1480","reference_id":"RHSA-2016:1480","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1480"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1481","reference_id":"RHSA-2016:1481","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1481"},{"reference_url":"https://usn.ubuntu.com/2881-1/","reference_id":"USN-2881-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2881-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035582?format=json","purl":"pkg:deb/debian/mariadb-10.0@10.0.25-0%2Bdeb8u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1gmc-pj6y-rkfx"},{"vulnerability":"VCID-2gyq-q761-h3br"},{"vulnerability":"VCID-2rf6-qaey-1ubn"},{"vulnerability":"VCID-45hn-ezks-j7br"},{"vulnerability":"VCID-4cnj-7fur-3qe3"},{"vulnerability":"VCID-4yz4-vxnh-b3dp"},{"vulnerability":"VCID-5sjj-599v-vybg"},{"vulnerability":"VCID-6g4n-3xfu-hfee"},{"vulnerability":"VCID-6muh-rg1z-pqab"},{"vulnerability":"VCID-8djb-knkk-s3c8"},{"vulnerability":"VCID-8krv-jqjg-uqc8"},{"vulnerability":"VCID-8kvb-5u8c-zbc4"},{"vulnerability":"VCID-8sya-wktg-dqa5"},{"vulnerability":"VCID-9f48-53dz-13an"},{"vulnerability":"VCID-9ff2-43rk-2ydj"},{"vulnerability":"VCID-9w98-nfg2-muh2"},{"vulnerability":"VCID-bhxk-8byp-eyap"},{"vulnerability":"VCID-ej67-ayfh-sqdt"},{"vulnerability":"VCID-g1pp-9qqg-1beb"},{"vulnerability":"VCID-gp4w-bdxg-6kab"},{"vulnerability":"VCID-jgff-4jyp-9fgr"},{"vulnerability":"VCID-mde2-1ynu-auh2"},{"vulnerability":"VCID-mfgg-7s54-gqg8"},{"vulnerability":"VCID-nkdd-suwp-4ffr"},{"vulnerability":"VCID-p623-gxyv-g7fs"},{"vulnerability":"VCID-pk7e-t26d-aqdm"},{"vulnerability":"VCID-pv92-6p9x-v7bs"},{"vulnerability":"VCID-r2cz-9kjz-zbgu"},{"vulnerability":"VCID-rssq-mfc2-ckaf"},{"vulnerability":"VCID-rted-6vzz-mbcv"},{"vulnerability":"VCID-tvdv-3ed5-h3dt"},{"vulnerability":"VCID-un5y-y9sq-1ufb"},{"vulnerability":"VCID-v4gv-g9n5-ukgc"},{"vulnerability":"VCID-vh5y-15tw-d7fd"},{"vulnerability":"VCID-wrna-cc9g-sqbe"},{"vulnerability":"VCID-yx79-3g2x-pqex"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.0@10.0.25-0%252Bdeb8u1"}],"aliases":["CVE-2016-0606"],"risk_score":1.6,"exploitability":"0.5","weighted_severity":"3.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3qjy-4cen-7qev"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/62569?format=json","vulnerability_id":"VCID-55fg-6c2c-6bg8","summary":"security update","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00015.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00015.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00016.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00016.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0534.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-0534.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0705.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-0705.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-1480.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-1480.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-1481.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-1481.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0600.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0600.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-0600","reference_id":"","reference_type":"","scores":[{"value":"0.00338","scoring_system":"epss","scoring_elements":"0.56676","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00338","scoring_system":"epss","scoring_elements":"0.56614","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00338","scoring_system":"epss","scoring_elements":"0.56522","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00338","scoring_system":"epss","scoring_elements":"0.56618","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00338","scoring_system":"epss","scoring_elements":"0.56639","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00338","scoring_system":"epss","scoring_elements":"0.56669","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00338","scoring_system":"epss","scoring_elements":"0.56675","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00338","scoring_system":"epss","scoring_elements":"0.56683","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00338","scoring_system":"epss","scoring_elements":"0.56658","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00338","scoring_system":"epss","scoring_elements":"0.56638","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00338","scoring_system":"epss","scoring_elements":"0.56668","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00338","scoring_system":"epss","scoring_elements":"0.5664","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00338","scoring_system":"epss","scoring_elements":"0.56576","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00338","scoring_system":"epss","scoring_elements":"0.56595","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00338","scoring_system":"epss","scoring_elements":"0.56577","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00338","scoring_system":"epss","scoring_elements":"0.56532","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00338","scoring_system":"epss","scoring_elements":"0.56578","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00338","scoring_system":"epss","scoring_elements":"0.56641","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00338","scoring_system":"epss","scoring_elements":"0.56592","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-0600"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0505","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0505"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0546","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0546"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0596","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0596"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0597","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0597"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0598","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0598"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0600","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0600"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0606","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0606"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0608","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0608"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0609","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0609"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0616","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0616"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2047","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2047"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:S/C:N/I:N/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://mariadb.com/kb/en/mariadb/mariadb-10110-release-notes/","reference_id":"","reference_type":"","scores":[],"url":"https://mariadb.com/kb/en/mariadb/mariadb-10110-release-notes/"},{"reference_url":"https://mariadb.com/kb/en/mariadb/mariadb-5547-release-notes/","reference_id":"","reference_type":"","scores":[],"url":"https://mariadb.com/kb/en/mariadb/mariadb-5547-release-notes/"},{"reference_url":"https://mariadb.com/kb/en/mdb-10023-rn/","reference_id":"","reference_type":"","scores":[],"url":"https://mariadb.com/kb/en/mdb-10023-rn/"},{"reference_url":"http://www.debian.org/security/2016/dsa-3453","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2016/dsa-3453"},{"reference_url":"http://www.debian.org/security/2016/dsa-3459","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2016/dsa-3459"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html"},{"reference_url":"http://www.securityfocus.com/bid/81188","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/81188"},{"reference_url":"http://www.securitytracker.com/id/1034708","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1034708"},{"reference_url":"http://www.ubuntu.com/usn/USN-2881-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2881-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1301501","reference_id":"1301501","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1301501"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node_eus:7.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_hpc_node_eus:7.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node_eus:7.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-0600","reference_id":"CVE-2016-0600","reference_type":"","scores":[{"value":"3.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:S/C:N/I:N/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-0600"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0534","reference_id":"RHSA-2016:0534","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0534"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0705","reference_id":"RHSA-2016:0705","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0705"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1132","reference_id":"RHSA-2016:1132","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1132"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1480","reference_id":"RHSA-2016:1480","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1480"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1481","reference_id":"RHSA-2016:1481","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1481"},{"reference_url":"https://usn.ubuntu.com/2881-1/","reference_id":"USN-2881-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2881-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035582?format=json","purl":"pkg:deb/debian/mariadb-10.0@10.0.25-0%2Bdeb8u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1gmc-pj6y-rkfx"},{"vulnerability":"VCID-2gyq-q761-h3br"},{"vulnerability":"VCID-2rf6-qaey-1ubn"},{"vulnerability":"VCID-45hn-ezks-j7br"},{"vulnerability":"VCID-4cnj-7fur-3qe3"},{"vulnerability":"VCID-4yz4-vxnh-b3dp"},{"vulnerability":"VCID-5sjj-599v-vybg"},{"vulnerability":"VCID-6g4n-3xfu-hfee"},{"vulnerability":"VCID-6muh-rg1z-pqab"},{"vulnerability":"VCID-8djb-knkk-s3c8"},{"vulnerability":"VCID-8krv-jqjg-uqc8"},{"vulnerability":"VCID-8kvb-5u8c-zbc4"},{"vulnerability":"VCID-8sya-wktg-dqa5"},{"vulnerability":"VCID-9f48-53dz-13an"},{"vulnerability":"VCID-9ff2-43rk-2ydj"},{"vulnerability":"VCID-9w98-nfg2-muh2"},{"vulnerability":"VCID-bhxk-8byp-eyap"},{"vulnerability":"VCID-ej67-ayfh-sqdt"},{"vulnerability":"VCID-g1pp-9qqg-1beb"},{"vulnerability":"VCID-gp4w-bdxg-6kab"},{"vulnerability":"VCID-jgff-4jyp-9fgr"},{"vulnerability":"VCID-mde2-1ynu-auh2"},{"vulnerability":"VCID-mfgg-7s54-gqg8"},{"vulnerability":"VCID-nkdd-suwp-4ffr"},{"vulnerability":"VCID-p623-gxyv-g7fs"},{"vulnerability":"VCID-pk7e-t26d-aqdm"},{"vulnerability":"VCID-pv92-6p9x-v7bs"},{"vulnerability":"VCID-r2cz-9kjz-zbgu"},{"vulnerability":"VCID-rssq-mfc2-ckaf"},{"vulnerability":"VCID-rted-6vzz-mbcv"},{"vulnerability":"VCID-tvdv-3ed5-h3dt"},{"vulnerability":"VCID-un5y-y9sq-1ufb"},{"vulnerability":"VCID-v4gv-g9n5-ukgc"},{"vulnerability":"VCID-vh5y-15tw-d7fd"},{"vulnerability":"VCID-wrna-cc9g-sqbe"},{"vulnerability":"VCID-yx79-3g2x-pqex"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.0@10.0.25-0%252Bdeb8u1"}],"aliases":["CVE-2016-0600"],"risk_score":1.6,"exploitability":"0.5","weighted_severity":"3.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-55fg-6c2c-6bg8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61085?format=json","vulnerability_id":"VCID-5yzf-3vz6-9yhu","summary":"security update","references":[{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177539.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177539.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00010.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00010.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00011.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00011.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2016-02/msg00039.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2016-02/msg00039.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0534.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-0534.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0705.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-0705.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-1480.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-1480.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-1481.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-1481.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4861.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4861.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-4861","reference_id":"","reference_type":"","scores":[{"value":"0.00392","scoring_system":"epss","scoring_elements":"0.6032","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00392","scoring_system":"epss","scoring_elements":"0.60078","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00392","scoring_system":"epss","scoring_elements":"0.60156","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00392","scoring_system":"epss","scoring_elements":"0.60181","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00392","scoring_system":"epss","scoring_elements":"0.6015","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00392","scoring_system":"epss","scoring_elements":"0.602","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00392","scoring_system":"epss","scoring_elements":"0.60214","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00392","scoring_system":"epss","scoring_elements":"0.60235","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00392","scoring_system":"epss","scoring_elements":"0.60222","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00392","scoring_system":"epss","scoring_elements":"0.60204","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00392","scoring_system":"epss","scoring_elements":"0.60244","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00392","scoring_system":"epss","scoring_elements":"0.60251","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00392","scoring_system":"epss","scoring_elements":"0.60239","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00392","scoring_system":"epss","scoring_elements":"0.60209","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00392","scoring_system":"epss","scoring_elements":"0.60225","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00392","scoring_system":"epss","scoring_elements":"0.60213","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00392","scoring_system":"epss","scoring_elements":"0.6017","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00392","scoring_system":"epss","scoring_elements":"0.60217","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00392","scoring_system":"epss","scoring_elements":"0.60274","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00392","scoring_system":"epss","scoring_elements":"0.60233","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00392","scoring_system":"epss","scoring_elements":"0.60259","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-4861"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4792","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4792"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4802","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4802"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4815","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4815"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4816","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4816"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4819","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4819"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4826","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4826"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4830","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4830"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4836","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4836"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4858","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4858"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4861","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4861"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4870","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4870"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4879","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4879"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4895","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4895"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4913","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4913"},{"reference_url":"https://www.suse.com/support/update/announcement/2016/suse-su-20160296-1.html","reference_id":"","reference_type":"","scores":[],"url":"https://www.suse.com/support/update/announcement/2016/suse-su-20160296-1.html"},{"reference_url":"http://www.debian.org/security/2015/dsa-3377","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2015/dsa-3377"},{"reference_url":"http://www.debian.org/security/2015/dsa-3385","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2015/dsa-3385"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html"},{"reference_url":"http://www.securityfocus.com/bid/77137","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/77137"},{"reference_url":"http://www.securitytracker.com/id/1033894","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1033894"},{"reference_url":"http://www.ubuntu.com/usn/USN-2781-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2781-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1274776","reference_id":"1274776","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1274776"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2015-4861","reference_id":"CVE-2015-4861","reference_type":"","scores":[{"value":"3.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:S/C:N/I:N/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2015-4861"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0534","reference_id":"RHSA-2016:0534","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0534"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0705","reference_id":"RHSA-2016:0705","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0705"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1132","reference_id":"RHSA-2016:1132","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1132"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1480","reference_id":"RHSA-2016:1480","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1480"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1481","reference_id":"RHSA-2016:1481","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1481"},{"reference_url":"https://usn.ubuntu.com/2781-1/","reference_id":"USN-2781-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2781-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035582?format=json","purl":"pkg:deb/debian/mariadb-10.0@10.0.25-0%2Bdeb8u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1gmc-pj6y-rkfx"},{"vulnerability":"VCID-2gyq-q761-h3br"},{"vulnerability":"VCID-2rf6-qaey-1ubn"},{"vulnerability":"VCID-45hn-ezks-j7br"},{"vulnerability":"VCID-4cnj-7fur-3qe3"},{"vulnerability":"VCID-4yz4-vxnh-b3dp"},{"vulnerability":"VCID-5sjj-599v-vybg"},{"vulnerability":"VCID-6g4n-3xfu-hfee"},{"vulnerability":"VCID-6muh-rg1z-pqab"},{"vulnerability":"VCID-8djb-knkk-s3c8"},{"vulnerability":"VCID-8krv-jqjg-uqc8"},{"vulnerability":"VCID-8kvb-5u8c-zbc4"},{"vulnerability":"VCID-8sya-wktg-dqa5"},{"vulnerability":"VCID-9f48-53dz-13an"},{"vulnerability":"VCID-9ff2-43rk-2ydj"},{"vulnerability":"VCID-9w98-nfg2-muh2"},{"vulnerability":"VCID-bhxk-8byp-eyap"},{"vulnerability":"VCID-ej67-ayfh-sqdt"},{"vulnerability":"VCID-g1pp-9qqg-1beb"},{"vulnerability":"VCID-gp4w-bdxg-6kab"},{"vulnerability":"VCID-jgff-4jyp-9fgr"},{"vulnerability":"VCID-mde2-1ynu-auh2"},{"vulnerability":"VCID-mfgg-7s54-gqg8"},{"vulnerability":"VCID-nkdd-suwp-4ffr"},{"vulnerability":"VCID-p623-gxyv-g7fs"},{"vulnerability":"VCID-pk7e-t26d-aqdm"},{"vulnerability":"VCID-pv92-6p9x-v7bs"},{"vulnerability":"VCID-r2cz-9kjz-zbgu"},{"vulnerability":"VCID-rssq-mfc2-ckaf"},{"vulnerability":"VCID-rted-6vzz-mbcv"},{"vulnerability":"VCID-tvdv-3ed5-h3dt"},{"vulnerability":"VCID-un5y-y9sq-1ufb"},{"vulnerability":"VCID-v4gv-g9n5-ukgc"},{"vulnerability":"VCID-vh5y-15tw-d7fd"},{"vulnerability":"VCID-wrna-cc9g-sqbe"},{"vulnerability":"VCID-yx79-3g2x-pqex"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.0@10.0.25-0%252Bdeb8u1"}],"aliases":["CVE-2015-4861"],"risk_score":1.6,"exploitability":"0.5","weighted_severity":"3.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-5yzf-3vz6-9yhu"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61087?format=json","vulnerability_id":"VCID-7qj2-atsh-pub4","summary":"security update","references":[{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177539.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177539.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-1628.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2015-1628.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0534.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-0534.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-1481.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-1481.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4879.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4879.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-4879","reference_id":"","reference_type":"","scores":[{"value":"0.00327","scoring_system":"epss","scoring_elements":"0.55724","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00327","scoring_system":"epss","scoring_elements":"0.5555","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00327","scoring_system":"epss","scoring_elements":"0.55662","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00327","scoring_system":"epss","scoring_elements":"0.55686","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00327","scoring_system":"epss","scoring_elements":"0.55664","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00327","scoring_system":"epss","scoring_elements":"0.55715","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00327","scoring_system":"epss","scoring_elements":"0.55718","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00327","scoring_system":"epss","scoring_elements":"0.55727","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00327","scoring_system":"epss","scoring_elements":"0.55707","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00327","scoring_system":"epss","scoring_elements":"0.5569","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00327","scoring_system":"epss","scoring_elements":"0.55729","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00327","scoring_system":"epss","scoring_elements":"0.55733","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00327","scoring_system":"epss","scoring_elements":"0.55712","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00327","scoring_system":"epss","scoring_elements":"0.55637","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00327","scoring_system":"epss","scoring_elements":"0.55655","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00327","scoring_system":"epss","scoring_elements":"0.55631","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00327","scoring_system":"epss","scoring_elements":"0.55578","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00327","scoring_system":"epss","scoring_elements":"0.55625","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00327","scoring_system":"epss","scoring_elements":"0.55682","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00327","scoring_system":"epss","scoring_elements":"0.55638","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00327","scoring_system":"epss","scoring_elements":"0.55665","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-4879"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4792","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4792"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4802","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4802"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4815","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4815"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4816","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4816"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4819","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4819"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4826","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4826"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4830","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4830"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4836","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4836"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4858","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4858"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4861","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4861"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4870","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4870"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4879","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4879"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4895","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4895"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4913","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4913"},{"reference_url":"http://www.debian.org/security/2015/dsa-3377","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2015/dsa-3377"},{"reference_url":"http://www.debian.org/security/2015/dsa-3385","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2015/dsa-3385"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html"},{"reference_url":"http://www.securityfocus.com/bid/77140","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/77140"},{"reference_url":"http://www.securitytracker.com/id/1033894","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1033894"},{"reference_url":"http://www.ubuntu.com/usn/USN-2781-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2781-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1274783","reference_id":"1274783","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1274783"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:-:*:*:*:*:*:*","reference_id":"cpe:2.3:o:oracle:linux:7:-:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:-:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2015-4879","reference_id":"CVE-2015-4879","reference_type":"","scores":[{"value":"4.6","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:S/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2015-4879"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1628","reference_id":"RHSA-2015:1628","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1628"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1629","reference_id":"RHSA-2015:1629","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1629"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1630","reference_id":"RHSA-2015:1630","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1630"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0534","reference_id":"RHSA-2016:0534","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0534"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1132","reference_id":"RHSA-2016:1132","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1132"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1481","reference_id":"RHSA-2016:1481","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1481"},{"reference_url":"https://usn.ubuntu.com/2781-1/","reference_id":"USN-2781-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2781-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035582?format=json","purl":"pkg:deb/debian/mariadb-10.0@10.0.25-0%2Bdeb8u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1gmc-pj6y-rkfx"},{"vulnerability":"VCID-2gyq-q761-h3br"},{"vulnerability":"VCID-2rf6-qaey-1ubn"},{"vulnerability":"VCID-45hn-ezks-j7br"},{"vulnerability":"VCID-4cnj-7fur-3qe3"},{"vulnerability":"VCID-4yz4-vxnh-b3dp"},{"vulnerability":"VCID-5sjj-599v-vybg"},{"vulnerability":"VCID-6g4n-3xfu-hfee"},{"vulnerability":"VCID-6muh-rg1z-pqab"},{"vulnerability":"VCID-8djb-knkk-s3c8"},{"vulnerability":"VCID-8krv-jqjg-uqc8"},{"vulnerability":"VCID-8kvb-5u8c-zbc4"},{"vulnerability":"VCID-8sya-wktg-dqa5"},{"vulnerability":"VCID-9f48-53dz-13an"},{"vulnerability":"VCID-9ff2-43rk-2ydj"},{"vulnerability":"VCID-9w98-nfg2-muh2"},{"vulnerability":"VCID-bhxk-8byp-eyap"},{"vulnerability":"VCID-ej67-ayfh-sqdt"},{"vulnerability":"VCID-g1pp-9qqg-1beb"},{"vulnerability":"VCID-gp4w-bdxg-6kab"},{"vulnerability":"VCID-jgff-4jyp-9fgr"},{"vulnerability":"VCID-mde2-1ynu-auh2"},{"vulnerability":"VCID-mfgg-7s54-gqg8"},{"vulnerability":"VCID-nkdd-suwp-4ffr"},{"vulnerability":"VCID-p623-gxyv-g7fs"},{"vulnerability":"VCID-pk7e-t26d-aqdm"},{"vulnerability":"VCID-pv92-6p9x-v7bs"},{"vulnerability":"VCID-r2cz-9kjz-zbgu"},{"vulnerability":"VCID-rssq-mfc2-ckaf"},{"vulnerability":"VCID-rted-6vzz-mbcv"},{"vulnerability":"VCID-tvdv-3ed5-h3dt"},{"vulnerability":"VCID-un5y-y9sq-1ufb"},{"vulnerability":"VCID-v4gv-g9n5-ukgc"},{"vulnerability":"VCID-vh5y-15tw-d7fd"},{"vulnerability":"VCID-wrna-cc9g-sqbe"},{"vulnerability":"VCID-yx79-3g2x-pqex"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.0@10.0.25-0%252Bdeb8u1"}],"aliases":["CVE-2015-4879"],"risk_score":2.0,"exploitability":"0.5","weighted_severity":"4.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-7qj2-atsh-pub4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/81262?format=json","vulnerability_id":"VCID-7tj3-dfxj-bke7","summary":"security update","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:17Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:17Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:17Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:17Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:17Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:17Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0705.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:17Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-0705.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-1480.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:17Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-1480.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-1481.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:17Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-1481.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-1602.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:17Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-1602.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0647.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0647.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-0647","reference_id":"","reference_type":"","scores":[{"value":"0.00243","scoring_system":"epss","scoring_elements":"0.47516","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00243","scoring_system":"epss","scoring_elements":"0.47518","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00243","scoring_system":"epss","scoring_elements":"0.47537","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00243","scoring_system":"epss","scoring_elements":"0.47513","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00243","scoring_system":"epss","scoring_elements":"0.47521","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00243","scoring_system":"epss","scoring_elements":"0.4758","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00243","scoring_system":"epss","scoring_elements":"0.47573","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00243","scoring_system":"epss","scoring_elements":"0.47524","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00243","scoring_system":"epss","scoring_elements":"0.47522","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00243","scoring_system":"epss","scoring_elements":"0.47471","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00243","scoring_system":"epss","scoring_elements":"0.47387","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00243","scoring_system":"epss","scoring_elements":"0.47452","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00243","scoring_system":"epss","scoring_elements":"0.47473","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00243","scoring_system":"epss","scoring_elements":"0.47415","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00243","scoring_system":"epss","scoring_elements":"0.47443","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00243","scoring_system":"epss","scoring_elements":"0.47464","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00243","scoring_system":"epss","scoring_elements":"0.47494","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00243","scoring_system":"epss","scoring_elements":"0.47515","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-0647"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0640","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0640"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0641","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0641"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0642","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0642"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0643","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0643"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0644","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0644"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0646","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0646"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0647","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0647"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0648","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0648"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0649","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0649"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0650","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0650"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0655","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0655"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0666","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0666"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0668","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0668"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2047","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2047"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.4","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:N/C:N/I:C/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://mariadb.com/kb/en/mariadb/mariadb-10025-release-notes/","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:17Z/"}],"url":"https://mariadb.com/kb/en/mariadb/mariadb-10025-release-notes/"},{"reference_url":"https://mariadb.com/kb/en/mariadb/mariadb-10114-release-notes/","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:17Z/"}],"url":"https://mariadb.com/kb/en/mariadb/mariadb-10114-release-notes/"},{"reference_url":"https://mariadb.com/kb/en/mariadb/mariadb-5549-release-notes/","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:17Z/"}],"url":"https://mariadb.com/kb/en/mariadb/mariadb-5549-release-notes/"},{"reference_url":"http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:17Z/"}],"url":"http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168"},{"reference_url":"http://www.debian.org/security/2016/dsa-3557","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:17Z/"}],"url":"http://www.debian.org/security/2016/dsa-3557"},{"reference_url":"http://www.debian.org/security/2016/dsa-3595","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:17Z/"}],"url":"http://www.debian.org/security/2016/dsa-3595"},{"reference_url":"http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:17Z/"}],"url":"http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:17Z/"}],"url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html"},{"reference_url":"http://www.securityfocus.com/bid/86495","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:17Z/"}],"url":"http://www.securityfocus.com/bid/86495"},{"reference_url":"http://www.securitytracker.com/id/1035606","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:17Z/"}],"url":"http://www.securitytracker.com/id/1035606"},{"reference_url":"http://www.ubuntu.com/usn/USN-2953-1","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:17Z/"}],"url":"http://www.ubuntu.com/usn/USN-2953-1"},{"reference_url":"http://www.ubuntu.com/usn/USN-2954-1","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:17Z/"}],"url":"http://www.ubuntu.com/usn/USN-2954-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1329249","reference_id":"1329249","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1329249"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:powerkvm:2.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ibm:powerkvm:2.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:powerkvm:2.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:powerkvm:3.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ibm:powerkvm:3.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:powerkvm:3.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-0647","reference_id":"CVE-2016-0647","reference_type":"","scores":[{"value":"4.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:S/C:N/I:N/A:P"},{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-0647"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0705","reference_id":"RHSA-2016:0705","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0705"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1132","reference_id":"RHSA-2016:1132","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:17Z/"}],"url":"https://access.redhat.com/errata/RHSA-2016:1132"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1480","reference_id":"RHSA-2016:1480","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1480"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1481","reference_id":"RHSA-2016:1481","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1481"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1602","reference_id":"RHSA-2016:1602","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1602"},{"reference_url":"https://usn.ubuntu.com/2953-1/","reference_id":"USN-2953-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2953-1/"},{"reference_url":"https://usn.ubuntu.com/2954-1/","reference_id":"USN-2954-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2954-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035582?format=json","purl":"pkg:deb/debian/mariadb-10.0@10.0.25-0%2Bdeb8u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1gmc-pj6y-rkfx"},{"vulnerability":"VCID-2gyq-q761-h3br"},{"vulnerability":"VCID-2rf6-qaey-1ubn"},{"vulnerability":"VCID-45hn-ezks-j7br"},{"vulnerability":"VCID-4cnj-7fur-3qe3"},{"vulnerability":"VCID-4yz4-vxnh-b3dp"},{"vulnerability":"VCID-5sjj-599v-vybg"},{"vulnerability":"VCID-6g4n-3xfu-hfee"},{"vulnerability":"VCID-6muh-rg1z-pqab"},{"vulnerability":"VCID-8djb-knkk-s3c8"},{"vulnerability":"VCID-8krv-jqjg-uqc8"},{"vulnerability":"VCID-8kvb-5u8c-zbc4"},{"vulnerability":"VCID-8sya-wktg-dqa5"},{"vulnerability":"VCID-9f48-53dz-13an"},{"vulnerability":"VCID-9ff2-43rk-2ydj"},{"vulnerability":"VCID-9w98-nfg2-muh2"},{"vulnerability":"VCID-bhxk-8byp-eyap"},{"vulnerability":"VCID-ej67-ayfh-sqdt"},{"vulnerability":"VCID-g1pp-9qqg-1beb"},{"vulnerability":"VCID-gp4w-bdxg-6kab"},{"vulnerability":"VCID-jgff-4jyp-9fgr"},{"vulnerability":"VCID-mde2-1ynu-auh2"},{"vulnerability":"VCID-mfgg-7s54-gqg8"},{"vulnerability":"VCID-nkdd-suwp-4ffr"},{"vulnerability":"VCID-p623-gxyv-g7fs"},{"vulnerability":"VCID-pk7e-t26d-aqdm"},{"vulnerability":"VCID-pv92-6p9x-v7bs"},{"vulnerability":"VCID-r2cz-9kjz-zbgu"},{"vulnerability":"VCID-rssq-mfc2-ckaf"},{"vulnerability":"VCID-rted-6vzz-mbcv"},{"vulnerability":"VCID-tvdv-3ed5-h3dt"},{"vulnerability":"VCID-un5y-y9sq-1ufb"},{"vulnerability":"VCID-v4gv-g9n5-ukgc"},{"vulnerability":"VCID-vh5y-15tw-d7fd"},{"vulnerability":"VCID-wrna-cc9g-sqbe"},{"vulnerability":"VCID-yx79-3g2x-pqex"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.0@10.0.25-0%252Bdeb8u1"}],"aliases":["CVE-2016-0647"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-7tj3-dfxj-bke7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/81256?format=json","vulnerability_id":"VCID-7w3v-5s98-a7ec","summary":"security update","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0534.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-0534.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0705.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-0705.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-1480.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-1480.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-1481.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-1481.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2047.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2047.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-2047","reference_id":"","reference_type":"","scores":[{"value":"0.01749","scoring_system":"epss","scoring_elements":"0.82743","published_at":"2026-05-14T12:55:00Z"},{"value":"0.01749","scoring_system":"epss","scoring_elements":"0.82687","published_at":"2026-05-11T12:55:00Z"},{"value":"0.01749","scoring_system":"epss","scoring_elements":"0.82702","published_at":"2026-05-12T12:55:00Z"},{"value":"0.01749","scoring_system":"epss","scoring_elements":"0.82477","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01749","scoring_system":"epss","scoring_elements":"0.82492","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01749","scoring_system":"epss","scoring_elements":"0.8251","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01749","scoring_system":"epss","scoring_elements":"0.82506","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01749","scoring_system":"epss","scoring_elements":"0.82532","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01749","scoring_system":"epss","scoring_elements":"0.8254","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01749","scoring_system":"epss","scoring_elements":"0.82558","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01749","scoring_system":"epss","scoring_elements":"0.82554","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01749","scoring_system":"epss","scoring_elements":"0.82549","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01749","scoring_system":"epss","scoring_elements":"0.82585","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01749","scoring_system":"epss","scoring_elements":"0.82589","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01749","scoring_system":"epss","scoring_elements":"0.8261","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01749","scoring_system":"epss","scoring_elements":"0.82621","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01749","scoring_system":"epss","scoring_elements":"0.82627","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01749","scoring_system":"epss","scoring_elements":"0.82646","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01749","scoring_system":"epss","scoring_elements":"0.82668","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01749","scoring_system":"epss","scoring_elements":"0.82688","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-2047"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0505","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0505"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0546","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0546"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0596","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0596"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0597","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0597"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0598","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0598"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0600","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0600"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0606","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0606"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0608","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0608"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0609","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0609"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0616","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0616"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0640","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0640"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0641","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0641"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0642","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0642"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0643","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0643"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0644","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0644"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0646","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0646"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0647","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0647"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0648","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0648"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0649","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0649"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0650","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0650"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0666","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0666"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2047","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2047"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:S/C:P/I:P/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://mariadb.atlassian.net/browse/MDEV-9212","reference_id":"","reference_type":"","scores":[],"url":"https://mariadb.atlassian.net/browse/MDEV-9212"},{"reference_url":"https://mariadb.com/kb/en/mariadb/mariadb-10110-release-notes/","reference_id":"","reference_type":"","scores":[],"url":"https://mariadb.com/kb/en/mariadb/mariadb-10110-release-notes/"},{"reference_url":"https://mariadb.com/kb/en/mariadb/mariadb-5547-release-notes/","reference_id":"","reference_type":"","scores":[],"url":"https://mariadb.com/kb/en/mariadb/mariadb-5547-release-notes/"},{"reference_url":"https://mariadb.com/kb/en/mdb-10023-rn/","reference_id":"","reference_type":"","scores":[],"url":"https://mariadb.com/kb/en/mdb-10023-rn/"},{"reference_url":"http://www.debian.org/security/2016/dsa-3453","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2016/dsa-3453"},{"reference_url":"http://www.debian.org/security/2016/dsa-3557","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2016/dsa-3557"},{"reference_url":"http://www.openwall.com/lists/oss-security/2016/01/26/3","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2016/01/26/3"},{"reference_url":"http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html"},{"reference_url":"http://www.securityfocus.com/bid/81810","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/81810"},{"reference_url":"http://www.securitytracker.com/id/1035606","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1035606"},{"reference_url":"http://www.ubuntu.com/usn/USN-2953-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2953-1"},{"reference_url":"http://www.ubuntu.com/usn/USN-2954-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2954-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1301874","reference_id":"1301874","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1301874"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-2047","reference_id":"CVE-2016-2047","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:P/A:N"},{"value":"5.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-2047"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0534","reference_id":"RHSA-2016:0534","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0534"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0705","reference_id":"RHSA-2016:0705","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0705"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1132","reference_id":"RHSA-2016:1132","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1132"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1480","reference_id":"RHSA-2016:1480","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1480"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1481","reference_id":"RHSA-2016:1481","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1481"},{"reference_url":"https://usn.ubuntu.com/2953-1/","reference_id":"USN-2953-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2953-1/"},{"reference_url":"https://usn.ubuntu.com/2954-1/","reference_id":"USN-2954-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2954-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035582?format=json","purl":"pkg:deb/debian/mariadb-10.0@10.0.25-0%2Bdeb8u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1gmc-pj6y-rkfx"},{"vulnerability":"VCID-2gyq-q761-h3br"},{"vulnerability":"VCID-2rf6-qaey-1ubn"},{"vulnerability":"VCID-45hn-ezks-j7br"},{"vulnerability":"VCID-4cnj-7fur-3qe3"},{"vulnerability":"VCID-4yz4-vxnh-b3dp"},{"vulnerability":"VCID-5sjj-599v-vybg"},{"vulnerability":"VCID-6g4n-3xfu-hfee"},{"vulnerability":"VCID-6muh-rg1z-pqab"},{"vulnerability":"VCID-8djb-knkk-s3c8"},{"vulnerability":"VCID-8krv-jqjg-uqc8"},{"vulnerability":"VCID-8kvb-5u8c-zbc4"},{"vulnerability":"VCID-8sya-wktg-dqa5"},{"vulnerability":"VCID-9f48-53dz-13an"},{"vulnerability":"VCID-9ff2-43rk-2ydj"},{"vulnerability":"VCID-9w98-nfg2-muh2"},{"vulnerability":"VCID-bhxk-8byp-eyap"},{"vulnerability":"VCID-ej67-ayfh-sqdt"},{"vulnerability":"VCID-g1pp-9qqg-1beb"},{"vulnerability":"VCID-gp4w-bdxg-6kab"},{"vulnerability":"VCID-jgff-4jyp-9fgr"},{"vulnerability":"VCID-mde2-1ynu-auh2"},{"vulnerability":"VCID-mfgg-7s54-gqg8"},{"vulnerability":"VCID-nkdd-suwp-4ffr"},{"vulnerability":"VCID-p623-gxyv-g7fs"},{"vulnerability":"VCID-pk7e-t26d-aqdm"},{"vulnerability":"VCID-pv92-6p9x-v7bs"},{"vulnerability":"VCID-r2cz-9kjz-zbgu"},{"vulnerability":"VCID-rssq-mfc2-ckaf"},{"vulnerability":"VCID-rted-6vzz-mbcv"},{"vulnerability":"VCID-tvdv-3ed5-h3dt"},{"vulnerability":"VCID-un5y-y9sq-1ufb"},{"vulnerability":"VCID-v4gv-g9n5-ukgc"},{"vulnerability":"VCID-vh5y-15tw-d7fd"},{"vulnerability":"VCID-wrna-cc9g-sqbe"},{"vulnerability":"VCID-yx79-3g2x-pqex"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.0@10.0.25-0%252Bdeb8u1"}],"aliases":["CVE-2016-2047"],"risk_score":2.6,"exploitability":"0.5","weighted_severity":"5.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-7w3v-5s98-a7ec"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/36451?format=json","vulnerability_id":"VCID-8c58-rvng-7fga","summary":"Multiple vulnerabilities have been found in MySQL, allowing\n    attackers to execute arbitrary code or cause Denial of Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0499.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0499.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-0499","reference_id":"","reference_type":"","scores":[{"value":"0.00329","scoring_system":"epss","scoring_elements":"0.55807","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00329","scoring_system":"epss","scoring_elements":"0.55918","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00329","scoring_system":"epss","scoring_elements":"0.5594","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00329","scoring_system":"epss","scoring_elements":"0.55969","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00329","scoring_system":"epss","scoring_elements":"0.55971","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00329","scoring_system":"epss","scoring_elements":"0.55981","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00329","scoring_system":"epss","scoring_elements":"0.55961","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00329","scoring_system":"epss","scoring_elements":"0.55943","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00329","scoring_system":"epss","scoring_elements":"0.55979","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00329","scoring_system":"epss","scoring_elements":"0.55982","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00329","scoring_system":"epss","scoring_elements":"0.55957","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00329","scoring_system":"epss","scoring_elements":"0.55884","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00329","scoring_system":"epss","scoring_elements":"0.55904","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00329","scoring_system":"epss","scoring_elements":"0.5588","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00329","scoring_system":"epss","scoring_elements":"0.55826","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00329","scoring_system":"epss","scoring_elements":"0.55874","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00329","scoring_system":"epss","scoring_elements":"0.55932","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00329","scoring_system":"epss","scoring_elements":"0.55882","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00329","scoring_system":"epss","scoring_elements":"0.55908","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00329","scoring_system":"epss","scoring_elements":"0.55966","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-0499"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0433","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0433"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0441","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0441"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0499","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0499"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0501","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0501"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0505","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0505"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2568","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2568"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2571","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2571"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2573","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2573"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2582","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2582"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2643","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2643"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2648","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2648"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3152","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3152"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4752","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4752"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4757","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4757"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1212768","reference_id":"1212768","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1212768"},{"reference_url":"https://security.gentoo.org/glsa/201507-19","reference_id":"GLSA-201507-19","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201507-19"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1628","reference_id":"RHSA-2015:1628","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1628"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1629","reference_id":"RHSA-2015:1629","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1629"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1646","reference_id":"RHSA-2015:1646","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1646"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1647","reference_id":"RHSA-2015:1647","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1647"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1665","reference_id":"RHSA-2015:1665","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1665"},{"reference_url":"https://usn.ubuntu.com/2575-1/","reference_id":"USN-2575-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2575-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035582?format=json","purl":"pkg:deb/debian/mariadb-10.0@10.0.25-0%2Bdeb8u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1gmc-pj6y-rkfx"},{"vulnerability":"VCID-2gyq-q761-h3br"},{"vulnerability":"VCID-2rf6-qaey-1ubn"},{"vulnerability":"VCID-45hn-ezks-j7br"},{"vulnerability":"VCID-4cnj-7fur-3qe3"},{"vulnerability":"VCID-4yz4-vxnh-b3dp"},{"vulnerability":"VCID-5sjj-599v-vybg"},{"vulnerability":"VCID-6g4n-3xfu-hfee"},{"vulnerability":"VCID-6muh-rg1z-pqab"},{"vulnerability":"VCID-8djb-knkk-s3c8"},{"vulnerability":"VCID-8krv-jqjg-uqc8"},{"vulnerability":"VCID-8kvb-5u8c-zbc4"},{"vulnerability":"VCID-8sya-wktg-dqa5"},{"vulnerability":"VCID-9f48-53dz-13an"},{"vulnerability":"VCID-9ff2-43rk-2ydj"},{"vulnerability":"VCID-9w98-nfg2-muh2"},{"vulnerability":"VCID-bhxk-8byp-eyap"},{"vulnerability":"VCID-ej67-ayfh-sqdt"},{"vulnerability":"VCID-g1pp-9qqg-1beb"},{"vulnerability":"VCID-gp4w-bdxg-6kab"},{"vulnerability":"VCID-jgff-4jyp-9fgr"},{"vulnerability":"VCID-mde2-1ynu-auh2"},{"vulnerability":"VCID-mfgg-7s54-gqg8"},{"vulnerability":"VCID-nkdd-suwp-4ffr"},{"vulnerability":"VCID-p623-gxyv-g7fs"},{"vulnerability":"VCID-pk7e-t26d-aqdm"},{"vulnerability":"VCID-pv92-6p9x-v7bs"},{"vulnerability":"VCID-r2cz-9kjz-zbgu"},{"vulnerability":"VCID-rssq-mfc2-ckaf"},{"vulnerability":"VCID-rted-6vzz-mbcv"},{"vulnerability":"VCID-tvdv-3ed5-h3dt"},{"vulnerability":"VCID-un5y-y9sq-1ufb"},{"vulnerability":"VCID-v4gv-g9n5-ukgc"},{"vulnerability":"VCID-vh5y-15tw-d7fd"},{"vulnerability":"VCID-wrna-cc9g-sqbe"},{"vulnerability":"VCID-yx79-3g2x-pqex"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.0@10.0.25-0%252Bdeb8u1"}],"aliases":["CVE-2015-0499"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-8c58-rvng-7fga"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61074?format=json","vulnerability_id":"VCID-9591-6344-yuga","summary":"security update","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4792.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4792.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-4792","reference_id":"","reference_type":"","scores":[{"value":"0.00906","scoring_system":"epss","scoring_elements":"0.75688","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00906","scoring_system":"epss","scoring_elements":"0.7569","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00906","scoring_system":"epss","scoring_elements":"0.75721","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00906","scoring_system":"epss","scoring_elements":"0.757","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00906","scoring_system":"epss","scoring_elements":"0.75734","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00906","scoring_system":"epss","scoring_elements":"0.75745","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00906","scoring_system":"epss","scoring_elements":"0.75769","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00906","scoring_system":"epss","scoring_elements":"0.75751","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00906","scoring_system":"epss","scoring_elements":"0.75782","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00906","scoring_system":"epss","scoring_elements":"0.75785","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00906","scoring_system":"epss","scoring_elements":"0.75771","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00906","scoring_system":"epss","scoring_elements":"0.7581","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00906","scoring_system":"epss","scoring_elements":"0.75816","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00906","scoring_system":"epss","scoring_elements":"0.75827","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00906","scoring_system":"epss","scoring_elements":"0.75835","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00906","scoring_system":"epss","scoring_elements":"0.75865","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00906","scoring_system":"epss","scoring_elements":"0.75889","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00906","scoring_system":"epss","scoring_elements":"0.75874","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00906","scoring_system":"epss","scoring_elements":"0.75888","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00906","scoring_system":"epss","scoring_elements":"0.7594","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-4792"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4792","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4792"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4802","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4802"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4815","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4815"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4816","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4816"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4819","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4819"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4826","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4826"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4830","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4830"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4836","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4836"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4858","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4858"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4861","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4861"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4870","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4870"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4879","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4879"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4895","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4895"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4913","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4913"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1274752","reference_id":"1274752","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1274752"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0534","reference_id":"RHSA-2016:0534","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0534"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0705","reference_id":"RHSA-2016:0705","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0705"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1132","reference_id":"RHSA-2016:1132","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1132"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1480","reference_id":"RHSA-2016:1480","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1480"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1481","reference_id":"RHSA-2016:1481","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1481"},{"reference_url":"https://usn.ubuntu.com/2781-1/","reference_id":"USN-2781-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2781-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035582?format=json","purl":"pkg:deb/debian/mariadb-10.0@10.0.25-0%2Bdeb8u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1gmc-pj6y-rkfx"},{"vulnerability":"VCID-2gyq-q761-h3br"},{"vulnerability":"VCID-2rf6-qaey-1ubn"},{"vulnerability":"VCID-45hn-ezks-j7br"},{"vulnerability":"VCID-4cnj-7fur-3qe3"},{"vulnerability":"VCID-4yz4-vxnh-b3dp"},{"vulnerability":"VCID-5sjj-599v-vybg"},{"vulnerability":"VCID-6g4n-3xfu-hfee"},{"vulnerability":"VCID-6muh-rg1z-pqab"},{"vulnerability":"VCID-8djb-knkk-s3c8"},{"vulnerability":"VCID-8krv-jqjg-uqc8"},{"vulnerability":"VCID-8kvb-5u8c-zbc4"},{"vulnerability":"VCID-8sya-wktg-dqa5"},{"vulnerability":"VCID-9f48-53dz-13an"},{"vulnerability":"VCID-9ff2-43rk-2ydj"},{"vulnerability":"VCID-9w98-nfg2-muh2"},{"vulnerability":"VCID-bhxk-8byp-eyap"},{"vulnerability":"VCID-ej67-ayfh-sqdt"},{"vulnerability":"VCID-g1pp-9qqg-1beb"},{"vulnerability":"VCID-gp4w-bdxg-6kab"},{"vulnerability":"VCID-jgff-4jyp-9fgr"},{"vulnerability":"VCID-mde2-1ynu-auh2"},{"vulnerability":"VCID-mfgg-7s54-gqg8"},{"vulnerability":"VCID-nkdd-suwp-4ffr"},{"vulnerability":"VCID-p623-gxyv-g7fs"},{"vulnerability":"VCID-pk7e-t26d-aqdm"},{"vulnerability":"VCID-pv92-6p9x-v7bs"},{"vulnerability":"VCID-r2cz-9kjz-zbgu"},{"vulnerability":"VCID-rssq-mfc2-ckaf"},{"vulnerability":"VCID-rted-6vzz-mbcv"},{"vulnerability":"VCID-tvdv-3ed5-h3dt"},{"vulnerability":"VCID-un5y-y9sq-1ufb"},{"vulnerability":"VCID-v4gv-g9n5-ukgc"},{"vulnerability":"VCID-vh5y-15tw-d7fd"},{"vulnerability":"VCID-wrna-cc9g-sqbe"},{"vulnerability":"VCID-yx79-3g2x-pqex"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.0@10.0.25-0%252Bdeb8u1"}],"aliases":["CVE-2015-4792"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-9591-6344-yuga"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61078?format=json","vulnerability_id":"VCID-9qd9-48p8-nyey","summary":"security update","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4819.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4819.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-4819","reference_id":"","reference_type":"","scores":[{"value":"0.00089","scoring_system":"epss","scoring_elements":"0.25406","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00089","scoring_system":"epss","scoring_elements":"0.2547","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00089","scoring_system":"epss","scoring_elements":"0.25506","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00089","scoring_system":"epss","scoring_elements":"0.25278","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00089","scoring_system":"epss","scoring_elements":"0.25346","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00089","scoring_system":"epss","scoring_elements":"0.2539","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00089","scoring_system":"epss","scoring_elements":"0.25402","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00089","scoring_system":"epss","scoring_elements":"0.2536","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00089","scoring_system":"epss","scoring_elements":"0.25307","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00089","scoring_system":"epss","scoring_elements":"0.25314","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00089","scoring_system":"epss","scoring_elements":"0.25305","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00089","scoring_system":"epss","scoring_elements":"0.25276","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00089","scoring_system":"epss","scoring_elements":"0.25238","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00089","scoring_system":"epss","scoring_elements":"0.25229","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00089","scoring_system":"epss","scoring_elements":"0.25184","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00089","scoring_system":"epss","scoring_elements":"0.25064","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00089","scoring_system":"epss","scoring_elements":"0.25128","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00089","scoring_system":"epss","scoring_elements":"0.25189","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00089","scoring_system":"epss","scoring_elements":"0.25116","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00089","scoring_system":"epss","scoring_elements":"0.25135","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00089","scoring_system":"epss","scoring_elements":"0.25212","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-4819"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4792","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4792"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4802","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4802"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4815","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4815"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4816","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4816"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4819","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4819"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4826","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4826"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4830","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4830"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4836","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4836"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4858","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4858"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4861","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4861"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4870","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4870"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4879","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4879"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4895","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4895"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4913","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4913"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1274764","reference_id":"1274764","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1274764"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1628","reference_id":"RHSA-2015:1628","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1628"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1629","reference_id":"RHSA-2015:1629","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1629"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1630","reference_id":"RHSA-2015:1630","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1630"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0534","reference_id":"RHSA-2016:0534","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0534"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1132","reference_id":"RHSA-2016:1132","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1132"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1481","reference_id":"RHSA-2016:1481","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1481"},{"reference_url":"https://usn.ubuntu.com/2781-1/","reference_id":"USN-2781-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2781-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035582?format=json","purl":"pkg:deb/debian/mariadb-10.0@10.0.25-0%2Bdeb8u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1gmc-pj6y-rkfx"},{"vulnerability":"VCID-2gyq-q761-h3br"},{"vulnerability":"VCID-2rf6-qaey-1ubn"},{"vulnerability":"VCID-45hn-ezks-j7br"},{"vulnerability":"VCID-4cnj-7fur-3qe3"},{"vulnerability":"VCID-4yz4-vxnh-b3dp"},{"vulnerability":"VCID-5sjj-599v-vybg"},{"vulnerability":"VCID-6g4n-3xfu-hfee"},{"vulnerability":"VCID-6muh-rg1z-pqab"},{"vulnerability":"VCID-8djb-knkk-s3c8"},{"vulnerability":"VCID-8krv-jqjg-uqc8"},{"vulnerability":"VCID-8kvb-5u8c-zbc4"},{"vulnerability":"VCID-8sya-wktg-dqa5"},{"vulnerability":"VCID-9f48-53dz-13an"},{"vulnerability":"VCID-9ff2-43rk-2ydj"},{"vulnerability":"VCID-9w98-nfg2-muh2"},{"vulnerability":"VCID-bhxk-8byp-eyap"},{"vulnerability":"VCID-ej67-ayfh-sqdt"},{"vulnerability":"VCID-g1pp-9qqg-1beb"},{"vulnerability":"VCID-gp4w-bdxg-6kab"},{"vulnerability":"VCID-jgff-4jyp-9fgr"},{"vulnerability":"VCID-mde2-1ynu-auh2"},{"vulnerability":"VCID-mfgg-7s54-gqg8"},{"vulnerability":"VCID-nkdd-suwp-4ffr"},{"vulnerability":"VCID-p623-gxyv-g7fs"},{"vulnerability":"VCID-pk7e-t26d-aqdm"},{"vulnerability":"VCID-pv92-6p9x-v7bs"},{"vulnerability":"VCID-r2cz-9kjz-zbgu"},{"vulnerability":"VCID-rssq-mfc2-ckaf"},{"vulnerability":"VCID-rted-6vzz-mbcv"},{"vulnerability":"VCID-tvdv-3ed5-h3dt"},{"vulnerability":"VCID-un5y-y9sq-1ufb"},{"vulnerability":"VCID-v4gv-g9n5-ukgc"},{"vulnerability":"VCID-vh5y-15tw-d7fd"},{"vulnerability":"VCID-wrna-cc9g-sqbe"},{"vulnerability":"VCID-yx79-3g2x-pqex"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.0@10.0.25-0%252Bdeb8u1"}],"aliases":["CVE-2015-4819"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-9qd9-48p8-nyey"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/81264?format=json","vulnerability_id":"VCID-a3hx-qz7x-7ybk","summary":"security update","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:13Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:13Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:13Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:13Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:13Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:13Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0705.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:13Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-0705.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-1480.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:13Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-1480.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-1481.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:13Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-1481.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-1602.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:13Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-1602.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0649.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0649.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-0649","reference_id":"","reference_type":"","scores":[{"value":"0.00214","scoring_system":"epss","scoring_elements":"0.43689","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00214","scoring_system":"epss","scoring_elements":"0.43926","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00214","scoring_system":"epss","scoring_elements":"0.43911","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00214","scoring_system":"epss","scoring_elements":"0.43895","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00214","scoring_system":"epss","scoring_elements":"0.43957","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00214","scoring_system":"epss","scoring_elements":"0.43948","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00214","scoring_system":"epss","scoring_elements":"0.4388","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00214","scoring_system":"epss","scoring_elements":"0.43832","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00214","scoring_system":"epss","scoring_elements":"0.43835","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00214","scoring_system":"epss","scoring_elements":"0.43755","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00214","scoring_system":"epss","scoring_elements":"0.43629","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00214","scoring_system":"epss","scoring_elements":"0.43704","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00214","scoring_system":"epss","scoring_elements":"0.43721","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00214","scoring_system":"epss","scoring_elements":"0.43658","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00214","scoring_system":"epss","scoring_elements":"0.43877","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00214","scoring_system":"epss","scoring_elements":"0.43921","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00214","scoring_system":"epss","scoring_elements":"0.43944","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00214","scoring_system":"epss","scoring_elements":"0.43874","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00214","scoring_system":"epss","scoring_elements":"0.43924","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-0649"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0640","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0640"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0641","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0641"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0642","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0642"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0643","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0643"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0644","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0644"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0646","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0646"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0647","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0647"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0648","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0648"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0649","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0649"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0650","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0650"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0655","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0655"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0666","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0666"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0668","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0668"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2047","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2047"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.6","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:S/C:N/I:N/A:C"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://mariadb.com/kb/en/mariadb/mariadb-10024-release-notes/","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:13Z/"}],"url":"https://mariadb.com/kb/en/mariadb/mariadb-10024-release-notes/"},{"reference_url":"https://mariadb.com/kb/en/mariadb/mariadb-10112-release-notes/","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:13Z/"}],"url":"https://mariadb.com/kb/en/mariadb/mariadb-10112-release-notes/"},{"reference_url":"https://mariadb.com/kb/en/mariadb/mariadb-5548-release-notes/","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:13Z/"}],"url":"https://mariadb.com/kb/en/mariadb/mariadb-5548-release-notes/"},{"reference_url":"http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:13Z/"}],"url":"http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168"},{"reference_url":"http://www.debian.org/security/2016/dsa-3557","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:13Z/"}],"url":"http://www.debian.org/security/2016/dsa-3557"},{"reference_url":"http://www.debian.org/security/2016/dsa-3595","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:13Z/"}],"url":"http://www.debian.org/security/2016/dsa-3595"},{"reference_url":"http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:13Z/"}],"url":"http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:13Z/"}],"url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html"},{"reference_url":"http://www.securityfocus.com/bid/86498","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:13Z/"}],"url":"http://www.securityfocus.com/bid/86498"},{"reference_url":"http://www.securitytracker.com/id/1035606","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:13Z/"}],"url":"http://www.securitytracker.com/id/1035606"},{"reference_url":"http://www.ubuntu.com/usn/USN-2953-1","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:13Z/"}],"url":"http://www.ubuntu.com/usn/USN-2953-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1329252","reference_id":"1329252","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1329252"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:powerkvm:2.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ibm:powerkvm:2.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:powerkvm:2.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:powerkvm:3.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ibm:powerkvm:3.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:powerkvm:3.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-0649","reference_id":"CVE-2016-0649","reference_type":"","scores":[{"value":"4.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:S/C:N/I:N/A:P"},{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-0649"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0705","reference_id":"RHSA-2016:0705","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0705"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1132","reference_id":"RHSA-2016:1132","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:13Z/"}],"url":"https://access.redhat.com/errata/RHSA-2016:1132"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1480","reference_id":"RHSA-2016:1480","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1480"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1481","reference_id":"RHSA-2016:1481","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1481"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1602","reference_id":"RHSA-2016:1602","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1602"},{"reference_url":"https://usn.ubuntu.com/2953-1/","reference_id":"USN-2953-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2953-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035582?format=json","purl":"pkg:deb/debian/mariadb-10.0@10.0.25-0%2Bdeb8u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1gmc-pj6y-rkfx"},{"vulnerability":"VCID-2gyq-q761-h3br"},{"vulnerability":"VCID-2rf6-qaey-1ubn"},{"vulnerability":"VCID-45hn-ezks-j7br"},{"vulnerability":"VCID-4cnj-7fur-3qe3"},{"vulnerability":"VCID-4yz4-vxnh-b3dp"},{"vulnerability":"VCID-5sjj-599v-vybg"},{"vulnerability":"VCID-6g4n-3xfu-hfee"},{"vulnerability":"VCID-6muh-rg1z-pqab"},{"vulnerability":"VCID-8djb-knkk-s3c8"},{"vulnerability":"VCID-8krv-jqjg-uqc8"},{"vulnerability":"VCID-8kvb-5u8c-zbc4"},{"vulnerability":"VCID-8sya-wktg-dqa5"},{"vulnerability":"VCID-9f48-53dz-13an"},{"vulnerability":"VCID-9ff2-43rk-2ydj"},{"vulnerability":"VCID-9w98-nfg2-muh2"},{"vulnerability":"VCID-bhxk-8byp-eyap"},{"vulnerability":"VCID-ej67-ayfh-sqdt"},{"vulnerability":"VCID-g1pp-9qqg-1beb"},{"vulnerability":"VCID-gp4w-bdxg-6kab"},{"vulnerability":"VCID-jgff-4jyp-9fgr"},{"vulnerability":"VCID-mde2-1ynu-auh2"},{"vulnerability":"VCID-mfgg-7s54-gqg8"},{"vulnerability":"VCID-nkdd-suwp-4ffr"},{"vulnerability":"VCID-p623-gxyv-g7fs"},{"vulnerability":"VCID-pk7e-t26d-aqdm"},{"vulnerability":"VCID-pv92-6p9x-v7bs"},{"vulnerability":"VCID-r2cz-9kjz-zbgu"},{"vulnerability":"VCID-rssq-mfc2-ckaf"},{"vulnerability":"VCID-rted-6vzz-mbcv"},{"vulnerability":"VCID-tvdv-3ed5-h3dt"},{"vulnerability":"VCID-un5y-y9sq-1ufb"},{"vulnerability":"VCID-v4gv-g9n5-ukgc"},{"vulnerability":"VCID-vh5y-15tw-d7fd"},{"vulnerability":"VCID-wrna-cc9g-sqbe"},{"vulnerability":"VCID-yx79-3g2x-pqex"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.0@10.0.25-0%252Bdeb8u1"}],"aliases":["CVE-2016-0649"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-a3hx-qz7x-7ybk"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/81261?format=json","vulnerability_id":"VCID-bfnh-7k45-nkg2","summary":"security update","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:19Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:19Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:19Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:19Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:19Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:19Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0705.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:19Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-0705.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-1480.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:19Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-1480.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-1481.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:19Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-1481.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-1602.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:19Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-1602.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0646.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0646.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-0646","reference_id":"","reference_type":"","scores":[{"value":"0.00214","scoring_system":"epss","scoring_elements":"0.43689","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00214","scoring_system":"epss","scoring_elements":"0.43926","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00214","scoring_system":"epss","scoring_elements":"0.43911","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00214","scoring_system":"epss","scoring_elements":"0.43895","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00214","scoring_system":"epss","scoring_elements":"0.43957","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00214","scoring_system":"epss","scoring_elements":"0.43948","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00214","scoring_system":"epss","scoring_elements":"0.4388","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00214","scoring_system":"epss","scoring_elements":"0.43832","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00214","scoring_system":"epss","scoring_elements":"0.43835","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00214","scoring_system":"epss","scoring_elements":"0.43755","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00214","scoring_system":"epss","scoring_elements":"0.43629","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00214","scoring_system":"epss","scoring_elements":"0.43704","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00214","scoring_system":"epss","scoring_elements":"0.43721","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00214","scoring_system":"epss","scoring_elements":"0.43658","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00214","scoring_system":"epss","scoring_elements":"0.43877","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00214","scoring_system":"epss","scoring_elements":"0.43921","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00214","scoring_system":"epss","scoring_elements":"0.43944","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00214","scoring_system":"epss","scoring_elements":"0.43874","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00214","scoring_system":"epss","scoring_elements":"0.43924","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-0646"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0640","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0640"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0641","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0641"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0642","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0642"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0643","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0643"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0644","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0644"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0646","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0646"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0647","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0647"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0648","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0648"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0649","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0649"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0650","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0650"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0655","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0655"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0666","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0666"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0668","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0668"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2047","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2047"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.6","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:S/C:N/I:N/A:C"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://mariadb.com/kb/en/mariadb/mariadb-10024-release-notes/","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:19Z/"}],"url":"https://mariadb.com/kb/en/mariadb/mariadb-10024-release-notes/"},{"reference_url":"https://mariadb.com/kb/en/mariadb/mariadb-10112-release-notes/","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:19Z/"}],"url":"https://mariadb.com/kb/en/mariadb/mariadb-10112-release-notes/"},{"reference_url":"https://mariadb.com/kb/en/mariadb/mariadb-5548-release-notes/","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:19Z/"}],"url":"https://mariadb.com/kb/en/mariadb/mariadb-5548-release-notes/"},{"reference_url":"http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:19Z/"}],"url":"http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168"},{"reference_url":"http://www.debian.org/security/2016/dsa-3557","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:19Z/"}],"url":"http://www.debian.org/security/2016/dsa-3557"},{"reference_url":"http://www.debian.org/security/2016/dsa-3595","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:19Z/"}],"url":"http://www.debian.org/security/2016/dsa-3595"},{"reference_url":"http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:19Z/"}],"url":"http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:19Z/"}],"url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html"},{"reference_url":"http://www.securityfocus.com/bid/86436","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:19Z/"}],"url":"http://www.securityfocus.com/bid/86436"},{"reference_url":"http://www.securitytracker.com/id/1035606","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:19Z/"}],"url":"http://www.securitytracker.com/id/1035606"},{"reference_url":"http://www.ubuntu.com/usn/USN-2953-1","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:19Z/"}],"url":"http://www.ubuntu.com/usn/USN-2953-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1329248","reference_id":"1329248","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1329248"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:powerkvm:2.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ibm:powerkvm:2.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:powerkvm:2.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:powerkvm:3.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ibm:powerkvm:3.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:powerkvm:3.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-0646","reference_id":"CVE-2016-0646","reference_type":"","scores":[{"value":"4.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:S/C:N/I:N/A:P"},{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-0646"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0705","reference_id":"RHSA-2016:0705","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0705"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1132","reference_id":"RHSA-2016:1132","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:19Z/"}],"url":"https://access.redhat.com/errata/RHSA-2016:1132"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1480","reference_id":"RHSA-2016:1480","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1480"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1481","reference_id":"RHSA-2016:1481","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1481"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1602","reference_id":"RHSA-2016:1602","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1602"},{"reference_url":"https://usn.ubuntu.com/2953-1/","reference_id":"USN-2953-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2953-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035582?format=json","purl":"pkg:deb/debian/mariadb-10.0@10.0.25-0%2Bdeb8u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1gmc-pj6y-rkfx"},{"vulnerability":"VCID-2gyq-q761-h3br"},{"vulnerability":"VCID-2rf6-qaey-1ubn"},{"vulnerability":"VCID-45hn-ezks-j7br"},{"vulnerability":"VCID-4cnj-7fur-3qe3"},{"vulnerability":"VCID-4yz4-vxnh-b3dp"},{"vulnerability":"VCID-5sjj-599v-vybg"},{"vulnerability":"VCID-6g4n-3xfu-hfee"},{"vulnerability":"VCID-6muh-rg1z-pqab"},{"vulnerability":"VCID-8djb-knkk-s3c8"},{"vulnerability":"VCID-8krv-jqjg-uqc8"},{"vulnerability":"VCID-8kvb-5u8c-zbc4"},{"vulnerability":"VCID-8sya-wktg-dqa5"},{"vulnerability":"VCID-9f48-53dz-13an"},{"vulnerability":"VCID-9ff2-43rk-2ydj"},{"vulnerability":"VCID-9w98-nfg2-muh2"},{"vulnerability":"VCID-bhxk-8byp-eyap"},{"vulnerability":"VCID-ej67-ayfh-sqdt"},{"vulnerability":"VCID-g1pp-9qqg-1beb"},{"vulnerability":"VCID-gp4w-bdxg-6kab"},{"vulnerability":"VCID-jgff-4jyp-9fgr"},{"vulnerability":"VCID-mde2-1ynu-auh2"},{"vulnerability":"VCID-mfgg-7s54-gqg8"},{"vulnerability":"VCID-nkdd-suwp-4ffr"},{"vulnerability":"VCID-p623-gxyv-g7fs"},{"vulnerability":"VCID-pk7e-t26d-aqdm"},{"vulnerability":"VCID-pv92-6p9x-v7bs"},{"vulnerability":"VCID-r2cz-9kjz-zbgu"},{"vulnerability":"VCID-rssq-mfc2-ckaf"},{"vulnerability":"VCID-rted-6vzz-mbcv"},{"vulnerability":"VCID-tvdv-3ed5-h3dt"},{"vulnerability":"VCID-un5y-y9sq-1ufb"},{"vulnerability":"VCID-v4gv-g9n5-ukgc"},{"vulnerability":"VCID-vh5y-15tw-d7fd"},{"vulnerability":"VCID-wrna-cc9g-sqbe"},{"vulnerability":"VCID-yx79-3g2x-pqex"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.0@10.0.25-0%252Bdeb8u1"}],"aliases":["CVE-2016-0646"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-bfnh-7k45-nkg2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61077?format=json","vulnerability_id":"VCID-bjyw-emd1-zbfv","summary":"security update","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4816.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4816.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-4816","reference_id":"","reference_type":"","scores":[{"value":"0.04002","scoring_system":"epss","scoring_elements":"0.88383","published_at":"2026-04-01T12:55:00Z"},{"value":"0.04002","scoring_system":"epss","scoring_elements":"0.88391","published_at":"2026-04-02T12:55:00Z"},{"value":"0.04002","scoring_system":"epss","scoring_elements":"0.884","published_at":"2026-04-04T12:55:00Z"},{"value":"0.04002","scoring_system":"epss","scoring_elements":"0.88404","published_at":"2026-04-07T12:55:00Z"},{"value":"0.04002","scoring_system":"epss","scoring_elements":"0.88423","published_at":"2026-04-08T12:55:00Z"},{"value":"0.04002","scoring_system":"epss","scoring_elements":"0.8843","published_at":"2026-04-09T12:55:00Z"},{"value":"0.04002","scoring_system":"epss","scoring_elements":"0.8844","published_at":"2026-04-11T12:55:00Z"},{"value":"0.04002","scoring_system":"epss","scoring_elements":"0.88433","published_at":"2026-04-12T12:55:00Z"},{"value":"0.04002","scoring_system":"epss","scoring_elements":"0.88432","published_at":"2026-04-13T12:55:00Z"},{"value":"0.04002","scoring_system":"epss","scoring_elements":"0.88447","published_at":"2026-04-16T12:55:00Z"},{"value":"0.04002","scoring_system":"epss","scoring_elements":"0.88444","published_at":"2026-04-18T12:55:00Z"},{"value":"0.04002","scoring_system":"epss","scoring_elements":"0.88441","published_at":"2026-04-21T12:55:00Z"},{"value":"0.04002","scoring_system":"epss","scoring_elements":"0.88458","published_at":"2026-04-24T12:55:00Z"},{"value":"0.04002","scoring_system":"epss","scoring_elements":"0.88463","published_at":"2026-04-29T12:55:00Z"},{"value":"0.04002","scoring_system":"epss","scoring_elements":"0.88474","published_at":"2026-05-05T12:55:00Z"},{"value":"0.04002","scoring_system":"epss","scoring_elements":"0.88491","published_at":"2026-05-07T12:55:00Z"},{"value":"0.04002","scoring_system":"epss","scoring_elements":"0.88505","published_at":"2026-05-09T12:55:00Z"},{"value":"0.04002","scoring_system":"epss","scoring_elements":"0.88503","published_at":"2026-05-11T12:55:00Z"},{"value":"0.04002","scoring_system":"epss","scoring_elements":"0.88516","published_at":"2026-05-12T12:55:00Z"},{"value":"0.04002","scoring_system":"epss","scoring_elements":"0.88544","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-4816"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4792","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4792"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4802","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4802"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4815","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4815"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4816","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4816"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4819","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4819"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4826","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4826"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4830","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4830"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4836","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4836"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4858","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4858"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4861","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4861"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4870","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4870"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4879","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4879"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4895","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4895"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4913","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4913"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1274761","reference_id":"1274761","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1274761"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1628","reference_id":"RHSA-2015:1628","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1628"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1629","reference_id":"RHSA-2015:1629","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1629"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0534","reference_id":"RHSA-2016:0534","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0534"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1132","reference_id":"RHSA-2016:1132","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1132"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1481","reference_id":"RHSA-2016:1481","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1481"},{"reference_url":"https://usn.ubuntu.com/2781-1/","reference_id":"USN-2781-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2781-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035582?format=json","purl":"pkg:deb/debian/mariadb-10.0@10.0.25-0%2Bdeb8u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1gmc-pj6y-rkfx"},{"vulnerability":"VCID-2gyq-q761-h3br"},{"vulnerability":"VCID-2rf6-qaey-1ubn"},{"vulnerability":"VCID-45hn-ezks-j7br"},{"vulnerability":"VCID-4cnj-7fur-3qe3"},{"vulnerability":"VCID-4yz4-vxnh-b3dp"},{"vulnerability":"VCID-5sjj-599v-vybg"},{"vulnerability":"VCID-6g4n-3xfu-hfee"},{"vulnerability":"VCID-6muh-rg1z-pqab"},{"vulnerability":"VCID-8djb-knkk-s3c8"},{"vulnerability":"VCID-8krv-jqjg-uqc8"},{"vulnerability":"VCID-8kvb-5u8c-zbc4"},{"vulnerability":"VCID-8sya-wktg-dqa5"},{"vulnerability":"VCID-9f48-53dz-13an"},{"vulnerability":"VCID-9ff2-43rk-2ydj"},{"vulnerability":"VCID-9w98-nfg2-muh2"},{"vulnerability":"VCID-bhxk-8byp-eyap"},{"vulnerability":"VCID-ej67-ayfh-sqdt"},{"vulnerability":"VCID-g1pp-9qqg-1beb"},{"vulnerability":"VCID-gp4w-bdxg-6kab"},{"vulnerability":"VCID-jgff-4jyp-9fgr"},{"vulnerability":"VCID-mde2-1ynu-auh2"},{"vulnerability":"VCID-mfgg-7s54-gqg8"},{"vulnerability":"VCID-nkdd-suwp-4ffr"},{"vulnerability":"VCID-p623-gxyv-g7fs"},{"vulnerability":"VCID-pk7e-t26d-aqdm"},{"vulnerability":"VCID-pv92-6p9x-v7bs"},{"vulnerability":"VCID-r2cz-9kjz-zbgu"},{"vulnerability":"VCID-rssq-mfc2-ckaf"},{"vulnerability":"VCID-rted-6vzz-mbcv"},{"vulnerability":"VCID-tvdv-3ed5-h3dt"},{"vulnerability":"VCID-un5y-y9sq-1ufb"},{"vulnerability":"VCID-v4gv-g9n5-ukgc"},{"vulnerability":"VCID-vh5y-15tw-d7fd"},{"vulnerability":"VCID-wrna-cc9g-sqbe"},{"vulnerability":"VCID-yx79-3g2x-pqex"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.0@10.0.25-0%252Bdeb8u1"}],"aliases":["CVE-2015-4816"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-bjyw-emd1-zbfv"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/81265?format=json","vulnerability_id":"VCID-ca85-vx8c-huht","summary":"security update","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:11Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:11Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:11Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:11Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:11Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:11Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0705.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:11Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-0705.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-1480.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:11Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-1480.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-1481.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:11Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-1481.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-1602.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:11Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-1602.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0650.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0650.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-0650","reference_id":"","reference_type":"","scores":[{"value":"0.00214","scoring_system":"epss","scoring_elements":"0.43689","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00214","scoring_system":"epss","scoring_elements":"0.43926","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00214","scoring_system":"epss","scoring_elements":"0.43911","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00214","scoring_system":"epss","scoring_elements":"0.43895","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00214","scoring_system":"epss","scoring_elements":"0.43957","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00214","scoring_system":"epss","scoring_elements":"0.43948","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00214","scoring_system":"epss","scoring_elements":"0.4388","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00214","scoring_system":"epss","scoring_elements":"0.43832","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00214","scoring_system":"epss","scoring_elements":"0.43835","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00214","scoring_system":"epss","scoring_elements":"0.43755","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00214","scoring_system":"epss","scoring_elements":"0.43629","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00214","scoring_system":"epss","scoring_elements":"0.43704","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00214","scoring_system":"epss","scoring_elements":"0.43721","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00214","scoring_system":"epss","scoring_elements":"0.43658","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00214","scoring_system":"epss","scoring_elements":"0.43877","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00214","scoring_system":"epss","scoring_elements":"0.43921","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00214","scoring_system":"epss","scoring_elements":"0.43944","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00214","scoring_system":"epss","scoring_elements":"0.43874","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00214","scoring_system":"epss","scoring_elements":"0.43924","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-0650"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0640","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0640"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0641","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0641"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0642","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0642"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0643","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0643"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0644","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0644"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0646","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0646"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0647","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0647"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0648","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0648"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0649","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0649"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0650","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0650"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0655","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0655"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0666","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0666"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0668","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0668"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2047","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2047"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.6","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:S/C:N/I:N/A:C"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://mariadb.com/kb/en/mariadb/mariadb-10024-release-notes/","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:11Z/"}],"url":"https://mariadb.com/kb/en/mariadb/mariadb-10024-release-notes/"},{"reference_url":"https://mariadb.com/kb/en/mariadb/mariadb-10112-release-notes/","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:11Z/"}],"url":"https://mariadb.com/kb/en/mariadb/mariadb-10112-release-notes/"},{"reference_url":"https://mariadb.com/kb/en/mariadb/mariadb-5548-release-notes/","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:11Z/"}],"url":"https://mariadb.com/kb/en/mariadb/mariadb-5548-release-notes/"},{"reference_url":"http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:11Z/"}],"url":"http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168"},{"reference_url":"http://www.debian.org/security/2016/dsa-3557","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:11Z/"}],"url":"http://www.debian.org/security/2016/dsa-3557"},{"reference_url":"http://www.debian.org/security/2016/dsa-3595","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:11Z/"}],"url":"http://www.debian.org/security/2016/dsa-3595"},{"reference_url":"http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:11Z/"}],"url":"http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:11Z/"}],"url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html"},{"reference_url":"http://www.securityfocus.com/bid/86496","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:11Z/"}],"url":"http://www.securityfocus.com/bid/86496"},{"reference_url":"http://www.securitytracker.com/id/1035606","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:11Z/"}],"url":"http://www.securitytracker.com/id/1035606"},{"reference_url":"http://www.ubuntu.com/usn/USN-2953-1","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:11Z/"}],"url":"http://www.ubuntu.com/usn/USN-2953-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1329253","reference_id":"1329253","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1329253"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:powerkvm:2.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ibm:powerkvm:2.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:powerkvm:2.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:powerkvm:3.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ibm:powerkvm:3.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:powerkvm:3.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-0650","reference_id":"CVE-2016-0650","reference_type":"","scores":[{"value":"4.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:S/C:N/I:N/A:P"},{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-0650"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0705","reference_id":"RHSA-2016:0705","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0705"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1132","reference_id":"RHSA-2016:1132","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:11Z/"}],"url":"https://access.redhat.com/errata/RHSA-2016:1132"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1480","reference_id":"RHSA-2016:1480","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1480"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1481","reference_id":"RHSA-2016:1481","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1481"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1602","reference_id":"RHSA-2016:1602","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1602"},{"reference_url":"https://usn.ubuntu.com/2953-1/","reference_id":"USN-2953-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2953-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035582?format=json","purl":"pkg:deb/debian/mariadb-10.0@10.0.25-0%2Bdeb8u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1gmc-pj6y-rkfx"},{"vulnerability":"VCID-2gyq-q761-h3br"},{"vulnerability":"VCID-2rf6-qaey-1ubn"},{"vulnerability":"VCID-45hn-ezks-j7br"},{"vulnerability":"VCID-4cnj-7fur-3qe3"},{"vulnerability":"VCID-4yz4-vxnh-b3dp"},{"vulnerability":"VCID-5sjj-599v-vybg"},{"vulnerability":"VCID-6g4n-3xfu-hfee"},{"vulnerability":"VCID-6muh-rg1z-pqab"},{"vulnerability":"VCID-8djb-knkk-s3c8"},{"vulnerability":"VCID-8krv-jqjg-uqc8"},{"vulnerability":"VCID-8kvb-5u8c-zbc4"},{"vulnerability":"VCID-8sya-wktg-dqa5"},{"vulnerability":"VCID-9f48-53dz-13an"},{"vulnerability":"VCID-9ff2-43rk-2ydj"},{"vulnerability":"VCID-9w98-nfg2-muh2"},{"vulnerability":"VCID-bhxk-8byp-eyap"},{"vulnerability":"VCID-ej67-ayfh-sqdt"},{"vulnerability":"VCID-g1pp-9qqg-1beb"},{"vulnerability":"VCID-gp4w-bdxg-6kab"},{"vulnerability":"VCID-jgff-4jyp-9fgr"},{"vulnerability":"VCID-mde2-1ynu-auh2"},{"vulnerability":"VCID-mfgg-7s54-gqg8"},{"vulnerability":"VCID-nkdd-suwp-4ffr"},{"vulnerability":"VCID-p623-gxyv-g7fs"},{"vulnerability":"VCID-pk7e-t26d-aqdm"},{"vulnerability":"VCID-pv92-6p9x-v7bs"},{"vulnerability":"VCID-r2cz-9kjz-zbgu"},{"vulnerability":"VCID-rssq-mfc2-ckaf"},{"vulnerability":"VCID-rted-6vzz-mbcv"},{"vulnerability":"VCID-tvdv-3ed5-h3dt"},{"vulnerability":"VCID-un5y-y9sq-1ufb"},{"vulnerability":"VCID-v4gv-g9n5-ukgc"},{"vulnerability":"VCID-vh5y-15tw-d7fd"},{"vulnerability":"VCID-wrna-cc9g-sqbe"},{"vulnerability":"VCID-yx79-3g2x-pqex"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.0@10.0.25-0%252Bdeb8u1"}],"aliases":["CVE-2016-0650"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ca85-vx8c-huht"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/81266?format=json","vulnerability_id":"VCID-ceyn-dgzv-5qak","summary":"security update","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:02Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:02Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:02Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:02Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:02Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0705.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:02Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-0705.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0655.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0655.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-0655","reference_id":"","reference_type":"","scores":[{"value":"0.00244","scoring_system":"epss","scoring_elements":"0.47627","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00244","scoring_system":"epss","scoring_elements":"0.47696","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00244","scoring_system":"epss","scoring_elements":"0.47752","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00244","scoring_system":"epss","scoring_elements":"0.47745","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00244","scoring_system":"epss","scoring_elements":"0.47698","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00244","scoring_system":"epss","scoring_elements":"0.47678","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00244","scoring_system":"epss","scoring_elements":"0.47633","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00244","scoring_system":"epss","scoring_elements":"0.47547","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00244","scoring_system":"epss","scoring_elements":"0.47612","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00244","scoring_system":"epss","scoring_elements":"0.47577","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00244","scoring_system":"epss","scoring_elements":"0.47606","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00244","scoring_system":"epss","scoring_elements":"0.47679","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00244","scoring_system":"epss","scoring_elements":"0.47665","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00244","scoring_system":"epss","scoring_elements":"0.47686","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00244","scoring_system":"epss","scoring_elements":"0.47636","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00244","scoring_system":"epss","scoring_elements":"0.47691","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00244","scoring_system":"epss","scoring_elements":"0.4771","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00244","scoring_system":"epss","scoring_elements":"0.47687","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-0655"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0640","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0640"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0641","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0641"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0643","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0643"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0644","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0644"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0646","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0646"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0647","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0647"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0648","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0648"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0649","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0649"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0650","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0650"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0655","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0655"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0666","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0666"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0668","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0668"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:H/Au:N/C:N/I:N/A:C"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://mariadb.com/kb/en/mariadb/mariadb-10025-release-notes/","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:02Z/"}],"url":"https://mariadb.com/kb/en/mariadb/mariadb-10025-release-notes/"},{"reference_url":"https://mariadb.com/kb/en/mariadb/mariadb-10114-release-notes/","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:02Z/"}],"url":"https://mariadb.com/kb/en/mariadb/mariadb-10114-release-notes/"},{"reference_url":"http://www.debian.org/security/2016/dsa-3595","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:02Z/"}],"url":"http://www.debian.org/security/2016/dsa-3595"},{"reference_url":"http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:02Z/"}],"url":"http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html"},{"reference_url":"http://www.securityfocus.com/bid/86424","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:02Z/"}],"url":"http://www.securityfocus.com/bid/86424"},{"reference_url":"http://www.securitytracker.com/id/1035606","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:02Z/"}],"url":"http://www.securitytracker.com/id/1035606"},{"reference_url":"http://www.ubuntu.com/usn/USN-2953-1","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:02Z/"}],"url":"http://www.ubuntu.com/usn/USN-2953-1"},{"reference_url":"http://www.ubuntu.com/usn/USN-2954-1","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:02Z/"}],"url":"http://www.ubuntu.com/usn/USN-2954-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1329259","reference_id":"1329259","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1329259"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-0655","reference_id":"CVE-2016-0655","reference_type":"","scores":[{"value":"3.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:S/C:N/I:N/A:P"},{"value":"4.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-0655"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0705","reference_id":"RHSA-2016:0705","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0705"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1132","reference_id":"RHSA-2016:1132","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:02Z/"}],"url":"https://access.redhat.com/errata/RHSA-2016:1132"},{"reference_url":"https://usn.ubuntu.com/2953-1/","reference_id":"USN-2953-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2953-1/"},{"reference_url":"https://usn.ubuntu.com/2954-1/","reference_id":"USN-2954-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2954-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035582?format=json","purl":"pkg:deb/debian/mariadb-10.0@10.0.25-0%2Bdeb8u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1gmc-pj6y-rkfx"},{"vulnerability":"VCID-2gyq-q761-h3br"},{"vulnerability":"VCID-2rf6-qaey-1ubn"},{"vulnerability":"VCID-45hn-ezks-j7br"},{"vulnerability":"VCID-4cnj-7fur-3qe3"},{"vulnerability":"VCID-4yz4-vxnh-b3dp"},{"vulnerability":"VCID-5sjj-599v-vybg"},{"vulnerability":"VCID-6g4n-3xfu-hfee"},{"vulnerability":"VCID-6muh-rg1z-pqab"},{"vulnerability":"VCID-8djb-knkk-s3c8"},{"vulnerability":"VCID-8krv-jqjg-uqc8"},{"vulnerability":"VCID-8kvb-5u8c-zbc4"},{"vulnerability":"VCID-8sya-wktg-dqa5"},{"vulnerability":"VCID-9f48-53dz-13an"},{"vulnerability":"VCID-9ff2-43rk-2ydj"},{"vulnerability":"VCID-9w98-nfg2-muh2"},{"vulnerability":"VCID-bhxk-8byp-eyap"},{"vulnerability":"VCID-ej67-ayfh-sqdt"},{"vulnerability":"VCID-g1pp-9qqg-1beb"},{"vulnerability":"VCID-gp4w-bdxg-6kab"},{"vulnerability":"VCID-jgff-4jyp-9fgr"},{"vulnerability":"VCID-mde2-1ynu-auh2"},{"vulnerability":"VCID-mfgg-7s54-gqg8"},{"vulnerability":"VCID-nkdd-suwp-4ffr"},{"vulnerability":"VCID-p623-gxyv-g7fs"},{"vulnerability":"VCID-pk7e-t26d-aqdm"},{"vulnerability":"VCID-pv92-6p9x-v7bs"},{"vulnerability":"VCID-r2cz-9kjz-zbgu"},{"vulnerability":"VCID-rssq-mfc2-ckaf"},{"vulnerability":"VCID-rted-6vzz-mbcv"},{"vulnerability":"VCID-tvdv-3ed5-h3dt"},{"vulnerability":"VCID-un5y-y9sq-1ufb"},{"vulnerability":"VCID-v4gv-g9n5-ukgc"},{"vulnerability":"VCID-vh5y-15tw-d7fd"},{"vulnerability":"VCID-wrna-cc9g-sqbe"},{"vulnerability":"VCID-yx79-3g2x-pqex"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.0@10.0.25-0%252Bdeb8u1"}],"aliases":["CVE-2016-0655"],"risk_score":2.1,"exploitability":"0.5","weighted_severity":"4.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ceyn-dgzv-5qak"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61080?format=json","vulnerability_id":"VCID-ctzs-ypzj-t7dg","summary":"security update","references":[{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177539.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177539.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00010.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00010.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00011.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00011.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2016-02/msg00039.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2016-02/msg00039.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0534.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-0534.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0705.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-0705.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-1480.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-1480.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-1481.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-1481.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4826.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4826.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-4826","reference_id":"","reference_type":"","scores":[{"value":"0.00276","scoring_system":"epss","scoring_elements":"0.51044","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00276","scoring_system":"epss","scoring_elements":"0.50937","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00276","scoring_system":"epss","scoring_elements":"0.5099","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00276","scoring_system":"epss","scoring_elements":"0.51015","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00276","scoring_system":"epss","scoring_elements":"0.50974","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00276","scoring_system":"epss","scoring_elements":"0.51031","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00276","scoring_system":"epss","scoring_elements":"0.51027","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00276","scoring_system":"epss","scoring_elements":"0.5107","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00276","scoring_system":"epss","scoring_elements":"0.51048","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00276","scoring_system":"epss","scoring_elements":"0.51069","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00276","scoring_system":"epss","scoring_elements":"0.51075","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00276","scoring_system":"epss","scoring_elements":"0.51052","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00276","scoring_system":"epss","scoring_elements":"0.51","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00276","scoring_system":"epss","scoring_elements":"0.51008","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00276","scoring_system":"epss","scoring_elements":"0.50968","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00276","scoring_system":"epss","scoring_elements":"0.50898","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00276","scoring_system":"epss","scoring_elements":"0.50948","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00276","scoring_system":"epss","scoring_elements":"0.50979","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00276","scoring_system":"epss","scoring_elements":"0.50936","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00276","scoring_system":"epss","scoring_elements":"0.50967","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-4826"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4792","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4792"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4802","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4802"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4815","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4815"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4816","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4816"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4819","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4819"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4826","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4826"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4830","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4830"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4836","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4836"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4858","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4858"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4861","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4861"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4870","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4870"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4879","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4879"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4895","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4895"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4913","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4913"},{"reference_url":"https://www.suse.com/support/update/announcement/2016/suse-su-20160296-1.html","reference_id":"","reference_type":"","scores":[],"url":"https://www.suse.com/support/update/announcement/2016/suse-su-20160296-1.html"},{"reference_url":"http://www.debian.org/security/2015/dsa-3377","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2015/dsa-3377"},{"reference_url":"http://www.debian.org/security/2015/dsa-3385","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2015/dsa-3385"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html"},{"reference_url":"http://www.securityfocus.com/bid/77237","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/77237"},{"reference_url":"http://www.securitytracker.com/id/1033894","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1033894"},{"reference_url":"http://www.ubuntu.com/usn/USN-2781-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2781-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1274766","reference_id":"1274766","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1274766"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:7.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2015-4826","reference_id":"CVE-2015-4826","reference_type":"","scores":[{"value":"4.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:S/C:P/I:N/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2015-4826"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0534","reference_id":"RHSA-2016:0534","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0534"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0705","reference_id":"RHSA-2016:0705","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0705"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1132","reference_id":"RHSA-2016:1132","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1132"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1480","reference_id":"RHSA-2016:1480","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1480"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1481","reference_id":"RHSA-2016:1481","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1481"},{"reference_url":"https://usn.ubuntu.com/2781-1/","reference_id":"USN-2781-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2781-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035582?format=json","purl":"pkg:deb/debian/mariadb-10.0@10.0.25-0%2Bdeb8u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1gmc-pj6y-rkfx"},{"vulnerability":"VCID-2gyq-q761-h3br"},{"vulnerability":"VCID-2rf6-qaey-1ubn"},{"vulnerability":"VCID-45hn-ezks-j7br"},{"vulnerability":"VCID-4cnj-7fur-3qe3"},{"vulnerability":"VCID-4yz4-vxnh-b3dp"},{"vulnerability":"VCID-5sjj-599v-vybg"},{"vulnerability":"VCID-6g4n-3xfu-hfee"},{"vulnerability":"VCID-6muh-rg1z-pqab"},{"vulnerability":"VCID-8djb-knkk-s3c8"},{"vulnerability":"VCID-8krv-jqjg-uqc8"},{"vulnerability":"VCID-8kvb-5u8c-zbc4"},{"vulnerability":"VCID-8sya-wktg-dqa5"},{"vulnerability":"VCID-9f48-53dz-13an"},{"vulnerability":"VCID-9ff2-43rk-2ydj"},{"vulnerability":"VCID-9w98-nfg2-muh2"},{"vulnerability":"VCID-bhxk-8byp-eyap"},{"vulnerability":"VCID-ej67-ayfh-sqdt"},{"vulnerability":"VCID-g1pp-9qqg-1beb"},{"vulnerability":"VCID-gp4w-bdxg-6kab"},{"vulnerability":"VCID-jgff-4jyp-9fgr"},{"vulnerability":"VCID-mde2-1ynu-auh2"},{"vulnerability":"VCID-mfgg-7s54-gqg8"},{"vulnerability":"VCID-nkdd-suwp-4ffr"},{"vulnerability":"VCID-p623-gxyv-g7fs"},{"vulnerability":"VCID-pk7e-t26d-aqdm"},{"vulnerability":"VCID-pv92-6p9x-v7bs"},{"vulnerability":"VCID-r2cz-9kjz-zbgu"},{"vulnerability":"VCID-rssq-mfc2-ckaf"},{"vulnerability":"VCID-rted-6vzz-mbcv"},{"vulnerability":"VCID-tvdv-3ed5-h3dt"},{"vulnerability":"VCID-un5y-y9sq-1ufb"},{"vulnerability":"VCID-v4gv-g9n5-ukgc"},{"vulnerability":"VCID-vh5y-15tw-d7fd"},{"vulnerability":"VCID-wrna-cc9g-sqbe"},{"vulnerability":"VCID-yx79-3g2x-pqex"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.0@10.0.25-0%252Bdeb8u1"}],"aliases":["CVE-2015-4826"],"risk_score":1.8,"exploitability":"0.5","weighted_severity":"3.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ctzs-ypzj-t7dg"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/81259?format=json","vulnerability_id":"VCID-cyqa-e362-yyaf","summary":"security update","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:24Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:24Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:24Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:24Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:24Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:24Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0705.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:24Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-0705.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-1480.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:24Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-1480.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-1481.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:24Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-1481.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-1602.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:24Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-1602.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0643.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0643.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-0643","reference_id":"","reference_type":"","scores":[{"value":"0.00267","scoring_system":"epss","scoring_elements":"0.50189","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00267","scoring_system":"epss","scoring_elements":"0.50187","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00267","scoring_system":"epss","scoring_elements":"0.50216","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00267","scoring_system":"epss","scoring_elements":"0.50177","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00267","scoring_system":"epss","scoring_elements":"0.50221","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00267","scoring_system":"epss","scoring_elements":"0.50222","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00267","scoring_system":"epss","scoring_elements":"0.50197","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00267","scoring_system":"epss","scoring_elements":"0.5017","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00267","scoring_system":"epss","scoring_elements":"0.5013","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00267","scoring_system":"epss","scoring_elements":"0.50048","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00267","scoring_system":"epss","scoring_elements":"0.50103","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00267","scoring_system":"epss","scoring_elements":"0.50131","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00267","scoring_system":"epss","scoring_elements":"0.50084","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00267","scoring_system":"epss","scoring_elements":"0.50113","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00267","scoring_system":"epss","scoring_elements":"0.50117","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00267","scoring_system":"epss","scoring_elements":"0.50162","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00267","scoring_system":"epss","scoring_elements":"0.5019","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00267","scoring_system":"epss","scoring_elements":"0.5014","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00267","scoring_system":"epss","scoring_elements":"0.50194","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-0643"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0640","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0640"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0641","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0641"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0642","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0642"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0643","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0643"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0644","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0644"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0646","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0646"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0647","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0647"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0648","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0648"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0649","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0649"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0650","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0650"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0655","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0655"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0666","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0666"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0668","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0668"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2047","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2047"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"1.7","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:S/C:P/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://mariadb.com/kb/en/mariadb/mariadb-10025-release-notes/","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:24Z/"}],"url":"https://mariadb.com/kb/en/mariadb/mariadb-10025-release-notes/"},{"reference_url":"https://mariadb.com/kb/en/mariadb/mariadb-10114-release-notes/","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:24Z/"}],"url":"https://mariadb.com/kb/en/mariadb/mariadb-10114-release-notes/"},{"reference_url":"https://mariadb.com/kb/en/mariadb/mariadb-5549-release-notes/","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:24Z/"}],"url":"https://mariadb.com/kb/en/mariadb/mariadb-5549-release-notes/"},{"reference_url":"http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:24Z/"}],"url":"http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168"},{"reference_url":"http://www.debian.org/security/2016/dsa-3557","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:24Z/"}],"url":"http://www.debian.org/security/2016/dsa-3557"},{"reference_url":"http://www.debian.org/security/2016/dsa-3595","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:24Z/"}],"url":"http://www.debian.org/security/2016/dsa-3595"},{"reference_url":"http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:24Z/"}],"url":"http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html"},{"reference_url":"http://www.securityfocus.com/bid/86486","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:24Z/"}],"url":"http://www.securityfocus.com/bid/86486"},{"reference_url":"http://www.securitytracker.com/id/1035606","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:24Z/"}],"url":"http://www.securitytracker.com/id/1035606"},{"reference_url":"http://www.ubuntu.com/usn/USN-2953-1","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:24Z/"}],"url":"http://www.ubuntu.com/usn/USN-2953-1"},{"reference_url":"http://www.ubuntu.com/usn/USN-2954-1","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:24Z/"}],"url":"http://www.ubuntu.com/usn/USN-2954-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1329245","reference_id":"1329245","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1329245"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:powerkvm:2.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ibm:powerkvm:2.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:powerkvm:2.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:powerkvm:3.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ibm:powerkvm:3.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:powerkvm:3.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-0643","reference_id":"CVE-2016-0643","reference_type":"","scores":[{"value":"4.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:S/C:P/I:N/A:N"},{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-0643"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0705","reference_id":"RHSA-2016:0705","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0705"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1132","reference_id":"RHSA-2016:1132","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:24Z/"}],"url":"https://access.redhat.com/errata/RHSA-2016:1132"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1480","reference_id":"RHSA-2016:1480","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1480"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1481","reference_id":"RHSA-2016:1481","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1481"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1602","reference_id":"RHSA-2016:1602","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1602"},{"reference_url":"https://usn.ubuntu.com/2953-1/","reference_id":"USN-2953-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2953-1/"},{"reference_url":"https://usn.ubuntu.com/2954-1/","reference_id":"USN-2954-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2954-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035582?format=json","purl":"pkg:deb/debian/mariadb-10.0@10.0.25-0%2Bdeb8u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1gmc-pj6y-rkfx"},{"vulnerability":"VCID-2gyq-q761-h3br"},{"vulnerability":"VCID-2rf6-qaey-1ubn"},{"vulnerability":"VCID-45hn-ezks-j7br"},{"vulnerability":"VCID-4cnj-7fur-3qe3"},{"vulnerability":"VCID-4yz4-vxnh-b3dp"},{"vulnerability":"VCID-5sjj-599v-vybg"},{"vulnerability":"VCID-6g4n-3xfu-hfee"},{"vulnerability":"VCID-6muh-rg1z-pqab"},{"vulnerability":"VCID-8djb-knkk-s3c8"},{"vulnerability":"VCID-8krv-jqjg-uqc8"},{"vulnerability":"VCID-8kvb-5u8c-zbc4"},{"vulnerability":"VCID-8sya-wktg-dqa5"},{"vulnerability":"VCID-9f48-53dz-13an"},{"vulnerability":"VCID-9ff2-43rk-2ydj"},{"vulnerability":"VCID-9w98-nfg2-muh2"},{"vulnerability":"VCID-bhxk-8byp-eyap"},{"vulnerability":"VCID-ej67-ayfh-sqdt"},{"vulnerability":"VCID-g1pp-9qqg-1beb"},{"vulnerability":"VCID-gp4w-bdxg-6kab"},{"vulnerability":"VCID-jgff-4jyp-9fgr"},{"vulnerability":"VCID-mde2-1ynu-auh2"},{"vulnerability":"VCID-mfgg-7s54-gqg8"},{"vulnerability":"VCID-nkdd-suwp-4ffr"},{"vulnerability":"VCID-p623-gxyv-g7fs"},{"vulnerability":"VCID-pk7e-t26d-aqdm"},{"vulnerability":"VCID-pv92-6p9x-v7bs"},{"vulnerability":"VCID-r2cz-9kjz-zbgu"},{"vulnerability":"VCID-rssq-mfc2-ckaf"},{"vulnerability":"VCID-rted-6vzz-mbcv"},{"vulnerability":"VCID-tvdv-3ed5-h3dt"},{"vulnerability":"VCID-un5y-y9sq-1ufb"},{"vulnerability":"VCID-v4gv-g9n5-ukgc"},{"vulnerability":"VCID-vh5y-15tw-d7fd"},{"vulnerability":"VCID-wrna-cc9g-sqbe"},{"vulnerability":"VCID-yx79-3g2x-pqex"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.0@10.0.25-0%252Bdeb8u1"}],"aliases":["CVE-2016-0643"],"risk_score":1.8,"exploitability":"0.5","weighted_severity":"3.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-cyqa-e362-yyaf"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/62565?format=json","vulnerability_id":"VCID-dqg6-2gmj-judy","summary":"security update","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00015.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00015.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00016.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00016.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0534.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-0534.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0705.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-0705.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-1480.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-1480.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-1481.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-1481.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0546.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0546.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-0546","reference_id":"","reference_type":"","scores":[{"value":"0.0018","scoring_system":"epss","scoring_elements":"0.39229","published_at":"2026-05-14T12:55:00Z"},{"value":"0.0018","scoring_system":"epss","scoring_elements":"0.39158","published_at":"2026-05-12T12:55:00Z"},{"value":"0.0018","scoring_system":"epss","scoring_elements":"0.39493","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0018","scoring_system":"epss","scoring_elements":"0.39643","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0018","scoring_system":"epss","scoring_elements":"0.39665","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0018","scoring_system":"epss","scoring_elements":"0.39582","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0018","scoring_system":"epss","scoring_elements":"0.39637","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0018","scoring_system":"epss","scoring_elements":"0.39651","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0018","scoring_system":"epss","scoring_elements":"0.3966","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0018","scoring_system":"epss","scoring_elements":"0.39624","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0018","scoring_system":"epss","scoring_elements":"0.39607","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0018","scoring_system":"epss","scoring_elements":"0.39658","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0018","scoring_system":"epss","scoring_elements":"0.39629","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0018","scoring_system":"epss","scoring_elements":"0.39546","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0018","scoring_system":"epss","scoring_elements":"0.39366","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0018","scoring_system":"epss","scoring_elements":"0.39351","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0018","scoring_system":"epss","scoring_elements":"0.39269","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0018","scoring_system":"epss","scoring_elements":"0.39144","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0018","scoring_system":"epss","scoring_elements":"0.3921","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0018","scoring_system":"epss","scoring_elements":"0.39226","published_at":"2026-05-09T12:55:00Z"},{"value":"0.0018","scoring_system":"epss","scoring_elements":"0.39135","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-0546"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0505","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0505"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0546","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0546"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0596","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0596"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0597","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0597"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0598","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0598"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0600","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0600"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0606","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0606"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0608","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0608"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0609","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0609"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0616","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0616"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2047","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2047"},{"reference_url":"https://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-47.html","reference_id":"","reference_type":"","scores":[],"url":"https://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-47.html"},{"reference_url":"https://dev.mysql.com/doc/relnotes/mysql/5.6/en/news-5-6-28.html","reference_id":"","reference_type":"","scores":[],"url":"https://dev.mysql.com/doc/relnotes/mysql/5.6/en/news-5-6-28.html"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.2","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:C/I:C/A:C"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://github.com/mysql/mysql-server/commit/0dbd5a8797ed4bd18e8b883988fb62177eb0f73f","reference_id":"","reference_type":"","scores":[],"url":"https://github.com/mysql/mysql-server/commit/0dbd5a8797ed4bd18e8b883988fb62177eb0f73f"},{"reference_url":"https://mariadb.com/kb/en/mariadb/mariadb-10110-release-notes/","reference_id":"","reference_type":"","scores":[],"url":"https://mariadb.com/kb/en/mariadb/mariadb-10110-release-notes/"},{"reference_url":"https://mariadb.com/kb/en/mariadb/mariadb-5547-release-notes/","reference_id":"","reference_type":"","scores":[],"url":"https://mariadb.com/kb/en/mariadb/mariadb-5547-release-notes/"},{"reference_url":"https://mariadb.com/kb/en/mdb-10023-rn/","reference_id":"","reference_type":"","scores":[],"url":"https://mariadb.com/kb/en/mdb-10023-rn/"},{"reference_url":"http://www.debian.org/security/2016/dsa-3453","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2016/dsa-3453"},{"reference_url":"http://www.debian.org/security/2016/dsa-3459","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2016/dsa-3459"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html"},{"reference_url":"http://www.securityfocus.com/bid/81066","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/81066"},{"reference_url":"http://www.securitytracker.com/id/1034708","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1034708"},{"reference_url":"http://www.ubuntu.com/usn/USN-2881-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2881-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1301493","reference_id":"1301493","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1301493"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node_eus:7.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_hpc_node_eus:7.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node_eus:7.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-0546","reference_id":"CVE-2016-0546","reference_type":"","scores":[{"value":"7.2","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:C/I:C/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-0546"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0534","reference_id":"RHSA-2016:0534","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0534"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0705","reference_id":"RHSA-2016:0705","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0705"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1132","reference_id":"RHSA-2016:1132","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1132"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1480","reference_id":"RHSA-2016:1480","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1480"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1481","reference_id":"RHSA-2016:1481","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1481"},{"reference_url":"https://usn.ubuntu.com/2881-1/","reference_id":"USN-2881-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2881-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035582?format=json","purl":"pkg:deb/debian/mariadb-10.0@10.0.25-0%2Bdeb8u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1gmc-pj6y-rkfx"},{"vulnerability":"VCID-2gyq-q761-h3br"},{"vulnerability":"VCID-2rf6-qaey-1ubn"},{"vulnerability":"VCID-45hn-ezks-j7br"},{"vulnerability":"VCID-4cnj-7fur-3qe3"},{"vulnerability":"VCID-4yz4-vxnh-b3dp"},{"vulnerability":"VCID-5sjj-599v-vybg"},{"vulnerability":"VCID-6g4n-3xfu-hfee"},{"vulnerability":"VCID-6muh-rg1z-pqab"},{"vulnerability":"VCID-8djb-knkk-s3c8"},{"vulnerability":"VCID-8krv-jqjg-uqc8"},{"vulnerability":"VCID-8kvb-5u8c-zbc4"},{"vulnerability":"VCID-8sya-wktg-dqa5"},{"vulnerability":"VCID-9f48-53dz-13an"},{"vulnerability":"VCID-9ff2-43rk-2ydj"},{"vulnerability":"VCID-9w98-nfg2-muh2"},{"vulnerability":"VCID-bhxk-8byp-eyap"},{"vulnerability":"VCID-ej67-ayfh-sqdt"},{"vulnerability":"VCID-g1pp-9qqg-1beb"},{"vulnerability":"VCID-gp4w-bdxg-6kab"},{"vulnerability":"VCID-jgff-4jyp-9fgr"},{"vulnerability":"VCID-mde2-1ynu-auh2"},{"vulnerability":"VCID-mfgg-7s54-gqg8"},{"vulnerability":"VCID-nkdd-suwp-4ffr"},{"vulnerability":"VCID-p623-gxyv-g7fs"},{"vulnerability":"VCID-pk7e-t26d-aqdm"},{"vulnerability":"VCID-pv92-6p9x-v7bs"},{"vulnerability":"VCID-r2cz-9kjz-zbgu"},{"vulnerability":"VCID-rssq-mfc2-ckaf"},{"vulnerability":"VCID-rted-6vzz-mbcv"},{"vulnerability":"VCID-tvdv-3ed5-h3dt"},{"vulnerability":"VCID-un5y-y9sq-1ufb"},{"vulnerability":"VCID-v4gv-g9n5-ukgc"},{"vulnerability":"VCID-vh5y-15tw-d7fd"},{"vulnerability":"VCID-wrna-cc9g-sqbe"},{"vulnerability":"VCID-yx79-3g2x-pqex"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.0@10.0.25-0%252Bdeb8u1"}],"aliases":["CVE-2016-0546"],"risk_score":3.2,"exploitability":"0.5","weighted_severity":"6.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-dqg6-2gmj-judy"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41362?format=json","vulnerability_id":"VCID-dvjd-g5eh-2uh8","summary":"Multiple vulnerabilities have been found in MySQL and MariaDB, the\n    worst of which could allow remote attackers to cause a Denial of Service\n    condition or obtain sensitive information.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2582.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2582.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-2582","reference_id":"","reference_type":"","scores":[{"value":"0.00811","scoring_system":"epss","scoring_elements":"0.74185","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00811","scoring_system":"epss","scoring_elements":"0.7419","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00811","scoring_system":"epss","scoring_elements":"0.74217","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00811","scoring_system":"epss","scoring_elements":"0.74223","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00811","scoring_system":"epss","scoring_elements":"0.74238","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00811","scoring_system":"epss","scoring_elements":"0.74259","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00811","scoring_system":"epss","scoring_elements":"0.7424","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00811","scoring_system":"epss","scoring_elements":"0.74233","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00811","scoring_system":"epss","scoring_elements":"0.74271","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00811","scoring_system":"epss","scoring_elements":"0.74281","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00811","scoring_system":"epss","scoring_elements":"0.74272","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00811","scoring_system":"epss","scoring_elements":"0.74306","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00811","scoring_system":"epss","scoring_elements":"0.74315","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00811","scoring_system":"epss","scoring_elements":"0.74314","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00811","scoring_system":"epss","scoring_elements":"0.74308","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00811","scoring_system":"epss","scoring_elements":"0.74336","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00811","scoring_system":"epss","scoring_elements":"0.74361","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00811","scoring_system":"epss","scoring_elements":"0.74326","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00811","scoring_system":"epss","scoring_elements":"0.74349","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00811","scoring_system":"epss","scoring_elements":"0.74404","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-2582"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0433","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0433"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0441","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0441"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0499","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0499"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0501","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0501"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0505","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0505"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2568","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2568"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2571","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2571"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2573","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2573"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2582","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2582"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2620","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2620"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2643","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2643"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2648","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2648"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3152","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3152"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4737","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4737"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4752","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4752"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4757","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4757"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1244768","reference_id":"1244768","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1244768"},{"reference_url":"https://security.gentoo.org/glsa/201610-06","reference_id":"GLSA-201610-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201610-06"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1628","reference_id":"RHSA-2015:1628","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1628"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1629","reference_id":"RHSA-2015:1629","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1629"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1630","reference_id":"RHSA-2015:1630","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1630"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1646","reference_id":"RHSA-2015:1646","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1646"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1647","reference_id":"RHSA-2015:1647","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1647"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1665","reference_id":"RHSA-2015:1665","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1665"},{"reference_url":"https://usn.ubuntu.com/2674-1/","reference_id":"USN-2674-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2674-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035582?format=json","purl":"pkg:deb/debian/mariadb-10.0@10.0.25-0%2Bdeb8u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1gmc-pj6y-rkfx"},{"vulnerability":"VCID-2gyq-q761-h3br"},{"vulnerability":"VCID-2rf6-qaey-1ubn"},{"vulnerability":"VCID-45hn-ezks-j7br"},{"vulnerability":"VCID-4cnj-7fur-3qe3"},{"vulnerability":"VCID-4yz4-vxnh-b3dp"},{"vulnerability":"VCID-5sjj-599v-vybg"},{"vulnerability":"VCID-6g4n-3xfu-hfee"},{"vulnerability":"VCID-6muh-rg1z-pqab"},{"vulnerability":"VCID-8djb-knkk-s3c8"},{"vulnerability":"VCID-8krv-jqjg-uqc8"},{"vulnerability":"VCID-8kvb-5u8c-zbc4"},{"vulnerability":"VCID-8sya-wktg-dqa5"},{"vulnerability":"VCID-9f48-53dz-13an"},{"vulnerability":"VCID-9ff2-43rk-2ydj"},{"vulnerability":"VCID-9w98-nfg2-muh2"},{"vulnerability":"VCID-bhxk-8byp-eyap"},{"vulnerability":"VCID-ej67-ayfh-sqdt"},{"vulnerability":"VCID-g1pp-9qqg-1beb"},{"vulnerability":"VCID-gp4w-bdxg-6kab"},{"vulnerability":"VCID-jgff-4jyp-9fgr"},{"vulnerability":"VCID-mde2-1ynu-auh2"},{"vulnerability":"VCID-mfgg-7s54-gqg8"},{"vulnerability":"VCID-nkdd-suwp-4ffr"},{"vulnerability":"VCID-p623-gxyv-g7fs"},{"vulnerability":"VCID-pk7e-t26d-aqdm"},{"vulnerability":"VCID-pv92-6p9x-v7bs"},{"vulnerability":"VCID-r2cz-9kjz-zbgu"},{"vulnerability":"VCID-rssq-mfc2-ckaf"},{"vulnerability":"VCID-rted-6vzz-mbcv"},{"vulnerability":"VCID-tvdv-3ed5-h3dt"},{"vulnerability":"VCID-un5y-y9sq-1ufb"},{"vulnerability":"VCID-v4gv-g9n5-ukgc"},{"vulnerability":"VCID-vh5y-15tw-d7fd"},{"vulnerability":"VCID-wrna-cc9g-sqbe"},{"vulnerability":"VCID-yx79-3g2x-pqex"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.0@10.0.25-0%252Bdeb8u1"}],"aliases":["CVE-2015-2582"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-dvjd-g5eh-2uh8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/62572?format=json","vulnerability_id":"VCID-esfk-umc5-ska4","summary":"security update","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00015.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00015.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00016.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00016.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0534.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-0534.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0705.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-0705.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-1480.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-1480.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-1481.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-1481.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0609.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0609.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-0609","reference_id":"","reference_type":"","scores":[{"value":"0.00794","scoring_system":"epss","scoring_elements":"0.74119","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00794","scoring_system":"epss","scoring_elements":"0.74063","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00794","scoring_system":"epss","scoring_elements":"0.73905","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00794","scoring_system":"epss","scoring_elements":"0.73915","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00794","scoring_system":"epss","scoring_elements":"0.73939","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00794","scoring_system":"epss","scoring_elements":"0.73911","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00794","scoring_system":"epss","scoring_elements":"0.73945","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00794","scoring_system":"epss","scoring_elements":"0.73958","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00794","scoring_system":"epss","scoring_elements":"0.73981","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00794","scoring_system":"epss","scoring_elements":"0.73963","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00794","scoring_system":"epss","scoring_elements":"0.73955","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00794","scoring_system":"epss","scoring_elements":"0.73995","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00794","scoring_system":"epss","scoring_elements":"0.74005","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00794","scoring_system":"epss","scoring_elements":"0.73996","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00794","scoring_system":"epss","scoring_elements":"0.7403","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00794","scoring_system":"epss","scoring_elements":"0.74038","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00794","scoring_system":"epss","scoring_elements":"0.74036","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00794","scoring_system":"epss","scoring_elements":"0.74056","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00794","scoring_system":"epss","scoring_elements":"0.74079","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00794","scoring_system":"epss","scoring_elements":"0.7404","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-0609"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0505","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0505"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0546","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0546"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0596","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0596"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0597","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0597"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0598","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0598"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0600","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0600"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0606","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0606"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0608","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0608"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0609","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0609"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0616","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0616"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2047","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2047"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"1.7","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:M/C:N/I:N/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://mariadb.com/kb/en/mariadb/mariadb-10110-release-notes/","reference_id":"","reference_type":"","scores":[],"url":"https://mariadb.com/kb/en/mariadb/mariadb-10110-release-notes/"},{"reference_url":"https://mariadb.com/kb/en/mariadb/mariadb-5547-release-notes/","reference_id":"","reference_type":"","scores":[],"url":"https://mariadb.com/kb/en/mariadb/mariadb-5547-release-notes/"},{"reference_url":"https://mariadb.com/kb/en/mdb-10023-rn/","reference_id":"","reference_type":"","scores":[],"url":"https://mariadb.com/kb/en/mdb-10023-rn/"},{"reference_url":"http://www.debian.org/security/2016/dsa-3453","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2016/dsa-3453"},{"reference_url":"http://www.debian.org/security/2016/dsa-3459","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2016/dsa-3459"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html"},{"reference_url":"http://www.securityfocus.com/bid/81258","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/81258"},{"reference_url":"http://www.securitytracker.com/id/1034708","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1034708"},{"reference_url":"http://www.ubuntu.com/usn/USN-2881-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2881-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1301507","reference_id":"1301507","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1301507"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node_eus:7.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_hpc_node_eus:7.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node_eus:7.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-0609","reference_id":"CVE-2016-0609","reference_type":"","scores":[{"value":"1.7","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:M/C:N/I:N/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-0609"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0534","reference_id":"RHSA-2016:0534","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0534"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0705","reference_id":"RHSA-2016:0705","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0705"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1132","reference_id":"RHSA-2016:1132","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1132"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1480","reference_id":"RHSA-2016:1480","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1480"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1481","reference_id":"RHSA-2016:1481","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1481"},{"reference_url":"https://usn.ubuntu.com/2881-1/","reference_id":"USN-2881-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2881-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035582?format=json","purl":"pkg:deb/debian/mariadb-10.0@10.0.25-0%2Bdeb8u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1gmc-pj6y-rkfx"},{"vulnerability":"VCID-2gyq-q761-h3br"},{"vulnerability":"VCID-2rf6-qaey-1ubn"},{"vulnerability":"VCID-45hn-ezks-j7br"},{"vulnerability":"VCID-4cnj-7fur-3qe3"},{"vulnerability":"VCID-4yz4-vxnh-b3dp"},{"vulnerability":"VCID-5sjj-599v-vybg"},{"vulnerability":"VCID-6g4n-3xfu-hfee"},{"vulnerability":"VCID-6muh-rg1z-pqab"},{"vulnerability":"VCID-8djb-knkk-s3c8"},{"vulnerability":"VCID-8krv-jqjg-uqc8"},{"vulnerability":"VCID-8kvb-5u8c-zbc4"},{"vulnerability":"VCID-8sya-wktg-dqa5"},{"vulnerability":"VCID-9f48-53dz-13an"},{"vulnerability":"VCID-9ff2-43rk-2ydj"},{"vulnerability":"VCID-9w98-nfg2-muh2"},{"vulnerability":"VCID-bhxk-8byp-eyap"},{"vulnerability":"VCID-ej67-ayfh-sqdt"},{"vulnerability":"VCID-g1pp-9qqg-1beb"},{"vulnerability":"VCID-gp4w-bdxg-6kab"},{"vulnerability":"VCID-jgff-4jyp-9fgr"},{"vulnerability":"VCID-mde2-1ynu-auh2"},{"vulnerability":"VCID-mfgg-7s54-gqg8"},{"vulnerability":"VCID-nkdd-suwp-4ffr"},{"vulnerability":"VCID-p623-gxyv-g7fs"},{"vulnerability":"VCID-pk7e-t26d-aqdm"},{"vulnerability":"VCID-pv92-6p9x-v7bs"},{"vulnerability":"VCID-r2cz-9kjz-zbgu"},{"vulnerability":"VCID-rssq-mfc2-ckaf"},{"vulnerability":"VCID-rted-6vzz-mbcv"},{"vulnerability":"VCID-tvdv-3ed5-h3dt"},{"vulnerability":"VCID-un5y-y9sq-1ufb"},{"vulnerability":"VCID-v4gv-g9n5-ukgc"},{"vulnerability":"VCID-vh5y-15tw-d7fd"},{"vulnerability":"VCID-wrna-cc9g-sqbe"},{"vulnerability":"VCID-yx79-3g2x-pqex"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.0@10.0.25-0%252Bdeb8u1"}],"aliases":["CVE-2016-0609"],"risk_score":0.8,"exploitability":"0.5","weighted_severity":"1.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-esfk-umc5-ska4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/62566?format=json","vulnerability_id":"VCID-f9vz-r6zv-t7ev","summary":"security update","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00015.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00015.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00016.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00016.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0534.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-0534.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0705.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-0705.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-1480.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-1480.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-1481.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-1481.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0596.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0596.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-0596","reference_id":"","reference_type":"","scores":[{"value":"0.00361","scoring_system":"epss","scoring_elements":"0.58349","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00361","scoring_system":"epss","scoring_elements":"0.58282","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00361","scoring_system":"epss","scoring_elements":"0.58149","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00361","scoring_system":"epss","scoring_elements":"0.58235","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00361","scoring_system":"epss","scoring_elements":"0.58255","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00361","scoring_system":"epss","scoring_elements":"0.58229","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00361","scoring_system":"epss","scoring_elements":"0.58283","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00361","scoring_system":"epss","scoring_elements":"0.58288","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00361","scoring_system":"epss","scoring_elements":"0.58307","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00361","scoring_system":"epss","scoring_elements":"0.58284","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00361","scoring_system":"epss","scoring_elements":"0.58264","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00361","scoring_system":"epss","scoring_elements":"0.58296","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00361","scoring_system":"epss","scoring_elements":"0.58298","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00361","scoring_system":"epss","scoring_elements":"0.58275","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00361","scoring_system":"epss","scoring_elements":"0.58237","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00361","scoring_system":"epss","scoring_elements":"0.5825","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00361","scoring_system":"epss","scoring_elements":"0.58236","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00361","scoring_system":"epss","scoring_elements":"0.58201","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00361","scoring_system":"epss","scoring_elements":"0.58242","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00361","scoring_system":"epss","scoring_elements":"0.58302","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-0596"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0505","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0505"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0546","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0546"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0596","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0596"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0597","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0597"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0598","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0598"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0600","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0600"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0606","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0606"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0608","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0608"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0609","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0609"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0616","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0616"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2047","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2047"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:S/C:N/I:N/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://mariadb.com/kb/en/mariadb/mariadb-10110-release-notes/","reference_id":"","reference_type":"","scores":[],"url":"https://mariadb.com/kb/en/mariadb/mariadb-10110-release-notes/"},{"reference_url":"https://mariadb.com/kb/en/mariadb/mariadb-5547-release-notes/","reference_id":"","reference_type":"","scores":[],"url":"https://mariadb.com/kb/en/mariadb/mariadb-5547-release-notes/"},{"reference_url":"https://mariadb.com/kb/en/mdb-10023-rn/","reference_id":"","reference_type":"","scores":[],"url":"https://mariadb.com/kb/en/mdb-10023-rn/"},{"reference_url":"http://www.debian.org/security/2016/dsa-3453","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2016/dsa-3453"},{"reference_url":"http://www.debian.org/security/2016/dsa-3459","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2016/dsa-3459"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html"},{"reference_url":"http://www.securityfocus.com/bid/81130","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/81130"},{"reference_url":"http://www.securitytracker.com/id/1034708","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1034708"},{"reference_url":"http://www.ubuntu.com/usn/USN-2881-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2881-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1301496","reference_id":"1301496","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1301496"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node_eus:7.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_hpc_node_eus:7.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node_eus:7.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-0596","reference_id":"CVE-2016-0596","reference_type":"","scores":[{"value":"4.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:S/C:N/I:N/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-0596"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0534","reference_id":"RHSA-2016:0534","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0534"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0705","reference_id":"RHSA-2016:0705","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0705"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1132","reference_id":"RHSA-2016:1132","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1132"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1480","reference_id":"RHSA-2016:1480","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1480"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1481","reference_id":"RHSA-2016:1481","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1481"},{"reference_url":"https://usn.ubuntu.com/2881-1/","reference_id":"USN-2881-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2881-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035582?format=json","purl":"pkg:deb/debian/mariadb-10.0@10.0.25-0%2Bdeb8u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1gmc-pj6y-rkfx"},{"vulnerability":"VCID-2gyq-q761-h3br"},{"vulnerability":"VCID-2rf6-qaey-1ubn"},{"vulnerability":"VCID-45hn-ezks-j7br"},{"vulnerability":"VCID-4cnj-7fur-3qe3"},{"vulnerability":"VCID-4yz4-vxnh-b3dp"},{"vulnerability":"VCID-5sjj-599v-vybg"},{"vulnerability":"VCID-6g4n-3xfu-hfee"},{"vulnerability":"VCID-6muh-rg1z-pqab"},{"vulnerability":"VCID-8djb-knkk-s3c8"},{"vulnerability":"VCID-8krv-jqjg-uqc8"},{"vulnerability":"VCID-8kvb-5u8c-zbc4"},{"vulnerability":"VCID-8sya-wktg-dqa5"},{"vulnerability":"VCID-9f48-53dz-13an"},{"vulnerability":"VCID-9ff2-43rk-2ydj"},{"vulnerability":"VCID-9w98-nfg2-muh2"},{"vulnerability":"VCID-bhxk-8byp-eyap"},{"vulnerability":"VCID-ej67-ayfh-sqdt"},{"vulnerability":"VCID-g1pp-9qqg-1beb"},{"vulnerability":"VCID-gp4w-bdxg-6kab"},{"vulnerability":"VCID-jgff-4jyp-9fgr"},{"vulnerability":"VCID-mde2-1ynu-auh2"},{"vulnerability":"VCID-mfgg-7s54-gqg8"},{"vulnerability":"VCID-nkdd-suwp-4ffr"},{"vulnerability":"VCID-p623-gxyv-g7fs"},{"vulnerability":"VCID-pk7e-t26d-aqdm"},{"vulnerability":"VCID-pv92-6p9x-v7bs"},{"vulnerability":"VCID-r2cz-9kjz-zbgu"},{"vulnerability":"VCID-rssq-mfc2-ckaf"},{"vulnerability":"VCID-rted-6vzz-mbcv"},{"vulnerability":"VCID-tvdv-3ed5-h3dt"},{"vulnerability":"VCID-un5y-y9sq-1ufb"},{"vulnerability":"VCID-v4gv-g9n5-ukgc"},{"vulnerability":"VCID-vh5y-15tw-d7fd"},{"vulnerability":"VCID-wrna-cc9g-sqbe"},{"vulnerability":"VCID-yx79-3g2x-pqex"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.0@10.0.25-0%252Bdeb8u1"}],"aliases":["CVE-2016-0596"],"risk_score":1.8,"exploitability":"0.5","weighted_severity":"3.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-f9vz-r6zv-t7ev"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/62564?format=json","vulnerability_id":"VCID-fnks-p4e9-13es","summary":"security update","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00015.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00015.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00016.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00016.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0534.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-0534.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0705.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-0705.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-1480.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-1480.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-1481.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-1481.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0505.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0505.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-0505","reference_id":"","reference_type":"","scores":[{"value":"0.06492","scoring_system":"epss","scoring_elements":"0.9119","published_at":"2026-05-14T12:55:00Z"},{"value":"0.06492","scoring_system":"epss","scoring_elements":"0.91179","published_at":"2026-05-12T12:55:00Z"},{"value":"0.06492","scoring_system":"epss","scoring_elements":"0.91047","published_at":"2026-04-01T12:55:00Z"},{"value":"0.06492","scoring_system":"epss","scoring_elements":"0.91051","published_at":"2026-04-02T12:55:00Z"},{"value":"0.06492","scoring_system":"epss","scoring_elements":"0.91061","published_at":"2026-04-04T12:55:00Z"},{"value":"0.06492","scoring_system":"epss","scoring_elements":"0.91069","published_at":"2026-04-07T12:55:00Z"},{"value":"0.06492","scoring_system":"epss","scoring_elements":"0.91082","published_at":"2026-04-08T12:55:00Z"},{"value":"0.06492","scoring_system":"epss","scoring_elements":"0.91088","published_at":"2026-04-09T12:55:00Z"},{"value":"0.06492","scoring_system":"epss","scoring_elements":"0.91096","published_at":"2026-04-11T12:55:00Z"},{"value":"0.06492","scoring_system":"epss","scoring_elements":"0.91097","published_at":"2026-04-13T12:55:00Z"},{"value":"0.06492","scoring_system":"epss","scoring_elements":"0.91121","published_at":"2026-04-18T12:55:00Z"},{"value":"0.06492","scoring_system":"epss","scoring_elements":"0.91124","published_at":"2026-04-21T12:55:00Z"},{"value":"0.06492","scoring_system":"epss","scoring_elements":"0.91138","published_at":"2026-04-24T12:55:00Z"},{"value":"0.06492","scoring_system":"epss","scoring_elements":"0.91135","published_at":"2026-04-26T12:55:00Z"},{"value":"0.06492","scoring_system":"epss","scoring_elements":"0.9113","published_at":"2026-04-29T12:55:00Z"},{"value":"0.06492","scoring_system":"epss","scoring_elements":"0.91144","published_at":"2026-05-05T12:55:00Z"},{"value":"0.06492","scoring_system":"epss","scoring_elements":"0.91159","published_at":"2026-05-07T12:55:00Z"},{"value":"0.06492","scoring_system":"epss","scoring_elements":"0.9117","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-0505"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0505","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0505"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0546","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0546"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0596","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0596"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0597","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0597"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0598","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0598"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0600","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0600"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0606","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0606"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0608","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0608"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0609","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0609"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0616","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0616"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2047","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2047"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:S/C:N/I:N/A:C"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://mariadb.com/kb/en/mariadb/mariadb-10110-release-notes/","reference_id":"","reference_type":"","scores":[],"url":"https://mariadb.com/kb/en/mariadb/mariadb-10110-release-notes/"},{"reference_url":"https://mariadb.com/kb/en/mariadb/mariadb-5547-release-notes/","reference_id":"","reference_type":"","scores":[],"url":"https://mariadb.com/kb/en/mariadb/mariadb-5547-release-notes/"},{"reference_url":"https://mariadb.com/kb/en/mdb-10023-rn/","reference_id":"","reference_type":"","scores":[],"url":"https://mariadb.com/kb/en/mdb-10023-rn/"},{"reference_url":"http://www.debian.org/security/2016/dsa-3453","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2016/dsa-3453"},{"reference_url":"http://www.debian.org/security/2016/dsa-3459","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2016/dsa-3459"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html"},{"reference_url":"http://www.securityfocus.com/bid/81088","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/81088"},{"reference_url":"http://www.securitytracker.com/id/1034708","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1034708"},{"reference_url":"http://www.ubuntu.com/usn/USN-2881-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2881-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1301492","reference_id":"1301492","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1301492"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node_eus:7.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_hpc_node_eus:7.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node_eus:7.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-0505","reference_id":"CVE-2016-0505","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:S/C:N/I:N/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-0505"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0534","reference_id":"RHSA-2016:0534","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0534"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0705","reference_id":"RHSA-2016:0705","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0705"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1132","reference_id":"RHSA-2016:1132","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1132"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1480","reference_id":"RHSA-2016:1480","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1480"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1481","reference_id":"RHSA-2016:1481","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1481"},{"reference_url":"https://usn.ubuntu.com/2881-1/","reference_id":"USN-2881-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2881-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035582?format=json","purl":"pkg:deb/debian/mariadb-10.0@10.0.25-0%2Bdeb8u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1gmc-pj6y-rkfx"},{"vulnerability":"VCID-2gyq-q761-h3br"},{"vulnerability":"VCID-2rf6-qaey-1ubn"},{"vulnerability":"VCID-45hn-ezks-j7br"},{"vulnerability":"VCID-4cnj-7fur-3qe3"},{"vulnerability":"VCID-4yz4-vxnh-b3dp"},{"vulnerability":"VCID-5sjj-599v-vybg"},{"vulnerability":"VCID-6g4n-3xfu-hfee"},{"vulnerability":"VCID-6muh-rg1z-pqab"},{"vulnerability":"VCID-8djb-knkk-s3c8"},{"vulnerability":"VCID-8krv-jqjg-uqc8"},{"vulnerability":"VCID-8kvb-5u8c-zbc4"},{"vulnerability":"VCID-8sya-wktg-dqa5"},{"vulnerability":"VCID-9f48-53dz-13an"},{"vulnerability":"VCID-9ff2-43rk-2ydj"},{"vulnerability":"VCID-9w98-nfg2-muh2"},{"vulnerability":"VCID-bhxk-8byp-eyap"},{"vulnerability":"VCID-ej67-ayfh-sqdt"},{"vulnerability":"VCID-g1pp-9qqg-1beb"},{"vulnerability":"VCID-gp4w-bdxg-6kab"},{"vulnerability":"VCID-jgff-4jyp-9fgr"},{"vulnerability":"VCID-mde2-1ynu-auh2"},{"vulnerability":"VCID-mfgg-7s54-gqg8"},{"vulnerability":"VCID-nkdd-suwp-4ffr"},{"vulnerability":"VCID-p623-gxyv-g7fs"},{"vulnerability":"VCID-pk7e-t26d-aqdm"},{"vulnerability":"VCID-pv92-6p9x-v7bs"},{"vulnerability":"VCID-r2cz-9kjz-zbgu"},{"vulnerability":"VCID-rssq-mfc2-ckaf"},{"vulnerability":"VCID-rted-6vzz-mbcv"},{"vulnerability":"VCID-tvdv-3ed5-h3dt"},{"vulnerability":"VCID-un5y-y9sq-1ufb"},{"vulnerability":"VCID-v4gv-g9n5-ukgc"},{"vulnerability":"VCID-vh5y-15tw-d7fd"},{"vulnerability":"VCID-wrna-cc9g-sqbe"},{"vulnerability":"VCID-yx79-3g2x-pqex"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.0@10.0.25-0%252Bdeb8u1"}],"aliases":["CVE-2016-0505"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"6.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-fnks-p4e9-13es"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/62573?format=json","vulnerability_id":"VCID-fuyw-1y1c-fkfp","summary":"security update","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0534.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-0534.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-1480.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-1480.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-1481.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-1481.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0616.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0616.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-0616","reference_id":"","reference_type":"","scores":[{"value":"0.00472","scoring_system":"epss","scoring_elements":"0.64856","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00472","scoring_system":"epss","scoring_elements":"0.64801","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00472","scoring_system":"epss","scoring_elements":"0.64596","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00472","scoring_system":"epss","scoring_elements":"0.64648","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00472","scoring_system":"epss","scoring_elements":"0.64676","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00472","scoring_system":"epss","scoring_elements":"0.64634","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00472","scoring_system":"epss","scoring_elements":"0.64682","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00472","scoring_system":"epss","scoring_elements":"0.64698","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00472","scoring_system":"epss","scoring_elements":"0.64715","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00472","scoring_system":"epss","scoring_elements":"0.64703","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00472","scoring_system":"epss","scoring_elements":"0.64674","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00472","scoring_system":"epss","scoring_elements":"0.6471","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00472","scoring_system":"epss","scoring_elements":"0.64722","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00472","scoring_system":"epss","scoring_elements":"0.64708","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00472","scoring_system":"epss","scoring_elements":"0.64729","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00472","scoring_system":"epss","scoring_elements":"0.64742","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00472","scoring_system":"epss","scoring_elements":"0.64738","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00472","scoring_system":"epss","scoring_elements":"0.64718","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00472","scoring_system":"epss","scoring_elements":"0.64765","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00472","scoring_system":"epss","scoring_elements":"0.64809","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00472","scoring_system":"epss","scoring_elements":"0.6478","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-0616"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0505","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0505"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0546","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0546"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0596","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0596"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0597","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0597"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0598","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0598"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0600","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0600"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0606","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0606"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0608","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0608"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0609","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0609"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0616","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0616"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2047","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2047"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:S/C:N/I:N/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://mariadb.com/kb/en/mariadb/mariadb-10110-release-notes/","reference_id":"","reference_type":"","scores":[],"url":"https://mariadb.com/kb/en/mariadb/mariadb-10110-release-notes/"},{"reference_url":"https://mariadb.com/kb/en/mariadb/mariadb-5547-release-notes/","reference_id":"","reference_type":"","scores":[],"url":"https://mariadb.com/kb/en/mariadb/mariadb-5547-release-notes/"},{"reference_url":"https://mariadb.com/kb/en/mdb-10023-rn/","reference_id":"","reference_type":"","scores":[],"url":"https://mariadb.com/kb/en/mdb-10023-rn/"},{"reference_url":"http://www.debian.org/security/2016/dsa-3453","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2016/dsa-3453"},{"reference_url":"http://www.debian.org/security/2016/dsa-3459","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2016/dsa-3459"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html"},{"reference_url":"http://www.securityfocus.com/bid/81176","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/81176"},{"reference_url":"http://www.securitytracker.com/id/1034708","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1034708"},{"reference_url":"http://www.ubuntu.com/usn/USN-2881-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2881-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1301510","reference_id":"1301510","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1301510"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.0.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mariadb:mariadb:10.0.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.0.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mariadb:mariadb:10.0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.0.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mariadb:mariadb:10.0.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.0.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.0.11:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mariadb:mariadb:10.0.11:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.0.11:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.0.12:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mariadb:mariadb:10.0.12:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.0.12:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.0.13:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mariadb:mariadb:10.0.13:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.0.13:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.0.14:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mariadb:mariadb:10.0.14:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.0.14:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.0.15:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mariadb:mariadb:10.0.15:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.0.15:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.0.16:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mariadb:mariadb:10.0.16:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.0.16:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.0.17:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mariadb:mariadb:10.0.17:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.0.17:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.0.18:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mariadb:mariadb:10.0.18:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.0.18:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.0.19:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mariadb:mariadb:10.0.19:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.0.19:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.0.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mariadb:mariadb:10.0.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.0.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.0.20:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mariadb:mariadb:10.0.20:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.0.20:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.0.21:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mariadb:mariadb:10.0.21:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.0.21:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.0.22:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mariadb:mariadb:10.0.22:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.0.22:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.0.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mariadb:mariadb:10.0.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.0.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.0.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mariadb:mariadb:10.0.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.0.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.0.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mariadb:mariadb:10.0.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.0.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.0.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mariadb:mariadb:10.0.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.0.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.0.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mariadb:mariadb:10.0.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.0.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.0.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mariadb:mariadb:10.0.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.0.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.0.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mariadb:mariadb:10.0.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.0.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.1.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mariadb:mariadb:10.1.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.1.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.1.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mariadb:mariadb:10.1.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.1.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.1.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mariadb:mariadb:10.1.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.1.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.1.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mariadb:mariadb:10.1.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.1.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.1.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mariadb:mariadb:10.1.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.1.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.1.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mariadb:mariadb:10.1.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.1.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.1.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mariadb:mariadb:10.1.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.1.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.1.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mariadb:mariadb:10.1.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.1.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.1.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mariadb:mariadb:10.1.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.1.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.1.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mariadb:mariadb:10.1.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.1.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node_eus:7.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_hpc_node_eus:7.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node_eus:7.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-0616","reference_id":"CVE-2016-0616","reference_type":"","scores":[{"value":"4.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:S/C:N/I:N/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-0616"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0534","reference_id":"RHSA-2016:0534","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0534"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1132","reference_id":"RHSA-2016:1132","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1132"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1480","reference_id":"RHSA-2016:1480","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1480"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1481","reference_id":"RHSA-2016:1481","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1481"},{"reference_url":"https://usn.ubuntu.com/2881-1/","reference_id":"USN-2881-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2881-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035582?format=json","purl":"pkg:deb/debian/mariadb-10.0@10.0.25-0%2Bdeb8u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1gmc-pj6y-rkfx"},{"vulnerability":"VCID-2gyq-q761-h3br"},{"vulnerability":"VCID-2rf6-qaey-1ubn"},{"vulnerability":"VCID-45hn-ezks-j7br"},{"vulnerability":"VCID-4cnj-7fur-3qe3"},{"vulnerability":"VCID-4yz4-vxnh-b3dp"},{"vulnerability":"VCID-5sjj-599v-vybg"},{"vulnerability":"VCID-6g4n-3xfu-hfee"},{"vulnerability":"VCID-6muh-rg1z-pqab"},{"vulnerability":"VCID-8djb-knkk-s3c8"},{"vulnerability":"VCID-8krv-jqjg-uqc8"},{"vulnerability":"VCID-8kvb-5u8c-zbc4"},{"vulnerability":"VCID-8sya-wktg-dqa5"},{"vulnerability":"VCID-9f48-53dz-13an"},{"vulnerability":"VCID-9ff2-43rk-2ydj"},{"vulnerability":"VCID-9w98-nfg2-muh2"},{"vulnerability":"VCID-bhxk-8byp-eyap"},{"vulnerability":"VCID-ej67-ayfh-sqdt"},{"vulnerability":"VCID-g1pp-9qqg-1beb"},{"vulnerability":"VCID-gp4w-bdxg-6kab"},{"vulnerability":"VCID-jgff-4jyp-9fgr"},{"vulnerability":"VCID-mde2-1ynu-auh2"},{"vulnerability":"VCID-mfgg-7s54-gqg8"},{"vulnerability":"VCID-nkdd-suwp-4ffr"},{"vulnerability":"VCID-p623-gxyv-g7fs"},{"vulnerability":"VCID-pk7e-t26d-aqdm"},{"vulnerability":"VCID-pv92-6p9x-v7bs"},{"vulnerability":"VCID-r2cz-9kjz-zbgu"},{"vulnerability":"VCID-rssq-mfc2-ckaf"},{"vulnerability":"VCID-rted-6vzz-mbcv"},{"vulnerability":"VCID-tvdv-3ed5-h3dt"},{"vulnerability":"VCID-un5y-y9sq-1ufb"},{"vulnerability":"VCID-v4gv-g9n5-ukgc"},{"vulnerability":"VCID-vh5y-15tw-d7fd"},{"vulnerability":"VCID-wrna-cc9g-sqbe"},{"vulnerability":"VCID-yx79-3g2x-pqex"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.0@10.0.25-0%252Bdeb8u1"}],"aliases":["CVE-2016-0616"],"risk_score":1.8,"exploitability":"0.5","weighted_severity":"3.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-fuyw-1y1c-fkfp"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61076?format=json","vulnerability_id":"VCID-hg16-rg46-4fe3","summary":"security update","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4815.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4815.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-4815","reference_id":"","reference_type":"","scores":[{"value":"0.00413","scoring_system":"epss","scoring_elements":"0.61354","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00413","scoring_system":"epss","scoring_elements":"0.61431","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00413","scoring_system":"epss","scoring_elements":"0.61459","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00413","scoring_system":"epss","scoring_elements":"0.61429","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00413","scoring_system":"epss","scoring_elements":"0.61477","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00413","scoring_system":"epss","scoring_elements":"0.61492","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00413","scoring_system":"epss","scoring_elements":"0.61513","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00413","scoring_system":"epss","scoring_elements":"0.615","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00413","scoring_system":"epss","scoring_elements":"0.6148","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00413","scoring_system":"epss","scoring_elements":"0.61519","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00413","scoring_system":"epss","scoring_elements":"0.61523","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00413","scoring_system":"epss","scoring_elements":"0.61507","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00413","scoring_system":"epss","scoring_elements":"0.61494","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00413","scoring_system":"epss","scoring_elements":"0.6151","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00413","scoring_system":"epss","scoring_elements":"0.61505","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00413","scoring_system":"epss","scoring_elements":"0.61456","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00413","scoring_system":"epss","scoring_elements":"0.61504","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00413","scoring_system":"epss","scoring_elements":"0.61564","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00413","scoring_system":"epss","scoring_elements":"0.61526","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00413","scoring_system":"epss","scoring_elements":"0.61553","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00413","scoring_system":"epss","scoring_elements":"0.61604","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-4815"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4792","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4792"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4802","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4802"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4815","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4815"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4816","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4816"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4819","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4819"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4826","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4826"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4830","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4830"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4836","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4836"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4858","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4858"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4861","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4861"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4870","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4870"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4879","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4879"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4895","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4895"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4913","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4913"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1274759","reference_id":"1274759","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1274759"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0534","reference_id":"RHSA-2016:0534","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0534"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0705","reference_id":"RHSA-2016:0705","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0705"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1132","reference_id":"RHSA-2016:1132","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1132"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1480","reference_id":"RHSA-2016:1480","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1480"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1481","reference_id":"RHSA-2016:1481","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1481"},{"reference_url":"https://usn.ubuntu.com/2781-1/","reference_id":"USN-2781-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2781-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035582?format=json","purl":"pkg:deb/debian/mariadb-10.0@10.0.25-0%2Bdeb8u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1gmc-pj6y-rkfx"},{"vulnerability":"VCID-2gyq-q761-h3br"},{"vulnerability":"VCID-2rf6-qaey-1ubn"},{"vulnerability":"VCID-45hn-ezks-j7br"},{"vulnerability":"VCID-4cnj-7fur-3qe3"},{"vulnerability":"VCID-4yz4-vxnh-b3dp"},{"vulnerability":"VCID-5sjj-599v-vybg"},{"vulnerability":"VCID-6g4n-3xfu-hfee"},{"vulnerability":"VCID-6muh-rg1z-pqab"},{"vulnerability":"VCID-8djb-knkk-s3c8"},{"vulnerability":"VCID-8krv-jqjg-uqc8"},{"vulnerability":"VCID-8kvb-5u8c-zbc4"},{"vulnerability":"VCID-8sya-wktg-dqa5"},{"vulnerability":"VCID-9f48-53dz-13an"},{"vulnerability":"VCID-9ff2-43rk-2ydj"},{"vulnerability":"VCID-9w98-nfg2-muh2"},{"vulnerability":"VCID-bhxk-8byp-eyap"},{"vulnerability":"VCID-ej67-ayfh-sqdt"},{"vulnerability":"VCID-g1pp-9qqg-1beb"},{"vulnerability":"VCID-gp4w-bdxg-6kab"},{"vulnerability":"VCID-jgff-4jyp-9fgr"},{"vulnerability":"VCID-mde2-1ynu-auh2"},{"vulnerability":"VCID-mfgg-7s54-gqg8"},{"vulnerability":"VCID-nkdd-suwp-4ffr"},{"vulnerability":"VCID-p623-gxyv-g7fs"},{"vulnerability":"VCID-pk7e-t26d-aqdm"},{"vulnerability":"VCID-pv92-6p9x-v7bs"},{"vulnerability":"VCID-r2cz-9kjz-zbgu"},{"vulnerability":"VCID-rssq-mfc2-ckaf"},{"vulnerability":"VCID-rted-6vzz-mbcv"},{"vulnerability":"VCID-tvdv-3ed5-h3dt"},{"vulnerability":"VCID-un5y-y9sq-1ufb"},{"vulnerability":"VCID-v4gv-g9n5-ukgc"},{"vulnerability":"VCID-vh5y-15tw-d7fd"},{"vulnerability":"VCID-wrna-cc9g-sqbe"},{"vulnerability":"VCID-yx79-3g2x-pqex"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.0@10.0.25-0%252Bdeb8u1"}],"aliases":["CVE-2015-4815"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-hg16-rg46-4fe3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/36464?format=json","vulnerability_id":"VCID-hpk6-es28-5ueb","summary":"Multiple vulnerabilities have been found in MySQL, allowing\n    attackers to execute arbitrary code or cause Denial of Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2571.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2571.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-2571","reference_id":"","reference_type":"","scores":[{"value":"0.00308","scoring_system":"epss","scoring_elements":"0.53886","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00308","scoring_system":"epss","scoring_elements":"0.53904","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00308","scoring_system":"epss","scoring_elements":"0.53932","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00308","scoring_system":"epss","scoring_elements":"0.53906","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00308","scoring_system":"epss","scoring_elements":"0.53958","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00308","scoring_system":"epss","scoring_elements":"0.54004","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00308","scoring_system":"epss","scoring_elements":"0.53987","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00308","scoring_system":"epss","scoring_elements":"0.5397","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00308","scoring_system":"epss","scoring_elements":"0.54008","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00308","scoring_system":"epss","scoring_elements":"0.54013","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00308","scoring_system":"epss","scoring_elements":"0.53994","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00308","scoring_system":"epss","scoring_elements":"0.53961","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00308","scoring_system":"epss","scoring_elements":"0.53973","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00308","scoring_system":"epss","scoring_elements":"0.53943","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00308","scoring_system":"epss","scoring_elements":"0.53891","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00308","scoring_system":"epss","scoring_elements":"0.53934","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00308","scoring_system":"epss","scoring_elements":"0.53989","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00308","scoring_system":"epss","scoring_elements":"0.53948","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00308","scoring_system":"epss","scoring_elements":"0.53974","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00308","scoring_system":"epss","scoring_elements":"0.54044","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-2571"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0433","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0433"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0441","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0441"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0499","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0499"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0501","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0501"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0505","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0505"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2568","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2568"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2571","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2571"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2573","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2573"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2582","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2582"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2643","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2643"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2648","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2648"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3152","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3152"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4752","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4752"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4757","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4757"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1212772","reference_id":"1212772","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1212772"},{"reference_url":"https://security.gentoo.org/glsa/201507-19","reference_id":"GLSA-201507-19","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201507-19"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1628","reference_id":"RHSA-2015:1628","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1628"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1629","reference_id":"RHSA-2015:1629","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1629"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1646","reference_id":"RHSA-2015:1646","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1646"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1647","reference_id":"RHSA-2015:1647","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1647"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1665","reference_id":"RHSA-2015:1665","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1665"},{"reference_url":"https://usn.ubuntu.com/2575-1/","reference_id":"USN-2575-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2575-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035582?format=json","purl":"pkg:deb/debian/mariadb-10.0@10.0.25-0%2Bdeb8u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1gmc-pj6y-rkfx"},{"vulnerability":"VCID-2gyq-q761-h3br"},{"vulnerability":"VCID-2rf6-qaey-1ubn"},{"vulnerability":"VCID-45hn-ezks-j7br"},{"vulnerability":"VCID-4cnj-7fur-3qe3"},{"vulnerability":"VCID-4yz4-vxnh-b3dp"},{"vulnerability":"VCID-5sjj-599v-vybg"},{"vulnerability":"VCID-6g4n-3xfu-hfee"},{"vulnerability":"VCID-6muh-rg1z-pqab"},{"vulnerability":"VCID-8djb-knkk-s3c8"},{"vulnerability":"VCID-8krv-jqjg-uqc8"},{"vulnerability":"VCID-8kvb-5u8c-zbc4"},{"vulnerability":"VCID-8sya-wktg-dqa5"},{"vulnerability":"VCID-9f48-53dz-13an"},{"vulnerability":"VCID-9ff2-43rk-2ydj"},{"vulnerability":"VCID-9w98-nfg2-muh2"},{"vulnerability":"VCID-bhxk-8byp-eyap"},{"vulnerability":"VCID-ej67-ayfh-sqdt"},{"vulnerability":"VCID-g1pp-9qqg-1beb"},{"vulnerability":"VCID-gp4w-bdxg-6kab"},{"vulnerability":"VCID-jgff-4jyp-9fgr"},{"vulnerability":"VCID-mde2-1ynu-auh2"},{"vulnerability":"VCID-mfgg-7s54-gqg8"},{"vulnerability":"VCID-nkdd-suwp-4ffr"},{"vulnerability":"VCID-p623-gxyv-g7fs"},{"vulnerability":"VCID-pk7e-t26d-aqdm"},{"vulnerability":"VCID-pv92-6p9x-v7bs"},{"vulnerability":"VCID-r2cz-9kjz-zbgu"},{"vulnerability":"VCID-rssq-mfc2-ckaf"},{"vulnerability":"VCID-rted-6vzz-mbcv"},{"vulnerability":"VCID-tvdv-3ed5-h3dt"},{"vulnerability":"VCID-un5y-y9sq-1ufb"},{"vulnerability":"VCID-v4gv-g9n5-ukgc"},{"vulnerability":"VCID-vh5y-15tw-d7fd"},{"vulnerability":"VCID-wrna-cc9g-sqbe"},{"vulnerability":"VCID-yx79-3g2x-pqex"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.0@10.0.25-0%252Bdeb8u1"}],"aliases":["CVE-2015-2571"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-hpk6-es28-5ueb"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61082?format=json","vulnerability_id":"VCID-jqmx-5tfh-qqff","summary":"security update","references":[{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177539.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177539.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00010.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00010.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00011.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00011.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2016-02/msg00039.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2016-02/msg00039.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0534.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-0534.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0705.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-0705.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-1480.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-1480.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-1481.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-1481.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4836.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4836.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-4836","reference_id":"","reference_type":"","scores":[{"value":"0.00861","scoring_system":"epss","scoring_elements":"0.75237","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00861","scoring_system":"epss","scoring_elements":"0.75008","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00861","scoring_system":"epss","scoring_elements":"0.75011","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00861","scoring_system":"epss","scoring_elements":"0.7504","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00861","scoring_system":"epss","scoring_elements":"0.75016","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00861","scoring_system":"epss","scoring_elements":"0.7505","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00861","scoring_system":"epss","scoring_elements":"0.75061","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00861","scoring_system":"epss","scoring_elements":"0.75084","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00861","scoring_system":"epss","scoring_elements":"0.75063","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00861","scoring_system":"epss","scoring_elements":"0.75052","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00861","scoring_system":"epss","scoring_elements":"0.7509","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00861","scoring_system":"epss","scoring_elements":"0.75097","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00861","scoring_system":"epss","scoring_elements":"0.75087","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00861","scoring_system":"epss","scoring_elements":"0.75125","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00861","scoring_system":"epss","scoring_elements":"0.75129","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00861","scoring_system":"epss","scoring_elements":"0.75133","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00861","scoring_system":"epss","scoring_elements":"0.75141","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00861","scoring_system":"epss","scoring_elements":"0.75168","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00861","scoring_system":"epss","scoring_elements":"0.75193","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00861","scoring_system":"epss","scoring_elements":"0.75174","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00861","scoring_system":"epss","scoring_elements":"0.75183","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-4836"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4792","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4792"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4802","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4802"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4815","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4815"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4816","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4816"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4819","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4819"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4826","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4826"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4830","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4830"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4836","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4836"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4858","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4858"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4861","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4861"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4870","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4870"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4879","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4879"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4895","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4895"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4913","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4913"},{"reference_url":"https://www.suse.com/support/update/announcement/2016/suse-su-20160296-1.html","reference_id":"","reference_type":"","scores":[],"url":"https://www.suse.com/support/update/announcement/2016/suse-su-20160296-1.html"},{"reference_url":"http://www.debian.org/security/2015/dsa-3377","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2015/dsa-3377"},{"reference_url":"http://www.debian.org/security/2015/dsa-3385","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2015/dsa-3385"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html"},{"reference_url":"http://www.securityfocus.com/bid/77190","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/77190"},{"reference_url":"http://www.securitytracker.com/id/1033894","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1033894"},{"reference_url":"http://www.ubuntu.com/usn/USN-2781-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2781-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1274771","reference_id":"1274771","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1274771"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:-:*:*:*:*:*:*","reference_id":"cpe:2.3:o:oracle:linux:7:-:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:-:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2015-4836","reference_id":"CVE-2015-4836","reference_type":"","scores":[{"value":"2.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:M/C:N/I:N/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2015-4836"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0534","reference_id":"RHSA-2016:0534","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0534"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0705","reference_id":"RHSA-2016:0705","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0705"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1132","reference_id":"RHSA-2016:1132","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1132"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1480","reference_id":"RHSA-2016:1480","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1480"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1481","reference_id":"RHSA-2016:1481","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1481"},{"reference_url":"https://usn.ubuntu.com/2781-1/","reference_id":"USN-2781-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2781-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035582?format=json","purl":"pkg:deb/debian/mariadb-10.0@10.0.25-0%2Bdeb8u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1gmc-pj6y-rkfx"},{"vulnerability":"VCID-2gyq-q761-h3br"},{"vulnerability":"VCID-2rf6-qaey-1ubn"},{"vulnerability":"VCID-45hn-ezks-j7br"},{"vulnerability":"VCID-4cnj-7fur-3qe3"},{"vulnerability":"VCID-4yz4-vxnh-b3dp"},{"vulnerability":"VCID-5sjj-599v-vybg"},{"vulnerability":"VCID-6g4n-3xfu-hfee"},{"vulnerability":"VCID-6muh-rg1z-pqab"},{"vulnerability":"VCID-8djb-knkk-s3c8"},{"vulnerability":"VCID-8krv-jqjg-uqc8"},{"vulnerability":"VCID-8kvb-5u8c-zbc4"},{"vulnerability":"VCID-8sya-wktg-dqa5"},{"vulnerability":"VCID-9f48-53dz-13an"},{"vulnerability":"VCID-9ff2-43rk-2ydj"},{"vulnerability":"VCID-9w98-nfg2-muh2"},{"vulnerability":"VCID-bhxk-8byp-eyap"},{"vulnerability":"VCID-ej67-ayfh-sqdt"},{"vulnerability":"VCID-g1pp-9qqg-1beb"},{"vulnerability":"VCID-gp4w-bdxg-6kab"},{"vulnerability":"VCID-jgff-4jyp-9fgr"},{"vulnerability":"VCID-mde2-1ynu-auh2"},{"vulnerability":"VCID-mfgg-7s54-gqg8"},{"vulnerability":"VCID-nkdd-suwp-4ffr"},{"vulnerability":"VCID-p623-gxyv-g7fs"},{"vulnerability":"VCID-pk7e-t26d-aqdm"},{"vulnerability":"VCID-pv92-6p9x-v7bs"},{"vulnerability":"VCID-r2cz-9kjz-zbgu"},{"vulnerability":"VCID-rssq-mfc2-ckaf"},{"vulnerability":"VCID-rted-6vzz-mbcv"},{"vulnerability":"VCID-tvdv-3ed5-h3dt"},{"vulnerability":"VCID-un5y-y9sq-1ufb"},{"vulnerability":"VCID-v4gv-g9n5-ukgc"},{"vulnerability":"VCID-vh5y-15tw-d7fd"},{"vulnerability":"VCID-wrna-cc9g-sqbe"},{"vulnerability":"VCID-yx79-3g2x-pqex"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.0@10.0.25-0%252Bdeb8u1"}],"aliases":["CVE-2015-4836"],"risk_score":1.2,"exploitability":"0.5","weighted_severity":"2.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-jqmx-5tfh-qqff"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/36449?format=json","vulnerability_id":"VCID-jzjd-n9ga-6yf5","summary":"Multiple vulnerabilities have been found in MySQL, allowing\n    attackers to execute arbitrary code or cause Denial of Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0441.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0441.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-0441","reference_id":"","reference_type":"","scores":[{"value":"0.00384","scoring_system":"epss","scoring_elements":"0.59573","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00384","scoring_system":"epss","scoring_elements":"0.59646","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00384","scoring_system":"epss","scoring_elements":"0.5967","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00384","scoring_system":"epss","scoring_elements":"0.59641","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00384","scoring_system":"epss","scoring_elements":"0.59692","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00384","scoring_system":"epss","scoring_elements":"0.59705","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00384","scoring_system":"epss","scoring_elements":"0.59725","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00384","scoring_system":"epss","scoring_elements":"0.59708","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00384","scoring_system":"epss","scoring_elements":"0.59689","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00384","scoring_system":"epss","scoring_elements":"0.59722","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00384","scoring_system":"epss","scoring_elements":"0.5973","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00384","scoring_system":"epss","scoring_elements":"0.59714","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00384","scoring_system":"epss","scoring_elements":"0.59684","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00384","scoring_system":"epss","scoring_elements":"0.59703","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00384","scoring_system":"epss","scoring_elements":"0.59652","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00384","scoring_system":"epss","scoring_elements":"0.597","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00384","scoring_system":"epss","scoring_elements":"0.59758","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00384","scoring_system":"epss","scoring_elements":"0.59715","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00384","scoring_system":"epss","scoring_elements":"0.59743","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00384","scoring_system":"epss","scoring_elements":"0.59812","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-0441"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0433","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0433"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0441","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0441"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0499","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0499"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0501","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0501"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0505","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0505"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2568","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2568"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2571","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2571"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2573","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2573"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2582","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2582"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2643","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2643"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2648","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2648"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3152","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3152"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4752","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4752"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4757","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4757"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1212777","reference_id":"1212777","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1212777"},{"reference_url":"https://security.gentoo.org/glsa/201507-19","reference_id":"GLSA-201507-19","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201507-19"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1628","reference_id":"RHSA-2015:1628","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1628"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1629","reference_id":"RHSA-2015:1629","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1629"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1647","reference_id":"RHSA-2015:1647","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1647"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1665","reference_id":"RHSA-2015:1665","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1665"},{"reference_url":"https://usn.ubuntu.com/2575-1/","reference_id":"USN-2575-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2575-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035582?format=json","purl":"pkg:deb/debian/mariadb-10.0@10.0.25-0%2Bdeb8u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1gmc-pj6y-rkfx"},{"vulnerability":"VCID-2gyq-q761-h3br"},{"vulnerability":"VCID-2rf6-qaey-1ubn"},{"vulnerability":"VCID-45hn-ezks-j7br"},{"vulnerability":"VCID-4cnj-7fur-3qe3"},{"vulnerability":"VCID-4yz4-vxnh-b3dp"},{"vulnerability":"VCID-5sjj-599v-vybg"},{"vulnerability":"VCID-6g4n-3xfu-hfee"},{"vulnerability":"VCID-6muh-rg1z-pqab"},{"vulnerability":"VCID-8djb-knkk-s3c8"},{"vulnerability":"VCID-8krv-jqjg-uqc8"},{"vulnerability":"VCID-8kvb-5u8c-zbc4"},{"vulnerability":"VCID-8sya-wktg-dqa5"},{"vulnerability":"VCID-9f48-53dz-13an"},{"vulnerability":"VCID-9ff2-43rk-2ydj"},{"vulnerability":"VCID-9w98-nfg2-muh2"},{"vulnerability":"VCID-bhxk-8byp-eyap"},{"vulnerability":"VCID-ej67-ayfh-sqdt"},{"vulnerability":"VCID-g1pp-9qqg-1beb"},{"vulnerability":"VCID-gp4w-bdxg-6kab"},{"vulnerability":"VCID-jgff-4jyp-9fgr"},{"vulnerability":"VCID-mde2-1ynu-auh2"},{"vulnerability":"VCID-mfgg-7s54-gqg8"},{"vulnerability":"VCID-nkdd-suwp-4ffr"},{"vulnerability":"VCID-p623-gxyv-g7fs"},{"vulnerability":"VCID-pk7e-t26d-aqdm"},{"vulnerability":"VCID-pv92-6p9x-v7bs"},{"vulnerability":"VCID-r2cz-9kjz-zbgu"},{"vulnerability":"VCID-rssq-mfc2-ckaf"},{"vulnerability":"VCID-rted-6vzz-mbcv"},{"vulnerability":"VCID-tvdv-3ed5-h3dt"},{"vulnerability":"VCID-un5y-y9sq-1ufb"},{"vulnerability":"VCID-v4gv-g9n5-ukgc"},{"vulnerability":"VCID-vh5y-15tw-d7fd"},{"vulnerability":"VCID-wrna-cc9g-sqbe"},{"vulnerability":"VCID-yx79-3g2x-pqex"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.0@10.0.25-0%252Bdeb8u1"}],"aliases":["CVE-2015-0441"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-jzjd-n9ga-6yf5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/81260?format=json","vulnerability_id":"VCID-kwrj-3fxz-g7c6","summary":"security update","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:22Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:22Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:22Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:22Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:22Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:22Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0705.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:22Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-0705.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-1480.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:22Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-1480.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-1481.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:22Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-1481.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-1602.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:22Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-1602.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0644.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0644.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-0644","reference_id":"","reference_type":"","scores":[{"value":"0.00214","scoring_system":"epss","scoring_elements":"0.43689","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00214","scoring_system":"epss","scoring_elements":"0.43926","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00214","scoring_system":"epss","scoring_elements":"0.43911","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00214","scoring_system":"epss","scoring_elements":"0.43895","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00214","scoring_system":"epss","scoring_elements":"0.43957","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00214","scoring_system":"epss","scoring_elements":"0.43948","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00214","scoring_system":"epss","scoring_elements":"0.4388","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00214","scoring_system":"epss","scoring_elements":"0.43832","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00214","scoring_system":"epss","scoring_elements":"0.43835","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00214","scoring_system":"epss","scoring_elements":"0.43755","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00214","scoring_system":"epss","scoring_elements":"0.43629","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00214","scoring_system":"epss","scoring_elements":"0.43704","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00214","scoring_system":"epss","scoring_elements":"0.43721","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00214","scoring_system":"epss","scoring_elements":"0.43658","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00214","scoring_system":"epss","scoring_elements":"0.43877","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00214","scoring_system":"epss","scoring_elements":"0.43921","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00214","scoring_system":"epss","scoring_elements":"0.43944","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00214","scoring_system":"epss","scoring_elements":"0.43874","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00214","scoring_system":"epss","scoring_elements":"0.43924","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-0644"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0640","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0640"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0641","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0641"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0642","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0642"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0643","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0643"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0644","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0644"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0646","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0646"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0647","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0647"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0648","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0648"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0649","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0649"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0650","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0650"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0655","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0655"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0666","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0666"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0668","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0668"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2047","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2047"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.6","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:S/C:N/I:N/A:C"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://mariadb.com/kb/en/mariadb/mariadb-10024-release-notes/","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:22Z/"}],"url":"https://mariadb.com/kb/en/mariadb/mariadb-10024-release-notes/"},{"reference_url":"https://mariadb.com/kb/en/mariadb/mariadb-10112-release-notes/","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:22Z/"}],"url":"https://mariadb.com/kb/en/mariadb/mariadb-10112-release-notes/"},{"reference_url":"https://mariadb.com/kb/en/mariadb/mariadb-5548-release-notes/","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:22Z/"}],"url":"https://mariadb.com/kb/en/mariadb/mariadb-5548-release-notes/"},{"reference_url":"http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:22Z/"}],"url":"http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168"},{"reference_url":"http://www.debian.org/security/2016/dsa-3557","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:22Z/"}],"url":"http://www.debian.org/security/2016/dsa-3557"},{"reference_url":"http://www.debian.org/security/2016/dsa-3595","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:22Z/"}],"url":"http://www.debian.org/security/2016/dsa-3595"},{"reference_url":"http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:22Z/"}],"url":"http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:22Z/"}],"url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html"},{"reference_url":"http://www.securityfocus.com/bid/86442","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:22Z/"}],"url":"http://www.securityfocus.com/bid/86442"},{"reference_url":"http://www.securitytracker.com/id/1035606","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:22Z/"}],"url":"http://www.securitytracker.com/id/1035606"},{"reference_url":"http://www.ubuntu.com/usn/USN-2953-1","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:22Z/"}],"url":"http://www.ubuntu.com/usn/USN-2953-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1329247","reference_id":"1329247","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1329247"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:powerkvm:2.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ibm:powerkvm:2.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:powerkvm:2.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:powerkvm:3.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ibm:powerkvm:3.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:powerkvm:3.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-0644","reference_id":"CVE-2016-0644","reference_type":"","scores":[{"value":"4.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:S/C:N/I:N/A:P"},{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-0644"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0705","reference_id":"RHSA-2016:0705","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0705"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1132","reference_id":"RHSA-2016:1132","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:22Z/"}],"url":"https://access.redhat.com/errata/RHSA-2016:1132"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1480","reference_id":"RHSA-2016:1480","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1480"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1481","reference_id":"RHSA-2016:1481","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1481"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1602","reference_id":"RHSA-2016:1602","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1602"},{"reference_url":"https://usn.ubuntu.com/2953-1/","reference_id":"USN-2953-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2953-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035582?format=json","purl":"pkg:deb/debian/mariadb-10.0@10.0.25-0%2Bdeb8u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1gmc-pj6y-rkfx"},{"vulnerability":"VCID-2gyq-q761-h3br"},{"vulnerability":"VCID-2rf6-qaey-1ubn"},{"vulnerability":"VCID-45hn-ezks-j7br"},{"vulnerability":"VCID-4cnj-7fur-3qe3"},{"vulnerability":"VCID-4yz4-vxnh-b3dp"},{"vulnerability":"VCID-5sjj-599v-vybg"},{"vulnerability":"VCID-6g4n-3xfu-hfee"},{"vulnerability":"VCID-6muh-rg1z-pqab"},{"vulnerability":"VCID-8djb-knkk-s3c8"},{"vulnerability":"VCID-8krv-jqjg-uqc8"},{"vulnerability":"VCID-8kvb-5u8c-zbc4"},{"vulnerability":"VCID-8sya-wktg-dqa5"},{"vulnerability":"VCID-9f48-53dz-13an"},{"vulnerability":"VCID-9ff2-43rk-2ydj"},{"vulnerability":"VCID-9w98-nfg2-muh2"},{"vulnerability":"VCID-bhxk-8byp-eyap"},{"vulnerability":"VCID-ej67-ayfh-sqdt"},{"vulnerability":"VCID-g1pp-9qqg-1beb"},{"vulnerability":"VCID-gp4w-bdxg-6kab"},{"vulnerability":"VCID-jgff-4jyp-9fgr"},{"vulnerability":"VCID-mde2-1ynu-auh2"},{"vulnerability":"VCID-mfgg-7s54-gqg8"},{"vulnerability":"VCID-nkdd-suwp-4ffr"},{"vulnerability":"VCID-p623-gxyv-g7fs"},{"vulnerability":"VCID-pk7e-t26d-aqdm"},{"vulnerability":"VCID-pv92-6p9x-v7bs"},{"vulnerability":"VCID-r2cz-9kjz-zbgu"},{"vulnerability":"VCID-rssq-mfc2-ckaf"},{"vulnerability":"VCID-rted-6vzz-mbcv"},{"vulnerability":"VCID-tvdv-3ed5-h3dt"},{"vulnerability":"VCID-un5y-y9sq-1ufb"},{"vulnerability":"VCID-v4gv-g9n5-ukgc"},{"vulnerability":"VCID-vh5y-15tw-d7fd"},{"vulnerability":"VCID-wrna-cc9g-sqbe"},{"vulnerability":"VCID-yx79-3g2x-pqex"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.0@10.0.25-0%252Bdeb8u1"}],"aliases":["CVE-2016-0644"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-kwrj-3fxz-g7c6"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61081?format=json","vulnerability_id":"VCID-nw5h-p35b-2khv","summary":"security update","references":[{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177539.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177539.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00010.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00010.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00011.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00011.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2016-02/msg00039.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2016-02/msg00039.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0534.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-0534.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0705.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-0705.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-1480.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-1480.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-1481.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-1481.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4830.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4830.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-4830","reference_id":"","reference_type":"","scores":[{"value":"0.0027","scoring_system":"epss","scoring_elements":"0.50452","published_at":"2026-05-12T12:55:00Z"},{"value":"0.0027","scoring_system":"epss","scoring_elements":"0.50436","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0027","scoring_system":"epss","scoring_elements":"0.50493","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0027","scoring_system":"epss","scoring_elements":"0.5052","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0027","scoring_system":"epss","scoring_elements":"0.50474","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0027","scoring_system":"epss","scoring_elements":"0.50528","published_at":"2026-05-14T12:55:00Z"},{"value":"0.0027","scoring_system":"epss","scoring_elements":"0.50524","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0027","scoring_system":"epss","scoring_elements":"0.50566","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0027","scoring_system":"epss","scoring_elements":"0.50542","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0027","scoring_system":"epss","scoring_elements":"0.50571","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0027","scoring_system":"epss","scoring_elements":"0.50576","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0027","scoring_system":"epss","scoring_elements":"0.50554","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0027","scoring_system":"epss","scoring_elements":"0.505","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0027","scoring_system":"epss","scoring_elements":"0.50508","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0027","scoring_system":"epss","scoring_elements":"0.50463","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0027","scoring_system":"epss","scoring_elements":"0.50384","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0027","scoring_system":"epss","scoring_elements":"0.50437","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0027","scoring_system":"epss","scoring_elements":"0.50467","published_at":"2026-05-09T12:55:00Z"},{"value":"0.0027","scoring_system":"epss","scoring_elements":"0.50421","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-4830"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4792","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4792"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4802","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4802"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4815","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4815"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4816","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4816"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4819","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4819"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4826","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4826"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4830","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4830"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4836","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4836"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4858","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4858"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4861","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4861"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4870","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4870"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4879","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4879"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4895","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4895"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4913","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4913"},{"reference_url":"https://www.suse.com/support/update/announcement/2016/suse-su-20160296-1.html","reference_id":"","reference_type":"","scores":[],"url":"https://www.suse.com/support/update/announcement/2016/suse-su-20160296-1.html"},{"reference_url":"http://www.debian.org/security/2015/dsa-3377","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2015/dsa-3377"},{"reference_url":"http://www.debian.org/security/2015/dsa-3385","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2015/dsa-3385"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html"},{"reference_url":"http://www.securityfocus.com/bid/77228","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/77228"},{"reference_url":"http://www.securitytracker.com/id/1033894","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1033894"},{"reference_url":"http://www.ubuntu.com/usn/USN-2781-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2781-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1274767","reference_id":"1274767","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1274767"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:7.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11:sp3:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_desktop:11:sp3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11:sp3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:-:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:-:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:-:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:vmware:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:vmware:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:vmware:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp3:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2015-4830","reference_id":"CVE-2015-4830","reference_type":"","scores":[{"value":"4.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:S/C:N/I:P/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2015-4830"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0534","reference_id":"RHSA-2016:0534","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0534"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0705","reference_id":"RHSA-2016:0705","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0705"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1132","reference_id":"RHSA-2016:1132","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1132"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1480","reference_id":"RHSA-2016:1480","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1480"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1481","reference_id":"RHSA-2016:1481","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1481"},{"reference_url":"https://usn.ubuntu.com/2781-1/","reference_id":"USN-2781-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2781-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035582?format=json","purl":"pkg:deb/debian/mariadb-10.0@10.0.25-0%2Bdeb8u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1gmc-pj6y-rkfx"},{"vulnerability":"VCID-2gyq-q761-h3br"},{"vulnerability":"VCID-2rf6-qaey-1ubn"},{"vulnerability":"VCID-45hn-ezks-j7br"},{"vulnerability":"VCID-4cnj-7fur-3qe3"},{"vulnerability":"VCID-4yz4-vxnh-b3dp"},{"vulnerability":"VCID-5sjj-599v-vybg"},{"vulnerability":"VCID-6g4n-3xfu-hfee"},{"vulnerability":"VCID-6muh-rg1z-pqab"},{"vulnerability":"VCID-8djb-knkk-s3c8"},{"vulnerability":"VCID-8krv-jqjg-uqc8"},{"vulnerability":"VCID-8kvb-5u8c-zbc4"},{"vulnerability":"VCID-8sya-wktg-dqa5"},{"vulnerability":"VCID-9f48-53dz-13an"},{"vulnerability":"VCID-9ff2-43rk-2ydj"},{"vulnerability":"VCID-9w98-nfg2-muh2"},{"vulnerability":"VCID-bhxk-8byp-eyap"},{"vulnerability":"VCID-ej67-ayfh-sqdt"},{"vulnerability":"VCID-g1pp-9qqg-1beb"},{"vulnerability":"VCID-gp4w-bdxg-6kab"},{"vulnerability":"VCID-jgff-4jyp-9fgr"},{"vulnerability":"VCID-mde2-1ynu-auh2"},{"vulnerability":"VCID-mfgg-7s54-gqg8"},{"vulnerability":"VCID-nkdd-suwp-4ffr"},{"vulnerability":"VCID-p623-gxyv-g7fs"},{"vulnerability":"VCID-pk7e-t26d-aqdm"},{"vulnerability":"VCID-pv92-6p9x-v7bs"},{"vulnerability":"VCID-r2cz-9kjz-zbgu"},{"vulnerability":"VCID-rssq-mfc2-ckaf"},{"vulnerability":"VCID-rted-6vzz-mbcv"},{"vulnerability":"VCID-tvdv-3ed5-h3dt"},{"vulnerability":"VCID-un5y-y9sq-1ufb"},{"vulnerability":"VCID-v4gv-g9n5-ukgc"},{"vulnerability":"VCID-vh5y-15tw-d7fd"},{"vulnerability":"VCID-wrna-cc9g-sqbe"},{"vulnerability":"VCID-yx79-3g2x-pqex"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.0@10.0.25-0%252Bdeb8u1"}],"aliases":["CVE-2015-4830"],"risk_score":1.8,"exploitability":"0.5","weighted_severity":"3.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-nw5h-p35b-2khv"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/80855?format=json","vulnerability_id":"VCID-nxma-cse5-pke8","summary":"security update","references":[{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177539.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177539.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4895.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4895.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-4895","reference_id":"","reference_type":"","scores":[{"value":"0.00459","scoring_system":"epss","scoring_elements":"0.64257","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00459","scoring_system":"epss","scoring_elements":"0.64005","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00459","scoring_system":"epss","scoring_elements":"0.64063","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00459","scoring_system":"epss","scoring_elements":"0.6409","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00459","scoring_system":"epss","scoring_elements":"0.6405","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00459","scoring_system":"epss","scoring_elements":"0.64101","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00459","scoring_system":"epss","scoring_elements":"0.64117","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00459","scoring_system":"epss","scoring_elements":"0.64129","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00459","scoring_system":"epss","scoring_elements":"0.64118","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00459","scoring_system":"epss","scoring_elements":"0.64089","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00459","scoring_system":"epss","scoring_elements":"0.64125","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00459","scoring_system":"epss","scoring_elements":"0.64136","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00459","scoring_system":"epss","scoring_elements":"0.64123","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00459","scoring_system":"epss","scoring_elements":"0.64142","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00459","scoring_system":"epss","scoring_elements":"0.64155","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00459","scoring_system":"epss","scoring_elements":"0.64121","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00459","scoring_system":"epss","scoring_elements":"0.64165","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00459","scoring_system":"epss","scoring_elements":"0.6421","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00459","scoring_system":"epss","scoring_elements":"0.64178","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00459","scoring_system":"epss","scoring_elements":"0.64205","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-4895"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4792","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4792"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4802","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4802"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4815","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4815"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4816","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4816"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4819","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4819"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4826","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4826"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4830","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4830"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4836","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4836"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4858","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4858"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4861","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4861"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4870","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4870"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4879","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4879"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4895","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4895"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4913","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4913"},{"reference_url":"http://www.debian.org/security/2015/dsa-3385","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2015/dsa-3385"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html"},{"reference_url":"http://www.securityfocus.com/bid/77136","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/77136"},{"reference_url":"http://www.securitytracker.com/id/1033894","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1033894"},{"reference_url":"http://www.ubuntu.com/usn/USN-2781-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2781-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1274786","reference_id":"1274786","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1274786"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2015-4895","reference_id":"CVE-2015-4895","reference_type":"","scores":[{"value":"3.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:S/C:N/I:N/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2015-4895"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1630","reference_id":"RHSA-2015:1630","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1630"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1132","reference_id":"RHSA-2016:1132","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1132"},{"reference_url":"https://usn.ubuntu.com/2781-1/","reference_id":"USN-2781-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2781-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035582?format=json","purl":"pkg:deb/debian/mariadb-10.0@10.0.25-0%2Bdeb8u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1gmc-pj6y-rkfx"},{"vulnerability":"VCID-2gyq-q761-h3br"},{"vulnerability":"VCID-2rf6-qaey-1ubn"},{"vulnerability":"VCID-45hn-ezks-j7br"},{"vulnerability":"VCID-4cnj-7fur-3qe3"},{"vulnerability":"VCID-4yz4-vxnh-b3dp"},{"vulnerability":"VCID-5sjj-599v-vybg"},{"vulnerability":"VCID-6g4n-3xfu-hfee"},{"vulnerability":"VCID-6muh-rg1z-pqab"},{"vulnerability":"VCID-8djb-knkk-s3c8"},{"vulnerability":"VCID-8krv-jqjg-uqc8"},{"vulnerability":"VCID-8kvb-5u8c-zbc4"},{"vulnerability":"VCID-8sya-wktg-dqa5"},{"vulnerability":"VCID-9f48-53dz-13an"},{"vulnerability":"VCID-9ff2-43rk-2ydj"},{"vulnerability":"VCID-9w98-nfg2-muh2"},{"vulnerability":"VCID-bhxk-8byp-eyap"},{"vulnerability":"VCID-ej67-ayfh-sqdt"},{"vulnerability":"VCID-g1pp-9qqg-1beb"},{"vulnerability":"VCID-gp4w-bdxg-6kab"},{"vulnerability":"VCID-jgff-4jyp-9fgr"},{"vulnerability":"VCID-mde2-1ynu-auh2"},{"vulnerability":"VCID-mfgg-7s54-gqg8"},{"vulnerability":"VCID-nkdd-suwp-4ffr"},{"vulnerability":"VCID-p623-gxyv-g7fs"},{"vulnerability":"VCID-pk7e-t26d-aqdm"},{"vulnerability":"VCID-pv92-6p9x-v7bs"},{"vulnerability":"VCID-r2cz-9kjz-zbgu"},{"vulnerability":"VCID-rssq-mfc2-ckaf"},{"vulnerability":"VCID-rted-6vzz-mbcv"},{"vulnerability":"VCID-tvdv-3ed5-h3dt"},{"vulnerability":"VCID-un5y-y9sq-1ufb"},{"vulnerability":"VCID-v4gv-g9n5-ukgc"},{"vulnerability":"VCID-vh5y-15tw-d7fd"},{"vulnerability":"VCID-wrna-cc9g-sqbe"},{"vulnerability":"VCID-yx79-3g2x-pqex"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.0@10.0.25-0%252Bdeb8u1"}],"aliases":["CVE-2015-4895"],"risk_score":1.6,"exploitability":"0.5","weighted_severity":"3.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-nxma-cse5-pke8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61083?format=json","vulnerability_id":"VCID-q1vh-jwcy-87cz","summary":"security update","references":[{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177539.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177539.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00010.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00010.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00011.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00011.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2016-02/msg00039.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2016-02/msg00039.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0534.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-0534.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0705.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-0705.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-1480.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-1480.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-1481.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-1481.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4858.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4858.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-4858","reference_id":"","reference_type":"","scores":[{"value":"0.00419","scoring_system":"epss","scoring_elements":"0.62017","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00419","scoring_system":"epss","scoring_elements":"0.6176","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00419","scoring_system":"epss","scoring_elements":"0.61834","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00419","scoring_system":"epss","scoring_elements":"0.61865","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00419","scoring_system":"epss","scoring_elements":"0.61837","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00419","scoring_system":"epss","scoring_elements":"0.61886","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00419","scoring_system":"epss","scoring_elements":"0.61902","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00419","scoring_system":"epss","scoring_elements":"0.61923","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00419","scoring_system":"epss","scoring_elements":"0.61911","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00419","scoring_system":"epss","scoring_elements":"0.61891","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00419","scoring_system":"epss","scoring_elements":"0.61934","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00419","scoring_system":"epss","scoring_elements":"0.61939","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00419","scoring_system":"epss","scoring_elements":"0.61921","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00419","scoring_system":"epss","scoring_elements":"0.61917","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00419","scoring_system":"epss","scoring_elements":"0.61935","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00419","scoring_system":"epss","scoring_elements":"0.61928","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00419","scoring_system":"epss","scoring_elements":"0.61872","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00419","scoring_system":"epss","scoring_elements":"0.6192","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00419","scoring_system":"epss","scoring_elements":"0.61981","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00419","scoring_system":"epss","scoring_elements":"0.61962","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-4858"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4792","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4792"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4802","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4802"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4815","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4815"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4816","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4816"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4819","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4819"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4826","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4826"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4830","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4830"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4836","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4836"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4858","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4858"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4861","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4861"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4870","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4870"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4879","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4879"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4895","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4895"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4913","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4913"},{"reference_url":"https://www.suse.com/support/update/announcement/2016/suse-su-20160296-1.html","reference_id":"","reference_type":"","scores":[],"url":"https://www.suse.com/support/update/announcement/2016/suse-su-20160296-1.html"},{"reference_url":"http://www.debian.org/security/2015/dsa-3377","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2015/dsa-3377"},{"reference_url":"http://www.debian.org/security/2015/dsa-3385","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2015/dsa-3385"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html"},{"reference_url":"http://www.securityfocus.com/bid/77145","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/77145"},{"reference_url":"http://www.securitytracker.com/id/1033894","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1033894"},{"reference_url":"http://www.ubuntu.com/usn/USN-2781-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2781-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1274773","reference_id":"1274773","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1274773"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:-:*:*:*:*:*:*","reference_id":"cpe:2.3:o:oracle:linux:7:-:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:-:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:7.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2015-4858","reference_id":"CVE-2015-4858","reference_type":"","scores":[{"value":"4.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:S/C:N/I:N/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2015-4858"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0534","reference_id":"RHSA-2016:0534","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0534"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0705","reference_id":"RHSA-2016:0705","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0705"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1132","reference_id":"RHSA-2016:1132","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1132"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1480","reference_id":"RHSA-2016:1480","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1480"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1481","reference_id":"RHSA-2016:1481","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1481"},{"reference_url":"https://usn.ubuntu.com/2781-1/","reference_id":"USN-2781-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2781-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035582?format=json","purl":"pkg:deb/debian/mariadb-10.0@10.0.25-0%2Bdeb8u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1gmc-pj6y-rkfx"},{"vulnerability":"VCID-2gyq-q761-h3br"},{"vulnerability":"VCID-2rf6-qaey-1ubn"},{"vulnerability":"VCID-45hn-ezks-j7br"},{"vulnerability":"VCID-4cnj-7fur-3qe3"},{"vulnerability":"VCID-4yz4-vxnh-b3dp"},{"vulnerability":"VCID-5sjj-599v-vybg"},{"vulnerability":"VCID-6g4n-3xfu-hfee"},{"vulnerability":"VCID-6muh-rg1z-pqab"},{"vulnerability":"VCID-8djb-knkk-s3c8"},{"vulnerability":"VCID-8krv-jqjg-uqc8"},{"vulnerability":"VCID-8kvb-5u8c-zbc4"},{"vulnerability":"VCID-8sya-wktg-dqa5"},{"vulnerability":"VCID-9f48-53dz-13an"},{"vulnerability":"VCID-9ff2-43rk-2ydj"},{"vulnerability":"VCID-9w98-nfg2-muh2"},{"vulnerability":"VCID-bhxk-8byp-eyap"},{"vulnerability":"VCID-ej67-ayfh-sqdt"},{"vulnerability":"VCID-g1pp-9qqg-1beb"},{"vulnerability":"VCID-gp4w-bdxg-6kab"},{"vulnerability":"VCID-jgff-4jyp-9fgr"},{"vulnerability":"VCID-mde2-1ynu-auh2"},{"vulnerability":"VCID-mfgg-7s54-gqg8"},{"vulnerability":"VCID-nkdd-suwp-4ffr"},{"vulnerability":"VCID-p623-gxyv-g7fs"},{"vulnerability":"VCID-pk7e-t26d-aqdm"},{"vulnerability":"VCID-pv92-6p9x-v7bs"},{"vulnerability":"VCID-r2cz-9kjz-zbgu"},{"vulnerability":"VCID-rssq-mfc2-ckaf"},{"vulnerability":"VCID-rted-6vzz-mbcv"},{"vulnerability":"VCID-tvdv-3ed5-h3dt"},{"vulnerability":"VCID-un5y-y9sq-1ufb"},{"vulnerability":"VCID-v4gv-g9n5-ukgc"},{"vulnerability":"VCID-vh5y-15tw-d7fd"},{"vulnerability":"VCID-wrna-cc9g-sqbe"},{"vulnerability":"VCID-yx79-3g2x-pqex"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.0@10.0.25-0%252Bdeb8u1"}],"aliases":["CVE-2015-4858"],"risk_score":1.8,"exploitability":"0.5","weighted_severity":"3.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-q1vh-jwcy-87cz"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/36446?format=json","vulnerability_id":"VCID-q4pg-yfsh-zqcu","summary":"Multiple vulnerabilities have been found in MySQL, allowing\n    attackers to execute arbitrary code or cause Denial of Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0433.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0433.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-0433","reference_id":"","reference_type":"","scores":[{"value":"0.00465","scoring_system":"epss","scoring_elements":"0.64285","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00465","scoring_system":"epss","scoring_elements":"0.64342","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00465","scoring_system":"epss","scoring_elements":"0.64371","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00465","scoring_system":"epss","scoring_elements":"0.6433","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00465","scoring_system":"epss","scoring_elements":"0.64379","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00465","scoring_system":"epss","scoring_elements":"0.64393","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00465","scoring_system":"epss","scoring_elements":"0.64405","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00465","scoring_system":"epss","scoring_elements":"0.64392","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00465","scoring_system":"epss","scoring_elements":"0.64363","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00465","scoring_system":"epss","scoring_elements":"0.64399","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00465","scoring_system":"epss","scoring_elements":"0.64411","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00465","scoring_system":"epss","scoring_elements":"0.64402","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00465","scoring_system":"epss","scoring_elements":"0.64423","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00465","scoring_system":"epss","scoring_elements":"0.64436","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00465","scoring_system":"epss","scoring_elements":"0.64435","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00465","scoring_system":"epss","scoring_elements":"0.64408","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00465","scoring_system":"epss","scoring_elements":"0.64454","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00465","scoring_system":"epss","scoring_elements":"0.64499","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00465","scoring_system":"epss","scoring_elements":"0.64469","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00465","scoring_system":"epss","scoring_elements":"0.64493","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00465","scoring_system":"epss","scoring_elements":"0.64546","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-0433"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0433","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0433"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0441","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0441"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0499","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0499"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0501","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0501"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0505","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0505"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2568","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2568"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2571","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2571"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2573","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2573"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2582","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2582"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2643","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2643"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2648","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2648"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3152","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3152"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4752","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4752"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4757","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4757"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1212776","reference_id":"1212776","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1212776"},{"reference_url":"https://security.gentoo.org/glsa/201507-19","reference_id":"GLSA-201507-19","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201507-19"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1628","reference_id":"RHSA-2015:1628","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1628"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1629","reference_id":"RHSA-2015:1629","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1629"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1647","reference_id":"RHSA-2015:1647","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1647"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1665","reference_id":"RHSA-2015:1665","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1665"},{"reference_url":"https://usn.ubuntu.com/2575-1/","reference_id":"USN-2575-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2575-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035582?format=json","purl":"pkg:deb/debian/mariadb-10.0@10.0.25-0%2Bdeb8u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1gmc-pj6y-rkfx"},{"vulnerability":"VCID-2gyq-q761-h3br"},{"vulnerability":"VCID-2rf6-qaey-1ubn"},{"vulnerability":"VCID-45hn-ezks-j7br"},{"vulnerability":"VCID-4cnj-7fur-3qe3"},{"vulnerability":"VCID-4yz4-vxnh-b3dp"},{"vulnerability":"VCID-5sjj-599v-vybg"},{"vulnerability":"VCID-6g4n-3xfu-hfee"},{"vulnerability":"VCID-6muh-rg1z-pqab"},{"vulnerability":"VCID-8djb-knkk-s3c8"},{"vulnerability":"VCID-8krv-jqjg-uqc8"},{"vulnerability":"VCID-8kvb-5u8c-zbc4"},{"vulnerability":"VCID-8sya-wktg-dqa5"},{"vulnerability":"VCID-9f48-53dz-13an"},{"vulnerability":"VCID-9ff2-43rk-2ydj"},{"vulnerability":"VCID-9w98-nfg2-muh2"},{"vulnerability":"VCID-bhxk-8byp-eyap"},{"vulnerability":"VCID-ej67-ayfh-sqdt"},{"vulnerability":"VCID-g1pp-9qqg-1beb"},{"vulnerability":"VCID-gp4w-bdxg-6kab"},{"vulnerability":"VCID-jgff-4jyp-9fgr"},{"vulnerability":"VCID-mde2-1ynu-auh2"},{"vulnerability":"VCID-mfgg-7s54-gqg8"},{"vulnerability":"VCID-nkdd-suwp-4ffr"},{"vulnerability":"VCID-p623-gxyv-g7fs"},{"vulnerability":"VCID-pk7e-t26d-aqdm"},{"vulnerability":"VCID-pv92-6p9x-v7bs"},{"vulnerability":"VCID-r2cz-9kjz-zbgu"},{"vulnerability":"VCID-rssq-mfc2-ckaf"},{"vulnerability":"VCID-rted-6vzz-mbcv"},{"vulnerability":"VCID-tvdv-3ed5-h3dt"},{"vulnerability":"VCID-un5y-y9sq-1ufb"},{"vulnerability":"VCID-v4gv-g9n5-ukgc"},{"vulnerability":"VCID-vh5y-15tw-d7fd"},{"vulnerability":"VCID-wrna-cc9g-sqbe"},{"vulnerability":"VCID-yx79-3g2x-pqex"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.0@10.0.25-0%252Bdeb8u1"}],"aliases":["CVE-2015-0433"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-q4pg-yfsh-zqcu"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41374?format=json","vulnerability_id":"VCID-qvae-5ytw-dbcy","summary":"Multiple vulnerabilities have been found in MySQL and MariaDB, the\n    worst of which could allow remote attackers to cause a Denial of Service\n    condition or obtain sensitive information.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4757.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4757.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-4757","reference_id":"","reference_type":"","scores":[{"value":"0.04287","scoring_system":"epss","scoring_elements":"0.88799","published_at":"2026-04-01T12:55:00Z"},{"value":"0.04287","scoring_system":"epss","scoring_elements":"0.88807","published_at":"2026-04-02T12:55:00Z"},{"value":"0.04287","scoring_system":"epss","scoring_elements":"0.88823","published_at":"2026-04-04T12:55:00Z"},{"value":"0.04287","scoring_system":"epss","scoring_elements":"0.88826","published_at":"2026-04-07T12:55:00Z"},{"value":"0.04287","scoring_system":"epss","scoring_elements":"0.88843","published_at":"2026-04-08T12:55:00Z"},{"value":"0.04287","scoring_system":"epss","scoring_elements":"0.88849","published_at":"2026-04-09T12:55:00Z"},{"value":"0.04287","scoring_system":"epss","scoring_elements":"0.8886","published_at":"2026-04-11T12:55:00Z"},{"value":"0.04287","scoring_system":"epss","scoring_elements":"0.88856","published_at":"2026-04-12T12:55:00Z"},{"value":"0.04287","scoring_system":"epss","scoring_elements":"0.88855","published_at":"2026-04-13T12:55:00Z"},{"value":"0.04287","scoring_system":"epss","scoring_elements":"0.88869","published_at":"2026-04-16T12:55:00Z"},{"value":"0.04287","scoring_system":"epss","scoring_elements":"0.88867","published_at":"2026-04-18T12:55:00Z"},{"value":"0.04287","scoring_system":"epss","scoring_elements":"0.88864","published_at":"2026-04-21T12:55:00Z"},{"value":"0.04287","scoring_system":"epss","scoring_elements":"0.88881","published_at":"2026-04-24T12:55:00Z"},{"value":"0.04287","scoring_system":"epss","scoring_elements":"0.88888","published_at":"2026-04-29T12:55:00Z"},{"value":"0.04287","scoring_system":"epss","scoring_elements":"0.88896","published_at":"2026-05-05T12:55:00Z"},{"value":"0.04287","scoring_system":"epss","scoring_elements":"0.88913","published_at":"2026-05-07T12:55:00Z"},{"value":"0.04287","scoring_system":"epss","scoring_elements":"0.88926","published_at":"2026-05-09T12:55:00Z"},{"value":"0.04287","scoring_system":"epss","scoring_elements":"0.8892","published_at":"2026-05-11T12:55:00Z"},{"value":"0.04287","scoring_system":"epss","scoring_elements":"0.88929","published_at":"2026-05-12T12:55:00Z"},{"value":"0.04287","scoring_system":"epss","scoring_elements":"0.88948","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-4757"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0433","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0433"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0441","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0441"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0499","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0499"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0501","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0501"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0505","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0505"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2568","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2568"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2571","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2571"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2573","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2573"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2582","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2582"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2643","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2643"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2648","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2648"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3152","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3152"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4752","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4752"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4757","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4757"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1244781","reference_id":"1244781","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1244781"},{"reference_url":"https://security.gentoo.org/glsa/201610-06","reference_id":"GLSA-201610-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201610-06"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1628","reference_id":"RHSA-2015:1628","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1628"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1629","reference_id":"RHSA-2015:1629","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1629"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1630","reference_id":"RHSA-2015:1630","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1630"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1646","reference_id":"RHSA-2015:1646","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1646"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1647","reference_id":"RHSA-2015:1647","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1647"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1665","reference_id":"RHSA-2015:1665","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1665"},{"reference_url":"https://usn.ubuntu.com/2674-1/","reference_id":"USN-2674-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2674-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035582?format=json","purl":"pkg:deb/debian/mariadb-10.0@10.0.25-0%2Bdeb8u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1gmc-pj6y-rkfx"},{"vulnerability":"VCID-2gyq-q761-h3br"},{"vulnerability":"VCID-2rf6-qaey-1ubn"},{"vulnerability":"VCID-45hn-ezks-j7br"},{"vulnerability":"VCID-4cnj-7fur-3qe3"},{"vulnerability":"VCID-4yz4-vxnh-b3dp"},{"vulnerability":"VCID-5sjj-599v-vybg"},{"vulnerability":"VCID-6g4n-3xfu-hfee"},{"vulnerability":"VCID-6muh-rg1z-pqab"},{"vulnerability":"VCID-8djb-knkk-s3c8"},{"vulnerability":"VCID-8krv-jqjg-uqc8"},{"vulnerability":"VCID-8kvb-5u8c-zbc4"},{"vulnerability":"VCID-8sya-wktg-dqa5"},{"vulnerability":"VCID-9f48-53dz-13an"},{"vulnerability":"VCID-9ff2-43rk-2ydj"},{"vulnerability":"VCID-9w98-nfg2-muh2"},{"vulnerability":"VCID-bhxk-8byp-eyap"},{"vulnerability":"VCID-ej67-ayfh-sqdt"},{"vulnerability":"VCID-g1pp-9qqg-1beb"},{"vulnerability":"VCID-gp4w-bdxg-6kab"},{"vulnerability":"VCID-jgff-4jyp-9fgr"},{"vulnerability":"VCID-mde2-1ynu-auh2"},{"vulnerability":"VCID-mfgg-7s54-gqg8"},{"vulnerability":"VCID-nkdd-suwp-4ffr"},{"vulnerability":"VCID-p623-gxyv-g7fs"},{"vulnerability":"VCID-pk7e-t26d-aqdm"},{"vulnerability":"VCID-pv92-6p9x-v7bs"},{"vulnerability":"VCID-r2cz-9kjz-zbgu"},{"vulnerability":"VCID-rssq-mfc2-ckaf"},{"vulnerability":"VCID-rted-6vzz-mbcv"},{"vulnerability":"VCID-tvdv-3ed5-h3dt"},{"vulnerability":"VCID-un5y-y9sq-1ufb"},{"vulnerability":"VCID-v4gv-g9n5-ukgc"},{"vulnerability":"VCID-vh5y-15tw-d7fd"},{"vulnerability":"VCID-wrna-cc9g-sqbe"},{"vulnerability":"VCID-yx79-3g2x-pqex"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.0@10.0.25-0%252Bdeb8u1"}],"aliases":["CVE-2015-4757"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-qvae-5ytw-dbcy"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/62571?format=json","vulnerability_id":"VCID-qyb6-7ees-ukcm","summary":"security update","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00015.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00015.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00016.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00016.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0534.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-0534.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0705.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-0705.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-1480.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-1480.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-1481.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-1481.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0608.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0608.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-0608","reference_id":"","reference_type":"","scores":[{"value":"0.00338","scoring_system":"epss","scoring_elements":"0.56676","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00338","scoring_system":"epss","scoring_elements":"0.56614","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00338","scoring_system":"epss","scoring_elements":"0.56522","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00338","scoring_system":"epss","scoring_elements":"0.56618","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00338","scoring_system":"epss","scoring_elements":"0.56639","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00338","scoring_system":"epss","scoring_elements":"0.56669","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00338","scoring_system":"epss","scoring_elements":"0.56675","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00338","scoring_system":"epss","scoring_elements":"0.56683","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00338","scoring_system":"epss","scoring_elements":"0.56658","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00338","scoring_system":"epss","scoring_elements":"0.56638","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00338","scoring_system":"epss","scoring_elements":"0.56668","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00338","scoring_system":"epss","scoring_elements":"0.5664","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00338","scoring_system":"epss","scoring_elements":"0.56576","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00338","scoring_system":"epss","scoring_elements":"0.56595","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00338","scoring_system":"epss","scoring_elements":"0.56577","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00338","scoring_system":"epss","scoring_elements":"0.56532","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00338","scoring_system":"epss","scoring_elements":"0.56578","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00338","scoring_system":"epss","scoring_elements":"0.56641","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00338","scoring_system":"epss","scoring_elements":"0.56592","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-0608"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0505","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0505"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0546","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0546"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0596","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0596"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0597","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0597"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0598","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0598"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0600","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0600"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0606","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0606"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0608","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0608"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0609","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0609"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0616","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0616"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2047","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2047"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:S/C:N/I:N/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://mariadb.com/kb/en/mariadb/mariadb-10110-release-notes/","reference_id":"","reference_type":"","scores":[],"url":"https://mariadb.com/kb/en/mariadb/mariadb-10110-release-notes/"},{"reference_url":"https://mariadb.com/kb/en/mariadb/mariadb-5547-release-notes/","reference_id":"","reference_type":"","scores":[],"url":"https://mariadb.com/kb/en/mariadb/mariadb-5547-release-notes/"},{"reference_url":"https://mariadb.com/kb/en/mdb-10023-rn/","reference_id":"","reference_type":"","scores":[],"url":"https://mariadb.com/kb/en/mdb-10023-rn/"},{"reference_url":"http://www.debian.org/security/2016/dsa-3453","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2016/dsa-3453"},{"reference_url":"http://www.debian.org/security/2016/dsa-3459","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2016/dsa-3459"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html"},{"reference_url":"http://www.securityfocus.com/bid/81226","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/81226"},{"reference_url":"http://www.securitytracker.com/id/1034708","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1034708"},{"reference_url":"http://www.ubuntu.com/usn/USN-2881-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2881-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1301506","reference_id":"1301506","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1301506"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node_eus:7.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_hpc_node_eus:7.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node_eus:7.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-0608","reference_id":"CVE-2016-0608","reference_type":"","scores":[{"value":"3.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:S/C:N/I:N/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-0608"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0534","reference_id":"RHSA-2016:0534","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0534"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0705","reference_id":"RHSA-2016:0705","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0705"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1132","reference_id":"RHSA-2016:1132","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1132"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1480","reference_id":"RHSA-2016:1480","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1480"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1481","reference_id":"RHSA-2016:1481","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1481"},{"reference_url":"https://usn.ubuntu.com/2881-1/","reference_id":"USN-2881-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2881-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035582?format=json","purl":"pkg:deb/debian/mariadb-10.0@10.0.25-0%2Bdeb8u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1gmc-pj6y-rkfx"},{"vulnerability":"VCID-2gyq-q761-h3br"},{"vulnerability":"VCID-2rf6-qaey-1ubn"},{"vulnerability":"VCID-45hn-ezks-j7br"},{"vulnerability":"VCID-4cnj-7fur-3qe3"},{"vulnerability":"VCID-4yz4-vxnh-b3dp"},{"vulnerability":"VCID-5sjj-599v-vybg"},{"vulnerability":"VCID-6g4n-3xfu-hfee"},{"vulnerability":"VCID-6muh-rg1z-pqab"},{"vulnerability":"VCID-8djb-knkk-s3c8"},{"vulnerability":"VCID-8krv-jqjg-uqc8"},{"vulnerability":"VCID-8kvb-5u8c-zbc4"},{"vulnerability":"VCID-8sya-wktg-dqa5"},{"vulnerability":"VCID-9f48-53dz-13an"},{"vulnerability":"VCID-9ff2-43rk-2ydj"},{"vulnerability":"VCID-9w98-nfg2-muh2"},{"vulnerability":"VCID-bhxk-8byp-eyap"},{"vulnerability":"VCID-ej67-ayfh-sqdt"},{"vulnerability":"VCID-g1pp-9qqg-1beb"},{"vulnerability":"VCID-gp4w-bdxg-6kab"},{"vulnerability":"VCID-jgff-4jyp-9fgr"},{"vulnerability":"VCID-mde2-1ynu-auh2"},{"vulnerability":"VCID-mfgg-7s54-gqg8"},{"vulnerability":"VCID-nkdd-suwp-4ffr"},{"vulnerability":"VCID-p623-gxyv-g7fs"},{"vulnerability":"VCID-pk7e-t26d-aqdm"},{"vulnerability":"VCID-pv92-6p9x-v7bs"},{"vulnerability":"VCID-r2cz-9kjz-zbgu"},{"vulnerability":"VCID-rssq-mfc2-ckaf"},{"vulnerability":"VCID-rted-6vzz-mbcv"},{"vulnerability":"VCID-tvdv-3ed5-h3dt"},{"vulnerability":"VCID-un5y-y9sq-1ufb"},{"vulnerability":"VCID-v4gv-g9n5-ukgc"},{"vulnerability":"VCID-vh5y-15tw-d7fd"},{"vulnerability":"VCID-wrna-cc9g-sqbe"},{"vulnerability":"VCID-yx79-3g2x-pqex"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.0@10.0.25-0%252Bdeb8u1"}],"aliases":["CVE-2016-0608"],"risk_score":1.6,"exploitability":"0.5","weighted_severity":"3.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-qyb6-7ees-ukcm"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41368?format=json","vulnerability_id":"VCID-r3kw-ufpz-aqft","summary":"Multiple vulnerabilities have been found in MySQL and MariaDB, the\n    worst of which could allow remote attackers to cause a Denial of Service\n    condition or obtain sensitive information.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2643.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2643.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-2643","reference_id":"","reference_type":"","scores":[{"value":"0.00598","scoring_system":"epss","scoring_elements":"0.69334","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00598","scoring_system":"epss","scoring_elements":"0.69347","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00598","scoring_system":"epss","scoring_elements":"0.69363","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00598","scoring_system":"epss","scoring_elements":"0.69343","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00598","scoring_system":"epss","scoring_elements":"0.69393","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00598","scoring_system":"epss","scoring_elements":"0.69409","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00598","scoring_system":"epss","scoring_elements":"0.69432","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00598","scoring_system":"epss","scoring_elements":"0.69417","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00598","scoring_system":"epss","scoring_elements":"0.69402","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00598","scoring_system":"epss","scoring_elements":"0.69442","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00598","scoring_system":"epss","scoring_elements":"0.69452","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00598","scoring_system":"epss","scoring_elements":"0.69434","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00598","scoring_system":"epss","scoring_elements":"0.69486","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00598","scoring_system":"epss","scoring_elements":"0.69492","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00598","scoring_system":"epss","scoring_elements":"0.69497","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00598","scoring_system":"epss","scoring_elements":"0.69476","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00598","scoring_system":"epss","scoring_elements":"0.69518","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00598","scoring_system":"epss","scoring_elements":"0.69553","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00598","scoring_system":"epss","scoring_elements":"0.69524","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00598","scoring_system":"epss","scoring_elements":"0.69548","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00598","scoring_system":"epss","scoring_elements":"0.69596","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-2643"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0433","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0433"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0441","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0441"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0499","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0499"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0501","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0501"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0505","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0505"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2568","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2568"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2571","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2571"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2573","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2573"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2582","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2582"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2620","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2620"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2643","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2643"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2648","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2648"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3152","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3152"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4737","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4737"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4752","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4752"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4757","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4757"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1244774","reference_id":"1244774","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1244774"},{"reference_url":"https://security.gentoo.org/glsa/201610-06","reference_id":"GLSA-201610-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201610-06"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1628","reference_id":"RHSA-2015:1628","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1628"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1629","reference_id":"RHSA-2015:1629","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1629"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1630","reference_id":"RHSA-2015:1630","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1630"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1646","reference_id":"RHSA-2015:1646","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1646"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1647","reference_id":"RHSA-2015:1647","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1647"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1665","reference_id":"RHSA-2015:1665","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1665"},{"reference_url":"https://usn.ubuntu.com/2674-1/","reference_id":"USN-2674-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2674-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035582?format=json","purl":"pkg:deb/debian/mariadb-10.0@10.0.25-0%2Bdeb8u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1gmc-pj6y-rkfx"},{"vulnerability":"VCID-2gyq-q761-h3br"},{"vulnerability":"VCID-2rf6-qaey-1ubn"},{"vulnerability":"VCID-45hn-ezks-j7br"},{"vulnerability":"VCID-4cnj-7fur-3qe3"},{"vulnerability":"VCID-4yz4-vxnh-b3dp"},{"vulnerability":"VCID-5sjj-599v-vybg"},{"vulnerability":"VCID-6g4n-3xfu-hfee"},{"vulnerability":"VCID-6muh-rg1z-pqab"},{"vulnerability":"VCID-8djb-knkk-s3c8"},{"vulnerability":"VCID-8krv-jqjg-uqc8"},{"vulnerability":"VCID-8kvb-5u8c-zbc4"},{"vulnerability":"VCID-8sya-wktg-dqa5"},{"vulnerability":"VCID-9f48-53dz-13an"},{"vulnerability":"VCID-9ff2-43rk-2ydj"},{"vulnerability":"VCID-9w98-nfg2-muh2"},{"vulnerability":"VCID-bhxk-8byp-eyap"},{"vulnerability":"VCID-ej67-ayfh-sqdt"},{"vulnerability":"VCID-g1pp-9qqg-1beb"},{"vulnerability":"VCID-gp4w-bdxg-6kab"},{"vulnerability":"VCID-jgff-4jyp-9fgr"},{"vulnerability":"VCID-mde2-1ynu-auh2"},{"vulnerability":"VCID-mfgg-7s54-gqg8"},{"vulnerability":"VCID-nkdd-suwp-4ffr"},{"vulnerability":"VCID-p623-gxyv-g7fs"},{"vulnerability":"VCID-pk7e-t26d-aqdm"},{"vulnerability":"VCID-pv92-6p9x-v7bs"},{"vulnerability":"VCID-r2cz-9kjz-zbgu"},{"vulnerability":"VCID-rssq-mfc2-ckaf"},{"vulnerability":"VCID-rted-6vzz-mbcv"},{"vulnerability":"VCID-tvdv-3ed5-h3dt"},{"vulnerability":"VCID-un5y-y9sq-1ufb"},{"vulnerability":"VCID-v4gv-g9n5-ukgc"},{"vulnerability":"VCID-vh5y-15tw-d7fd"},{"vulnerability":"VCID-wrna-cc9g-sqbe"},{"vulnerability":"VCID-yx79-3g2x-pqex"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.0@10.0.25-0%252Bdeb8u1"}],"aliases":["CVE-2015-2643"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-r3kw-ufpz-aqft"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/36455?format=json","vulnerability_id":"VCID-r5m9-kdvc-g3fv","summary":"Multiple vulnerabilities have been found in MySQL, allowing\n    attackers to execute arbitrary code or cause Denial of Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0505.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0505.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-0505","reference_id":"","reference_type":"","scores":[{"value":"0.00288","scoring_system":"epss","scoring_elements":"0.52118","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00288","scoring_system":"epss","scoring_elements":"0.52162","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00288","scoring_system":"epss","scoring_elements":"0.52189","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00288","scoring_system":"epss","scoring_elements":"0.52154","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00288","scoring_system":"epss","scoring_elements":"0.52207","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00288","scoring_system":"epss","scoring_elements":"0.52203","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00288","scoring_system":"epss","scoring_elements":"0.52254","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00288","scoring_system":"epss","scoring_elements":"0.52238","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00288","scoring_system":"epss","scoring_elements":"0.52224","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00288","scoring_system":"epss","scoring_elements":"0.52261","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00288","scoring_system":"epss","scoring_elements":"0.52265","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00288","scoring_system":"epss","scoring_elements":"0.52249","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00288","scoring_system":"epss","scoring_elements":"0.52197","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00288","scoring_system":"epss","scoring_elements":"0.52206","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00288","scoring_system":"epss","scoring_elements":"0.52169","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00288","scoring_system":"epss","scoring_elements":"0.52115","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00288","scoring_system":"epss","scoring_elements":"0.52165","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00288","scoring_system":"epss","scoring_elements":"0.52209","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00288","scoring_system":"epss","scoring_elements":"0.52171","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00288","scoring_system":"epss","scoring_elements":"0.52195","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00288","scoring_system":"epss","scoring_elements":"0.52275","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-0505"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0433","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0433"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0441","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0441"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0499","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0499"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0501","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0501"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0505","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0505"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2568","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2568"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2571","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2571"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2573","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2573"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2582","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2582"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2643","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2643"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2648","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2648"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3152","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3152"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4752","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4752"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4757","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4757"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1212780","reference_id":"1212780","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1212780"},{"reference_url":"https://security.gentoo.org/glsa/201507-19","reference_id":"GLSA-201507-19","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201507-19"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1628","reference_id":"RHSA-2015:1628","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1628"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1629","reference_id":"RHSA-2015:1629","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1629"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1646","reference_id":"RHSA-2015:1646","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1646"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1647","reference_id":"RHSA-2015:1647","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1647"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1665","reference_id":"RHSA-2015:1665","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1665"},{"reference_url":"https://usn.ubuntu.com/2575-1/","reference_id":"USN-2575-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2575-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035582?format=json","purl":"pkg:deb/debian/mariadb-10.0@10.0.25-0%2Bdeb8u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1gmc-pj6y-rkfx"},{"vulnerability":"VCID-2gyq-q761-h3br"},{"vulnerability":"VCID-2rf6-qaey-1ubn"},{"vulnerability":"VCID-45hn-ezks-j7br"},{"vulnerability":"VCID-4cnj-7fur-3qe3"},{"vulnerability":"VCID-4yz4-vxnh-b3dp"},{"vulnerability":"VCID-5sjj-599v-vybg"},{"vulnerability":"VCID-6g4n-3xfu-hfee"},{"vulnerability":"VCID-6muh-rg1z-pqab"},{"vulnerability":"VCID-8djb-knkk-s3c8"},{"vulnerability":"VCID-8krv-jqjg-uqc8"},{"vulnerability":"VCID-8kvb-5u8c-zbc4"},{"vulnerability":"VCID-8sya-wktg-dqa5"},{"vulnerability":"VCID-9f48-53dz-13an"},{"vulnerability":"VCID-9ff2-43rk-2ydj"},{"vulnerability":"VCID-9w98-nfg2-muh2"},{"vulnerability":"VCID-bhxk-8byp-eyap"},{"vulnerability":"VCID-ej67-ayfh-sqdt"},{"vulnerability":"VCID-g1pp-9qqg-1beb"},{"vulnerability":"VCID-gp4w-bdxg-6kab"},{"vulnerability":"VCID-jgff-4jyp-9fgr"},{"vulnerability":"VCID-mde2-1ynu-auh2"},{"vulnerability":"VCID-mfgg-7s54-gqg8"},{"vulnerability":"VCID-nkdd-suwp-4ffr"},{"vulnerability":"VCID-p623-gxyv-g7fs"},{"vulnerability":"VCID-pk7e-t26d-aqdm"},{"vulnerability":"VCID-pv92-6p9x-v7bs"},{"vulnerability":"VCID-r2cz-9kjz-zbgu"},{"vulnerability":"VCID-rssq-mfc2-ckaf"},{"vulnerability":"VCID-rted-6vzz-mbcv"},{"vulnerability":"VCID-tvdv-3ed5-h3dt"},{"vulnerability":"VCID-un5y-y9sq-1ufb"},{"vulnerability":"VCID-v4gv-g9n5-ukgc"},{"vulnerability":"VCID-vh5y-15tw-d7fd"},{"vulnerability":"VCID-wrna-cc9g-sqbe"},{"vulnerability":"VCID-yx79-3g2x-pqex"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.0@10.0.25-0%252Bdeb8u1"}],"aliases":["CVE-2015-0505"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-r5m9-kdvc-g3fv"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/81258?format=json","vulnerability_id":"VCID-rfz7-vha1-e7gy","summary":"security update","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:29Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:29Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:29Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:29Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:29Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:29Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0705.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:29Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-0705.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-1480.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:29Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-1480.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-1481.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:29Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-1481.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-1602.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:29Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-1602.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0641.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0641.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-0641","reference_id":"","reference_type":"","scores":[{"value":"0.0025","scoring_system":"epss","scoring_elements":"0.48217","published_at":"2026-05-14T12:55:00Z"},{"value":"0.0025","scoring_system":"epss","scoring_elements":"0.48213","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0025","scoring_system":"epss","scoring_elements":"0.48224","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0025","scoring_system":"epss","scoring_elements":"0.48275","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0025","scoring_system":"epss","scoring_elements":"0.4827","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0025","scoring_system":"epss","scoring_elements":"0.48226","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0025","scoring_system":"epss","scoring_elements":"0.48206","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0025","scoring_system":"epss","scoring_elements":"0.48216","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0025","scoring_system":"epss","scoring_elements":"0.48163","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0025","scoring_system":"epss","scoring_elements":"0.48081","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0025","scoring_system":"epss","scoring_elements":"0.48146","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0025","scoring_system":"epss","scoring_elements":"0.4817","published_at":"2026-05-09T12:55:00Z"},{"value":"0.0025","scoring_system":"epss","scoring_elements":"0.48115","published_at":"2026-05-11T12:55:00Z"},{"value":"0.0025","scoring_system":"epss","scoring_elements":"0.48144","published_at":"2026-05-12T12:55:00Z"},{"value":"0.0025","scoring_system":"epss","scoring_elements":"0.48158","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0025","scoring_system":"epss","scoring_elements":"0.48195","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0025","scoring_system":"epss","scoring_elements":"0.48215","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0025","scoring_system":"epss","scoring_elements":"0.48167","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0025","scoring_system":"epss","scoring_elements":"0.4822","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0025","scoring_system":"epss","scoring_elements":"0.48214","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0025","scoring_system":"epss","scoring_elements":"0.48238","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-0641"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0640","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0640"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0641","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0641"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0642","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0642"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0643","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0643"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0644","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0644"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0646","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0646"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0647","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0647"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0648","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0648"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0649","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0649"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0650","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0650"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0655","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0655"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0666","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0666"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0668","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0668"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2047","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2047"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:M/C:P/I:N/A:C"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://mariadb.com/kb/en/mariadb/mariadb-10024-release-notes/","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:29Z/"}],"url":"https://mariadb.com/kb/en/mariadb/mariadb-10024-release-notes/"},{"reference_url":"https://mariadb.com/kb/en/mariadb/mariadb-10112-release-notes/","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:29Z/"}],"url":"https://mariadb.com/kb/en/mariadb/mariadb-10112-release-notes/"},{"reference_url":"https://mariadb.com/kb/en/mariadb/mariadb-5548-release-notes/","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:29Z/"}],"url":"https://mariadb.com/kb/en/mariadb/mariadb-5548-release-notes/"},{"reference_url":"http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:29Z/"}],"url":"http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168"},{"reference_url":"http://www.debian.org/security/2016/dsa-3557","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:29Z/"}],"url":"http://www.debian.org/security/2016/dsa-3557"},{"reference_url":"http://www.debian.org/security/2016/dsa-3595","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:29Z/"}],"url":"http://www.debian.org/security/2016/dsa-3595"},{"reference_url":"http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:29Z/"}],"url":"http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:29Z/"}],"url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html"},{"reference_url":"http://www.securityfocus.com/bid/86470","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:29Z/"}],"url":"http://www.securityfocus.com/bid/86470"},{"reference_url":"http://www.securitytracker.com/id/1035606","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:29Z/"}],"url":"http://www.securitytracker.com/id/1035606"},{"reference_url":"http://www.ubuntu.com/usn/USN-2953-1","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:29Z/"}],"url":"http://www.ubuntu.com/usn/USN-2953-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1329241","reference_id":"1329241","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1329241"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:powerkvm:2.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ibm:powerkvm:2.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:powerkvm:2.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:powerkvm:3.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ibm:powerkvm:3.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:powerkvm:3.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-0641","reference_id":"CVE-2016-0641","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:S/C:P/I:N/A:P"},{"value":"5.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-0641"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0705","reference_id":"RHSA-2016:0705","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0705"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1132","reference_id":"RHSA-2016:1132","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:29Z/"}],"url":"https://access.redhat.com/errata/RHSA-2016:1132"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1480","reference_id":"RHSA-2016:1480","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1480"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1481","reference_id":"RHSA-2016:1481","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1481"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1602","reference_id":"RHSA-2016:1602","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1602"},{"reference_url":"https://usn.ubuntu.com/2953-1/","reference_id":"USN-2953-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2953-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035582?format=json","purl":"pkg:deb/debian/mariadb-10.0@10.0.25-0%2Bdeb8u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1gmc-pj6y-rkfx"},{"vulnerability":"VCID-2gyq-q761-h3br"},{"vulnerability":"VCID-2rf6-qaey-1ubn"},{"vulnerability":"VCID-45hn-ezks-j7br"},{"vulnerability":"VCID-4cnj-7fur-3qe3"},{"vulnerability":"VCID-4yz4-vxnh-b3dp"},{"vulnerability":"VCID-5sjj-599v-vybg"},{"vulnerability":"VCID-6g4n-3xfu-hfee"},{"vulnerability":"VCID-6muh-rg1z-pqab"},{"vulnerability":"VCID-8djb-knkk-s3c8"},{"vulnerability":"VCID-8krv-jqjg-uqc8"},{"vulnerability":"VCID-8kvb-5u8c-zbc4"},{"vulnerability":"VCID-8sya-wktg-dqa5"},{"vulnerability":"VCID-9f48-53dz-13an"},{"vulnerability":"VCID-9ff2-43rk-2ydj"},{"vulnerability":"VCID-9w98-nfg2-muh2"},{"vulnerability":"VCID-bhxk-8byp-eyap"},{"vulnerability":"VCID-ej67-ayfh-sqdt"},{"vulnerability":"VCID-g1pp-9qqg-1beb"},{"vulnerability":"VCID-gp4w-bdxg-6kab"},{"vulnerability":"VCID-jgff-4jyp-9fgr"},{"vulnerability":"VCID-mde2-1ynu-auh2"},{"vulnerability":"VCID-mfgg-7s54-gqg8"},{"vulnerability":"VCID-nkdd-suwp-4ffr"},{"vulnerability":"VCID-p623-gxyv-g7fs"},{"vulnerability":"VCID-pk7e-t26d-aqdm"},{"vulnerability":"VCID-pv92-6p9x-v7bs"},{"vulnerability":"VCID-r2cz-9kjz-zbgu"},{"vulnerability":"VCID-rssq-mfc2-ckaf"},{"vulnerability":"VCID-rted-6vzz-mbcv"},{"vulnerability":"VCID-tvdv-3ed5-h3dt"},{"vulnerability":"VCID-un5y-y9sq-1ufb"},{"vulnerability":"VCID-v4gv-g9n5-ukgc"},{"vulnerability":"VCID-vh5y-15tw-d7fd"},{"vulnerability":"VCID-wrna-cc9g-sqbe"},{"vulnerability":"VCID-yx79-3g2x-pqex"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.0@10.0.25-0%252Bdeb8u1"}],"aliases":["CVE-2016-0641"],"risk_score":2.3,"exploitability":"0.5","weighted_severity":"4.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-rfz7-vha1-e7gy"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61088?format=json","vulnerability_id":"VCID-s5bz-57vv-b7bz","summary":"security update","references":[{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177539.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177539.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00010.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00010.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00011.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00011.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2016-02/msg00039.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2016-02/msg00039.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0534.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-0534.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0705.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-0705.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-1480.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-1480.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-1481.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-1481.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4913.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4913.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-4913","reference_id":"","reference_type":"","scores":[{"value":"0.00392","scoring_system":"epss","scoring_elements":"0.6032","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00392","scoring_system":"epss","scoring_elements":"0.60078","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00392","scoring_system":"epss","scoring_elements":"0.60156","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00392","scoring_system":"epss","scoring_elements":"0.60181","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00392","scoring_system":"epss","scoring_elements":"0.6015","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00392","scoring_system":"epss","scoring_elements":"0.602","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00392","scoring_system":"epss","scoring_elements":"0.60214","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00392","scoring_system":"epss","scoring_elements":"0.60235","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00392","scoring_system":"epss","scoring_elements":"0.60222","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00392","scoring_system":"epss","scoring_elements":"0.60204","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00392","scoring_system":"epss","scoring_elements":"0.60244","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00392","scoring_system":"epss","scoring_elements":"0.60251","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00392","scoring_system":"epss","scoring_elements":"0.60239","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00392","scoring_system":"epss","scoring_elements":"0.60209","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00392","scoring_system":"epss","scoring_elements":"0.60225","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00392","scoring_system":"epss","scoring_elements":"0.60213","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00392","scoring_system":"epss","scoring_elements":"0.6017","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00392","scoring_system":"epss","scoring_elements":"0.60217","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00392","scoring_system":"epss","scoring_elements":"0.60274","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00392","scoring_system":"epss","scoring_elements":"0.60233","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00392","scoring_system":"epss","scoring_elements":"0.60259","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-4913"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4792","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4792"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4802","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4802"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4815","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4815"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4816","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4816"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4819","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4819"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4826","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4826"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4830","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4830"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4836","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4836"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4858","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4858"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4861","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4861"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4870","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4870"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4879","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4879"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4895","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4895"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4913","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4913"},{"reference_url":"https://www.suse.com/support/update/announcement/2016/suse-su-20160296-1.html","reference_id":"","reference_type":"","scores":[],"url":"https://www.suse.com/support/update/announcement/2016/suse-su-20160296-1.html"},{"reference_url":"http://www.debian.org/security/2015/dsa-3377","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2015/dsa-3377"},{"reference_url":"http://www.debian.org/security/2015/dsa-3385","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2015/dsa-3385"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html"},{"reference_url":"http://www.securityfocus.com/bid/77153","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/77153"},{"reference_url":"http://www.securitytracker.com/id/1033894","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1033894"},{"reference_url":"http://www.ubuntu.com/usn/USN-2781-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2781-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1274794","reference_id":"1274794","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1274794"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2015-4913","reference_id":"CVE-2015-4913","reference_type":"","scores":[{"value":"3.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:S/C:N/I:N/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2015-4913"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0534","reference_id":"RHSA-2016:0534","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0534"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0705","reference_id":"RHSA-2016:0705","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0705"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1132","reference_id":"RHSA-2016:1132","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1132"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1480","reference_id":"RHSA-2016:1480","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1480"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1481","reference_id":"RHSA-2016:1481","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1481"},{"reference_url":"https://usn.ubuntu.com/2781-1/","reference_id":"USN-2781-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2781-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035582?format=json","purl":"pkg:deb/debian/mariadb-10.0@10.0.25-0%2Bdeb8u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1gmc-pj6y-rkfx"},{"vulnerability":"VCID-2gyq-q761-h3br"},{"vulnerability":"VCID-2rf6-qaey-1ubn"},{"vulnerability":"VCID-45hn-ezks-j7br"},{"vulnerability":"VCID-4cnj-7fur-3qe3"},{"vulnerability":"VCID-4yz4-vxnh-b3dp"},{"vulnerability":"VCID-5sjj-599v-vybg"},{"vulnerability":"VCID-6g4n-3xfu-hfee"},{"vulnerability":"VCID-6muh-rg1z-pqab"},{"vulnerability":"VCID-8djb-knkk-s3c8"},{"vulnerability":"VCID-8krv-jqjg-uqc8"},{"vulnerability":"VCID-8kvb-5u8c-zbc4"},{"vulnerability":"VCID-8sya-wktg-dqa5"},{"vulnerability":"VCID-9f48-53dz-13an"},{"vulnerability":"VCID-9ff2-43rk-2ydj"},{"vulnerability":"VCID-9w98-nfg2-muh2"},{"vulnerability":"VCID-bhxk-8byp-eyap"},{"vulnerability":"VCID-ej67-ayfh-sqdt"},{"vulnerability":"VCID-g1pp-9qqg-1beb"},{"vulnerability":"VCID-gp4w-bdxg-6kab"},{"vulnerability":"VCID-jgff-4jyp-9fgr"},{"vulnerability":"VCID-mde2-1ynu-auh2"},{"vulnerability":"VCID-mfgg-7s54-gqg8"},{"vulnerability":"VCID-nkdd-suwp-4ffr"},{"vulnerability":"VCID-p623-gxyv-g7fs"},{"vulnerability":"VCID-pk7e-t26d-aqdm"},{"vulnerability":"VCID-pv92-6p9x-v7bs"},{"vulnerability":"VCID-r2cz-9kjz-zbgu"},{"vulnerability":"VCID-rssq-mfc2-ckaf"},{"vulnerability":"VCID-rted-6vzz-mbcv"},{"vulnerability":"VCID-tvdv-3ed5-h3dt"},{"vulnerability":"VCID-un5y-y9sq-1ufb"},{"vulnerability":"VCID-v4gv-g9n5-ukgc"},{"vulnerability":"VCID-vh5y-15tw-d7fd"},{"vulnerability":"VCID-wrna-cc9g-sqbe"},{"vulnerability":"VCID-yx79-3g2x-pqex"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.0@10.0.25-0%252Bdeb8u1"}],"aliases":["CVE-2015-4913"],"risk_score":1.6,"exploitability":"0.5","weighted_severity":"3.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-s5bz-57vv-b7bz"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/80438?format=json","vulnerability_id":"VCID-sv7d-4eqj-a3dx","summary":"security update","references":[{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2015-July/161436.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2015-July/161436.html"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2015-July/161625.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2015-July/161625.html"},{"reference_url":"http://mysqlblog.fivefarmers.com/2014/04/02/redefining-ssl-option/","reference_id":"","reference_type":"","scores":[],"url":"http://mysqlblog.fivefarmers.com/2014/04/02/redefining-ssl-option/"},{"reference_url":"http://mysqlblog.fivefarmers.com/2015/04/29/ssltls-in-5-6-and-5-5-ocert-advisory/","reference_id":"","reference_type":"","scores":[],"url":"http://mysqlblog.fivefarmers.com/2015/04/29/ssltls-in-5-6-and-5-5-ocert-advisory/"},{"reference_url":"http://packetstormsecurity.com/files/131688/MySQL-SSL-TLS-Downgrade.html","reference_id":"","reference_type":"","scores":[],"url":"http://packetstormsecurity.com/files/131688/MySQL-SSL-TLS-Downgrade.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-1646.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2015-1646.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-1647.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2015-1647.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-1665.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2015-1665.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3152.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3152.json"},{"reference_url":"https://access.redhat.com/security/cve/cve-2015-3152","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/security/cve/cve-2015-3152"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-3152","reference_id":"","reference_type":"","scores":[{"value":"0.51669","scoring_system":"epss","scoring_elements":"0.97923","published_at":"2026-05-14T12:55:00Z"},{"value":"0.51669","scoring_system":"epss","scoring_elements":"0.97918","published_at":"2026-05-12T12:55:00Z"},{"value":"0.51669","scoring_system":"epss","scoring_elements":"0.97876","published_at":"2026-04-01T12:55:00Z"},{"value":"0.51669","scoring_system":"epss","scoring_elements":"0.97881","published_at":"2026-04-02T12:55:00Z"},{"value":"0.51669","scoring_system":"epss","scoring_elements":"0.97882","published_at":"2026-04-04T12:55:00Z"},{"value":"0.51669","scoring_system":"epss","scoring_elements":"0.97886","published_at":"2026-04-07T12:55:00Z"},{"value":"0.51669","scoring_system":"epss","scoring_elements":"0.9789","published_at":"2026-04-08T12:55:00Z"},{"value":"0.51669","scoring_system":"epss","scoring_elements":"0.97893","published_at":"2026-04-09T12:55:00Z"},{"value":"0.51669","scoring_system":"epss","scoring_elements":"0.97896","published_at":"2026-04-11T12:55:00Z"},{"value":"0.51669","scoring_system":"epss","scoring_elements":"0.97897","published_at":"2026-04-12T12:55:00Z"},{"value":"0.51669","scoring_system":"epss","scoring_elements":"0.97899","published_at":"2026-04-13T12:55:00Z"},{"value":"0.51669","scoring_system":"epss","scoring_elements":"0.97905","published_at":"2026-04-21T12:55:00Z"},{"value":"0.51669","scoring_system":"epss","scoring_elements":"0.97906","published_at":"2026-04-18T12:55:00Z"},{"value":"0.51669","scoring_system":"epss","scoring_elements":"0.97903","published_at":"2026-04-24T12:55:00Z"},{"value":"0.51669","scoring_system":"epss","scoring_elements":"0.97904","published_at":"2026-04-26T12:55:00Z"},{"value":"0.51669","scoring_system":"epss","scoring_elements":"0.9791","published_at":"2026-04-29T12:55:00Z"},{"value":"0.51669","scoring_system":"epss","scoring_elements":"0.97914","published_at":"2026-05-05T12:55:00Z"},{"value":"0.51669","scoring_system":"epss","scoring_elements":"0.97912","published_at":"2026-05-07T12:55:00Z"},{"value":"0.51669","scoring_system":"epss","scoring_elements":"0.97915","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-3152"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0433","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0433"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0441","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0441"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0499","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0499"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0501","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0501"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0505","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0505"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2568","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2568"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2571","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2571"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2573","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2573"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2582","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2582"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2643","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2643"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2648","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2648"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3152","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3152"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4752","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4752"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4757","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4757"},{"reference_url":"https://github.com/mysql/mysql-server/commit/3bd5589e1a5a93f9c224badf983cd65c45215390","reference_id":"","reference_type":"","scores":[],"url":"https://github.com/mysql/mysql-server/commit/3bd5589e1a5a93f9c224badf983cd65c45215390"},{"reference_url":"https://jira.mariadb.org/browse/MDEV-7937","reference_id":"","reference_type":"","scores":[],"url":"https://jira.mariadb.org/browse/MDEV-7937"},{"reference_url":"https://www.duosecurity.com/blog/backronym-mysql-vulnerability","reference_id":"","reference_type":"","scores":[],"url":"https://www.duosecurity.com/blog/backronym-mysql-vulnerability"},{"reference_url":"http://www.debian.org/security/2015/dsa-3311","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2015/dsa-3311"},{"reference_url":"http://www.ocert.org/advisories/ocert-2015-003.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.ocert.org/advisories/ocert-2015-003.html"},{"reference_url":"http://www.securityfocus.com/archive/1/535397/100/1100/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/535397/100/1100/threaded"},{"reference_url":"http://www.securityfocus.com/bid/74398","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/74398"},{"reference_url":"http://www.securitytracker.com/id/1032216","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1032216"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1217506","reference_id":"1217506","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1217506"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_connector\\/c:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_connector\\/c:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_connector\\/c:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:php:php:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:21:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:21:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:21:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:7.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2015-3152","reference_id":"CVE-2015-3152","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:P/A:N"},{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2015-3152"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1646","reference_id":"RHSA-2015:1646","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1646"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1647","reference_id":"RHSA-2015:1647","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1647"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1665","reference_id":"RHSA-2015:1665","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1665"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035582?format=json","purl":"pkg:deb/debian/mariadb-10.0@10.0.25-0%2Bdeb8u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1gmc-pj6y-rkfx"},{"vulnerability":"VCID-2gyq-q761-h3br"},{"vulnerability":"VCID-2rf6-qaey-1ubn"},{"vulnerability":"VCID-45hn-ezks-j7br"},{"vulnerability":"VCID-4cnj-7fur-3qe3"},{"vulnerability":"VCID-4yz4-vxnh-b3dp"},{"vulnerability":"VCID-5sjj-599v-vybg"},{"vulnerability":"VCID-6g4n-3xfu-hfee"},{"vulnerability":"VCID-6muh-rg1z-pqab"},{"vulnerability":"VCID-8djb-knkk-s3c8"},{"vulnerability":"VCID-8krv-jqjg-uqc8"},{"vulnerability":"VCID-8kvb-5u8c-zbc4"},{"vulnerability":"VCID-8sya-wktg-dqa5"},{"vulnerability":"VCID-9f48-53dz-13an"},{"vulnerability":"VCID-9ff2-43rk-2ydj"},{"vulnerability":"VCID-9w98-nfg2-muh2"},{"vulnerability":"VCID-bhxk-8byp-eyap"},{"vulnerability":"VCID-ej67-ayfh-sqdt"},{"vulnerability":"VCID-g1pp-9qqg-1beb"},{"vulnerability":"VCID-gp4w-bdxg-6kab"},{"vulnerability":"VCID-jgff-4jyp-9fgr"},{"vulnerability":"VCID-mde2-1ynu-auh2"},{"vulnerability":"VCID-mfgg-7s54-gqg8"},{"vulnerability":"VCID-nkdd-suwp-4ffr"},{"vulnerability":"VCID-p623-gxyv-g7fs"},{"vulnerability":"VCID-pk7e-t26d-aqdm"},{"vulnerability":"VCID-pv92-6p9x-v7bs"},{"vulnerability":"VCID-r2cz-9kjz-zbgu"},{"vulnerability":"VCID-rssq-mfc2-ckaf"},{"vulnerability":"VCID-rted-6vzz-mbcv"},{"vulnerability":"VCID-tvdv-3ed5-h3dt"},{"vulnerability":"VCID-un5y-y9sq-1ufb"},{"vulnerability":"VCID-v4gv-g9n5-ukgc"},{"vulnerability":"VCID-vh5y-15tw-d7fd"},{"vulnerability":"VCID-wrna-cc9g-sqbe"},{"vulnerability":"VCID-yx79-3g2x-pqex"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.0@10.0.25-0%252Bdeb8u1"}],"aliases":["CVE-2015-3152"],"risk_score":2.6,"exploitability":"0.5","weighted_severity":"5.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-sv7d-4eqj-a3dx"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/81263?format=json","vulnerability_id":"VCID-tazb-gd49-73b4","summary":"security update","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:15Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:15Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:15Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:15Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:15Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:15Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0705.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:15Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-0705.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-1480.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:15Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-1480.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-1481.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:15Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-1481.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-1602.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:15Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-1602.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0648.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0648.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-0648","reference_id":"","reference_type":"","scores":[{"value":"0.00243","scoring_system":"epss","scoring_elements":"0.47516","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00243","scoring_system":"epss","scoring_elements":"0.47518","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00243","scoring_system":"epss","scoring_elements":"0.47537","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00243","scoring_system":"epss","scoring_elements":"0.47513","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00243","scoring_system":"epss","scoring_elements":"0.47521","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00243","scoring_system":"epss","scoring_elements":"0.4758","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00243","scoring_system":"epss","scoring_elements":"0.47573","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00243","scoring_system":"epss","scoring_elements":"0.47524","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00243","scoring_system":"epss","scoring_elements":"0.47522","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00243","scoring_system":"epss","scoring_elements":"0.47471","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00243","scoring_system":"epss","scoring_elements":"0.47387","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00243","scoring_system":"epss","scoring_elements":"0.47452","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00243","scoring_system":"epss","scoring_elements":"0.47473","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00243","scoring_system":"epss","scoring_elements":"0.47415","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00243","scoring_system":"epss","scoring_elements":"0.47443","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00243","scoring_system":"epss","scoring_elements":"0.47464","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00243","scoring_system":"epss","scoring_elements":"0.47494","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00243","scoring_system":"epss","scoring_elements":"0.47515","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-0648"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0640","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0640"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0641","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0641"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0642","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0642"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0643","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0643"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0644","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0644"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0646","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0646"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0647","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0647"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0648","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0648"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0649","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0649"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0650","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0650"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0655","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0655"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0666","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0666"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0668","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0668"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2047","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2047"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.6","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:S/C:N/I:N/A:C"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://mariadb.com/kb/en/mariadb/mariadb-10025-release-notes/","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:15Z/"}],"url":"https://mariadb.com/kb/en/mariadb/mariadb-10025-release-notes/"},{"reference_url":"https://mariadb.com/kb/en/mariadb/mariadb-10114-release-notes/","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:15Z/"}],"url":"https://mariadb.com/kb/en/mariadb/mariadb-10114-release-notes/"},{"reference_url":"https://mariadb.com/kb/en/mariadb/mariadb-5549-release-notes/","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:15Z/"}],"url":"https://mariadb.com/kb/en/mariadb/mariadb-5549-release-notes/"},{"reference_url":"http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:15Z/"}],"url":"http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168"},{"reference_url":"http://www.debian.org/security/2016/dsa-3557","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:15Z/"}],"url":"http://www.debian.org/security/2016/dsa-3557"},{"reference_url":"http://www.debian.org/security/2016/dsa-3595","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:15Z/"}],"url":"http://www.debian.org/security/2016/dsa-3595"},{"reference_url":"http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:15Z/"}],"url":"http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:15Z/"}],"url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html"},{"reference_url":"http://www.securityfocus.com/bid/86457","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:15Z/"}],"url":"http://www.securityfocus.com/bid/86457"},{"reference_url":"http://www.securitytracker.com/id/1035606","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:15Z/"}],"url":"http://www.securitytracker.com/id/1035606"},{"reference_url":"http://www.ubuntu.com/usn/USN-2953-1","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:15Z/"}],"url":"http://www.ubuntu.com/usn/USN-2953-1"},{"reference_url":"http://www.ubuntu.com/usn/USN-2954-1","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:15Z/"}],"url":"http://www.ubuntu.com/usn/USN-2954-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1329251","reference_id":"1329251","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1329251"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:powerkvm:2.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ibm:powerkvm:2.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:powerkvm:2.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:powerkvm:3.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ibm:powerkvm:3.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:powerkvm:3.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-0648","reference_id":"CVE-2016-0648","reference_type":"","scores":[{"value":"4.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:S/C:N/I:N/A:P"},{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-0648"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0705","reference_id":"RHSA-2016:0705","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0705"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1132","reference_id":"RHSA-2016:1132","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:15Z/"}],"url":"https://access.redhat.com/errata/RHSA-2016:1132"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1480","reference_id":"RHSA-2016:1480","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1480"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1481","reference_id":"RHSA-2016:1481","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1481"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1602","reference_id":"RHSA-2016:1602","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1602"},{"reference_url":"https://usn.ubuntu.com/2953-1/","reference_id":"USN-2953-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2953-1/"},{"reference_url":"https://usn.ubuntu.com/2954-1/","reference_id":"USN-2954-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2954-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035582?format=json","purl":"pkg:deb/debian/mariadb-10.0@10.0.25-0%2Bdeb8u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1gmc-pj6y-rkfx"},{"vulnerability":"VCID-2gyq-q761-h3br"},{"vulnerability":"VCID-2rf6-qaey-1ubn"},{"vulnerability":"VCID-45hn-ezks-j7br"},{"vulnerability":"VCID-4cnj-7fur-3qe3"},{"vulnerability":"VCID-4yz4-vxnh-b3dp"},{"vulnerability":"VCID-5sjj-599v-vybg"},{"vulnerability":"VCID-6g4n-3xfu-hfee"},{"vulnerability":"VCID-6muh-rg1z-pqab"},{"vulnerability":"VCID-8djb-knkk-s3c8"},{"vulnerability":"VCID-8krv-jqjg-uqc8"},{"vulnerability":"VCID-8kvb-5u8c-zbc4"},{"vulnerability":"VCID-8sya-wktg-dqa5"},{"vulnerability":"VCID-9f48-53dz-13an"},{"vulnerability":"VCID-9ff2-43rk-2ydj"},{"vulnerability":"VCID-9w98-nfg2-muh2"},{"vulnerability":"VCID-bhxk-8byp-eyap"},{"vulnerability":"VCID-ej67-ayfh-sqdt"},{"vulnerability":"VCID-g1pp-9qqg-1beb"},{"vulnerability":"VCID-gp4w-bdxg-6kab"},{"vulnerability":"VCID-jgff-4jyp-9fgr"},{"vulnerability":"VCID-mde2-1ynu-auh2"},{"vulnerability":"VCID-mfgg-7s54-gqg8"},{"vulnerability":"VCID-nkdd-suwp-4ffr"},{"vulnerability":"VCID-p623-gxyv-g7fs"},{"vulnerability":"VCID-pk7e-t26d-aqdm"},{"vulnerability":"VCID-pv92-6p9x-v7bs"},{"vulnerability":"VCID-r2cz-9kjz-zbgu"},{"vulnerability":"VCID-rssq-mfc2-ckaf"},{"vulnerability":"VCID-rted-6vzz-mbcv"},{"vulnerability":"VCID-tvdv-3ed5-h3dt"},{"vulnerability":"VCID-un5y-y9sq-1ufb"},{"vulnerability":"VCID-v4gv-g9n5-ukgc"},{"vulnerability":"VCID-vh5y-15tw-d7fd"},{"vulnerability":"VCID-wrna-cc9g-sqbe"},{"vulnerability":"VCID-yx79-3g2x-pqex"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.0@10.0.25-0%252Bdeb8u1"}],"aliases":["CVE-2016-0648"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-tazb-gd49-73b4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61086?format=json","vulnerability_id":"VCID-xegm-n9yj-ckhs","summary":"security update","references":[{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177539.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177539.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00010.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00010.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00011.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00011.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2016-02/msg00039.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2016-02/msg00039.html"},{"reference_url":"http://packetstormsecurity.com/files/137232/MySQL-Procedure-Analyse-Denial-Of-Service.html","reference_id":"","reference_type":"","scores":[],"url":"http://packetstormsecurity.com/files/137232/MySQL-Procedure-Analyse-Denial-Of-Service.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0534.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-0534.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0705.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-0705.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-1480.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-1480.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-1481.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-1481.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4870.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4870.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-4870","reference_id":"","reference_type":"","scores":[{"value":"0.2214","scoring_system":"epss","scoring_elements":"0.95855","published_at":"2026-05-14T12:55:00Z"},{"value":"0.2214","scoring_system":"epss","scoring_elements":"0.95759","published_at":"2026-04-01T12:55:00Z"},{"value":"0.2214","scoring_system":"epss","scoring_elements":"0.95768","published_at":"2026-04-02T12:55:00Z"},{"value":"0.2214","scoring_system":"epss","scoring_elements":"0.95775","published_at":"2026-04-04T12:55:00Z"},{"value":"0.2214","scoring_system":"epss","scoring_elements":"0.95778","published_at":"2026-04-07T12:55:00Z"},{"value":"0.2214","scoring_system":"epss","scoring_elements":"0.95786","published_at":"2026-04-08T12:55:00Z"},{"value":"0.2214","scoring_system":"epss","scoring_elements":"0.9579","published_at":"2026-04-09T12:55:00Z"},{"value":"0.2214","scoring_system":"epss","scoring_elements":"0.95793","published_at":"2026-04-12T12:55:00Z"},{"value":"0.2214","scoring_system":"epss","scoring_elements":"0.95795","published_at":"2026-04-13T12:55:00Z"},{"value":"0.2214","scoring_system":"epss","scoring_elements":"0.95805","published_at":"2026-04-16T12:55:00Z"},{"value":"0.2214","scoring_system":"epss","scoring_elements":"0.9581","published_at":"2026-04-18T12:55:00Z"},{"value":"0.2214","scoring_system":"epss","scoring_elements":"0.95811","published_at":"2026-04-21T12:55:00Z"},{"value":"0.2214","scoring_system":"epss","scoring_elements":"0.95814","published_at":"2026-04-29T12:55:00Z"},{"value":"0.2214","scoring_system":"epss","scoring_elements":"0.95826","published_at":"2026-05-05T12:55:00Z"},{"value":"0.2214","scoring_system":"epss","scoring_elements":"0.95827","published_at":"2026-05-07T12:55:00Z"},{"value":"0.2214","scoring_system":"epss","scoring_elements":"0.95833","published_at":"2026-05-09T12:55:00Z"},{"value":"0.2214","scoring_system":"epss","scoring_elements":"0.95838","published_at":"2026-05-11T12:55:00Z"},{"value":"0.2214","scoring_system":"epss","scoring_elements":"0.95843","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-4870"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4792","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4792"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4802","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4802"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4815","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4815"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4816","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4816"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4819","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4819"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4826","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4826"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4830","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4830"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4836","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4836"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4858","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4858"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4861","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4861"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4870","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4870"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4879","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4879"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4895","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4895"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4913","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4913"},{"reference_url":"https://www.exploit-db.com/exploits/39867/","reference_id":"","reference_type":"","scores":[],"url":"https://www.exploit-db.com/exploits/39867/"},{"reference_url":"https://www.suse.com/support/update/announcement/2016/suse-su-20160296-1.html","reference_id":"","reference_type":"","scores":[],"url":"https://www.suse.com/support/update/announcement/2016/suse-su-20160296-1.html"},{"reference_url":"http://www.debian.org/security/2015/dsa-3377","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2015/dsa-3377"},{"reference_url":"http://www.debian.org/security/2015/dsa-3385","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2015/dsa-3385"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html"},{"reference_url":"http://www.securityfocus.com/bid/77208","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/77208"},{"reference_url":"http://www.securitytracker.com/id/1033894","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1033894"},{"reference_url":"http://www.ubuntu.com/usn/USN-2781-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2781-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1274781","reference_id":"1274781","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1274781"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:-:*:*:*:*:*:*","reference_id":"cpe:2.3:o:oracle:linux:7:-:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:-:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:7.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/39867.py","reference_id":"CVE-2015-4870","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/39867.py"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2015-4870","reference_id":"CVE-2015-4870","reference_type":"","scores":[{"value":"4.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:S/C:N/I:N/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2015-4870"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0534","reference_id":"RHSA-2016:0534","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0534"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0705","reference_id":"RHSA-2016:0705","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0705"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1132","reference_id":"RHSA-2016:1132","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1132"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1480","reference_id":"RHSA-2016:1480","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1480"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1481","reference_id":"RHSA-2016:1481","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1481"},{"reference_url":"https://usn.ubuntu.com/2781-1/","reference_id":"USN-2781-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2781-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035582?format=json","purl":"pkg:deb/debian/mariadb-10.0@10.0.25-0%2Bdeb8u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1gmc-pj6y-rkfx"},{"vulnerability":"VCID-2gyq-q761-h3br"},{"vulnerability":"VCID-2rf6-qaey-1ubn"},{"vulnerability":"VCID-45hn-ezks-j7br"},{"vulnerability":"VCID-4cnj-7fur-3qe3"},{"vulnerability":"VCID-4yz4-vxnh-b3dp"},{"vulnerability":"VCID-5sjj-599v-vybg"},{"vulnerability":"VCID-6g4n-3xfu-hfee"},{"vulnerability":"VCID-6muh-rg1z-pqab"},{"vulnerability":"VCID-8djb-knkk-s3c8"},{"vulnerability":"VCID-8krv-jqjg-uqc8"},{"vulnerability":"VCID-8kvb-5u8c-zbc4"},{"vulnerability":"VCID-8sya-wktg-dqa5"},{"vulnerability":"VCID-9f48-53dz-13an"},{"vulnerability":"VCID-9ff2-43rk-2ydj"},{"vulnerability":"VCID-9w98-nfg2-muh2"},{"vulnerability":"VCID-bhxk-8byp-eyap"},{"vulnerability":"VCID-ej67-ayfh-sqdt"},{"vulnerability":"VCID-g1pp-9qqg-1beb"},{"vulnerability":"VCID-gp4w-bdxg-6kab"},{"vulnerability":"VCID-jgff-4jyp-9fgr"},{"vulnerability":"VCID-mde2-1ynu-auh2"},{"vulnerability":"VCID-mfgg-7s54-gqg8"},{"vulnerability":"VCID-nkdd-suwp-4ffr"},{"vulnerability":"VCID-p623-gxyv-g7fs"},{"vulnerability":"VCID-pk7e-t26d-aqdm"},{"vulnerability":"VCID-pv92-6p9x-v7bs"},{"vulnerability":"VCID-r2cz-9kjz-zbgu"},{"vulnerability":"VCID-rssq-mfc2-ckaf"},{"vulnerability":"VCID-rted-6vzz-mbcv"},{"vulnerability":"VCID-tvdv-3ed5-h3dt"},{"vulnerability":"VCID-un5y-y9sq-1ufb"},{"vulnerability":"VCID-v4gv-g9n5-ukgc"},{"vulnerability":"VCID-vh5y-15tw-d7fd"},{"vulnerability":"VCID-wrna-cc9g-sqbe"},{"vulnerability":"VCID-yx79-3g2x-pqex"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.0@10.0.25-0%252Bdeb8u1"}],"aliases":["CVE-2015-4870"],"risk_score":7.2,"exploitability":"2.0","weighted_severity":"3.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-xegm-n9yj-ckhs"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/62567?format=json","vulnerability_id":"VCID-xvv1-nxs6-n7ab","summary":"security update","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00015.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00015.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00016.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00016.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0534.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-0534.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0705.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-0705.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-1480.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-1480.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-1481.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-1481.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0597.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0597.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-0597","reference_id":"","reference_type":"","scores":[{"value":"0.00361","scoring_system":"epss","scoring_elements":"0.58349","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00361","scoring_system":"epss","scoring_elements":"0.58282","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00361","scoring_system":"epss","scoring_elements":"0.58149","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00361","scoring_system":"epss","scoring_elements":"0.58235","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00361","scoring_system":"epss","scoring_elements":"0.58255","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00361","scoring_system":"epss","scoring_elements":"0.58229","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00361","scoring_system":"epss","scoring_elements":"0.58283","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00361","scoring_system":"epss","scoring_elements":"0.58288","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00361","scoring_system":"epss","scoring_elements":"0.58307","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00361","scoring_system":"epss","scoring_elements":"0.58284","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00361","scoring_system":"epss","scoring_elements":"0.58264","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00361","scoring_system":"epss","scoring_elements":"0.58296","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00361","scoring_system":"epss","scoring_elements":"0.58298","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00361","scoring_system":"epss","scoring_elements":"0.58275","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00361","scoring_system":"epss","scoring_elements":"0.58237","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00361","scoring_system":"epss","scoring_elements":"0.5825","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00361","scoring_system":"epss","scoring_elements":"0.58236","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00361","scoring_system":"epss","scoring_elements":"0.58201","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00361","scoring_system":"epss","scoring_elements":"0.58242","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00361","scoring_system":"epss","scoring_elements":"0.58302","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-0597"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0505","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0505"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0546","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0546"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0596","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0596"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0597","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0597"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0598","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0598"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0600","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0600"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0606","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0606"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0608","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0608"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0609","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0609"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0616","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0616"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2047","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2047"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:S/C:N/I:N/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://mariadb.com/kb/en/mariadb/mariadb-10110-release-notes/","reference_id":"","reference_type":"","scores":[],"url":"https://mariadb.com/kb/en/mariadb/mariadb-10110-release-notes/"},{"reference_url":"https://mariadb.com/kb/en/mariadb/mariadb-5547-release-notes/","reference_id":"","reference_type":"","scores":[],"url":"https://mariadb.com/kb/en/mariadb/mariadb-5547-release-notes/"},{"reference_url":"https://mariadb.com/kb/en/mdb-10023-rn/","reference_id":"","reference_type":"","scores":[],"url":"https://mariadb.com/kb/en/mdb-10023-rn/"},{"reference_url":"http://www.debian.org/security/2016/dsa-3453","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2016/dsa-3453"},{"reference_url":"http://www.debian.org/security/2016/dsa-3459","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2016/dsa-3459"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html"},{"reference_url":"http://www.securityfocus.com/bid/81151","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/81151"},{"reference_url":"http://www.securitytracker.com/id/1034708","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1034708"},{"reference_url":"http://www.ubuntu.com/usn/USN-2881-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2881-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1301497","reference_id":"1301497","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1301497"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node_eus:7.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_hpc_node_eus:7.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node_eus:7.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-0597","reference_id":"CVE-2016-0597","reference_type":"","scores":[{"value":"4.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:S/C:N/I:N/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-0597"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0534","reference_id":"RHSA-2016:0534","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0534"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0705","reference_id":"RHSA-2016:0705","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0705"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1132","reference_id":"RHSA-2016:1132","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1132"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1480","reference_id":"RHSA-2016:1480","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1480"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1481","reference_id":"RHSA-2016:1481","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1481"},{"reference_url":"https://usn.ubuntu.com/2881-1/","reference_id":"USN-2881-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2881-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035582?format=json","purl":"pkg:deb/debian/mariadb-10.0@10.0.25-0%2Bdeb8u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1gmc-pj6y-rkfx"},{"vulnerability":"VCID-2gyq-q761-h3br"},{"vulnerability":"VCID-2rf6-qaey-1ubn"},{"vulnerability":"VCID-45hn-ezks-j7br"},{"vulnerability":"VCID-4cnj-7fur-3qe3"},{"vulnerability":"VCID-4yz4-vxnh-b3dp"},{"vulnerability":"VCID-5sjj-599v-vybg"},{"vulnerability":"VCID-6g4n-3xfu-hfee"},{"vulnerability":"VCID-6muh-rg1z-pqab"},{"vulnerability":"VCID-8djb-knkk-s3c8"},{"vulnerability":"VCID-8krv-jqjg-uqc8"},{"vulnerability":"VCID-8kvb-5u8c-zbc4"},{"vulnerability":"VCID-8sya-wktg-dqa5"},{"vulnerability":"VCID-9f48-53dz-13an"},{"vulnerability":"VCID-9ff2-43rk-2ydj"},{"vulnerability":"VCID-9w98-nfg2-muh2"},{"vulnerability":"VCID-bhxk-8byp-eyap"},{"vulnerability":"VCID-ej67-ayfh-sqdt"},{"vulnerability":"VCID-g1pp-9qqg-1beb"},{"vulnerability":"VCID-gp4w-bdxg-6kab"},{"vulnerability":"VCID-jgff-4jyp-9fgr"},{"vulnerability":"VCID-mde2-1ynu-auh2"},{"vulnerability":"VCID-mfgg-7s54-gqg8"},{"vulnerability":"VCID-nkdd-suwp-4ffr"},{"vulnerability":"VCID-p623-gxyv-g7fs"},{"vulnerability":"VCID-pk7e-t26d-aqdm"},{"vulnerability":"VCID-pv92-6p9x-v7bs"},{"vulnerability":"VCID-r2cz-9kjz-zbgu"},{"vulnerability":"VCID-rssq-mfc2-ckaf"},{"vulnerability":"VCID-rted-6vzz-mbcv"},{"vulnerability":"VCID-tvdv-3ed5-h3dt"},{"vulnerability":"VCID-un5y-y9sq-1ufb"},{"vulnerability":"VCID-v4gv-g9n5-ukgc"},{"vulnerability":"VCID-vh5y-15tw-d7fd"},{"vulnerability":"VCID-wrna-cc9g-sqbe"},{"vulnerability":"VCID-yx79-3g2x-pqex"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.0@10.0.25-0%252Bdeb8u1"}],"aliases":["CVE-2016-0597"],"risk_score":1.8,"exploitability":"0.5","weighted_severity":"3.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-xvv1-nxs6-n7ab"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/62568?format=json","vulnerability_id":"VCID-y6p4-vfkn-q7fc","summary":"security update","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00015.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00015.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00016.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00016.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0534.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-0534.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0705.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-0705.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-1480.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-1480.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-1481.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-1481.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0598.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0598.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-0598","reference_id":"","reference_type":"","scores":[{"value":"0.00338","scoring_system":"epss","scoring_elements":"0.56676","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00338","scoring_system":"epss","scoring_elements":"0.56614","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00338","scoring_system":"epss","scoring_elements":"0.56522","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00338","scoring_system":"epss","scoring_elements":"0.56618","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00338","scoring_system":"epss","scoring_elements":"0.56639","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00338","scoring_system":"epss","scoring_elements":"0.56669","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00338","scoring_system":"epss","scoring_elements":"0.56675","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00338","scoring_system":"epss","scoring_elements":"0.56683","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00338","scoring_system":"epss","scoring_elements":"0.56658","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00338","scoring_system":"epss","scoring_elements":"0.56638","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00338","scoring_system":"epss","scoring_elements":"0.56668","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00338","scoring_system":"epss","scoring_elements":"0.5664","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00338","scoring_system":"epss","scoring_elements":"0.56576","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00338","scoring_system":"epss","scoring_elements":"0.56595","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00338","scoring_system":"epss","scoring_elements":"0.56577","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00338","scoring_system":"epss","scoring_elements":"0.56532","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00338","scoring_system":"epss","scoring_elements":"0.56578","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00338","scoring_system":"epss","scoring_elements":"0.56641","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00338","scoring_system":"epss","scoring_elements":"0.56592","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-0598"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0505","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0505"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0546","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0546"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0596","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0596"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0597","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0597"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0598","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0598"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0600","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0600"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0606","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0606"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0608","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0608"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0609","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0609"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0616","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0616"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2047","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2047"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:S/C:N/I:N/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://mariadb.com/kb/en/mariadb/mariadb-10110-release-notes/","reference_id":"","reference_type":"","scores":[],"url":"https://mariadb.com/kb/en/mariadb/mariadb-10110-release-notes/"},{"reference_url":"https://mariadb.com/kb/en/mariadb/mariadb-5547-release-notes/","reference_id":"","reference_type":"","scores":[],"url":"https://mariadb.com/kb/en/mariadb/mariadb-5547-release-notes/"},{"reference_url":"https://mariadb.com/kb/en/mdb-10023-rn/","reference_id":"","reference_type":"","scores":[],"url":"https://mariadb.com/kb/en/mdb-10023-rn/"},{"reference_url":"http://www.debian.org/security/2016/dsa-3453","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2016/dsa-3453"},{"reference_url":"http://www.debian.org/security/2016/dsa-3459","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2016/dsa-3459"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html"},{"reference_url":"http://www.securityfocus.com/bid/81182","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/81182"},{"reference_url":"http://www.securitytracker.com/id/1034708","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1034708"},{"reference_url":"http://www.ubuntu.com/usn/USN-2881-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2881-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1301498","reference_id":"1301498","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1301498"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node_eus:7.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_hpc_node_eus:7.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node_eus:7.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-0598","reference_id":"CVE-2016-0598","reference_type":"","scores":[{"value":"3.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:S/C:N/I:N/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-0598"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0534","reference_id":"RHSA-2016:0534","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0534"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0705","reference_id":"RHSA-2016:0705","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0705"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1132","reference_id":"RHSA-2016:1132","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1132"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1480","reference_id":"RHSA-2016:1480","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1480"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1481","reference_id":"RHSA-2016:1481","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1481"},{"reference_url":"https://usn.ubuntu.com/2881-1/","reference_id":"USN-2881-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2881-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035582?format=json","purl":"pkg:deb/debian/mariadb-10.0@10.0.25-0%2Bdeb8u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1gmc-pj6y-rkfx"},{"vulnerability":"VCID-2gyq-q761-h3br"},{"vulnerability":"VCID-2rf6-qaey-1ubn"},{"vulnerability":"VCID-45hn-ezks-j7br"},{"vulnerability":"VCID-4cnj-7fur-3qe3"},{"vulnerability":"VCID-4yz4-vxnh-b3dp"},{"vulnerability":"VCID-5sjj-599v-vybg"},{"vulnerability":"VCID-6g4n-3xfu-hfee"},{"vulnerability":"VCID-6muh-rg1z-pqab"},{"vulnerability":"VCID-8djb-knkk-s3c8"},{"vulnerability":"VCID-8krv-jqjg-uqc8"},{"vulnerability":"VCID-8kvb-5u8c-zbc4"},{"vulnerability":"VCID-8sya-wktg-dqa5"},{"vulnerability":"VCID-9f48-53dz-13an"},{"vulnerability":"VCID-9ff2-43rk-2ydj"},{"vulnerability":"VCID-9w98-nfg2-muh2"},{"vulnerability":"VCID-bhxk-8byp-eyap"},{"vulnerability":"VCID-ej67-ayfh-sqdt"},{"vulnerability":"VCID-g1pp-9qqg-1beb"},{"vulnerability":"VCID-gp4w-bdxg-6kab"},{"vulnerability":"VCID-jgff-4jyp-9fgr"},{"vulnerability":"VCID-mde2-1ynu-auh2"},{"vulnerability":"VCID-mfgg-7s54-gqg8"},{"vulnerability":"VCID-nkdd-suwp-4ffr"},{"vulnerability":"VCID-p623-gxyv-g7fs"},{"vulnerability":"VCID-pk7e-t26d-aqdm"},{"vulnerability":"VCID-pv92-6p9x-v7bs"},{"vulnerability":"VCID-r2cz-9kjz-zbgu"},{"vulnerability":"VCID-rssq-mfc2-ckaf"},{"vulnerability":"VCID-rted-6vzz-mbcv"},{"vulnerability":"VCID-tvdv-3ed5-h3dt"},{"vulnerability":"VCID-un5y-y9sq-1ufb"},{"vulnerability":"VCID-v4gv-g9n5-ukgc"},{"vulnerability":"VCID-vh5y-15tw-d7fd"},{"vulnerability":"VCID-wrna-cc9g-sqbe"},{"vulnerability":"VCID-yx79-3g2x-pqex"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.0@10.0.25-0%252Bdeb8u1"}],"aliases":["CVE-2016-0598"],"risk_score":1.6,"exploitability":"0.5","weighted_severity":"3.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-y6p4-vfkn-q7fc"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61075?format=json","vulnerability_id":"VCID-yzzc-qh9x-pfd6","summary":"security update","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4802.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4802.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-4802","reference_id":"","reference_type":"","scores":[{"value":"0.00419","scoring_system":"epss","scoring_elements":"0.6176","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00419","scoring_system":"epss","scoring_elements":"0.61834","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00419","scoring_system":"epss","scoring_elements":"0.61865","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00419","scoring_system":"epss","scoring_elements":"0.61837","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00419","scoring_system":"epss","scoring_elements":"0.61886","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00419","scoring_system":"epss","scoring_elements":"0.61902","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00419","scoring_system":"epss","scoring_elements":"0.61923","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00419","scoring_system":"epss","scoring_elements":"0.61911","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00419","scoring_system":"epss","scoring_elements":"0.61891","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00419","scoring_system":"epss","scoring_elements":"0.61934","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00419","scoring_system":"epss","scoring_elements":"0.61939","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00419","scoring_system":"epss","scoring_elements":"0.61921","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00419","scoring_system":"epss","scoring_elements":"0.61917","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00419","scoring_system":"epss","scoring_elements":"0.61935","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00419","scoring_system":"epss","scoring_elements":"0.61928","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00419","scoring_system":"epss","scoring_elements":"0.61872","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00419","scoring_system":"epss","scoring_elements":"0.6192","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00419","scoring_system":"epss","scoring_elements":"0.61981","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00419","scoring_system":"epss","scoring_elements":"0.61962","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00419","scoring_system":"epss","scoring_elements":"0.62017","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-4802"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4792","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4792"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4802","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4802"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4815","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4815"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4816","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4816"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4819","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4819"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4826","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4826"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4830","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4830"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4836","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4836"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4858","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4858"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4861","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4861"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4870","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4870"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4879","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4879"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4895","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4895"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4913","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4913"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1274756","reference_id":"1274756","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1274756"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0534","reference_id":"RHSA-2016:0534","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0534"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0705","reference_id":"RHSA-2016:0705","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0705"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1132","reference_id":"RHSA-2016:1132","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1132"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1480","reference_id":"RHSA-2016:1480","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1480"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1481","reference_id":"RHSA-2016:1481","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1481"},{"reference_url":"https://usn.ubuntu.com/2781-1/","reference_id":"USN-2781-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2781-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035582?format=json","purl":"pkg:deb/debian/mariadb-10.0@10.0.25-0%2Bdeb8u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1gmc-pj6y-rkfx"},{"vulnerability":"VCID-2gyq-q761-h3br"},{"vulnerability":"VCID-2rf6-qaey-1ubn"},{"vulnerability":"VCID-45hn-ezks-j7br"},{"vulnerability":"VCID-4cnj-7fur-3qe3"},{"vulnerability":"VCID-4yz4-vxnh-b3dp"},{"vulnerability":"VCID-5sjj-599v-vybg"},{"vulnerability":"VCID-6g4n-3xfu-hfee"},{"vulnerability":"VCID-6muh-rg1z-pqab"},{"vulnerability":"VCID-8djb-knkk-s3c8"},{"vulnerability":"VCID-8krv-jqjg-uqc8"},{"vulnerability":"VCID-8kvb-5u8c-zbc4"},{"vulnerability":"VCID-8sya-wktg-dqa5"},{"vulnerability":"VCID-9f48-53dz-13an"},{"vulnerability":"VCID-9ff2-43rk-2ydj"},{"vulnerability":"VCID-9w98-nfg2-muh2"},{"vulnerability":"VCID-bhxk-8byp-eyap"},{"vulnerability":"VCID-ej67-ayfh-sqdt"},{"vulnerability":"VCID-g1pp-9qqg-1beb"},{"vulnerability":"VCID-gp4w-bdxg-6kab"},{"vulnerability":"VCID-jgff-4jyp-9fgr"},{"vulnerability":"VCID-mde2-1ynu-auh2"},{"vulnerability":"VCID-mfgg-7s54-gqg8"},{"vulnerability":"VCID-nkdd-suwp-4ffr"},{"vulnerability":"VCID-p623-gxyv-g7fs"},{"vulnerability":"VCID-pk7e-t26d-aqdm"},{"vulnerability":"VCID-pv92-6p9x-v7bs"},{"vulnerability":"VCID-r2cz-9kjz-zbgu"},{"vulnerability":"VCID-rssq-mfc2-ckaf"},{"vulnerability":"VCID-rted-6vzz-mbcv"},{"vulnerability":"VCID-tvdv-3ed5-h3dt"},{"vulnerability":"VCID-un5y-y9sq-1ufb"},{"vulnerability":"VCID-v4gv-g9n5-ukgc"},{"vulnerability":"VCID-vh5y-15tw-d7fd"},{"vulnerability":"VCID-wrna-cc9g-sqbe"},{"vulnerability":"VCID-yx79-3g2x-pqex"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.0@10.0.25-0%252Bdeb8u1"}],"aliases":["CVE-2015-4802"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-yzzc-qh9x-pfd6"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/81257?format=json","vulnerability_id":"VCID-zb4s-9rj3-ebea","summary":"security update","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:31Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:31Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:31Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:31Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:31Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:31Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0705.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:31Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-0705.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-1480.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:31Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-1480.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-1481.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:31Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-1481.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-1602.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:31Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-1602.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0640.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0640.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-0640","reference_id":"","reference_type":"","scores":[{"value":"0.00225","scoring_system":"epss","scoring_elements":"0.45191","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00225","scoring_system":"epss","scoring_elements":"0.45313","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00225","scoring_system":"epss","scoring_elements":"0.45315","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00225","scoring_system":"epss","scoring_elements":"0.45366","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00225","scoring_system":"epss","scoring_elements":"0.4536","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00225","scoring_system":"epss","scoring_elements":"0.45308","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00225","scoring_system":"epss","scoring_elements":"0.4522","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00225","scoring_system":"epss","scoring_elements":"0.45227","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00225","scoring_system":"epss","scoring_elements":"0.45168","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00225","scoring_system":"epss","scoring_elements":"0.45065","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00225","scoring_system":"epss","scoring_elements":"0.4513","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00225","scoring_system":"epss","scoring_elements":"0.45147","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00225","scoring_system":"epss","scoring_elements":"0.45089","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00225","scoring_system":"epss","scoring_elements":"0.45115","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00225","scoring_system":"epss","scoring_elements":"0.45224","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00225","scoring_system":"epss","scoring_elements":"0.45304","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00225","scoring_system":"epss","scoring_elements":"0.45326","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00225","scoring_system":"epss","scoring_elements":"0.45268","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00225","scoring_system":"epss","scoring_elements":"0.45324","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00225","scoring_system":"epss","scoring_elements":"0.45323","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00225","scoring_system":"epss","scoring_elements":"0.45345","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-0640"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0640","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0640"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0641","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0641"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0642","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0642"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0643","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0643"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0644","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0644"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0646","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0646"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0647","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0647"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0648","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0648"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0649","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0649"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0650","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0650"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0655","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0655"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0666","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0666"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0668","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0668"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2047","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2047"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.2","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:S/C:N/I:P/A:C"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://mariadb.com/kb/en/mariadb/mariadb-10024-release-notes/","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:31Z/"}],"url":"https://mariadb.com/kb/en/mariadb/mariadb-10024-release-notes/"},{"reference_url":"https://mariadb.com/kb/en/mariadb/mariadb-10112-release-notes/","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:31Z/"}],"url":"https://mariadb.com/kb/en/mariadb/mariadb-10112-release-notes/"},{"reference_url":"https://mariadb.com/kb/en/mariadb/mariadb-5548-release-notes/","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:31Z/"}],"url":"https://mariadb.com/kb/en/mariadb/mariadb-5548-release-notes/"},{"reference_url":"http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:31Z/"}],"url":"http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168"},{"reference_url":"http://www.debian.org/security/2016/dsa-3557","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:31Z/"}],"url":"http://www.debian.org/security/2016/dsa-3557"},{"reference_url":"http://www.debian.org/security/2016/dsa-3595","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:31Z/"}],"url":"http://www.debian.org/security/2016/dsa-3595"},{"reference_url":"http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:31Z/"}],"url":"http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:31Z/"}],"url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html"},{"reference_url":"http://www.securityfocus.com/bid/86427","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:31Z/"}],"url":"http://www.securityfocus.com/bid/86427"},{"reference_url":"http://www.securitytracker.com/id/1035606","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:31Z/"}],"url":"http://www.securitytracker.com/id/1035606"},{"reference_url":"http://www.ubuntu.com/usn/USN-2953-1","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:31Z/"}],"url":"http://www.ubuntu.com/usn/USN-2953-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1329239","reference_id":"1329239","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1329239"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:powerkvm:2.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ibm:powerkvm:2.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:powerkvm:2.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:powerkvm:3.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ibm:powerkvm:3.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:powerkvm:3.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-0640","reference_id":"CVE-2016-0640","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:S/C:N/I:P/A:P"},{"value":"6.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-0640"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0705","reference_id":"RHSA-2016:0705","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0705"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1132","reference_id":"RHSA-2016:1132","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:59:31Z/"}],"url":"https://access.redhat.com/errata/RHSA-2016:1132"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1480","reference_id":"RHSA-2016:1480","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1480"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1481","reference_id":"RHSA-2016:1481","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1481"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1602","reference_id":"RHSA-2016:1602","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1602"},{"reference_url":"https://usn.ubuntu.com/2953-1/","reference_id":"USN-2953-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2953-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035582?format=json","purl":"pkg:deb/debian/mariadb-10.0@10.0.25-0%2Bdeb8u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1gmc-pj6y-rkfx"},{"vulnerability":"VCID-2gyq-q761-h3br"},{"vulnerability":"VCID-2rf6-qaey-1ubn"},{"vulnerability":"VCID-45hn-ezks-j7br"},{"vulnerability":"VCID-4cnj-7fur-3qe3"},{"vulnerability":"VCID-4yz4-vxnh-b3dp"},{"vulnerability":"VCID-5sjj-599v-vybg"},{"vulnerability":"VCID-6g4n-3xfu-hfee"},{"vulnerability":"VCID-6muh-rg1z-pqab"},{"vulnerability":"VCID-8djb-knkk-s3c8"},{"vulnerability":"VCID-8krv-jqjg-uqc8"},{"vulnerability":"VCID-8kvb-5u8c-zbc4"},{"vulnerability":"VCID-8sya-wktg-dqa5"},{"vulnerability":"VCID-9f48-53dz-13an"},{"vulnerability":"VCID-9ff2-43rk-2ydj"},{"vulnerability":"VCID-9w98-nfg2-muh2"},{"vulnerability":"VCID-bhxk-8byp-eyap"},{"vulnerability":"VCID-ej67-ayfh-sqdt"},{"vulnerability":"VCID-g1pp-9qqg-1beb"},{"vulnerability":"VCID-gp4w-bdxg-6kab"},{"vulnerability":"VCID-jgff-4jyp-9fgr"},{"vulnerability":"VCID-mde2-1ynu-auh2"},{"vulnerability":"VCID-mfgg-7s54-gqg8"},{"vulnerability":"VCID-nkdd-suwp-4ffr"},{"vulnerability":"VCID-p623-gxyv-g7fs"},{"vulnerability":"VCID-pk7e-t26d-aqdm"},{"vulnerability":"VCID-pv92-6p9x-v7bs"},{"vulnerability":"VCID-r2cz-9kjz-zbgu"},{"vulnerability":"VCID-rssq-mfc2-ckaf"},{"vulnerability":"VCID-rted-6vzz-mbcv"},{"vulnerability":"VCID-tvdv-3ed5-h3dt"},{"vulnerability":"VCID-un5y-y9sq-1ufb"},{"vulnerability":"VCID-v4gv-g9n5-ukgc"},{"vulnerability":"VCID-vh5y-15tw-d7fd"},{"vulnerability":"VCID-wrna-cc9g-sqbe"},{"vulnerability":"VCID-yx79-3g2x-pqex"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.0@10.0.25-0%252Bdeb8u1"}],"aliases":["CVE-2016-0640"],"risk_score":2.8,"exploitability":"0.5","weighted_severity":"5.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-zb4s-9rj3-ebea"}],"risk_score":"10.0","resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.0@10.0.25-0%252Bdeb8u1"}