{"url":"http://public2.vulnerablecode.io/api/packages/75770?format=json","purl":"pkg:ebuild/dev-db/mariadb@10.0.28","type":"ebuild","namespace":"dev-db","name":"mariadb","version":"10.0.28","qualifiers":{},"subpath":"","is_vulnerable":false,"next_non_vulnerable_version":"10.0.29","latest_non_vulnerable_version":"10.11.3","affected_by_vulnerabilities":[],"fixing_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41737?format=json","vulnerability_id":"VCID-39rq-1cg5-9ueu","summary":"Multiple vulnerabilities have been found in MariaDB and MySQL, the\n    worst of which could lead to the remote execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5633.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5633.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-5633","reference_id":"","reference_type":"","scores":[{"value":"0.01417","scoring_system":"epss","scoring_elements":"0.80514","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01417","scoring_system":"epss","scoring_elements":"0.80706","published_at":"2026-05-09T12:55:00Z"},{"value":"0.01417","scoring_system":"epss","scoring_elements":"0.80631","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01417","scoring_system":"epss","scoring_elements":"0.80647","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01417","scoring_system":"epss","scoring_elements":"0.80664","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01417","scoring_system":"epss","scoring_elements":"0.80686","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01417","scoring_system":"epss","scoring_elements":"0.80521","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01417","scoring_system":"epss","scoring_elements":"0.80543","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01417","scoring_system":"epss","scoring_elements":"0.80535","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01417","scoring_system":"epss","scoring_elements":"0.80564","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01417","scoring_system":"epss","scoring_elements":"0.80574","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01417","scoring_system":"epss","scoring_elements":"0.80591","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01417","scoring_system":"epss","scoring_elements":"0.80577","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01417","scoring_system":"epss","scoring_elements":"0.80569","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01417","scoring_system":"epss","scoring_elements":"0.80598","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01417","scoring_system":"epss","scoring_elements":"0.806","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01417","scoring_system":"epss","scoring_elements":"0.80603","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01417","scoring_system":"epss","scoring_elements":"0.80628","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-5633"},{"reference_url":"http://www.securitytracker.com/id/1037050","reference_id":"1037050","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:28Z/"}],"url":"http://www.securitytracker.com/id/1037050"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1386576","reference_id":"1386576","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1386576"},{"reference_url":"http://www.securityfocus.com/bid/93702","reference_id":"93702","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:28Z/"}],"url":"http://www.securityfocus.com/bid/93702"},{"reference_url":"https://security.gentoo.org/glsa/201701-01","reference_id":"GLSA-201701-01","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:28Z/"}],"url":"https://security.gentoo.org/glsa/201701-01"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/75770?format=json","purl":"pkg:ebuild/dev-db/mariadb@10.0.28","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mariadb@10.0.28"}],"aliases":["CVE-2016-5633"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-39rq-1cg5-9ueu"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41745?format=json","vulnerability_id":"VCID-3b6t-dn57-qbhb","summary":"Multiple vulnerabilities have been found in MariaDB and MySQL, the\n    worst of which could lead to the remote execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8288.json","reference_id":"","reference_type":"","scores":[{"value":"3.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8288.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-8288","reference_id":"","reference_type":"","scores":[{"value":"0.00219","scoring_system":"epss","scoring_elements":"0.44276","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00219","scoring_system":"epss","scoring_elements":"0.44417","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00219","scoring_system":"epss","scoring_elements":"0.44389","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00219","scoring_system":"epss","scoring_elements":"0.44308","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00219","scoring_system":"epss","scoring_elements":"0.44182","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00219","scoring_system":"epss","scoring_elements":"0.4426","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00219","scoring_system":"epss","scoring_elements":"0.44486","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00219","scoring_system":"epss","scoring_elements":"0.44508","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00219","scoring_system":"epss","scoring_elements":"0.44446","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00219","scoring_system":"epss","scoring_elements":"0.44498","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00219","scoring_system":"epss","scoring_elements":"0.44503","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00219","scoring_system":"epss","scoring_elements":"0.44519","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00219","scoring_system":"epss","scoring_elements":"0.44489","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00219","scoring_system":"epss","scoring_elements":"0.4449","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00219","scoring_system":"epss","scoring_elements":"0.44546","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00219","scoring_system":"epss","scoring_elements":"0.44537","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00219","scoring_system":"epss","scoring_elements":"0.44468","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00219","scoring_system":"epss","scoring_elements":"0.44385","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-8288"},{"reference_url":"http://www.securitytracker.com/id/1037050","reference_id":"1037050","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:16Z/"}],"url":"http://www.securitytracker.com/id/1037050"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1386590","reference_id":"1386590","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1386590"},{"reference_url":"http://www.securityfocus.com/bid/93740","reference_id":"93740","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:16Z/"}],"url":"http://www.securityfocus.com/bid/93740"},{"reference_url":"https://security.gentoo.org/glsa/201701-01","reference_id":"GLSA-201701-01","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:16Z/"}],"url":"https://security.gentoo.org/glsa/201701-01"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1601","reference_id":"RHSA-2016:1601","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1601"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/75770?format=json","purl":"pkg:ebuild/dev-db/mariadb@10.0.28","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mariadb@10.0.28"}],"aliases":["CVE-2016-8288"],"risk_score":1.4,"exploitability":"0.5","weighted_severity":"2.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3b6t-dn57-qbhb"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41728?format=json","vulnerability_id":"VCID-3u5f-yadd-zkf7","summary":"Multiple vulnerabilities have been found in MariaDB and MySQL, the\n    worst of which could lead to the remote execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5625.json","reference_id":"","reference_type":"","scores":[{"value":"7.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5625.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-5625","reference_id":"","reference_type":"","scores":[{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13148","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13147","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13111","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13009","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.12914","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13068","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13257","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13323","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13121","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13202","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13253","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13222","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13185","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13133","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13035","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13038","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13134","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.1314","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-5625"},{"reference_url":"http://www.securitytracker.com/id/1037050","reference_id":"1037050","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:36Z/"}],"url":"http://www.securitytracker.com/id/1037050"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1386567","reference_id":"1386567","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1386567"},{"reference_url":"http://www.securityfocus.com/bid/93617","reference_id":"93617","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:36Z/"}],"url":"http://www.securityfocus.com/bid/93617"},{"reference_url":"https://security.gentoo.org/glsa/201701-01","reference_id":"GLSA-201701-01","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:36Z/"}],"url":"https://security.gentoo.org/glsa/201701-01"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/75770?format=json","purl":"pkg:ebuild/dev-db/mariadb@10.0.28","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mariadb@10.0.28"}],"aliases":["CVE-2016-5625"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3u5f-yadd-zkf7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41724?format=json","vulnerability_id":"VCID-4maq-x6xs-x7gm","summary":"Multiple vulnerabilities have been found in MariaDB and MySQL, the\n    worst of which could lead to the remote execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5507.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5507.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-5507","reference_id":"","reference_type":"","scores":[{"value":"0.00674","scoring_system":"epss","scoring_elements":"0.7158","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00674","scoring_system":"epss","scoring_elements":"0.71387","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00674","scoring_system":"epss","scoring_elements":"0.71517","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00674","scoring_system":"epss","scoring_elements":"0.71521","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00674","scoring_system":"epss","scoring_elements":"0.71509","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00674","scoring_system":"epss","scoring_elements":"0.71545","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00674","scoring_system":"epss","scoring_elements":"0.71395","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00674","scoring_system":"epss","scoring_elements":"0.71412","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00674","scoring_system":"epss","scoring_elements":"0.71428","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00674","scoring_system":"epss","scoring_elements":"0.7144","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00674","scoring_system":"epss","scoring_elements":"0.71462","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00674","scoring_system":"epss","scoring_elements":"0.71447","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00674","scoring_system":"epss","scoring_elements":"0.71429","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00674","scoring_system":"epss","scoring_elements":"0.71475","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00674","scoring_system":"epss","scoring_elements":"0.7148","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00674","scoring_system":"epss","scoring_elements":"0.7146","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00674","scoring_system":"epss","scoring_elements":"0.7151","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-5507"},{"reference_url":"http://www.securitytracker.com/id/1037050","reference_id":"1037050","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:46Z/"}],"url":"http://www.securitytracker.com/id/1037050"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1386556","reference_id":"1386556","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1386556"},{"reference_url":"http://www.securityfocus.com/bid/93678","reference_id":"93678","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:46Z/"}],"url":"http://www.securityfocus.com/bid/93678"},{"reference_url":"https://security.gentoo.org/glsa/201701-01","reference_id":"GLSA-201701-01","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:46Z/"}],"url":"https://security.gentoo.org/glsa/201701-01"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2749","reference_id":"RHSA-2016:2749","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2749"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-2749.html","reference_id":"RHSA-2016-2749.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:46Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-2749.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/75770?format=json","purl":"pkg:ebuild/dev-db/mariadb@10.0.28","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mariadb@10.0.28"}],"aliases":["CVE-2016-5507"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-4maq-x6xs-x7gm"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41730?format=json","vulnerability_id":"VCID-8bs6-r11g-c3dx","summary":"Multiple vulnerabilities have been found in MariaDB and MySQL, the\n    worst of which could lead to the remote execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5627.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5627.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-5627","reference_id":"","reference_type":"","scores":[{"value":"0.01357","scoring_system":"epss","scoring_elements":"0.80272","published_at":"2026-05-09T12:55:00Z"},{"value":"0.01357","scoring_system":"epss","scoring_elements":"0.80087","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01357","scoring_system":"epss","scoring_elements":"0.80206","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01357","scoring_system":"epss","scoring_elements":"0.80221","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01357","scoring_system":"epss","scoring_elements":"0.80234","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01357","scoring_system":"epss","scoring_elements":"0.80256","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01357","scoring_system":"epss","scoring_elements":"0.80095","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01357","scoring_system":"epss","scoring_elements":"0.80115","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01357","scoring_system":"epss","scoring_elements":"0.80103","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01357","scoring_system":"epss","scoring_elements":"0.80132","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01357","scoring_system":"epss","scoring_elements":"0.80139","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01357","scoring_system":"epss","scoring_elements":"0.80157","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01357","scoring_system":"epss","scoring_elements":"0.80142","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01357","scoring_system":"epss","scoring_elements":"0.80134","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01357","scoring_system":"epss","scoring_elements":"0.80163","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01357","scoring_system":"epss","scoring_elements":"0.80164","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01357","scoring_system":"epss","scoring_elements":"0.80167","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01357","scoring_system":"epss","scoring_elements":"0.80196","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-5627"},{"reference_url":"http://www.securitytracker.com/id/1037050","reference_id":"1037050","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:35Z/"}],"url":"http://www.securitytracker.com/id/1037050"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1386570","reference_id":"1386570","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1386570"},{"reference_url":"http://www.securityfocus.com/bid/93642","reference_id":"93642","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:35Z/"}],"url":"http://www.securityfocus.com/bid/93642"},{"reference_url":"https://security.gentoo.org/glsa/201701-01","reference_id":"GLSA-201701-01","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:35Z/"}],"url":"https://security.gentoo.org/glsa/201701-01"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1601","reference_id":"RHSA-2016:1601","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1601"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/75770?format=json","purl":"pkg:ebuild/dev-db/mariadb@10.0.28","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mariadb@10.0.28"}],"aliases":["CVE-2016-5627"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-8bs6-r11g-c3dx"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41725?format=json","vulnerability_id":"VCID-8kvb-5u8c-zbc4","summary":"Multiple vulnerabilities have been found in MariaDB and MySQL, the\n    worst of which could lead to the remote execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5584.json","reference_id":"","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5584.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-5584","reference_id":"","reference_type":"","scores":[{"value":"0.00442","scoring_system":"epss","scoring_elements":"0.63214","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00442","scoring_system":"epss","scoring_elements":"0.63423","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00442","scoring_system":"epss","scoring_elements":"0.63345","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00442","scoring_system":"epss","scoring_elements":"0.63324","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00442","scoring_system":"epss","scoring_elements":"0.63343","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00442","scoring_system":"epss","scoring_elements":"0.63356","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00442","scoring_system":"epss","scoring_elements":"0.63354","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00442","scoring_system":"epss","scoring_elements":"0.63326","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00442","scoring_system":"epss","scoring_elements":"0.6337","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00442","scoring_system":"epss","scoring_elements":"0.63273","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00442","scoring_system":"epss","scoring_elements":"0.63302","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00442","scoring_system":"epss","scoring_elements":"0.63268","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00442","scoring_system":"epss","scoring_elements":"0.63319","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00442","scoring_system":"epss","scoring_elements":"0.63337","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00442","scoring_system":"epss","scoring_elements":"0.63355","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00442","scoring_system":"epss","scoring_elements":"0.63338","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-5584"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3492","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3492"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5584","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5584"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5624","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5624"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5626","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5626"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5629","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5629"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6663","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6663"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7440","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7440"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8283","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8283"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:S/C:C/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.securitytracker.com/id/1037050","reference_id":"1037050","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:08Z/"}],"url":"http://www.securitytracker.com/id/1037050"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1386557","reference_id":"1386557","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1386557"},{"reference_url":"http://www.securityfocus.com/bid/93735","reference_id":"93735","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:08Z/"}],"url":"http://www.securityfocus.com/bid/93735"},{"reference_url":"http://www.debian.org/security/2016/dsa-3706","reference_id":"dsa-3706","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:08Z/"}],"url":"http://www.debian.org/security/2016/dsa-3706"},{"reference_url":"https://security.gentoo.org/glsa/201701-01","reference_id":"GLSA-201701-01","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:08Z/"}],"url":"https://security.gentoo.org/glsa/201701-01"},{"reference_url":"https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/","reference_id":"mariadb-10028-release-notes","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:08Z/"}],"url":"https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/"},{"reference_url":"https://usn.ubuntu.com/3109-1/","reference_id":"USN-3109-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3109-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/75770?format=json","purl":"pkg:ebuild/dev-db/mariadb@10.0.28","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mariadb@10.0.28"}],"aliases":["CVE-2016-5584"],"risk_score":2.0,"exploitability":"0.5","weighted_severity":"4.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-8kvb-5u8c-zbc4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41726?format=json","vulnerability_id":"VCID-b2aa-32zq-aqd5","summary":"Multiple vulnerabilities have been found in MariaDB and MySQL, the\n    worst of which could lead to the remote execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5609.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5609.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-5609","reference_id":"","reference_type":"","scores":[{"value":"0.01357","scoring_system":"epss","scoring_elements":"0.80272","published_at":"2026-05-09T12:55:00Z"},{"value":"0.01357","scoring_system":"epss","scoring_elements":"0.80087","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01357","scoring_system":"epss","scoring_elements":"0.80206","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01357","scoring_system":"epss","scoring_elements":"0.80221","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01357","scoring_system":"epss","scoring_elements":"0.80234","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01357","scoring_system":"epss","scoring_elements":"0.80256","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01357","scoring_system":"epss","scoring_elements":"0.80095","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01357","scoring_system":"epss","scoring_elements":"0.80115","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01357","scoring_system":"epss","scoring_elements":"0.80103","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01357","scoring_system":"epss","scoring_elements":"0.80132","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01357","scoring_system":"epss","scoring_elements":"0.80139","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01357","scoring_system":"epss","scoring_elements":"0.80157","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01357","scoring_system":"epss","scoring_elements":"0.80142","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01357","scoring_system":"epss","scoring_elements":"0.80134","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01357","scoring_system":"epss","scoring_elements":"0.80163","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01357","scoring_system":"epss","scoring_elements":"0.80164","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01357","scoring_system":"epss","scoring_elements":"0.80167","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01357","scoring_system":"epss","scoring_elements":"0.80196","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-5609"},{"reference_url":"http://www.securitytracker.com/id/1037050","reference_id":"1037050","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:51Z/"}],"url":"http://www.securitytracker.com/id/1037050"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1386559","reference_id":"1386559","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1386559"},{"reference_url":"http://www.securityfocus.com/bid/93622","reference_id":"93622","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:51Z/"}],"url":"http://www.securityfocus.com/bid/93622"},{"reference_url":"https://security.gentoo.org/glsa/201701-01","reference_id":"GLSA-201701-01","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:51Z/"}],"url":"https://security.gentoo.org/glsa/201701-01"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1601","reference_id":"RHSA-2016:1601","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1601"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/75770?format=json","purl":"pkg:ebuild/dev-db/mariadb@10.0.28","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mariadb@10.0.28"}],"aliases":["CVE-2016-5609"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-b2aa-32zq-aqd5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41734?format=json","vulnerability_id":"VCID-c66q-ap9s-57e1","summary":"Multiple vulnerabilities have been found in MariaDB and MySQL, the\n    worst of which could lead to the remote execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5631.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5631.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-5631","reference_id":"","reference_type":"","scores":[{"value":"0.01417","scoring_system":"epss","scoring_elements":"0.80514","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01417","scoring_system":"epss","scoring_elements":"0.80706","published_at":"2026-05-09T12:55:00Z"},{"value":"0.01417","scoring_system":"epss","scoring_elements":"0.80631","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01417","scoring_system":"epss","scoring_elements":"0.80647","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01417","scoring_system":"epss","scoring_elements":"0.80664","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01417","scoring_system":"epss","scoring_elements":"0.80686","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01417","scoring_system":"epss","scoring_elements":"0.80521","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01417","scoring_system":"epss","scoring_elements":"0.80543","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01417","scoring_system":"epss","scoring_elements":"0.80535","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01417","scoring_system":"epss","scoring_elements":"0.80564","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01417","scoring_system":"epss","scoring_elements":"0.80574","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01417","scoring_system":"epss","scoring_elements":"0.80591","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01417","scoring_system":"epss","scoring_elements":"0.80577","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01417","scoring_system":"epss","scoring_elements":"0.80569","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01417","scoring_system":"epss","scoring_elements":"0.80598","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01417","scoring_system":"epss","scoring_elements":"0.806","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01417","scoring_system":"epss","scoring_elements":"0.80603","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01417","scoring_system":"epss","scoring_elements":"0.80628","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-5631"},{"reference_url":"http://www.securitytracker.com/id/1037050","reference_id":"1037050","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:31Z/"}],"url":"http://www.securitytracker.com/id/1037050"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1386574","reference_id":"1386574","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1386574"},{"reference_url":"http://www.securityfocus.com/bid/93684","reference_id":"93684","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:31Z/"}],"url":"http://www.securityfocus.com/bid/93684"},{"reference_url":"https://security.gentoo.org/glsa/201701-01","reference_id":"GLSA-201701-01","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:31Z/"}],"url":"https://security.gentoo.org/glsa/201701-01"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/75770?format=json","purl":"pkg:ebuild/dev-db/mariadb@10.0.28","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mariadb@10.0.28"}],"aliases":["CVE-2016-5631"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-c66q-ap9s-57e1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41735?format=json","vulnerability_id":"VCID-c9c7-nkt8-4baa","summary":"Multiple vulnerabilities have been found in MariaDB and MySQL, the\n    worst of which could lead to the remote execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5632.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5632.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-5632","reference_id":"","reference_type":"","scores":[{"value":"0.01417","scoring_system":"epss","scoring_elements":"0.80514","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01417","scoring_system":"epss","scoring_elements":"0.80706","published_at":"2026-05-09T12:55:00Z"},{"value":"0.01417","scoring_system":"epss","scoring_elements":"0.80631","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01417","scoring_system":"epss","scoring_elements":"0.80647","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01417","scoring_system":"epss","scoring_elements":"0.80664","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01417","scoring_system":"epss","scoring_elements":"0.80686","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01417","scoring_system":"epss","scoring_elements":"0.80521","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01417","scoring_system":"epss","scoring_elements":"0.80543","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01417","scoring_system":"epss","scoring_elements":"0.80535","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01417","scoring_system":"epss","scoring_elements":"0.80564","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01417","scoring_system":"epss","scoring_elements":"0.80574","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01417","scoring_system":"epss","scoring_elements":"0.80591","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01417","scoring_system":"epss","scoring_elements":"0.80577","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01417","scoring_system":"epss","scoring_elements":"0.80569","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01417","scoring_system":"epss","scoring_elements":"0.80598","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01417","scoring_system":"epss","scoring_elements":"0.806","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01417","scoring_system":"epss","scoring_elements":"0.80603","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01417","scoring_system":"epss","scoring_elements":"0.80628","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-5632"},{"reference_url":"http://www.securitytracker.com/id/1037050","reference_id":"1037050","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:29Z/"}],"url":"http://www.securitytracker.com/id/1037050"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1386575","reference_id":"1386575","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1386575"},{"reference_url":"http://www.securityfocus.com/bid/93693","reference_id":"93693","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:29Z/"}],"url":"http://www.securityfocus.com/bid/93693"},{"reference_url":"https://security.gentoo.org/glsa/201701-01","reference_id":"GLSA-201701-01","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:29Z/"}],"url":"https://security.gentoo.org/glsa/201701-01"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/75770?format=json","purl":"pkg:ebuild/dev-db/mariadb@10.0.28","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mariadb@10.0.28"}],"aliases":["CVE-2016-5632"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-c9c7-nkt8-4baa"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41746?format=json","vulnerability_id":"VCID-dn63-evjx-5khp","summary":"Multiple vulnerabilities have been found in MariaDB and MySQL, the\n    worst of which could lead to the remote execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8289.json","reference_id":"","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8289.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-8289","reference_id":"","reference_type":"","scores":[{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22534","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22453","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22389","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22387","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22291","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22376","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22706","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.2275","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22537","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22615","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22668","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22686","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22645","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22589","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22605","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22602","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22551","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.224","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-8289"},{"reference_url":"http://www.securitytracker.com/id/1037050","reference_id":"1037050","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:15Z/"}],"url":"http://www.securitytracker.com/id/1037050"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1386591","reference_id":"1386591","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1386591"},{"reference_url":"http://www.securityfocus.com/bid/93720","reference_id":"93720","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:15Z/"}],"url":"http://www.securityfocus.com/bid/93720"},{"reference_url":"https://security.gentoo.org/glsa/201701-01","reference_id":"GLSA-201701-01","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:15Z/"}],"url":"https://security.gentoo.org/glsa/201701-01"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/75770?format=json","purl":"pkg:ebuild/dev-db/mariadb@10.0.28","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mariadb@10.0.28"}],"aliases":["CVE-2016-8289"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-dn63-evjx-5khp"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41732?format=json","vulnerability_id":"VCID-gp4w-bdxg-6kab","summary":"Multiple vulnerabilities have been found in MariaDB and MySQL, the\n    worst of which could lead to the remote execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5629.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5629.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-5629","reference_id":"","reference_type":"","scores":[{"value":"0.00501","scoring_system":"epss","scoring_elements":"0.66122","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00501","scoring_system":"epss","scoring_elements":"0.65913","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00501","scoring_system":"epss","scoring_elements":"0.65989","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00501","scoring_system":"epss","scoring_elements":"0.66024","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00501","scoring_system":"epss","scoring_elements":"0.66038","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00501","scoring_system":"epss","scoring_elements":"0.66025","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00501","scoring_system":"epss","scoring_elements":"0.66046","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00501","scoring_system":"epss","scoring_elements":"0.66057","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00501","scoring_system":"epss","scoring_elements":"0.66055","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00501","scoring_system":"epss","scoring_elements":"0.66033","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00501","scoring_system":"epss","scoring_elements":"0.66079","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00501","scoring_system":"epss","scoring_elements":"0.65954","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00501","scoring_system":"epss","scoring_elements":"0.65984","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00501","scoring_system":"epss","scoring_elements":"0.6595","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00501","scoring_system":"epss","scoring_elements":"0.66001","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00501","scoring_system":"epss","scoring_elements":"0.66013","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00501","scoring_system":"epss","scoring_elements":"0.66032","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00501","scoring_system":"epss","scoring_elements":"0.66019","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-5629"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3492","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3492"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5584","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5584"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5624","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5624"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5626","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5626"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5629","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5629"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6663","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6663"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7440","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7440"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8283","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8283"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:S/C:N/I:N/A:P"},{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.securitytracker.com/id/1037050","reference_id":"1037050","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:33Z/"}],"url":"http://www.securitytracker.com/id/1037050"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1386572","reference_id":"1386572","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1386572"},{"reference_url":"http://www.securityfocus.com/bid/93668","reference_id":"93668","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:33Z/"}],"url":"http://www.securityfocus.com/bid/93668"},{"reference_url":"https://security.gentoo.org/glsa/201701-01","reference_id":"GLSA-201701-01","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:33Z/"}],"url":"https://security.gentoo.org/glsa/201701-01"},{"reference_url":"https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/","reference_id":"mariadb-10028-release-notes","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:33Z/"}],"url":"https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/"},{"reference_url":"https://mariadb.com/kb/en/mariadb/mariadb-10118-release-notes/","reference_id":"mariadb-10118-release-notes","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:33Z/"}],"url":"https://mariadb.com/kb/en/mariadb/mariadb-10118-release-notes/"},{"reference_url":"https://mariadb.com/kb/en/mariadb/mariadb-5552-release-notes/","reference_id":"mariadb-5552-release-notes","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:33Z/"}],"url":"https://mariadb.com/kb/en/mariadb/mariadb-5552-release-notes/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2130","reference_id":"RHSA-2016:2130","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2130"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-2130.html","reference_id":"RHSA-2016-2130.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:33Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-2130.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2131","reference_id":"RHSA-2016:2131","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2131"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-2131.html","reference_id":"RHSA-2016-2131.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:33Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-2131.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2595","reference_id":"RHSA-2016:2595","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2595"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-2595.html","reference_id":"RHSA-2016-2595.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:33Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-2595.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2749","reference_id":"RHSA-2016:2749","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2749"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-2749.html","reference_id":"RHSA-2016-2749.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:33Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-2749.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2927","reference_id":"RHSA-2016:2927","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2927"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2928","reference_id":"RHSA-2016:2928","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2928"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/75770?format=json","purl":"pkg:ebuild/dev-db/mariadb@10.0.28","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mariadb@10.0.28"}],"aliases":["CVE-2016-5629"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-gp4w-bdxg-6kab"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41727?format=json","vulnerability_id":"VCID-gyjy-c8wc-qubd","summary":"Multiple vulnerabilities have been found in MariaDB and MySQL, the\n    worst of which could lead to the remote execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5612.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5612.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-5612","reference_id":"","reference_type":"","scores":[{"value":"0.00712","scoring_system":"epss","scoring_elements":"0.72395","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00712","scoring_system":"epss","scoring_elements":"0.72217","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00712","scoring_system":"epss","scoring_elements":"0.72352","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00712","scoring_system":"epss","scoring_elements":"0.72348","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00712","scoring_system":"epss","scoring_elements":"0.72339","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00712","scoring_system":"epss","scoring_elements":"0.72368","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00712","scoring_system":"epss","scoring_elements":"0.72222","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00712","scoring_system":"epss","scoring_elements":"0.72242","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00712","scoring_system":"epss","scoring_elements":"0.72218","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00712","scoring_system":"epss","scoring_elements":"0.72255","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00712","scoring_system":"epss","scoring_elements":"0.72267","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00712","scoring_system":"epss","scoring_elements":"0.72289","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00712","scoring_system":"epss","scoring_elements":"0.72273","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00712","scoring_system":"epss","scoring_elements":"0.7226","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00712","scoring_system":"epss","scoring_elements":"0.72302","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00712","scoring_system":"epss","scoring_elements":"0.72311","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00712","scoring_system":"epss","scoring_elements":"0.72299","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00712","scoring_system":"epss","scoring_elements":"0.72343","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-5612"},{"reference_url":"http://www.securitytracker.com/id/1037050","reference_id":"1037050","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:48Z/"}],"url":"http://www.securitytracker.com/id/1037050"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1386561","reference_id":"1386561","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1386561"},{"reference_url":"http://www.securityfocus.com/bid/93630","reference_id":"93630","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:48Z/"}],"url":"http://www.securityfocus.com/bid/93630"},{"reference_url":"https://security.gentoo.org/glsa/201701-01","reference_id":"GLSA-201701-01","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:48Z/"}],"url":"https://security.gentoo.org/glsa/201701-01"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1601","reference_id":"RHSA-2016:1601","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1601"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2130","reference_id":"RHSA-2016:2130","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2130"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-2130.html","reference_id":"RHSA-2016-2130.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:48Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-2130.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2131","reference_id":"RHSA-2016:2131","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2131"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-2131.html","reference_id":"RHSA-2016-2131.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:48Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-2131.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2595","reference_id":"RHSA-2016:2595","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2595"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-2595.html","reference_id":"RHSA-2016-2595.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:48Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-2595.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2927","reference_id":"RHSA-2016:2927","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2927"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/75770?format=json","purl":"pkg:ebuild/dev-db/mariadb@10.0.28","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mariadb@10.0.28"}],"aliases":["CVE-2016-5612"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-gyjy-c8wc-qubd"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41733?format=json","vulnerability_id":"VCID-jj46-73tp-nub5","summary":"Multiple vulnerabilities have been found in MariaDB and MySQL, the\n    worst of which could lead to the remote execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5630.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5630.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-5630","reference_id":"","reference_type":"","scores":[{"value":"0.00755","scoring_system":"epss","scoring_elements":"0.73376","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00755","scoring_system":"epss","scoring_elements":"0.73189","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00755","scoring_system":"epss","scoring_elements":"0.73319","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00755","scoring_system":"epss","scoring_elements":"0.73333","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00755","scoring_system":"epss","scoring_elements":"0.73331","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00755","scoring_system":"epss","scoring_elements":"0.73326","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00755","scoring_system":"epss","scoring_elements":"0.73352","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00755","scoring_system":"epss","scoring_elements":"0.73199","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00755","scoring_system":"epss","scoring_elements":"0.7322","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00755","scoring_system":"epss","scoring_elements":"0.73194","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00755","scoring_system":"epss","scoring_elements":"0.7323","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00755","scoring_system":"epss","scoring_elements":"0.73244","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00755","scoring_system":"epss","scoring_elements":"0.73269","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00755","scoring_system":"epss","scoring_elements":"0.73249","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00755","scoring_system":"epss","scoring_elements":"0.73242","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00755","scoring_system":"epss","scoring_elements":"0.73284","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00755","scoring_system":"epss","scoring_elements":"0.73293","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00755","scoring_system":"epss","scoring_elements":"0.73285","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-5630"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.securitytracker.com/id/1037050","reference_id":"1037050","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:31Z/"}],"url":"http://www.securitytracker.com/id/1037050"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1386573","reference_id":"1386573","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1386573"},{"reference_url":"http://www.securityfocus.com/bid/93674","reference_id":"93674","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:31Z/"}],"url":"http://www.securityfocus.com/bid/93674"},{"reference_url":"https://security.gentoo.org/glsa/201701-01","reference_id":"GLSA-201701-01","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:31Z/"}],"url":"https://security.gentoo.org/glsa/201701-01"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1601","reference_id":"RHSA-2016:1601","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1601"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2927","reference_id":"RHSA-2016:2927","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2927"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/75770?format=json","purl":"pkg:ebuild/dev-db/mariadb@10.0.28","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mariadb@10.0.28"}],"aliases":["CVE-2016-5630"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-jj46-73tp-nub5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41723?format=json","vulnerability_id":"VCID-jnue-w479-eqdw","summary":"Multiple vulnerabilities have been found in MariaDB and MySQL, the\n    worst of which could lead to the remote execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3495.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3495.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-3495","reference_id":"","reference_type":"","scores":[{"value":"0.00739","scoring_system":"epss","scoring_elements":"0.72837","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00739","scoring_system":"epss","scoring_elements":"0.7303","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00739","scoring_system":"epss","scoring_elements":"0.72986","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00739","scoring_system":"epss","scoring_elements":"0.72983","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00739","scoring_system":"epss","scoring_elements":"0.72979","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00739","scoring_system":"epss","scoring_elements":"0.73005","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00739","scoring_system":"epss","scoring_elements":"0.72843","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00739","scoring_system":"epss","scoring_elements":"0.72864","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00739","scoring_system":"epss","scoring_elements":"0.72839","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00739","scoring_system":"epss","scoring_elements":"0.72877","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00739","scoring_system":"epss","scoring_elements":"0.72891","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00739","scoring_system":"epss","scoring_elements":"0.72915","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00739","scoring_system":"epss","scoring_elements":"0.72899","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00739","scoring_system":"epss","scoring_elements":"0.72932","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00739","scoring_system":"epss","scoring_elements":"0.72942","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00739","scoring_system":"epss","scoring_elements":"0.72935","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00739","scoring_system":"epss","scoring_elements":"0.72976","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-3495"},{"reference_url":"http://www.securitytracker.com/id/1037050","reference_id":"1037050","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:50:06Z/"}],"url":"http://www.securitytracker.com/id/1037050"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1386555","reference_id":"1386555","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1386555"},{"reference_url":"http://www.securityfocus.com/bid/93670","reference_id":"93670","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:50:06Z/"}],"url":"http://www.securityfocus.com/bid/93670"},{"reference_url":"https://security.gentoo.org/glsa/201701-01","reference_id":"GLSA-201701-01","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:50:06Z/"}],"url":"https://security.gentoo.org/glsa/201701-01"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/75770?format=json","purl":"pkg:ebuild/dev-db/mariadb@10.0.28","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mariadb@10.0.28"}],"aliases":["CVE-2016-3495"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-jnue-w479-eqdw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41739?format=json","vulnerability_id":"VCID-k7av-yra2-ckap","summary":"Multiple vulnerabilities have been found in MariaDB and MySQL, the\n    worst of which could lead to the remote execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5635.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5635.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-5635","reference_id":"","reference_type":"","scores":[{"value":"0.01417","scoring_system":"epss","scoring_elements":"0.80514","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01417","scoring_system":"epss","scoring_elements":"0.80706","published_at":"2026-05-09T12:55:00Z"},{"value":"0.01417","scoring_system":"epss","scoring_elements":"0.80631","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01417","scoring_system":"epss","scoring_elements":"0.80647","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01417","scoring_system":"epss","scoring_elements":"0.80664","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01417","scoring_system":"epss","scoring_elements":"0.80686","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01417","scoring_system":"epss","scoring_elements":"0.80521","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01417","scoring_system":"epss","scoring_elements":"0.80543","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01417","scoring_system":"epss","scoring_elements":"0.80535","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01417","scoring_system":"epss","scoring_elements":"0.80564","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01417","scoring_system":"epss","scoring_elements":"0.80574","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01417","scoring_system":"epss","scoring_elements":"0.80591","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01417","scoring_system":"epss","scoring_elements":"0.80577","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01417","scoring_system":"epss","scoring_elements":"0.80569","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01417","scoring_system":"epss","scoring_elements":"0.80598","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01417","scoring_system":"epss","scoring_elements":"0.806","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01417","scoring_system":"epss","scoring_elements":"0.80603","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01417","scoring_system":"epss","scoring_elements":"0.80628","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-5635"},{"reference_url":"http://www.securitytracker.com/id/1037050","reference_id":"1037050","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:25Z/"}],"url":"http://www.securitytracker.com/id/1037050"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1386580","reference_id":"1386580","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1386580"},{"reference_url":"http://www.securityfocus.com/bid/93715","reference_id":"93715","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:25Z/"}],"url":"http://www.securityfocus.com/bid/93715"},{"reference_url":"https://security.gentoo.org/glsa/201701-01","reference_id":"GLSA-201701-01","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:25Z/"}],"url":"https://security.gentoo.org/glsa/201701-01"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/75770?format=json","purl":"pkg:ebuild/dev-db/mariadb@10.0.28","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mariadb@10.0.28"}],"aliases":["CVE-2016-5635"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-k7av-yra2-ckap"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41743?format=json","vulnerability_id":"VCID-kg6w-jbac-5yf8","summary":"Multiple vulnerabilities have been found in MariaDB and MySQL, the\n    worst of which could lead to the remote execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8286.json","reference_id":"","reference_type":"","scores":[{"value":"3.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8286.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-8286","reference_id":"","reference_type":"","scores":[{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25813","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25578","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25611","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25561","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25451","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25516","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25873","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25916","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25685","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25756","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25804","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25771","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25713","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25717","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25699","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25675","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25619","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-8286"},{"reference_url":"http://www.securitytracker.com/id/1037050","reference_id":"1037050","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:18Z/"}],"url":"http://www.securitytracker.com/id/1037050"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1386588","reference_id":"1386588","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1386588"},{"reference_url":"http://www.securityfocus.com/bid/93745","reference_id":"93745","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:18Z/"}],"url":"http://www.securityfocus.com/bid/93745"},{"reference_url":"https://security.gentoo.org/glsa/201701-01","reference_id":"GLSA-201701-01","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:18Z/"}],"url":"https://security.gentoo.org/glsa/201701-01"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/75770?format=json","purl":"pkg:ebuild/dev-db/mariadb@10.0.28","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mariadb@10.0.28"}],"aliases":["CVE-2016-8286"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-kg6w-jbac-5yf8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41744?format=json","vulnerability_id":"VCID-kvz9-pnmc-jfbp","summary":"Multiple vulnerabilities have been found in MariaDB and MySQL, the\n    worst of which could lead to the remote execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8287.json","reference_id":"","reference_type":"","scores":[{"value":"4.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8287.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-8287","reference_id":"","reference_type":"","scores":[{"value":"0.00274","scoring_system":"epss","scoring_elements":"0.50745","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00274","scoring_system":"epss","scoring_elements":"0.5079","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00274","scoring_system":"epss","scoring_elements":"0.50823","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00274","scoring_system":"epss","scoring_elements":"0.50782","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00274","scoring_system":"epss","scoring_elements":"0.50706","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00274","scoring_system":"epss","scoring_elements":"0.50759","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00274","scoring_system":"epss","scoring_elements":"0.50801","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00274","scoring_system":"epss","scoring_elements":"0.50827","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00274","scoring_system":"epss","scoring_elements":"0.50784","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00274","scoring_system":"epss","scoring_elements":"0.50841","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00274","scoring_system":"epss","scoring_elements":"0.50839","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00274","scoring_system":"epss","scoring_elements":"0.50881","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00274","scoring_system":"epss","scoring_elements":"0.50858","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00274","scoring_system":"epss","scoring_elements":"0.50843","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00274","scoring_system":"epss","scoring_elements":"0.50886","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00274","scoring_system":"epss","scoring_elements":"0.50865","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00274","scoring_system":"epss","scoring_elements":"0.50814","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-8287"},{"reference_url":"http://www.securitytracker.com/id/1037050","reference_id":"1037050","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:17Z/"}],"url":"http://www.securitytracker.com/id/1037050"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1386589","reference_id":"1386589","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1386589"},{"reference_url":"http://www.securityfocus.com/bid/93727","reference_id":"93727","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:17Z/"}],"url":"http://www.securityfocus.com/bid/93727"},{"reference_url":"https://security.gentoo.org/glsa/201701-01","reference_id":"GLSA-201701-01","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:17Z/"}],"url":"https://security.gentoo.org/glsa/201701-01"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/75770?format=json","purl":"pkg:ebuild/dev-db/mariadb@10.0.28","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mariadb@10.0.28"}],"aliases":["CVE-2016-8287"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-kvz9-pnmc-jfbp"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41747?format=json","vulnerability_id":"VCID-pchw-5h2a-27fk","summary":"Multiple vulnerabilities have been found in MariaDB and MySQL, the\n    worst of which could lead to the remote execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8290.json","reference_id":"","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8290.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-8290","reference_id":"","reference_type":"","scores":[{"value":"0.00542","scoring_system":"epss","scoring_elements":"0.6761","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00542","scoring_system":"epss","scoring_elements":"0.67808","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00542","scoring_system":"epss","scoring_elements":"0.67748","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00542","scoring_system":"epss","scoring_elements":"0.67751","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00542","scoring_system":"epss","scoring_elements":"0.67729","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00542","scoring_system":"epss","scoring_elements":"0.67771","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00542","scoring_system":"epss","scoring_elements":"0.67646","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00542","scoring_system":"epss","scoring_elements":"0.67667","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00542","scoring_system":"epss","scoring_elements":"0.67647","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00542","scoring_system":"epss","scoring_elements":"0.67699","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00542","scoring_system":"epss","scoring_elements":"0.67713","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00542","scoring_system":"epss","scoring_elements":"0.67736","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00542","scoring_system":"epss","scoring_elements":"0.67721","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00542","scoring_system":"epss","scoring_elements":"0.67688","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00542","scoring_system":"epss","scoring_elements":"0.67724","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00542","scoring_system":"epss","scoring_elements":"0.67737","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00542","scoring_system":"epss","scoring_elements":"0.67718","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-8290"},{"reference_url":"http://www.securitytracker.com/id/1037050","reference_id":"1037050","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:14Z/"}],"url":"http://www.securitytracker.com/id/1037050"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1386592","reference_id":"1386592","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1386592"},{"reference_url":"http://www.securityfocus.com/bid/93733","reference_id":"93733","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:14Z/"}],"url":"http://www.securityfocus.com/bid/93733"},{"reference_url":"https://security.gentoo.org/glsa/201701-01","reference_id":"GLSA-201701-01","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:14Z/"}],"url":"https://security.gentoo.org/glsa/201701-01"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/75770?format=json","purl":"pkg:ebuild/dev-db/mariadb@10.0.28","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mariadb@10.0.28"}],"aliases":["CVE-2016-8290"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-pchw-5h2a-27fk"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41722?format=json","vulnerability_id":"VCID-rted-6vzz-mbcv","summary":"Multiple vulnerabilities have been found in MariaDB and MySQL, the\n    worst of which could lead to the remote execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3492.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3492.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-3492","reference_id":"","reference_type":"","scores":[{"value":"0.00566","scoring_system":"epss","scoring_elements":"0.68622","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00566","scoring_system":"epss","scoring_elements":"0.68412","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00566","scoring_system":"epss","scoring_elements":"0.68513","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00566","scoring_system":"epss","scoring_elements":"0.68526","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00566","scoring_system":"epss","scoring_elements":"0.68505","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00566","scoring_system":"epss","scoring_elements":"0.68554","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00566","scoring_system":"epss","scoring_elements":"0.68559","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00566","scoring_system":"epss","scoring_elements":"0.68565","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00566","scoring_system":"epss","scoring_elements":"0.68542","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00566","scoring_system":"epss","scoring_elements":"0.68585","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00566","scoring_system":"epss","scoring_elements":"0.68431","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00566","scoring_system":"epss","scoring_elements":"0.68451","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00566","scoring_system":"epss","scoring_elements":"0.68427","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00566","scoring_system":"epss","scoring_elements":"0.68477","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00566","scoring_system":"epss","scoring_elements":"0.68494","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00566","scoring_system":"epss","scoring_elements":"0.6852","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00566","scoring_system":"epss","scoring_elements":"0.68508","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00566","scoring_system":"epss","scoring_elements":"0.68475","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-3492"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3492","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3492"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5584","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5584"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5624","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5624"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5626","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5626"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5629","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5629"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6663","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6663"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7440","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7440"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8283","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8283"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:S/C:N/I:N/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.securitytracker.com/id/1037050","reference_id":"1037050","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:50:08Z/"}],"url":"http://www.securitytracker.com/id/1037050"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1386554","reference_id":"1386554","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1386554"},{"reference_url":"http://www.securityfocus.com/bid/93650","reference_id":"93650","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:50:08Z/"}],"url":"http://www.securityfocus.com/bid/93650"},{"reference_url":"https://security.gentoo.org/glsa/201701-01","reference_id":"GLSA-201701-01","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:50:08Z/"}],"url":"https://security.gentoo.org/glsa/201701-01"},{"reference_url":"https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/","reference_id":"mariadb-10028-release-notes","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:50:08Z/"}],"url":"https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/"},{"reference_url":"https://mariadb.com/kb/en/mariadb/mariadb-10118-release-notes/","reference_id":"mariadb-10118-release-notes","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:50:08Z/"}],"url":"https://mariadb.com/kb/en/mariadb/mariadb-10118-release-notes/"},{"reference_url":"https://mariadb.com/kb/en/mariadb/mariadb-5552-release-notes/","reference_id":"mariadb-5552-release-notes","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:50:08Z/"}],"url":"https://mariadb.com/kb/en/mariadb/mariadb-5552-release-notes/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2130","reference_id":"RHSA-2016:2130","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2130"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-2130.html","reference_id":"RHSA-2016-2130.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:50:08Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-2130.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2131","reference_id":"RHSA-2016:2131","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2131"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-2131.html","reference_id":"RHSA-2016-2131.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:50:08Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-2131.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2595","reference_id":"RHSA-2016:2595","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2595"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-2595.html","reference_id":"RHSA-2016-2595.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:50:08Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-2595.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2749","reference_id":"RHSA-2016:2749","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2749"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-2749.html","reference_id":"RHSA-2016-2749.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:50:08Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-2749.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2927","reference_id":"RHSA-2016:2927","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2927"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2928","reference_id":"RHSA-2016:2928","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2928"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/75770?format=json","purl":"pkg:ebuild/dev-db/mariadb@10.0.28","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mariadb@10.0.28"}],"aliases":["CVE-2016-3492"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-rted-6vzz-mbcv"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41740?format=json","vulnerability_id":"VCID-skzt-r7sx-1ucv","summary":"Multiple vulnerabilities have been found in MariaDB and MySQL, the\n    worst of which could lead to the remote execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-6662.json","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-6662.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-6662","reference_id":"","reference_type":"","scores":[{"value":"0.89577","scoring_system":"epss","scoring_elements":"0.99554","published_at":"2026-04-04T12:55:00Z"},{"value":"0.89577","scoring_system":"epss","scoring_elements":"0.99553","published_at":"2026-04-02T12:55:00Z"},{"value":"0.89577","scoring_system":"epss","scoring_elements":"0.99555","published_at":"2026-04-07T12:55:00Z"},{"value":"0.89577","scoring_system":"epss","scoring_elements":"0.99556","published_at":"2026-04-12T12:55:00Z"},{"value":"0.89577","scoring_system":"epss","scoring_elements":"0.99557","published_at":"2026-04-13T12:55:00Z"},{"value":"0.89577","scoring_system":"epss","scoring_elements":"0.99559","published_at":"2026-04-16T12:55:00Z"},{"value":"0.89577","scoring_system":"epss","scoring_elements":"0.9956","published_at":"2026-04-24T12:55:00Z"},{"value":"0.89577","scoring_system":"epss","scoring_elements":"0.99561","published_at":"2026-04-26T12:55:00Z"},{"value":"0.89577","scoring_system":"epss","scoring_elements":"0.99563","published_at":"2026-04-29T12:55:00Z"},{"value":"0.89577","scoring_system":"epss","scoring_elements":"0.99564","published_at":"2026-05-07T12:55:00Z"},{"value":"0.89577","scoring_system":"epss","scoring_elements":"0.99565","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-6662"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6662","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6662"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:S/C:C/I:C/A:C"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1375198","reference_id":"1375198","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1375198"},{"reference_url":"http://legalhackers.com/advisories/MySQL-Exploit-Remote-Root-Code-Execution-Privesc-CVE-2016-6662.html","reference_id":"CVE-2016-6662","reference_type":"exploit","scores":[],"url":"http://legalhackers.com/advisories/MySQL-Exploit-Remote-Root-Code-Execution-Privesc-CVE-2016-6662.html"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/40360.py","reference_id":"CVE-2016-6662","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/40360.py"},{"reference_url":"https://security.gentoo.org/glsa/201701-01","reference_id":"GLSA-201701-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201701-01"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2058","reference_id":"RHSA-2016:2058","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2058"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2059","reference_id":"RHSA-2016:2059","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2059"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2060","reference_id":"RHSA-2016:2060","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2060"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2061","reference_id":"RHSA-2016:2061","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2061"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2062","reference_id":"RHSA-2016:2062","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2062"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2077","reference_id":"RHSA-2016:2077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2077"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2130","reference_id":"RHSA-2016:2130","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2130"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2131","reference_id":"RHSA-2016:2131","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2131"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2595","reference_id":"RHSA-2016:2595","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2595"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2749","reference_id":"RHSA-2016:2749","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2749"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2927","reference_id":"RHSA-2016:2927","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2927"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2928","reference_id":"RHSA-2016:2928","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2928"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0184","reference_id":"RHSA-2017:0184","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0184"},{"reference_url":"https://usn.ubuntu.com/3078-1/","reference_id":"USN-3078-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3078-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/75770?format=json","purl":"pkg:ebuild/dev-db/mariadb@10.0.28","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mariadb@10.0.28"}],"aliases":["CVE-2016-6662"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"8.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-skzt-r7sx-1ucv"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/4730?format=json","vulnerability_id":"VCID-tdbv-p3up-vfgv","summary":"SQL injection vulnerability in Pivotal Spring Data JPA before 1.9.6 (Gosling SR6) and 1.10.x before 1.10.4 (Hopper SR4), when used with a repository that defines a String query using the @Query annotation, allows attackers to execute arbitrary JPQL commands via a sort instance with a function call.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-6652","reference_id":"","reference_type":"","scores":[{"value":"0.00317","scoring_system":"epss","scoring_elements":"0.54727","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00317","scoring_system":"epss","scoring_elements":"0.54786","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00317","scoring_system":"epss","scoring_elements":"0.5473","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00317","scoring_system":"epss","scoring_elements":"0.54687","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00317","scoring_system":"epss","scoring_elements":"0.5474","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00317","scoring_system":"epss","scoring_elements":"0.54763","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00317","scoring_system":"epss","scoring_elements":"0.54744","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00317","scoring_system":"epss","scoring_elements":"0.54789","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00317","scoring_system":"epss","scoring_elements":"0.54749","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00317","scoring_system":"epss","scoring_elements":"0.54771","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00317","scoring_system":"epss","scoring_elements":"0.54787","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00317","scoring_system":"epss","scoring_elements":"0.54776","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00317","scoring_system":"epss","scoring_elements":"0.54665","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00317","scoring_system":"epss","scoring_elements":"0.54735","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00317","scoring_system":"epss","scoring_elements":"0.54779","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00317","scoring_system":"epss","scoring_elements":"0.54758","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-6652"},{"reference_url":"https://github.com/spring-projects/spring-data-jpa/commit/b8e7fe","reference_id":"","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/spring-projects/spring-data-jpa/commit/b8e7fe"},{"reference_url":"https://github.com/spring-projects/spring-data-jpa/commit/b8e7fecccc7dc8edcabb4704656a7abe6352c08f","reference_id":"","reference_type":"","scores":[],"url":"https://github.com/spring-projects/spring-data-jpa/commit/b8e7fecccc7dc8edcabb4704656a7abe6352c08f"},{"reference_url":"https://jira.spring.io/browse/DATAJPA-965","reference_id":"","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://jira.spring.io/browse/DATAJPA-965"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-6652","reference_id":"","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-6652"},{"reference_url":"https://pivotal.io/security/cve-2016-6652","reference_id":"","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://pivotal.io/security/cve-2016-6652"},{"reference_url":"http://www.securityfocus.com/bid/93276","reference_id":"","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://www.securityfocus.com/bid/93276"},{"reference_url":"https://github.com/advisories/GHSA-xr4v-28rm-pvgw","reference_id":"GHSA-xr4v-28rm-pvgw","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"cvssv3.1_qr","scoring_elements":""}],"url":"https://github.com/advisories/GHSA-xr4v-28rm-pvgw"},{"reference_url":"https://security.gentoo.org/glsa/201701-01","reference_id":"GLSA-201701-01","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://security.gentoo.org/glsa/201701-01"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/75770?format=json","purl":"pkg:ebuild/dev-db/mariadb@10.0.28","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mariadb@10.0.28"}],"aliases":["CVE-2016-6652","GHSA-xr4v-28rm-pvgw"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-tdbv-p3up-vfgv"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41738?format=json","vulnerability_id":"VCID-teh5-9459-p7a8","summary":"Multiple vulnerabilities have been found in MariaDB and MySQL, the\n    worst of which could lead to the remote execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5634.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5634.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-5634","reference_id":"","reference_type":"","scores":[{"value":"0.01417","scoring_system":"epss","scoring_elements":"0.80514","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01417","scoring_system":"epss","scoring_elements":"0.80706","published_at":"2026-05-09T12:55:00Z"},{"value":"0.01417","scoring_system":"epss","scoring_elements":"0.80631","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01417","scoring_system":"epss","scoring_elements":"0.80647","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01417","scoring_system":"epss","scoring_elements":"0.80664","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01417","scoring_system":"epss","scoring_elements":"0.80686","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01417","scoring_system":"epss","scoring_elements":"0.80521","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01417","scoring_system":"epss","scoring_elements":"0.80543","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01417","scoring_system":"epss","scoring_elements":"0.80535","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01417","scoring_system":"epss","scoring_elements":"0.80564","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01417","scoring_system":"epss","scoring_elements":"0.80574","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01417","scoring_system":"epss","scoring_elements":"0.80591","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01417","scoring_system":"epss","scoring_elements":"0.80577","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01417","scoring_system":"epss","scoring_elements":"0.80569","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01417","scoring_system":"epss","scoring_elements":"0.80598","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01417","scoring_system":"epss","scoring_elements":"0.806","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01417","scoring_system":"epss","scoring_elements":"0.80603","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01417","scoring_system":"epss","scoring_elements":"0.80628","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-5634"},{"reference_url":"http://www.securitytracker.com/id/1037050","reference_id":"1037050","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:27Z/"}],"url":"http://www.securitytracker.com/id/1037050"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1386579","reference_id":"1386579","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1386579"},{"reference_url":"http://www.securityfocus.com/bid/93709","reference_id":"93709","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:27Z/"}],"url":"http://www.securityfocus.com/bid/93709"},{"reference_url":"https://security.gentoo.org/glsa/201701-01","reference_id":"GLSA-201701-01","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:27Z/"}],"url":"https://security.gentoo.org/glsa/201701-01"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/75770?format=json","purl":"pkg:ebuild/dev-db/mariadb@10.0.28","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mariadb@10.0.28"}],"aliases":["CVE-2016-5634"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-teh5-9459-p7a8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41729?format=json","vulnerability_id":"VCID-tvdv-3ed5-h3dt","summary":"Multiple vulnerabilities have been found in MariaDB and MySQL, the\n    worst of which could lead to the remote execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5626.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5626.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-5626","reference_id":"","reference_type":"","scores":[{"value":"0.00369","scoring_system":"epss","scoring_elements":"0.58866","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00369","scoring_system":"epss","scoring_elements":"0.58702","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00369","scoring_system":"epss","scoring_elements":"0.58824","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00369","scoring_system":"epss","scoring_elements":"0.58842","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00369","scoring_system":"epss","scoring_elements":"0.58805","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00369","scoring_system":"epss","scoring_elements":"0.58837","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00369","scoring_system":"epss","scoring_elements":"0.58811","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00369","scoring_system":"epss","scoring_elements":"0.58796","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00369","scoring_system":"epss","scoring_elements":"0.58763","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00369","scoring_system":"epss","scoring_elements":"0.58807","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00369","scoring_system":"epss","scoring_elements":"0.58776","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00369","scoring_system":"epss","scoring_elements":"0.58797","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00369","scoring_system":"epss","scoring_elements":"0.58766","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00369","scoring_system":"epss","scoring_elements":"0.58818","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-5626"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3492","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3492"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5584","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5584"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5624","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5624"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5626","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5626"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5629","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5629"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6663","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6663"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7440","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7440"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8283","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8283"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:S/C:N/I:N/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.securitytracker.com/id/1037050","reference_id":"1037050","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:36Z/"}],"url":"http://www.securitytracker.com/id/1037050"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1386568","reference_id":"1386568","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1386568"},{"reference_url":"http://www.securityfocus.com/bid/93638","reference_id":"93638","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:36Z/"}],"url":"http://www.securityfocus.com/bid/93638"},{"reference_url":"https://security.gentoo.org/glsa/201701-01","reference_id":"GLSA-201701-01","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:36Z/"}],"url":"https://security.gentoo.org/glsa/201701-01"},{"reference_url":"https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/","reference_id":"mariadb-10028-release-notes","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:36Z/"}],"url":"https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/"},{"reference_url":"https://mariadb.com/kb/en/mariadb/mariadb-10118-release-notes/","reference_id":"mariadb-10118-release-notes","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:36Z/"}],"url":"https://mariadb.com/kb/en/mariadb/mariadb-10118-release-notes/"},{"reference_url":"https://mariadb.com/kb/en/mariadb/mariadb-5552-release-notes/","reference_id":"mariadb-5552-release-notes","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:36Z/"}],"url":"https://mariadb.com/kb/en/mariadb/mariadb-5552-release-notes/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2130","reference_id":"RHSA-2016:2130","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2130"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-2130.html","reference_id":"RHSA-2016-2130.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:36Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-2130.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2131","reference_id":"RHSA-2016:2131","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2131"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-2131.html","reference_id":"RHSA-2016-2131.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:36Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-2131.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2595","reference_id":"RHSA-2016:2595","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2595"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-2595.html","reference_id":"RHSA-2016-2595.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:36Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-2595.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2749","reference_id":"RHSA-2016:2749","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2749"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-2749.html","reference_id":"RHSA-2016-2749.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:36Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-2749.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2927","reference_id":"RHSA-2016:2927","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2927"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2928","reference_id":"RHSA-2016:2928","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2928"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/75770?format=json","purl":"pkg:ebuild/dev-db/mariadb@10.0.28","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mariadb@10.0.28"}],"aliases":["CVE-2016-5626"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-tvdv-3ed5-h3dt"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41741?format=json","vulnerability_id":"VCID-vh5y-15tw-d7fd","summary":"Multiple vulnerabilities have been found in MariaDB and MySQL, the\n    worst of which could lead to the remote execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8283.json","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8283.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-8283","reference_id":"","reference_type":"","scores":[{"value":"0.00361","scoring_system":"epss","scoring_elements":"0.58297","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00361","scoring_system":"epss","scoring_elements":"0.58144","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00361","scoring_system":"epss","scoring_elements":"0.58258","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00361","scoring_system":"epss","scoring_elements":"0.5829","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00361","scoring_system":"epss","scoring_elements":"0.58292","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00361","scoring_system":"epss","scoring_elements":"0.58269","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00361","scoring_system":"epss","scoring_elements":"0.58231","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00361","scoring_system":"epss","scoring_elements":"0.58244","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00361","scoring_system":"epss","scoring_elements":"0.5823","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00361","scoring_system":"epss","scoring_elements":"0.58195","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00361","scoring_system":"epss","scoring_elements":"0.58236","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00361","scoring_system":"epss","scoring_elements":"0.58229","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00361","scoring_system":"epss","scoring_elements":"0.58249","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00361","scoring_system":"epss","scoring_elements":"0.58223","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00361","scoring_system":"epss","scoring_elements":"0.58277","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00361","scoring_system":"epss","scoring_elements":"0.58283","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00361","scoring_system":"epss","scoring_elements":"0.583","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00361","scoring_system":"epss","scoring_elements":"0.58278","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-8283"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3492","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3492"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5584","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5584"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5624","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5624"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5626","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5626"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5629","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5629"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6663","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6663"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7440","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7440"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8283","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8283"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:S/C:N/I:N/A:P"},{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.securitytracker.com/id/1037050","reference_id":"1037050","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:22Z/"}],"url":"http://www.securitytracker.com/id/1037050"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1386585","reference_id":"1386585","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1386585"},{"reference_url":"http://www.securityfocus.com/bid/93737","reference_id":"93737","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:22Z/"}],"url":"http://www.securityfocus.com/bid/93737"},{"reference_url":"https://security.gentoo.org/glsa/201701-01","reference_id":"GLSA-201701-01","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:22Z/"}],"url":"https://security.gentoo.org/glsa/201701-01"},{"reference_url":"https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/","reference_id":"mariadb-10028-release-notes","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:22Z/"}],"url":"https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/"},{"reference_url":"https://mariadb.com/kb/en/mariadb/mariadb-10118-release-notes/","reference_id":"mariadb-10118-release-notes","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:22Z/"}],"url":"https://mariadb.com/kb/en/mariadb/mariadb-10118-release-notes/"},{"reference_url":"https://mariadb.com/kb/en/mariadb/mariadb-5552-release-notes/","reference_id":"mariadb-5552-release-notes","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:22Z/"}],"url":"https://mariadb.com/kb/en/mariadb/mariadb-5552-release-notes/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2130","reference_id":"RHSA-2016:2130","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2130"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-2130.html","reference_id":"RHSA-2016-2130.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:22Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-2130.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2131","reference_id":"RHSA-2016:2131","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2131"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-2131.html","reference_id":"RHSA-2016-2131.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:22Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-2131.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2595","reference_id":"RHSA-2016:2595","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2595"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-2595.html","reference_id":"RHSA-2016-2595.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:22Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-2595.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2749","reference_id":"RHSA-2016:2749","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2749"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-2749.html","reference_id":"RHSA-2016-2749.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:22Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-2749.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2927","reference_id":"RHSA-2016:2927","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2927"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2928","reference_id":"RHSA-2016:2928","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2928"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/75770?format=json","purl":"pkg:ebuild/dev-db/mariadb@10.0.28","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mariadb@10.0.28"}],"aliases":["CVE-2016-8283"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-vh5y-15tw-d7fd"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41742?format=json","vulnerability_id":"VCID-wnpa-9f9q-dfbs","summary":"Multiple vulnerabilities have been found in MariaDB and MySQL, the\n    worst of which could lead to the remote execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8284.json","reference_id":"","reference_type":"","scores":[{"value":"1.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:H/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8284.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-8284","reference_id":"","reference_type":"","scores":[{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20666","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20822","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20648","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20614","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20507","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20578","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20972","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.2103","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20745","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20823","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20884","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.209","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20856","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20804","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20794","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20786","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20771","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20652","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-8284"},{"reference_url":"http://www.securitytracker.com/id/1037050","reference_id":"1037050","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:21Z/"}],"url":"http://www.securitytracker.com/id/1037050"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1386587","reference_id":"1386587","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1386587"},{"reference_url":"http://www.securityfocus.com/bid/93755","reference_id":"93755","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:21Z/"}],"url":"http://www.securityfocus.com/bid/93755"},{"reference_url":"https://security.gentoo.org/glsa/201701-01","reference_id":"GLSA-201701-01","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:21Z/"}],"url":"https://security.gentoo.org/glsa/201701-01"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1601","reference_id":"RHSA-2016:1601","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1601"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/75770?format=json","purl":"pkg:ebuild/dev-db/mariadb@10.0.28","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mariadb@10.0.28"}],"aliases":["CVE-2016-8284"],"risk_score":0.8,"exploitability":"0.5","weighted_severity":"1.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-wnpa-9f9q-dfbs"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41731?format=json","vulnerability_id":"VCID-zyjr-6hy7-k7ax","summary":"Multiple vulnerabilities have been found in MariaDB and MySQL, the\n    worst of which could lead to the remote execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5628.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5628.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-5628","reference_id":"","reference_type":"","scores":[{"value":"0.02921","scoring_system":"epss","scoring_elements":"0.86329","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02921","scoring_system":"epss","scoring_elements":"0.86494","published_at":"2026-05-09T12:55:00Z"},{"value":"0.02921","scoring_system":"epss","scoring_elements":"0.86438","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02921","scoring_system":"epss","scoring_elements":"0.86435","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02921","scoring_system":"epss","scoring_elements":"0.86455","published_at":"2026-05-05T12:55:00Z"},{"value":"0.02921","scoring_system":"epss","scoring_elements":"0.86475","published_at":"2026-05-07T12:55:00Z"},{"value":"0.02921","scoring_system":"epss","scoring_elements":"0.86339","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02921","scoring_system":"epss","scoring_elements":"0.86357","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02921","scoring_system":"epss","scoring_elements":"0.86359","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02921","scoring_system":"epss","scoring_elements":"0.86377","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02921","scoring_system":"epss","scoring_elements":"0.86387","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02921","scoring_system":"epss","scoring_elements":"0.86401","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02921","scoring_system":"epss","scoring_elements":"0.86399","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02921","scoring_system":"epss","scoring_elements":"0.86394","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02921","scoring_system":"epss","scoring_elements":"0.8641","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02921","scoring_system":"epss","scoring_elements":"0.86415","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02921","scoring_system":"epss","scoring_elements":"0.86409","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02921","scoring_system":"epss","scoring_elements":"0.86428","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-5628"},{"reference_url":"http://www.securitytracker.com/id/1037050","reference_id":"1037050","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:34Z/"}],"url":"http://www.securitytracker.com/id/1037050"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1386571","reference_id":"1386571","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1386571"},{"reference_url":"http://www.securityfocus.com/bid/93662","reference_id":"93662","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:34Z/"}],"url":"http://www.securityfocus.com/bid/93662"},{"reference_url":"https://security.gentoo.org/glsa/201701-01","reference_id":"GLSA-201701-01","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:34Z/"}],"url":"https://security.gentoo.org/glsa/201701-01"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/75770?format=json","purl":"pkg:ebuild/dev-db/mariadb@10.0.28","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mariadb@10.0.28"}],"aliases":["CVE-2016-5628"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-zyjr-6hy7-k7ax"}],"risk_score":null,"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mariadb@10.0.28"}