{"url":"http://public2.vulnerablecode.io/api/packages/75625?format=json","purl":"pkg:ebuild/dev-db/mariab@5.6.31","type":"ebuild","namespace":"dev-db","name":"mariab","version":"5.6.31","qualifiers":{},"subpath":"","is_vulnerable":false,"next_non_vulnerable_version":"10.0.27","latest_non_vulnerable_version":"10.0.27","affected_by_vulnerabilities":[],"fixing_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41363?format=json","vulnerability_id":"VCID-1fu7-83tn-5qdt","summary":"Multiple vulnerabilities have been found in MySQL and MariaDB, the\n    worst of which could allow remote attackers to cause a Denial of Service\n    condition or obtain sensitive information.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2611.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2611.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-2611","reference_id":"","reference_type":"","scores":[{"value":"0.00595","scoring_system":"epss","scoring_elements":"0.69241","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00595","scoring_system":"epss","scoring_elements":"0.69256","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00595","scoring_system":"epss","scoring_elements":"0.69276","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00595","scoring_system":"epss","scoring_elements":"0.69258","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00595","scoring_system":"epss","scoring_elements":"0.69307","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00595","scoring_system":"epss","scoring_elements":"0.69325","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00595","scoring_system":"epss","scoring_elements":"0.69347","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00595","scoring_system":"epss","scoring_elements":"0.69331","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00595","scoring_system":"epss","scoring_elements":"0.69302","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00595","scoring_system":"epss","scoring_elements":"0.69341","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00595","scoring_system":"epss","scoring_elements":"0.69351","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00595","scoring_system":"epss","scoring_elements":"0.69382","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00595","scoring_system":"epss","scoring_elements":"0.6939","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00595","scoring_system":"epss","scoring_elements":"0.69395","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00595","scoring_system":"epss","scoring_elements":"0.69373","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00595","scoring_system":"epss","scoring_elements":"0.69416","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00595","scoring_system":"epss","scoring_elements":"0.69451","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00595","scoring_system":"epss","scoring_elements":"0.6942","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00595","scoring_system":"epss","scoring_elements":"0.69444","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00595","scoring_system":"epss","scoring_elements":"0.69491","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-2611"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1244769","reference_id":"1244769","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1244769"},{"reference_url":"https://security.gentoo.org/glsa/201610-06","reference_id":"GLSA-201610-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201610-06"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1630","reference_id":"RHSA-2015:1630","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1630"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1646","reference_id":"RHSA-2015:1646","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1646"},{"reference_url":"https://usn.ubuntu.com/2674-1/","reference_id":"USN-2674-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2674-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/75625?format=json","purl":"pkg:ebuild/dev-db/mariab@5.6.31","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mariab@5.6.31"},{"url":"http://public2.vulnerablecode.io/api/packages/75626?format=json","purl":"pkg:ebuild/dev-db/mariab@10.0.27","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mariab@10.0.27"}],"aliases":["CVE-2015-2611"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-1fu7-83tn-5qdt"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41369?format=json","vulnerability_id":"VCID-1k52-9nbh-1qdj","summary":"Multiple vulnerabilities have been found in MySQL and MariaDB, the\n    worst of which could allow remote attackers to cause a Denial of Service\n    condition or obtain sensitive information.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2648.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2648.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-2648","reference_id":"","reference_type":"","scores":[{"value":"0.00598","scoring_system":"epss","scoring_elements":"0.69334","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00598","scoring_system":"epss","scoring_elements":"0.69347","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00598","scoring_system":"epss","scoring_elements":"0.69363","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00598","scoring_system":"epss","scoring_elements":"0.69343","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00598","scoring_system":"epss","scoring_elements":"0.69393","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00598","scoring_system":"epss","scoring_elements":"0.69409","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00598","scoring_system":"epss","scoring_elements":"0.69432","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00598","scoring_system":"epss","scoring_elements":"0.69417","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00598","scoring_system":"epss","scoring_elements":"0.69402","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00598","scoring_system":"epss","scoring_elements":"0.69442","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00598","scoring_system":"epss","scoring_elements":"0.69452","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00598","scoring_system":"epss","scoring_elements":"0.69434","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00598","scoring_system":"epss","scoring_elements":"0.69486","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00598","scoring_system":"epss","scoring_elements":"0.69492","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00598","scoring_system":"epss","scoring_elements":"0.69497","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00598","scoring_system":"epss","scoring_elements":"0.69476","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00598","scoring_system":"epss","scoring_elements":"0.69518","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00598","scoring_system":"epss","scoring_elements":"0.69553","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00598","scoring_system":"epss","scoring_elements":"0.69524","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00598","scoring_system":"epss","scoring_elements":"0.69548","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00598","scoring_system":"epss","scoring_elements":"0.69596","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-2648"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0433","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0433"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0441","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0441"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0499","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0499"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0501","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0501"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0505","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0505"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2568","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2568"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2571","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2571"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2573","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2573"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2582","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2582"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2620","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2620"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2643","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2643"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2648","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2648"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3152","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3152"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4737","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4737"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4752","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4752"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4757","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4757"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1244775","reference_id":"1244775","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1244775"},{"reference_url":"https://security.gentoo.org/glsa/201610-06","reference_id":"GLSA-201610-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201610-06"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1628","reference_id":"RHSA-2015:1628","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1628"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1629","reference_id":"RHSA-2015:1629","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1629"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1630","reference_id":"RHSA-2015:1630","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1630"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1646","reference_id":"RHSA-2015:1646","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1646"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1647","reference_id":"RHSA-2015:1647","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1647"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1665","reference_id":"RHSA-2015:1665","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1665"},{"reference_url":"https://usn.ubuntu.com/2674-1/","reference_id":"USN-2674-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2674-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/75625?format=json","purl":"pkg:ebuild/dev-db/mariab@5.6.31","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mariab@5.6.31"},{"url":"http://public2.vulnerablecode.io/api/packages/75626?format=json","purl":"pkg:ebuild/dev-db/mariab@10.0.27","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mariab@10.0.27"}],"aliases":["CVE-2015-2648"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-1k52-9nbh-1qdj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41372?format=json","vulnerability_id":"VCID-34h2-5ygu-6fdc","summary":"Multiple vulnerabilities have been found in MySQL and MariaDB, the\n    worst of which could allow remote attackers to cause a Denial of Service\n    condition or obtain sensitive information.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4752.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4752.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-4752","reference_id":"","reference_type":"","scores":[{"value":"0.00598","scoring_system":"epss","scoring_elements":"0.69334","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00598","scoring_system":"epss","scoring_elements":"0.69347","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00598","scoring_system":"epss","scoring_elements":"0.69363","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00598","scoring_system":"epss","scoring_elements":"0.69343","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00598","scoring_system":"epss","scoring_elements":"0.69393","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00598","scoring_system":"epss","scoring_elements":"0.69409","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00598","scoring_system":"epss","scoring_elements":"0.69432","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00598","scoring_system":"epss","scoring_elements":"0.69417","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00598","scoring_system":"epss","scoring_elements":"0.69402","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00598","scoring_system":"epss","scoring_elements":"0.69442","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00598","scoring_system":"epss","scoring_elements":"0.69452","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00598","scoring_system":"epss","scoring_elements":"0.69434","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00598","scoring_system":"epss","scoring_elements":"0.69486","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00598","scoring_system":"epss","scoring_elements":"0.69492","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00598","scoring_system":"epss","scoring_elements":"0.69497","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00598","scoring_system":"epss","scoring_elements":"0.69476","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00598","scoring_system":"epss","scoring_elements":"0.69518","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00598","scoring_system":"epss","scoring_elements":"0.69553","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00598","scoring_system":"epss","scoring_elements":"0.69524","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00598","scoring_system":"epss","scoring_elements":"0.69548","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00598","scoring_system":"epss","scoring_elements":"0.69596","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-4752"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0433","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0433"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0441","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0441"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0499","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0499"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0501","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0501"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0505","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0505"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2568","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2568"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2571","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2571"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2573","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2573"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2582","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2582"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2620","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2620"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2643","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2643"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2648","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2648"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3152","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3152"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4737","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4737"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4752","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4752"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4757","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4757"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1244779","reference_id":"1244779","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1244779"},{"reference_url":"https://security.gentoo.org/glsa/201610-06","reference_id":"GLSA-201610-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201610-06"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1628","reference_id":"RHSA-2015:1628","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1628"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1629","reference_id":"RHSA-2015:1629","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1629"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1630","reference_id":"RHSA-2015:1630","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1630"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1646","reference_id":"RHSA-2015:1646","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1646"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1647","reference_id":"RHSA-2015:1647","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1647"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1665","reference_id":"RHSA-2015:1665","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1665"},{"reference_url":"https://usn.ubuntu.com/2674-1/","reference_id":"USN-2674-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2674-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/75625?format=json","purl":"pkg:ebuild/dev-db/mariab@5.6.31","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mariab@5.6.31"},{"url":"http://public2.vulnerablecode.io/api/packages/75626?format=json","purl":"pkg:ebuild/dev-db/mariab@10.0.27","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mariab@10.0.27"}],"aliases":["CVE-2015-4752"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-34h2-5ygu-6fdc"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41376?format=json","vulnerability_id":"VCID-4dta-v8h2-nqch","summary":"Multiple vulnerabilities have been found in MySQL and MariaDB, the\n    worst of which could allow remote attackers to cause a Denial of Service\n    condition or obtain sensitive information.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4769.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4769.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-4769","reference_id":"","reference_type":"","scores":[{"value":"0.00769","scoring_system":"epss","scoring_elements":"0.73458","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00769","scoring_system":"epss","scoring_elements":"0.73466","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00769","scoring_system":"epss","scoring_elements":"0.73489","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00769","scoring_system":"epss","scoring_elements":"0.7346","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00769","scoring_system":"epss","scoring_elements":"0.73497","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00769","scoring_system":"epss","scoring_elements":"0.7351","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00769","scoring_system":"epss","scoring_elements":"0.73534","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00769","scoring_system":"epss","scoring_elements":"0.73515","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00769","scoring_system":"epss","scoring_elements":"0.73507","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00769","scoring_system":"epss","scoring_elements":"0.7355","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00769","scoring_system":"epss","scoring_elements":"0.73559","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00769","scoring_system":"epss","scoring_elements":"0.73553","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00769","scoring_system":"epss","scoring_elements":"0.73586","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00769","scoring_system":"epss","scoring_elements":"0.73597","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00769","scoring_system":"epss","scoring_elements":"0.73596","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00769","scoring_system":"epss","scoring_elements":"0.73589","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00769","scoring_system":"epss","scoring_elements":"0.73614","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00769","scoring_system":"epss","scoring_elements":"0.73638","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00769","scoring_system":"epss","scoring_elements":"0.73599","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00769","scoring_system":"epss","scoring_elements":"0.73621","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00769","scoring_system":"epss","scoring_elements":"0.73679","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-4769"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1244785","reference_id":"1244785","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1244785"},{"reference_url":"https://security.gentoo.org/glsa/201610-06","reference_id":"GLSA-201610-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201610-06"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1630","reference_id":"RHSA-2015:1630","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1630"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1646","reference_id":"RHSA-2015:1646","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1646"},{"reference_url":"https://usn.ubuntu.com/2674-1/","reference_id":"USN-2674-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2674-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/75625?format=json","purl":"pkg:ebuild/dev-db/mariab@5.6.31","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mariab@5.6.31"},{"url":"http://public2.vulnerablecode.io/api/packages/75626?format=json","purl":"pkg:ebuild/dev-db/mariab@10.0.27","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mariab@10.0.27"}],"aliases":["CVE-2015-4769"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-4dta-v8h2-nqch"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41371?format=json","vulnerability_id":"VCID-6q17-t984-4uhd","summary":"Multiple vulnerabilities have been found in MySQL and MariaDB, the\n    worst of which could allow remote attackers to cause a Denial of Service\n    condition or obtain sensitive information.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4737.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4737.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-4737","reference_id":"","reference_type":"","scores":[{"value":"0.00428","scoring_system":"epss","scoring_elements":"0.62334","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00428","scoring_system":"epss","scoring_elements":"0.62392","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00428","scoring_system":"epss","scoring_elements":"0.62423","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00428","scoring_system":"epss","scoring_elements":"0.62388","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00428","scoring_system":"epss","scoring_elements":"0.62437","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00428","scoring_system":"epss","scoring_elements":"0.62454","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00428","scoring_system":"epss","scoring_elements":"0.62473","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00428","scoring_system":"epss","scoring_elements":"0.62462","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00428","scoring_system":"epss","scoring_elements":"0.6244","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00428","scoring_system":"epss","scoring_elements":"0.62484","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00428","scoring_system":"epss","scoring_elements":"0.6249","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00428","scoring_system":"epss","scoring_elements":"0.62483","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00428","scoring_system":"epss","scoring_elements":"0.625","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00428","scoring_system":"epss","scoring_elements":"0.62497","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00428","scoring_system":"epss","scoring_elements":"0.62444","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00428","scoring_system":"epss","scoring_elements":"0.62491","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00428","scoring_system":"epss","scoring_elements":"0.62548","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00428","scoring_system":"epss","scoring_elements":"0.62501","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00428","scoring_system":"epss","scoring_elements":"0.62527","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00428","scoring_system":"epss","scoring_elements":"0.6258","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-4737"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2582","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2582"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2620","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2620"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2643","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2643"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2648","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2648"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4737","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4737"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4752","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4752"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1244778","reference_id":"1244778","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1244778"},{"reference_url":"https://security.gentoo.org/glsa/201610-06","reference_id":"GLSA-201610-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201610-06"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1628","reference_id":"RHSA-2015:1628","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1628"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1629","reference_id":"RHSA-2015:1629","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1629"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1630","reference_id":"RHSA-2015:1630","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1630"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1646","reference_id":"RHSA-2015:1646","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1646"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1647","reference_id":"RHSA-2015:1647","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1647"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1665","reference_id":"RHSA-2015:1665","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1665"},{"reference_url":"https://usn.ubuntu.com/2674-1/","reference_id":"USN-2674-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2674-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/75625?format=json","purl":"pkg:ebuild/dev-db/mariab@5.6.31","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mariab@5.6.31"},{"url":"http://public2.vulnerablecode.io/api/packages/75626?format=json","purl":"pkg:ebuild/dev-db/mariab@10.0.27","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mariab@10.0.27"}],"aliases":["CVE-2015-4737"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-6q17-t984-4uhd"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41366?format=json","vulnerability_id":"VCID-aee5-r83r-afb8","summary":"Multiple vulnerabilities have been found in MySQL and MariaDB, the\n    worst of which could allow remote attackers to cause a Denial of Service\n    condition or obtain sensitive information.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2639.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2639.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-2639","reference_id":"","reference_type":"","scores":[{"value":"0.00294","scoring_system":"epss","scoring_elements":"0.52634","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00294","scoring_system":"epss","scoring_elements":"0.52678","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00294","scoring_system":"epss","scoring_elements":"0.52704","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00294","scoring_system":"epss","scoring_elements":"0.52669","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00294","scoring_system":"epss","scoring_elements":"0.52719","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00294","scoring_system":"epss","scoring_elements":"0.52714","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00294","scoring_system":"epss","scoring_elements":"0.52764","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00294","scoring_system":"epss","scoring_elements":"0.52747","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00294","scoring_system":"epss","scoring_elements":"0.52731","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00294","scoring_system":"epss","scoring_elements":"0.5277","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00294","scoring_system":"epss","scoring_elements":"0.52777","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00294","scoring_system":"epss","scoring_elements":"0.5276","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00294","scoring_system":"epss","scoring_elements":"0.52712","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00294","scoring_system":"epss","scoring_elements":"0.52722","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00294","scoring_system":"epss","scoring_elements":"0.52683","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00294","scoring_system":"epss","scoring_elements":"0.52627","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00294","scoring_system":"epss","scoring_elements":"0.5268","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00294","scoring_system":"epss","scoring_elements":"0.52724","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00294","scoring_system":"epss","scoring_elements":"0.5269","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00294","scoring_system":"epss","scoring_elements":"0.52716","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00294","scoring_system":"epss","scoring_elements":"0.52791","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-2639"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1244772","reference_id":"1244772","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1244772"},{"reference_url":"https://security.gentoo.org/glsa/201610-06","reference_id":"GLSA-201610-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201610-06"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1630","reference_id":"RHSA-2015:1630","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1630"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1646","reference_id":"RHSA-2015:1646","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1646"},{"reference_url":"https://usn.ubuntu.com/2674-1/","reference_id":"USN-2674-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2674-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/75625?format=json","purl":"pkg:ebuild/dev-db/mariab@5.6.31","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mariab@5.6.31"},{"url":"http://public2.vulnerablecode.io/api/packages/75626?format=json","purl":"pkg:ebuild/dev-db/mariab@10.0.27","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mariab@10.0.27"}],"aliases":["CVE-2015-2639"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-aee5-r83r-afb8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41362?format=json","vulnerability_id":"VCID-dvjd-g5eh-2uh8","summary":"Multiple vulnerabilities have been found in MySQL and MariaDB, the\n    worst of which could allow remote attackers to cause a Denial of Service\n    condition or obtain sensitive information.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2582.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2582.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-2582","reference_id":"","reference_type":"","scores":[{"value":"0.00811","scoring_system":"epss","scoring_elements":"0.74185","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00811","scoring_system":"epss","scoring_elements":"0.7419","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00811","scoring_system":"epss","scoring_elements":"0.74217","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00811","scoring_system":"epss","scoring_elements":"0.74223","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00811","scoring_system":"epss","scoring_elements":"0.74238","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00811","scoring_system":"epss","scoring_elements":"0.74259","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00811","scoring_system":"epss","scoring_elements":"0.7424","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00811","scoring_system":"epss","scoring_elements":"0.74233","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00811","scoring_system":"epss","scoring_elements":"0.74271","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00811","scoring_system":"epss","scoring_elements":"0.74281","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00811","scoring_system":"epss","scoring_elements":"0.74272","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00811","scoring_system":"epss","scoring_elements":"0.74306","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00811","scoring_system":"epss","scoring_elements":"0.74315","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00811","scoring_system":"epss","scoring_elements":"0.74314","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00811","scoring_system":"epss","scoring_elements":"0.74308","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00811","scoring_system":"epss","scoring_elements":"0.74336","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00811","scoring_system":"epss","scoring_elements":"0.74361","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00811","scoring_system":"epss","scoring_elements":"0.74326","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00811","scoring_system":"epss","scoring_elements":"0.74349","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00811","scoring_system":"epss","scoring_elements":"0.74404","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-2582"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0433","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0433"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0441","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0441"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0499","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0499"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0501","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0501"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0505","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0505"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2568","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2568"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2571","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2571"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2573","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2573"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2582","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2582"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2620","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2620"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2643","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2643"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2648","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2648"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3152","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3152"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4737","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4737"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4752","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4752"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4757","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4757"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1244768","reference_id":"1244768","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1244768"},{"reference_url":"https://security.gentoo.org/glsa/201610-06","reference_id":"GLSA-201610-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201610-06"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1628","reference_id":"RHSA-2015:1628","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1628"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1629","reference_id":"RHSA-2015:1629","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1629"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1630","reference_id":"RHSA-2015:1630","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1630"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1646","reference_id":"RHSA-2015:1646","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1646"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1647","reference_id":"RHSA-2015:1647","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1647"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1665","reference_id":"RHSA-2015:1665","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1665"},{"reference_url":"https://usn.ubuntu.com/2674-1/","reference_id":"USN-2674-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2674-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/75625?format=json","purl":"pkg:ebuild/dev-db/mariab@5.6.31","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mariab@5.6.31"},{"url":"http://public2.vulnerablecode.io/api/packages/75626?format=json","purl":"pkg:ebuild/dev-db/mariab@10.0.27","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mariab@10.0.27"}],"aliases":["CVE-2015-2582"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-dvjd-g5eh-2uh8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41364?format=json","vulnerability_id":"VCID-hxy6-zux1-4fbe","summary":"Multiple vulnerabilities have been found in MySQL and MariaDB, the\n    worst of which could allow remote attackers to cause a Denial of Service\n    condition or obtain sensitive information.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2617.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2617.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-2617","reference_id":"","reference_type":"","scores":[{"value":"0.00814","scoring_system":"epss","scoring_elements":"0.74221","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00814","scoring_system":"epss","scoring_elements":"0.74226","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00814","scoring_system":"epss","scoring_elements":"0.74252","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00814","scoring_system":"epss","scoring_elements":"0.74225","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00814","scoring_system":"epss","scoring_elements":"0.74258","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00814","scoring_system":"epss","scoring_elements":"0.74273","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00814","scoring_system":"epss","scoring_elements":"0.74295","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00814","scoring_system":"epss","scoring_elements":"0.74275","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00814","scoring_system":"epss","scoring_elements":"0.74268","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00814","scoring_system":"epss","scoring_elements":"0.74305","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00814","scoring_system":"epss","scoring_elements":"0.74314","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00814","scoring_system":"epss","scoring_elements":"0.74338","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00814","scoring_system":"epss","scoring_elements":"0.74347","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00814","scoring_system":"epss","scoring_elements":"0.74346","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00814","scoring_system":"epss","scoring_elements":"0.74343","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00814","scoring_system":"epss","scoring_elements":"0.74372","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00814","scoring_system":"epss","scoring_elements":"0.74397","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00814","scoring_system":"epss","scoring_elements":"0.74362","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00814","scoring_system":"epss","scoring_elements":"0.74385","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00814","scoring_system":"epss","scoring_elements":"0.74441","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-2617"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1244770","reference_id":"1244770","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1244770"},{"reference_url":"https://security.gentoo.org/glsa/201610-06","reference_id":"GLSA-201610-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201610-06"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1630","reference_id":"RHSA-2015:1630","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1630"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1646","reference_id":"RHSA-2015:1646","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1646"},{"reference_url":"https://usn.ubuntu.com/2674-1/","reference_id":"USN-2674-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2674-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/75625?format=json","purl":"pkg:ebuild/dev-db/mariab@5.6.31","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mariab@5.6.31"},{"url":"http://public2.vulnerablecode.io/api/packages/75626?format=json","purl":"pkg:ebuild/dev-db/mariab@10.0.27","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mariab@10.0.27"}],"aliases":["CVE-2015-2617"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-hxy6-zux1-4fbe"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41375?format=json","vulnerability_id":"VCID-nbfn-ank3-mfh8","summary":"Multiple vulnerabilities have been found in MySQL and MariaDB, the\n    worst of which could allow remote attackers to cause a Denial of Service\n    condition or obtain sensitive information.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4767.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4767.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-4767","reference_id":"","reference_type":"","scores":[{"value":"0.00965","scoring_system":"epss","scoring_elements":"0.765","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00965","scoring_system":"epss","scoring_elements":"0.76505","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00965","scoring_system":"epss","scoring_elements":"0.76534","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00965","scoring_system":"epss","scoring_elements":"0.76517","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00965","scoring_system":"epss","scoring_elements":"0.76549","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00965","scoring_system":"epss","scoring_elements":"0.7656","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00965","scoring_system":"epss","scoring_elements":"0.76586","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00965","scoring_system":"epss","scoring_elements":"0.76565","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00965","scoring_system":"epss","scoring_elements":"0.76558","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00965","scoring_system":"epss","scoring_elements":"0.766","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00965","scoring_system":"epss","scoring_elements":"0.76604","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00965","scoring_system":"epss","scoring_elements":"0.76592","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00965","scoring_system":"epss","scoring_elements":"0.76624","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00965","scoring_system":"epss","scoring_elements":"0.76629","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00965","scoring_system":"epss","scoring_elements":"0.76643","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00965","scoring_system":"epss","scoring_elements":"0.7663","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00965","scoring_system":"epss","scoring_elements":"0.76661","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00965","scoring_system":"epss","scoring_elements":"0.76679","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00965","scoring_system":"epss","scoring_elements":"0.76666","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00965","scoring_system":"epss","scoring_elements":"0.76684","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00965","scoring_system":"epss","scoring_elements":"0.76732","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-4767"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1244784","reference_id":"1244784","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1244784"},{"reference_url":"https://security.gentoo.org/glsa/201610-06","reference_id":"GLSA-201610-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201610-06"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1630","reference_id":"RHSA-2015:1630","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1630"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1646","reference_id":"RHSA-2015:1646","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1646"},{"reference_url":"https://usn.ubuntu.com/2674-1/","reference_id":"USN-2674-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2674-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/75625?format=json","purl":"pkg:ebuild/dev-db/mariab@5.6.31","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mariab@5.6.31"},{"url":"http://public2.vulnerablecode.io/api/packages/75626?format=json","purl":"pkg:ebuild/dev-db/mariab@10.0.27","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mariab@10.0.27"}],"aliases":["CVE-2015-4767"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-nbfn-ank3-mfh8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41378?format=json","vulnerability_id":"VCID-nywb-kfpq-n7bq","summary":"Multiple vulnerabilities have been found in MySQL and MariaDB, the\n    worst of which could allow remote attackers to cause a Denial of Service\n    condition or obtain sensitive information.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4772.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4772.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-4772","reference_id":"","reference_type":"","scores":[{"value":"0.01114","scoring_system":"epss","scoring_elements":"0.78115","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01114","scoring_system":"epss","scoring_elements":"0.78124","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01114","scoring_system":"epss","scoring_elements":"0.78153","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01114","scoring_system":"epss","scoring_elements":"0.78136","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01114","scoring_system":"epss","scoring_elements":"0.78162","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01114","scoring_system":"epss","scoring_elements":"0.78168","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01114","scoring_system":"epss","scoring_elements":"0.78194","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01114","scoring_system":"epss","scoring_elements":"0.78176","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01114","scoring_system":"epss","scoring_elements":"0.78173","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01114","scoring_system":"epss","scoring_elements":"0.78205","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01114","scoring_system":"epss","scoring_elements":"0.78204","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01114","scoring_system":"epss","scoring_elements":"0.78199","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01114","scoring_system":"epss","scoring_elements":"0.7823","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01114","scoring_system":"epss","scoring_elements":"0.78236","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01114","scoring_system":"epss","scoring_elements":"0.7825","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01114","scoring_system":"epss","scoring_elements":"0.78264","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01114","scoring_system":"epss","scoring_elements":"0.7829","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01114","scoring_system":"epss","scoring_elements":"0.78307","published_at":"2026-05-09T12:55:00Z"},{"value":"0.01114","scoring_system":"epss","scoring_elements":"0.78302","published_at":"2026-05-11T12:55:00Z"},{"value":"0.01114","scoring_system":"epss","scoring_elements":"0.78319","published_at":"2026-05-12T12:55:00Z"},{"value":"0.01114","scoring_system":"epss","scoring_elements":"0.78358","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-4772"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1244787","reference_id":"1244787","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1244787"},{"reference_url":"https://security.gentoo.org/glsa/201610-06","reference_id":"GLSA-201610-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201610-06"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1630","reference_id":"RHSA-2015:1630","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1630"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1646","reference_id":"RHSA-2015:1646","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1646"},{"reference_url":"https://usn.ubuntu.com/2674-1/","reference_id":"USN-2674-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2674-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/75625?format=json","purl":"pkg:ebuild/dev-db/mariab@5.6.31","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mariab@5.6.31"},{"url":"http://public2.vulnerablecode.io/api/packages/75626?format=json","purl":"pkg:ebuild/dev-db/mariab@10.0.27","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mariab@10.0.27"}],"aliases":["CVE-2015-4772"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-nywb-kfpq-n7bq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41365?format=json","vulnerability_id":"VCID-p9xn-27dm-nfhg","summary":"Multiple vulnerabilities have been found in MySQL and MariaDB, the\n    worst of which could allow remote attackers to cause a Denial of Service\n    condition or obtain sensitive information.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2620.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2620.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-2620","reference_id":"","reference_type":"","scores":[{"value":"0.00774","scoring_system":"epss","scoring_elements":"0.73535","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00774","scoring_system":"epss","scoring_elements":"0.73544","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00774","scoring_system":"epss","scoring_elements":"0.73567","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00774","scoring_system":"epss","scoring_elements":"0.73539","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00774","scoring_system":"epss","scoring_elements":"0.73575","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00774","scoring_system":"epss","scoring_elements":"0.73588","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00774","scoring_system":"epss","scoring_elements":"0.73611","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00774","scoring_system":"epss","scoring_elements":"0.73593","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00774","scoring_system":"epss","scoring_elements":"0.73585","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00774","scoring_system":"epss","scoring_elements":"0.73629","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00774","scoring_system":"epss","scoring_elements":"0.73638","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00774","scoring_system":"epss","scoring_elements":"0.7363","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00774","scoring_system":"epss","scoring_elements":"0.73662","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00774","scoring_system":"epss","scoring_elements":"0.73671","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00774","scoring_system":"epss","scoring_elements":"0.73665","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00774","scoring_system":"epss","scoring_elements":"0.73691","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00774","scoring_system":"epss","scoring_elements":"0.73714","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00774","scoring_system":"epss","scoring_elements":"0.73676","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00774","scoring_system":"epss","scoring_elements":"0.73698","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00774","scoring_system":"epss","scoring_elements":"0.73757","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-2620"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2582","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2582"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2620","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2620"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2643","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2643"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2648","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2648"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4737","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4737"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4752","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4752"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1244771","reference_id":"1244771","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1244771"},{"reference_url":"https://security.gentoo.org/glsa/201610-06","reference_id":"GLSA-201610-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201610-06"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1628","reference_id":"RHSA-2015:1628","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1628"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1629","reference_id":"RHSA-2015:1629","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1629"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1630","reference_id":"RHSA-2015:1630","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1630"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1646","reference_id":"RHSA-2015:1646","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1646"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1647","reference_id":"RHSA-2015:1647","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1647"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1665","reference_id":"RHSA-2015:1665","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1665"},{"reference_url":"https://usn.ubuntu.com/2674-1/","reference_id":"USN-2674-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2674-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/75625?format=json","purl":"pkg:ebuild/dev-db/mariab@5.6.31","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mariab@5.6.31"},{"url":"http://public2.vulnerablecode.io/api/packages/75626?format=json","purl":"pkg:ebuild/dev-db/mariab@10.0.27","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mariab@10.0.27"}],"aliases":["CVE-2015-2620"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-p9xn-27dm-nfhg"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41367?format=json","vulnerability_id":"VCID-pgrq-udns-6uca","summary":"Multiple vulnerabilities have been found in MySQL and MariaDB, the\n    worst of which could allow remote attackers to cause a Denial of Service\n    condition or obtain sensitive information.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2641.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2641.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-2641","reference_id":"","reference_type":"","scores":[{"value":"0.00769","scoring_system":"epss","scoring_elements":"0.73458","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00769","scoring_system":"epss","scoring_elements":"0.73466","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00769","scoring_system":"epss","scoring_elements":"0.73489","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00769","scoring_system":"epss","scoring_elements":"0.7346","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00769","scoring_system":"epss","scoring_elements":"0.73497","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00769","scoring_system":"epss","scoring_elements":"0.7351","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00769","scoring_system":"epss","scoring_elements":"0.73534","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00769","scoring_system":"epss","scoring_elements":"0.73515","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00769","scoring_system":"epss","scoring_elements":"0.73507","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00769","scoring_system":"epss","scoring_elements":"0.7355","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00769","scoring_system":"epss","scoring_elements":"0.73559","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00769","scoring_system":"epss","scoring_elements":"0.73553","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00769","scoring_system":"epss","scoring_elements":"0.73586","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00769","scoring_system":"epss","scoring_elements":"0.73597","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00769","scoring_system":"epss","scoring_elements":"0.73596","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00769","scoring_system":"epss","scoring_elements":"0.73589","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00769","scoring_system":"epss","scoring_elements":"0.73614","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00769","scoring_system":"epss","scoring_elements":"0.73638","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00769","scoring_system":"epss","scoring_elements":"0.73599","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00769","scoring_system":"epss","scoring_elements":"0.73621","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00769","scoring_system":"epss","scoring_elements":"0.73679","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-2641"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1244773","reference_id":"1244773","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1244773"},{"reference_url":"https://security.gentoo.org/glsa/201610-06","reference_id":"GLSA-201610-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201610-06"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1630","reference_id":"RHSA-2015:1630","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1630"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1646","reference_id":"RHSA-2015:1646","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1646"},{"reference_url":"https://usn.ubuntu.com/2674-1/","reference_id":"USN-2674-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2674-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/75625?format=json","purl":"pkg:ebuild/dev-db/mariab@5.6.31","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mariab@5.6.31"},{"url":"http://public2.vulnerablecode.io/api/packages/75626?format=json","purl":"pkg:ebuild/dev-db/mariab@10.0.27","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mariab@10.0.27"}],"aliases":["CVE-2015-2641"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-pgrq-udns-6uca"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41377?format=json","vulnerability_id":"VCID-pvwn-1168-rbec","summary":"Multiple vulnerabilities have been found in MySQL and MariaDB, the\n    worst of which could allow remote attackers to cause a Denial of Service\n    condition or obtain sensitive information.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4771.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4771.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-4771","reference_id":"","reference_type":"","scores":[{"value":"0.00769","scoring_system":"epss","scoring_elements":"0.73458","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00769","scoring_system":"epss","scoring_elements":"0.73466","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00769","scoring_system":"epss","scoring_elements":"0.73489","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00769","scoring_system":"epss","scoring_elements":"0.7346","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00769","scoring_system":"epss","scoring_elements":"0.73497","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00769","scoring_system":"epss","scoring_elements":"0.7351","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00769","scoring_system":"epss","scoring_elements":"0.73534","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00769","scoring_system":"epss","scoring_elements":"0.73515","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00769","scoring_system":"epss","scoring_elements":"0.73507","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00769","scoring_system":"epss","scoring_elements":"0.7355","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00769","scoring_system":"epss","scoring_elements":"0.73559","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00769","scoring_system":"epss","scoring_elements":"0.73553","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00769","scoring_system":"epss","scoring_elements":"0.73586","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00769","scoring_system":"epss","scoring_elements":"0.73597","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00769","scoring_system":"epss","scoring_elements":"0.73596","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00769","scoring_system":"epss","scoring_elements":"0.73589","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00769","scoring_system":"epss","scoring_elements":"0.73614","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00769","scoring_system":"epss","scoring_elements":"0.73638","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00769","scoring_system":"epss","scoring_elements":"0.73599","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00769","scoring_system":"epss","scoring_elements":"0.73621","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00769","scoring_system":"epss","scoring_elements":"0.73679","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-4771"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1244786","reference_id":"1244786","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1244786"},{"reference_url":"https://security.gentoo.org/glsa/201610-06","reference_id":"GLSA-201610-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201610-06"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1630","reference_id":"RHSA-2015:1630","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1630"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1646","reference_id":"RHSA-2015:1646","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1646"},{"reference_url":"https://usn.ubuntu.com/2674-1/","reference_id":"USN-2674-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2674-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/75625?format=json","purl":"pkg:ebuild/dev-db/mariab@5.6.31","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mariab@5.6.31"},{"url":"http://public2.vulnerablecode.io/api/packages/75626?format=json","purl":"pkg:ebuild/dev-db/mariab@10.0.27","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mariab@10.0.27"}],"aliases":["CVE-2015-4771"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-pvwn-1168-rbec"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41374?format=json","vulnerability_id":"VCID-qvae-5ytw-dbcy","summary":"Multiple vulnerabilities have been found in MySQL and MariaDB, the\n    worst of which could allow remote attackers to cause a Denial of Service\n    condition or obtain sensitive information.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4757.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4757.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-4757","reference_id":"","reference_type":"","scores":[{"value":"0.04287","scoring_system":"epss","scoring_elements":"0.88799","published_at":"2026-04-01T12:55:00Z"},{"value":"0.04287","scoring_system":"epss","scoring_elements":"0.88807","published_at":"2026-04-02T12:55:00Z"},{"value":"0.04287","scoring_system":"epss","scoring_elements":"0.88823","published_at":"2026-04-04T12:55:00Z"},{"value":"0.04287","scoring_system":"epss","scoring_elements":"0.88826","published_at":"2026-04-07T12:55:00Z"},{"value":"0.04287","scoring_system":"epss","scoring_elements":"0.88843","published_at":"2026-04-08T12:55:00Z"},{"value":"0.04287","scoring_system":"epss","scoring_elements":"0.88849","published_at":"2026-04-09T12:55:00Z"},{"value":"0.04287","scoring_system":"epss","scoring_elements":"0.8886","published_at":"2026-04-11T12:55:00Z"},{"value":"0.04287","scoring_system":"epss","scoring_elements":"0.88856","published_at":"2026-04-12T12:55:00Z"},{"value":"0.04287","scoring_system":"epss","scoring_elements":"0.88855","published_at":"2026-04-13T12:55:00Z"},{"value":"0.04287","scoring_system":"epss","scoring_elements":"0.88869","published_at":"2026-04-16T12:55:00Z"},{"value":"0.04287","scoring_system":"epss","scoring_elements":"0.88867","published_at":"2026-04-18T12:55:00Z"},{"value":"0.04287","scoring_system":"epss","scoring_elements":"0.88864","published_at":"2026-04-21T12:55:00Z"},{"value":"0.04287","scoring_system":"epss","scoring_elements":"0.88881","published_at":"2026-04-24T12:55:00Z"},{"value":"0.04287","scoring_system":"epss","scoring_elements":"0.88888","published_at":"2026-04-29T12:55:00Z"},{"value":"0.04287","scoring_system":"epss","scoring_elements":"0.88896","published_at":"2026-05-05T12:55:00Z"},{"value":"0.04287","scoring_system":"epss","scoring_elements":"0.88913","published_at":"2026-05-07T12:55:00Z"},{"value":"0.04287","scoring_system":"epss","scoring_elements":"0.88926","published_at":"2026-05-09T12:55:00Z"},{"value":"0.04287","scoring_system":"epss","scoring_elements":"0.8892","published_at":"2026-05-11T12:55:00Z"},{"value":"0.04287","scoring_system":"epss","scoring_elements":"0.88929","published_at":"2026-05-12T12:55:00Z"},{"value":"0.04287","scoring_system":"epss","scoring_elements":"0.88948","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-4757"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0433","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0433"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0441","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0441"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0499","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0499"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0501","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0501"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0505","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0505"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2568","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2568"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2571","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2571"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2573","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2573"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2582","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2582"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2643","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2643"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2648","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2648"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3152","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3152"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4752","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4752"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4757","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4757"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1244781","reference_id":"1244781","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1244781"},{"reference_url":"https://security.gentoo.org/glsa/201610-06","reference_id":"GLSA-201610-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201610-06"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1628","reference_id":"RHSA-2015:1628","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1628"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1629","reference_id":"RHSA-2015:1629","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1629"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1630","reference_id":"RHSA-2015:1630","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1630"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1646","reference_id":"RHSA-2015:1646","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1646"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1647","reference_id":"RHSA-2015:1647","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1647"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1665","reference_id":"RHSA-2015:1665","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1665"},{"reference_url":"https://usn.ubuntu.com/2674-1/","reference_id":"USN-2674-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2674-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/75625?format=json","purl":"pkg:ebuild/dev-db/mariab@5.6.31","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mariab@5.6.31"},{"url":"http://public2.vulnerablecode.io/api/packages/75626?format=json","purl":"pkg:ebuild/dev-db/mariab@10.0.27","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mariab@10.0.27"}],"aliases":["CVE-2015-4757"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-qvae-5ytw-dbcy"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41368?format=json","vulnerability_id":"VCID-r3kw-ufpz-aqft","summary":"Multiple vulnerabilities have been found in MySQL and MariaDB, the\n    worst of which could allow remote attackers to cause a Denial of Service\n    condition or obtain sensitive information.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2643.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2643.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-2643","reference_id":"","reference_type":"","scores":[{"value":"0.00598","scoring_system":"epss","scoring_elements":"0.69334","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00598","scoring_system":"epss","scoring_elements":"0.69347","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00598","scoring_system":"epss","scoring_elements":"0.69363","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00598","scoring_system":"epss","scoring_elements":"0.69343","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00598","scoring_system":"epss","scoring_elements":"0.69393","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00598","scoring_system":"epss","scoring_elements":"0.69409","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00598","scoring_system":"epss","scoring_elements":"0.69432","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00598","scoring_system":"epss","scoring_elements":"0.69417","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00598","scoring_system":"epss","scoring_elements":"0.69402","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00598","scoring_system":"epss","scoring_elements":"0.69442","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00598","scoring_system":"epss","scoring_elements":"0.69452","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00598","scoring_system":"epss","scoring_elements":"0.69434","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00598","scoring_system":"epss","scoring_elements":"0.69486","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00598","scoring_system":"epss","scoring_elements":"0.69492","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00598","scoring_system":"epss","scoring_elements":"0.69497","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00598","scoring_system":"epss","scoring_elements":"0.69476","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00598","scoring_system":"epss","scoring_elements":"0.69518","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00598","scoring_system":"epss","scoring_elements":"0.69553","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00598","scoring_system":"epss","scoring_elements":"0.69524","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00598","scoring_system":"epss","scoring_elements":"0.69548","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00598","scoring_system":"epss","scoring_elements":"0.69596","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-2643"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0433","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0433"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0441","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0441"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0499","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0499"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0501","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0501"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0505","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0505"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2568","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2568"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2571","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2571"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2573","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2573"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2582","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2582"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2620","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2620"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2643","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2643"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2648","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2648"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3152","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3152"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4737","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4737"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4752","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4752"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4757","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4757"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1244774","reference_id":"1244774","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1244774"},{"reference_url":"https://security.gentoo.org/glsa/201610-06","reference_id":"GLSA-201610-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201610-06"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1628","reference_id":"RHSA-2015:1628","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1628"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1629","reference_id":"RHSA-2015:1629","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1629"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1630","reference_id":"RHSA-2015:1630","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1630"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1646","reference_id":"RHSA-2015:1646","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1646"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1647","reference_id":"RHSA-2015:1647","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1647"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1665","reference_id":"RHSA-2015:1665","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1665"},{"reference_url":"https://usn.ubuntu.com/2674-1/","reference_id":"USN-2674-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2674-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/75625?format=json","purl":"pkg:ebuild/dev-db/mariab@5.6.31","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mariab@5.6.31"},{"url":"http://public2.vulnerablecode.io/api/packages/75626?format=json","purl":"pkg:ebuild/dev-db/mariab@10.0.27","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mariab@10.0.27"}],"aliases":["CVE-2015-2643"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-r3kw-ufpz-aqft"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41370?format=json","vulnerability_id":"VCID-uzud-6w7c-pqg9","summary":"Multiple vulnerabilities have been found in MySQL and MariaDB, the\n    worst of which could allow remote attackers to cause a Denial of Service\n    condition or obtain sensitive information.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2661.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2661.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-2661","reference_id":"","reference_type":"","scores":[{"value":"0.00171","scoring_system":"epss","scoring_elements":"0.38292","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00171","scoring_system":"epss","scoring_elements":"0.3843","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00171","scoring_system":"epss","scoring_elements":"0.38454","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00171","scoring_system":"epss","scoring_elements":"0.38318","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00171","scoring_system":"epss","scoring_elements":"0.38369","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00171","scoring_system":"epss","scoring_elements":"0.38377","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00171","scoring_system":"epss","scoring_elements":"0.38393","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00171","scoring_system":"epss","scoring_elements":"0.38356","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00171","scoring_system":"epss","scoring_elements":"0.38332","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00171","scoring_system":"epss","scoring_elements":"0.3838","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00171","scoring_system":"epss","scoring_elements":"0.38359","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00171","scoring_system":"epss","scoring_elements":"0.38295","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00171","scoring_system":"epss","scoring_elements":"0.38136","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00171","scoring_system":"epss","scoring_elements":"0.38113","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00171","scoring_system":"epss","scoring_elements":"0.38019","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00171","scoring_system":"epss","scoring_elements":"0.37906","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00171","scoring_system":"epss","scoring_elements":"0.37976","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00171","scoring_system":"epss","scoring_elements":"0.37987","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00171","scoring_system":"epss","scoring_elements":"0.37901","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00171","scoring_system":"epss","scoring_elements":"0.37877","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00171","scoring_system":"epss","scoring_elements":"0.37954","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-2661"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1244776","reference_id":"1244776","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1244776"},{"reference_url":"https://security.gentoo.org/glsa/201610-06","reference_id":"GLSA-201610-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201610-06"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1630","reference_id":"RHSA-2015:1630","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1630"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1646","reference_id":"RHSA-2015:1646","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1646"},{"reference_url":"https://usn.ubuntu.com/2674-1/","reference_id":"USN-2674-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2674-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/75625?format=json","purl":"pkg:ebuild/dev-db/mariab@5.6.31","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mariab@5.6.31"},{"url":"http://public2.vulnerablecode.io/api/packages/75626?format=json","purl":"pkg:ebuild/dev-db/mariab@10.0.27","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mariab@10.0.27"}],"aliases":["CVE-2015-2661"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-uzud-6w7c-pqg9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41373?format=json","vulnerability_id":"VCID-ygwk-7ags-2bgk","summary":"Multiple vulnerabilities have been found in MySQL and MariaDB, the\n    worst of which could allow remote attackers to cause a Denial of Service\n    condition or obtain sensitive information.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4756.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4756.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-4756","reference_id":"","reference_type":"","scores":[{"value":"0.00821","scoring_system":"epss","scoring_elements":"0.74349","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00821","scoring_system":"epss","scoring_elements":"0.74353","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00821","scoring_system":"epss","scoring_elements":"0.7438","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00821","scoring_system":"epss","scoring_elements":"0.74355","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00821","scoring_system":"epss","scoring_elements":"0.74387","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00821","scoring_system":"epss","scoring_elements":"0.74403","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00821","scoring_system":"epss","scoring_elements":"0.74424","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00821","scoring_system":"epss","scoring_elements":"0.74404","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00821","scoring_system":"epss","scoring_elements":"0.74396","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00821","scoring_system":"epss","scoring_elements":"0.74433","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00821","scoring_system":"epss","scoring_elements":"0.74442","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00821","scoring_system":"epss","scoring_elements":"0.74432","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00821","scoring_system":"epss","scoring_elements":"0.74466","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00821","scoring_system":"epss","scoring_elements":"0.74473","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00821","scoring_system":"epss","scoring_elements":"0.74472","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00821","scoring_system":"epss","scoring_elements":"0.74469","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00821","scoring_system":"epss","scoring_elements":"0.74498","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00821","scoring_system":"epss","scoring_elements":"0.74524","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00821","scoring_system":"epss","scoring_elements":"0.7449","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00821","scoring_system":"epss","scoring_elements":"0.74511","published_at":"2026-05-12T12:55:00Z"},{"value":"0.01248","scoring_system":"epss","scoring_elements":"0.79492","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-4756"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1244780","reference_id":"1244780","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1244780"},{"reference_url":"https://security.gentoo.org/glsa/201610-06","reference_id":"GLSA-201610-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201610-06"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1630","reference_id":"RHSA-2015:1630","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1630"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1646","reference_id":"RHSA-2015:1646","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1646"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/75625?format=json","purl":"pkg:ebuild/dev-db/mariab@5.6.31","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mariab@5.6.31"},{"url":"http://public2.vulnerablecode.io/api/packages/75626?format=json","purl":"pkg:ebuild/dev-db/mariab@10.0.27","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mariab@10.0.27"}],"aliases":["CVE-2015-4756"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ygwk-7ags-2bgk"}],"risk_score":null,"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mariab@5.6.31"}