Lookup for vulnerable packages by Package URL.

Purlpkg:rpm/redhat/rh-mariadb103-galera@25.3.31-1?arch=el7
Typerpm
Namespaceredhat
Namerh-mariadb103-galera
Version25.3.31-1
Qualifiers
arch el7
Subpath
Is_vulnerabletrue
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
0
url VCID-161c-myft-2ka7
vulnerability_id VCID-161c-myft-2ka7
summary mysql: Server: Replication unspecified vulnerability (CPU Apr 2019)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-2614.json
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-2614.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-2614
reference_id
reference_type
scores
0
value 0.00161
scoring_system epss
scoring_elements 0.36987
published_at 2026-04-21T12:55:00Z
1
value 0.00228
scoring_system epss
scoring_elements 0.45484
published_at 2026-04-01T12:55:00Z
2
value 0.00228
scoring_system epss
scoring_elements 0.45559
published_at 2026-04-02T12:55:00Z
3
value 0.00228
scoring_system epss
scoring_elements 0.45581
published_at 2026-04-04T12:55:00Z
4
value 0.00228
scoring_system epss
scoring_elements 0.4553
published_at 2026-04-07T12:55:00Z
5
value 0.00228
scoring_system epss
scoring_elements 0.45585
published_at 2026-04-09T12:55:00Z
6
value 0.00228
scoring_system epss
scoring_elements 0.45606
published_at 2026-04-11T12:55:00Z
7
value 0.00228
scoring_system epss
scoring_elements 0.45575
published_at 2026-04-12T12:55:00Z
8
value 0.00228
scoring_system epss
scoring_elements 0.45582
published_at 2026-04-13T12:55:00Z
9
value 0.00228
scoring_system epss
scoring_elements 0.4563
published_at 2026-04-16T12:55:00Z
10
value 0.00228
scoring_system epss
scoring_elements 0.45626
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-2614
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1702969
reference_id 1702969
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1702969
4
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/A55N3HZ3JZBXHQMGTUHY63FVTDU5ILEV/
reference_id A55N3HZ3JZBXHQMGTUHY63FVTDU5ILEV
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T14:00:44Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/A55N3HZ3JZBXHQMGTUHY63FVTDU5ILEV/
5
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CN3JPT5ICOAWQNPFVPVLLYR4TQIX4MXP/
reference_id CN3JPT5ICOAWQNPFVPVLLYR4TQIX4MXP
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T14:00:44Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CN3JPT5ICOAWQNPFVPVLLYR4TQIX4MXP/
6
reference_url https://support.f5.com/csp/article/K52514501
reference_id K52514501
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T14:00:44Z/
url https://support.f5.com/csp/article/K52514501
7
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00032.html
reference_id msg00032.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T14:00:44Z/
url http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00032.html
8
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00035.html
reference_id msg00035.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T14:00:44Z/
url http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00035.html
9
reference_url https://access.redhat.com/errata/RHSA-2019:2327
reference_id RHSA-2019:2327
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T14:00:44Z/
url https://access.redhat.com/errata/RHSA-2019:2327
10
reference_url https://access.redhat.com/errata/RHSA-2019:2484
reference_id RHSA-2019:2484
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T14:00:44Z/
url https://access.redhat.com/errata/RHSA-2019:2484
11
reference_url https://access.redhat.com/errata/RHSA-2019:2511
reference_id RHSA-2019:2511
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T14:00:44Z/
url https://access.redhat.com/errata/RHSA-2019:2511
12
reference_url https://access.redhat.com/errata/RHSA-2019:3708
reference_id RHSA-2019:3708
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T14:00:44Z/
url https://access.redhat.com/errata/RHSA-2019:3708
13
reference_url https://access.redhat.com/errata/RHSA-2020:4174
reference_id RHSA-2020:4174
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4174
14
reference_url https://access.redhat.com/errata/RHSA-2020:5246
reference_id RHSA-2020:5246
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5246
15
reference_url https://access.redhat.com/errata/RHSA-2020:5663
reference_id RHSA-2020:5663
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5663
16
reference_url https://usn.ubuntu.com/3957-1/
reference_id USN-3957-1
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T14:00:44Z/
url https://usn.ubuntu.com/3957-1/
17
reference_url https://usn.ubuntu.com/3957-2/
reference_id USN-3957-2
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T14:00:44Z/
url https://usn.ubuntu.com/3957-2/
18
reference_url https://usn.ubuntu.com/3957-3/
reference_id USN-3957-3
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T14:00:44Z/
url https://usn.ubuntu.com/3957-3/
19
reference_url https://usn.ubuntu.com/4070-3/
reference_id USN-4070-3
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T14:00:44Z/
url https://usn.ubuntu.com/4070-3/
fixed_packages
aliases CVE-2019-2614
risk_score 2.0
exploitability 0.5
weighted_severity 4.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-161c-myft-2ka7
1
url VCID-16hf-q2fp-3yg4
vulnerability_id VCID-16hf-q2fp-3yg4
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00037.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:06Z/
url http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00037.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-2974.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-2974.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-2974
reference_id
reference_type
scores
0
value 0.00208
scoring_system epss
scoring_elements 0.43162
published_at 2026-04-21T12:55:00Z
1
value 0.00208
scoring_system epss
scoring_elements 0.43116
published_at 2026-04-01T12:55:00Z
2
value 0.00208
scoring_system epss
scoring_elements 0.43174
published_at 2026-04-02T12:55:00Z
3
value 0.00208
scoring_system epss
scoring_elements 0.43202
published_at 2026-04-04T12:55:00Z
4
value 0.00208
scoring_system epss
scoring_elements 0.4314
published_at 2026-04-07T12:55:00Z
5
value 0.00208
scoring_system epss
scoring_elements 0.43192
published_at 2026-04-12T12:55:00Z
6
value 0.00208
scoring_system epss
scoring_elements 0.43204
published_at 2026-04-09T12:55:00Z
7
value 0.00208
scoring_system epss
scoring_elements 0.43225
published_at 2026-04-11T12:55:00Z
8
value 0.00208
scoring_system epss
scoring_elements 0.43177
published_at 2026-04-13T12:55:00Z
9
value 0.00208
scoring_system epss
scoring_elements 0.43237
published_at 2026-04-16T12:55:00Z
10
value 0.00208
scoring_system epss
scoring_elements 0.43226
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-2974
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6DTUCXX5XXPNPFV2PHP6IESGTCFMZOFP/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:06Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6DTUCXX5XXPNPFV2PHP6IESGTCFMZOFP/
5
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7X5D3O4TOQ57KL5FLQEXH2JB2UQYHCUZ/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:06Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7X5D3O4TOQ57KL5FLQEXH2JB2UQYHCUZ/
6
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MKCJLNRK6RHFAHV7ZFD3XO7HNSBU3XOL/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:06Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MKCJLNRK6RHFAHV7ZFD3XO7HNSBU3XOL/
7
reference_url https://security.netapp.com/advisory/ntap-20191017-0002/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:06Z/
url https://security.netapp.com/advisory/ntap-20191017-0002/
8
reference_url http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:06Z/
url http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1764691
reference_id 1764691
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1764691
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-2974
reference_id CVE-2019-2974
reference_type
scores
0
value 4.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:P
1
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2019-2974
21
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:06Z/
url https://security.gentoo.org/glsa/202105-27
22
reference_url https://security.gentoo.org/glsa/202405-25
reference_id GLSA-202405-25
reference_type
scores
url https://security.gentoo.org/glsa/202405-25
23
reference_url https://access.redhat.com/errata/RHSA-2020:3518
reference_id RHSA-2020:3518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3518
24
reference_url https://access.redhat.com/errata/RHSA-2020:3732
reference_id RHSA-2020:3732
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3732
25
reference_url https://access.redhat.com/errata/RHSA-2020:3755
reference_id RHSA-2020:3755
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3755
26
reference_url https://access.redhat.com/errata/RHSA-2020:3757
reference_id RHSA-2020:3757
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3757
27
reference_url https://access.redhat.com/errata/RHSA-2020:4026
reference_id RHSA-2020:4026
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4026
28
reference_url https://access.redhat.com/errata/RHSA-2020:4174
reference_id RHSA-2020:4174
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4174
29
reference_url https://access.redhat.com/errata/RHSA-2020:5246
reference_id RHSA-2020:5246
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5246
30
reference_url https://access.redhat.com/errata/RHSA-2020:5500
reference_id RHSA-2020:5500
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5500
31
reference_url https://access.redhat.com/errata/RHSA-2020:5654
reference_id RHSA-2020:5654
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5654
32
reference_url https://access.redhat.com/errata/RHSA-2020:5663
reference_id RHSA-2020:5663
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5663
33
reference_url https://access.redhat.com/errata/RHSA-2020:5665
reference_id RHSA-2020:5665
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5665
34
reference_url https://usn.ubuntu.com/4195-1/
reference_id USN-4195-1
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:06Z/
url https://usn.ubuntu.com/4195-1/
35
reference_url https://usn.ubuntu.com/4195-2/
reference_id USN-4195-2
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:06Z/
url https://usn.ubuntu.com/4195-2/
fixed_packages
aliases CVE-2019-2974
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-16hf-q2fp-3yg4
2
url VCID-2eev-6ekm-2ydm
vulnerability_id VCID-2eev-6ekm-2ydm
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00054.html
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:59Z/
url http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00054.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2760.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2760.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-2760
reference_id
reference_type
scores
0
value 0.00111
scoring_system epss
scoring_elements 0.29485
published_at 2026-04-21T12:55:00Z
1
value 0.00111
scoring_system epss
scoring_elements 0.29596
published_at 2026-04-08T12:55:00Z
2
value 0.00111
scoring_system epss
scoring_elements 0.29662
published_at 2026-04-02T12:55:00Z
3
value 0.00111
scoring_system epss
scoring_elements 0.29712
published_at 2026-04-04T12:55:00Z
4
value 0.00111
scoring_system epss
scoring_elements 0.29533
published_at 2026-04-07T12:55:00Z
5
value 0.00111
scoring_system epss
scoring_elements 0.29634
published_at 2026-04-09T12:55:00Z
6
value 0.00111
scoring_system epss
scoring_elements 0.29636
published_at 2026-04-11T12:55:00Z
7
value 0.00111
scoring_system epss
scoring_elements 0.29591
published_at 2026-04-12T12:55:00Z
8
value 0.00111
scoring_system epss
scoring_elements 0.29539
published_at 2026-04-13T12:55:00Z
9
value 0.00111
scoring_system epss
scoring_elements 0.29559
published_at 2026-04-16T12:55:00Z
10
value 0.00111
scoring_system epss
scoring_elements 0.29532
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-2760
3
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/77REFDB7DE4WNKQIRGZTF53RFBQOXQLC/
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:59Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/77REFDB7DE4WNKQIRGZTF53RFBQOXQLC/
4
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SDGBQYS3A36S4CAZPV5YROHYXYZR6LAH/
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:59Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SDGBQYS3A36S4CAZPV5YROHYXYZR6LAH/
5
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TSVLI36TYRTPQGCS24VZQUXCUFOUW4VQ/
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:59Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TSVLI36TYRTPQGCS24VZQUXCUFOUW4VQ/
6
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UW2ED32VEUHXFN2J3YQE27JIBV4SC2PI/
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:59Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UW2ED32VEUHXFN2J3YQE27JIBV4SC2PI/
7
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X4X2BMF3EILMTXGOZDTPYS3KT5VWLA2P/
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:59Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X4X2BMF3EILMTXGOZDTPYS3KT5VWLA2P/
8
reference_url https://security.netapp.com/advisory/ntap-20200416-0003/
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:59Z/
url https://security.netapp.com/advisory/ntap-20200416-0003/
9
reference_url https://www.oracle.com/security-alerts/cpuapr2020.html
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:59Z/
url https://www.oracle.com/security-alerts/cpuapr2020.html
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1830082
reference_id 1830082
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1830082
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
reference_id cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
reference_id cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/detail/CVE-2020-2760
reference_id CVE-2020-2760
reference_type
scores
0
value 5.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:P/A:P
1
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H
2
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2020-2760
27
reference_url https://security.gentoo.org/glsa/202012-08
reference_id GLSA-202012-08
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:59Z/
url https://security.gentoo.org/glsa/202012-08
28
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:59Z/
url https://security.gentoo.org/glsa/202105-27
29
reference_url https://access.redhat.com/errata/RHSA-2020:3518
reference_id RHSA-2020:3518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3518
30
reference_url https://access.redhat.com/errata/RHSA-2020:3732
reference_id RHSA-2020:3732
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3732
31
reference_url https://access.redhat.com/errata/RHSA-2020:3755
reference_id RHSA-2020:3755
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3755
32
reference_url https://access.redhat.com/errata/RHSA-2020:3757
reference_id RHSA-2020:3757
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3757
33
reference_url https://access.redhat.com/errata/RHSA-2020:4174
reference_id RHSA-2020:4174
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4174
34
reference_url https://access.redhat.com/errata/RHSA-2020:5246
reference_id RHSA-2020:5246
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5246
35
reference_url https://access.redhat.com/errata/RHSA-2020:5500
reference_id RHSA-2020:5500
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5500
36
reference_url https://access.redhat.com/errata/RHSA-2020:5654
reference_id RHSA-2020:5654
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5654
37
reference_url https://access.redhat.com/errata/RHSA-2020:5663
reference_id RHSA-2020:5663
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5663
38
reference_url https://access.redhat.com/errata/RHSA-2020:5665
reference_id RHSA-2020:5665
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5665
39
reference_url https://usn.ubuntu.com/4350-1/
reference_id USN-4350-1
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:59Z/
url https://usn.ubuntu.com/4350-1/
40
reference_url https://usn.ubuntu.com/4603-1/
reference_id USN-4603-1
reference_type
scores
url https://usn.ubuntu.com/4603-1/
fixed_packages
aliases CVE-2020-2760
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2eev-6ekm-2ydm
3
url VCID-372a-11r4-fyad
vulnerability_id VCID-372a-11r4-fyad
summary mysql: Server: Security: Privileges unspecified vulnerability (CPU Apr 2019)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-2627.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-2627.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-2627
reference_id
reference_type
scores
0
value 0.00165
scoring_system epss
scoring_elements 0.3746
published_at 2026-04-21T12:55:00Z
1
value 0.00171
scoring_system epss
scoring_elements 0.38472
published_at 2026-04-04T12:55:00Z
2
value 0.00171
scoring_system epss
scoring_elements 0.38387
published_at 2026-04-08T12:55:00Z
3
value 0.00171
scoring_system epss
scoring_elements 0.38395
published_at 2026-04-09T12:55:00Z
4
value 0.00171
scoring_system epss
scoring_elements 0.38411
published_at 2026-04-11T12:55:00Z
5
value 0.00171
scoring_system epss
scoring_elements 0.38373
published_at 2026-04-12T12:55:00Z
6
value 0.00171
scoring_system epss
scoring_elements 0.38349
published_at 2026-04-13T12:55:00Z
7
value 0.00171
scoring_system epss
scoring_elements 0.38396
published_at 2026-04-16T12:55:00Z
8
value 0.00171
scoring_system epss
scoring_elements 0.38375
published_at 2026-04-18T12:55:00Z
9
value 0.00171
scoring_system epss
scoring_elements 0.38447
published_at 2026-04-02T12:55:00Z
10
value 0.00171
scoring_system epss
scoring_elements 0.38311
published_at 2026-04-01T12:55:00Z
11
value 0.00171
scoring_system epss
scoring_elements 0.38336
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-2627
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1702976
reference_id 1702976
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1702976
4
reference_url https://support.f5.com/csp/article/K32798641
reference_id K32798641
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T14:00:31Z/
url https://support.f5.com/csp/article/K32798641
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00032.html
reference_id msg00032.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T14:00:31Z/
url http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00032.html
6
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00035.html
reference_id msg00035.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T14:00:31Z/
url http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00035.html
7
reference_url https://access.redhat.com/errata/RHSA-2019:2327
reference_id RHSA-2019:2327
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T14:00:31Z/
url https://access.redhat.com/errata/RHSA-2019:2327
8
reference_url https://access.redhat.com/errata/RHSA-2019:2484
reference_id RHSA-2019:2484
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T14:00:31Z/
url https://access.redhat.com/errata/RHSA-2019:2484
9
reference_url https://access.redhat.com/errata/RHSA-2019:2511
reference_id RHSA-2019:2511
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T14:00:31Z/
url https://access.redhat.com/errata/RHSA-2019:2511
10
reference_url https://access.redhat.com/errata/RHSA-2019:3708
reference_id RHSA-2019:3708
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T14:00:31Z/
url https://access.redhat.com/errata/RHSA-2019:3708
11
reference_url https://access.redhat.com/errata/RHSA-2020:4174
reference_id RHSA-2020:4174
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4174
12
reference_url https://access.redhat.com/errata/RHSA-2020:5246
reference_id RHSA-2020:5246
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5246
13
reference_url https://access.redhat.com/errata/RHSA-2020:5663
reference_id RHSA-2020:5663
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5663
14
reference_url https://usn.ubuntu.com/3957-1/
reference_id USN-3957-1
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T14:00:31Z/
url https://usn.ubuntu.com/3957-1/
15
reference_url https://usn.ubuntu.com/3957-2/
reference_id USN-3957-2
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T14:00:31Z/
url https://usn.ubuntu.com/3957-2/
16
reference_url https://usn.ubuntu.com/3957-3/
reference_id USN-3957-3
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T14:00:31Z/
url https://usn.ubuntu.com/3957-3/
17
reference_url https://usn.ubuntu.com/4070-3/
reference_id USN-4070-3
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T14:00:31Z/
url https://usn.ubuntu.com/4070-3/
fixed_packages
aliases CVE-2019-2627
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-372a-11r4-fyad
4
url VCID-3h99-b8mf-rkcr
vulnerability_id VCID-3h99-b8mf-rkcr
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2922.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2922.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-2922
reference_id
reference_type
scores
0
value 0.00209
scoring_system epss
scoring_elements 0.43264
published_at 2026-04-01T12:55:00Z
1
value 0.00209
scoring_system epss
scoring_elements 0.43311
published_at 2026-04-21T12:55:00Z
2
value 0.00209
scoring_system epss
scoring_elements 0.4332
published_at 2026-04-02T12:55:00Z
3
value 0.00209
scoring_system epss
scoring_elements 0.43348
published_at 2026-04-04T12:55:00Z
4
value 0.00209
scoring_system epss
scoring_elements 0.43286
published_at 2026-04-07T12:55:00Z
5
value 0.00209
scoring_system epss
scoring_elements 0.43337
published_at 2026-04-08T12:55:00Z
6
value 0.00209
scoring_system epss
scoring_elements 0.43352
published_at 2026-04-09T12:55:00Z
7
value 0.00209
scoring_system epss
scoring_elements 0.43372
published_at 2026-04-11T12:55:00Z
8
value 0.00209
scoring_system epss
scoring_elements 0.43341
published_at 2026-04-12T12:55:00Z
9
value 0.00209
scoring_system epss
scoring_elements 0.43326
published_at 2026-04-13T12:55:00Z
10
value 0.00209
scoring_system epss
scoring_elements 0.43387
published_at 2026-04-16T12:55:00Z
11
value 0.00209
scoring_system epss
scoring_elements 0.43376
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-2922
2
reference_url https://security.netapp.com/advisory/ntap-20200416-0003/
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:01:08Z/
url https://security.netapp.com/advisory/ntap-20200416-0003/
3
reference_url https://www.oracle.com/security-alerts/cpuapr2020.html
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:01:08Z/
url https://www.oracle.com/security-alerts/cpuapr2020.html
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1835850
reference_id 1835850
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1835850
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
reference_id cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
reference_id cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*
16
reference_url https://nvd.nist.gov/vuln/detail/CVE-2020-2922
reference_id CVE-2020-2922
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:N/A:N
1
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
2
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2020-2922
17
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:01:08Z/
url https://security.gentoo.org/glsa/202105-27
18
reference_url https://access.redhat.com/errata/RHSA-2019:3708
reference_id RHSA-2019:3708
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3708
19
reference_url https://access.redhat.com/errata/RHSA-2020:1100
reference_id RHSA-2020:1100
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1100
20
reference_url https://access.redhat.com/errata/RHSA-2020:3518
reference_id RHSA-2020:3518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3518
21
reference_url https://access.redhat.com/errata/RHSA-2020:3732
reference_id RHSA-2020:3732
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3732
22
reference_url https://access.redhat.com/errata/RHSA-2020:3755
reference_id RHSA-2020:3755
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3755
23
reference_url https://access.redhat.com/errata/RHSA-2020:3757
reference_id RHSA-2020:3757
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3757
24
reference_url https://access.redhat.com/errata/RHSA-2020:4174
reference_id RHSA-2020:4174
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4174
25
reference_url https://access.redhat.com/errata/RHSA-2020:5246
reference_id RHSA-2020:5246
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5246
26
reference_url https://access.redhat.com/errata/RHSA-2020:5503
reference_id RHSA-2020:5503
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5503
27
reference_url https://access.redhat.com/errata/RHSA-2020:5655
reference_id RHSA-2020:5655
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5655
28
reference_url https://access.redhat.com/errata/RHSA-2020:5660
reference_id RHSA-2020:5660
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5660
29
reference_url https://access.redhat.com/errata/RHSA-2020:5662
reference_id RHSA-2020:5662
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5662
30
reference_url https://access.redhat.com/errata/RHSA-2020:5663
reference_id RHSA-2020:5663
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5663
31
reference_url https://usn.ubuntu.com/4350-1/
reference_id USN-4350-1
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:01:08Z/
url https://usn.ubuntu.com/4350-1/
fixed_packages
aliases CVE-2020-2922
risk_score 1.9
exploitability 0.5
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3h99-b8mf-rkcr
5
url VCID-4msq-13an-d7cb
vulnerability_id VCID-4msq-13an-d7cb
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14789.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14789.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-14789
reference_id
reference_type
scores
0
value 0.00968
scoring_system epss
scoring_elements 0.76541
published_at 2026-04-01T12:55:00Z
1
value 0.00968
scoring_system epss
scoring_elements 0.76546
published_at 2026-04-02T12:55:00Z
2
value 0.00968
scoring_system epss
scoring_elements 0.76628
published_at 2026-04-21T12:55:00Z
3
value 0.00968
scoring_system epss
scoring_elements 0.76574
published_at 2026-04-04T12:55:00Z
4
value 0.00968
scoring_system epss
scoring_elements 0.76555
published_at 2026-04-07T12:55:00Z
5
value 0.00968
scoring_system epss
scoring_elements 0.76587
published_at 2026-04-08T12:55:00Z
6
value 0.00968
scoring_system epss
scoring_elements 0.76598
published_at 2026-04-09T12:55:00Z
7
value 0.00968
scoring_system epss
scoring_elements 0.76624
published_at 2026-04-11T12:55:00Z
8
value 0.00968
scoring_system epss
scoring_elements 0.76604
published_at 2026-04-12T12:55:00Z
9
value 0.00968
scoring_system epss
scoring_elements 0.76594
published_at 2026-04-13T12:55:00Z
10
value 0.00968
scoring_system epss
scoring_elements 0.76636
published_at 2026-04-16T12:55:00Z
11
value 0.00968
scoring_system epss
scoring_elements 0.7664
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-14789
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14789
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14789
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1890747
reference_id 1890747
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1890747
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623
reference_id 972623
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623
6
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:31Z/
url https://security.gentoo.org/glsa/202105-27
7
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR/
reference_id GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:31Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR/
8
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JBZZ3XIRPFPAWBZLYBN777ANXSFXAPPB/
reference_id JBZZ3XIRPFPAWBZLYBN777ANXSFXAPPB
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:31Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JBZZ3XIRPFPAWBZLYBN777ANXSFXAPPB/
9
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4/
reference_id O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:31Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4/
10
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OPW5YMZR5C7D7NBZQSTDOB3XAI5QP32Y/
reference_id OPW5YMZR5C7D7NBZQSTDOB3XAI5QP32Y
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:31Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OPW5YMZR5C7D7NBZQSTDOB3XAI5QP32Y/
11
reference_url https://access.redhat.com/errata/RHSA-2020:5246
reference_id RHSA-2020:5246
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5246
12
reference_url https://access.redhat.com/errata/RHSA-2020:5500
reference_id RHSA-2020:5500
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5500
13
reference_url https://access.redhat.com/errata/RHSA-2020:5654
reference_id RHSA-2020:5654
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5654
14
reference_url https://access.redhat.com/errata/RHSA-2020:5663
reference_id RHSA-2020:5663
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5663
15
reference_url https://access.redhat.com/errata/RHSA-2020:5665
reference_id RHSA-2020:5665
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5665
16
reference_url https://access.redhat.com/errata/RHSA-2021:3590
reference_id RHSA-2021:3590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3590
17
reference_url https://access.redhat.com/errata/RHSA-2021:3811
reference_id RHSA-2021:3811
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3811
18
reference_url https://usn.ubuntu.com/4604-1/
reference_id USN-4604-1
reference_type
scores
url https://usn.ubuntu.com/4604-1/
19
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6/
reference_id ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:31Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6/
fixed_packages
aliases CVE-2020-14789
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4msq-13an-d7cb
6
url VCID-5sgr-q6mn-u7gq
vulnerability_id VCID-5sgr-q6mn-u7gq
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14776.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14776.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-14776
reference_id
reference_type
scores
0
value 0.00968
scoring_system epss
scoring_elements 0.76541
published_at 2026-04-01T12:55:00Z
1
value 0.00968
scoring_system epss
scoring_elements 0.76546
published_at 2026-04-02T12:55:00Z
2
value 0.00968
scoring_system epss
scoring_elements 0.76628
published_at 2026-04-21T12:55:00Z
3
value 0.00968
scoring_system epss
scoring_elements 0.76574
published_at 2026-04-04T12:55:00Z
4
value 0.00968
scoring_system epss
scoring_elements 0.76555
published_at 2026-04-07T12:55:00Z
5
value 0.00968
scoring_system epss
scoring_elements 0.76587
published_at 2026-04-08T12:55:00Z
6
value 0.00968
scoring_system epss
scoring_elements 0.76598
published_at 2026-04-09T12:55:00Z
7
value 0.00968
scoring_system epss
scoring_elements 0.76624
published_at 2026-04-11T12:55:00Z
8
value 0.00968
scoring_system epss
scoring_elements 0.76604
published_at 2026-04-12T12:55:00Z
9
value 0.00968
scoring_system epss
scoring_elements 0.76594
published_at 2026-04-13T12:55:00Z
10
value 0.00968
scoring_system epss
scoring_elements 0.76636
published_at 2026-04-16T12:55:00Z
11
value 0.00968
scoring_system epss
scoring_elements 0.7664
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-14776
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14776
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14776
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1890743
reference_id 1890743
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1890743
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623
reference_id 972623
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623
6
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:48Z/
url https://security.gentoo.org/glsa/202105-27
7
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR/
reference_id GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:48Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR/
8
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JBZZ3XIRPFPAWBZLYBN777ANXSFXAPPB/
reference_id JBZZ3XIRPFPAWBZLYBN777ANXSFXAPPB
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:48Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JBZZ3XIRPFPAWBZLYBN777ANXSFXAPPB/
9
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4/
reference_id O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:48Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4/
10
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OPW5YMZR5C7D7NBZQSTDOB3XAI5QP32Y/
reference_id OPW5YMZR5C7D7NBZQSTDOB3XAI5QP32Y
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:48Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OPW5YMZR5C7D7NBZQSTDOB3XAI5QP32Y/
11
reference_url https://access.redhat.com/errata/RHSA-2020:5246
reference_id RHSA-2020:5246
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5246
12
reference_url https://access.redhat.com/errata/RHSA-2020:5500
reference_id RHSA-2020:5500
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5500
13
reference_url https://access.redhat.com/errata/RHSA-2020:5654
reference_id RHSA-2020:5654
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5654
14
reference_url https://access.redhat.com/errata/RHSA-2020:5663
reference_id RHSA-2020:5663
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5663
15
reference_url https://access.redhat.com/errata/RHSA-2020:5665
reference_id RHSA-2020:5665
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5665
16
reference_url https://access.redhat.com/errata/RHSA-2021:3590
reference_id RHSA-2021:3590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3590
17
reference_url https://access.redhat.com/errata/RHSA-2021:3811
reference_id RHSA-2021:3811
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3811
18
reference_url https://usn.ubuntu.com/4604-1/
reference_id USN-4604-1
reference_type
scores
url https://usn.ubuntu.com/4604-1/
19
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6/
reference_id ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:48Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6/
fixed_packages
aliases CVE-2020-14776
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5sgr-q6mn-u7gq
7
url VCID-6b9f-dtxh-gud7
vulnerability_id VCID-6b9f-dtxh-gud7
summary mysql: Server: Parser unspecified vulnerability (CPU Jul 2019)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-2805.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-2805.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-2805
reference_id
reference_type
scores
0
value 0.00484
scoring_system epss
scoring_elements 0.65302
published_at 2026-04-18T12:55:00Z
1
value 0.00484
scoring_system epss
scoring_elements 0.65175
published_at 2026-04-01T12:55:00Z
2
value 0.00484
scoring_system epss
scoring_elements 0.65225
published_at 2026-04-02T12:55:00Z
3
value 0.00484
scoring_system epss
scoring_elements 0.65251
published_at 2026-04-04T12:55:00Z
4
value 0.00484
scoring_system epss
scoring_elements 0.65217
published_at 2026-04-07T12:55:00Z
5
value 0.00484
scoring_system epss
scoring_elements 0.65267
published_at 2026-04-08T12:55:00Z
6
value 0.00484
scoring_system epss
scoring_elements 0.65279
published_at 2026-04-09T12:55:00Z
7
value 0.00484
scoring_system epss
scoring_elements 0.65298
published_at 2026-04-11T12:55:00Z
8
value 0.00484
scoring_system epss
scoring_elements 0.65285
published_at 2026-04-21T12:55:00Z
9
value 0.00484
scoring_system epss
scoring_elements 0.65257
published_at 2026-04-13T12:55:00Z
10
value 0.00484
scoring_system epss
scoring_elements 0.65292
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-2805
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://seclists.org/bugtraq/2019/Aug/1
reference_id 1
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:17:09Z/
url https://seclists.org/bugtraq/2019/Aug/1
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1732025
reference_id 1732025
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1732025
5
reference_url http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
reference_id cpujul2019-5072835.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:17:09Z/
url http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
6
reference_url https://support.f5.com/csp/article/K04831884
reference_id K04831884
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:17:09Z/
url https://support.f5.com/csp/article/K04831884
7
reference_url https://support.f5.com/csp/article/K04831884?utm_source=f5support&amp%3Butm_medium=RSS
reference_id K04831884?utm_source=f5support&amp%3Butm_medium=RSS
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:17:09Z/
url https://support.f5.com/csp/article/K04831884?utm_source=f5support&amp%3Butm_medium=RSS
8
reference_url https://access.redhat.com/errata/RHSA-2019:2484
reference_id RHSA-2019:2484
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:17:09Z/
url https://access.redhat.com/errata/RHSA-2019:2484
9
reference_url https://access.redhat.com/errata/RHSA-2019:2511
reference_id RHSA-2019:2511
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:17:09Z/
url https://access.redhat.com/errata/RHSA-2019:2511
10
reference_url https://access.redhat.com/errata/RHSA-2019:3708
reference_id RHSA-2019:3708
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:17:09Z/
url https://access.redhat.com/errata/RHSA-2019:3708
11
reference_url https://access.redhat.com/errata/RHSA-2020:1100
reference_id RHSA-2020:1100
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1100
12
reference_url https://access.redhat.com/errata/RHSA-2020:4174
reference_id RHSA-2020:4174
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4174
13
reference_url https://access.redhat.com/errata/RHSA-2020:5246
reference_id RHSA-2020:5246
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5246
14
reference_url https://access.redhat.com/errata/RHSA-2020:5663
reference_id RHSA-2020:5663
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5663
15
reference_url http://packetstormsecurity.com/files/153862/Slackware-Security-Advisory-mariadb-Updates.html
reference_id Slackware-Security-Advisory-mariadb-Updates.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:17:09Z/
url http://packetstormsecurity.com/files/153862/Slackware-Security-Advisory-mariadb-Updates.html
16
reference_url https://usn.ubuntu.com/4070-1/
reference_id USN-4070-1
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:17:09Z/
url https://usn.ubuntu.com/4070-1/
17
reference_url https://usn.ubuntu.com/4070-2/
reference_id USN-4070-2
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:17:09Z/
url https://usn.ubuntu.com/4070-2/
18
reference_url https://usn.ubuntu.com/4070-3/
reference_id USN-4070-3
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:17:09Z/
url https://usn.ubuntu.com/4070-3/
fixed_packages
aliases CVE-2019-2805
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6b9f-dtxh-gud7
8
url VCID-6du1-tzth-k3ht
vulnerability_id VCID-6du1-tzth-k3ht
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00054.html
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:04:05Z/
url http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00054.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2812.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2812.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-2812
reference_id
reference_type
scores
0
value 0.00122
scoring_system epss
scoring_elements 0.31334
published_at 2026-04-21T12:55:00Z
1
value 0.00122
scoring_system epss
scoring_elements 0.31344
published_at 2026-04-01T12:55:00Z
2
value 0.00122
scoring_system epss
scoring_elements 0.31483
published_at 2026-04-02T12:55:00Z
3
value 0.00122
scoring_system epss
scoring_elements 0.31525
published_at 2026-04-04T12:55:00Z
4
value 0.00122
scoring_system epss
scoring_elements 0.31343
published_at 2026-04-07T12:55:00Z
5
value 0.00122
scoring_system epss
scoring_elements 0.31396
published_at 2026-04-08T12:55:00Z
6
value 0.00122
scoring_system epss
scoring_elements 0.31427
published_at 2026-04-09T12:55:00Z
7
value 0.00122
scoring_system epss
scoring_elements 0.3143
published_at 2026-04-11T12:55:00Z
8
value 0.00122
scoring_system epss
scoring_elements 0.31387
published_at 2026-04-12T12:55:00Z
9
value 0.00122
scoring_system epss
scoring_elements 0.3135
published_at 2026-04-13T12:55:00Z
10
value 0.00122
scoring_system epss
scoring_elements 0.31383
published_at 2026-04-16T12:55:00Z
11
value 0.00122
scoring_system epss
scoring_elements 0.31363
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-2812
3
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/77REFDB7DE4WNKQIRGZTF53RFBQOXQLC/
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:04:05Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/77REFDB7DE4WNKQIRGZTF53RFBQOXQLC/
4
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SDGBQYS3A36S4CAZPV5YROHYXYZR6LAH/
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:04:05Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SDGBQYS3A36S4CAZPV5YROHYXYZR6LAH/
5
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TSVLI36TYRTPQGCS24VZQUXCUFOUW4VQ/
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:04:05Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TSVLI36TYRTPQGCS24VZQUXCUFOUW4VQ/
6
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UW2ED32VEUHXFN2J3YQE27JIBV4SC2PI/
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:04:05Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UW2ED32VEUHXFN2J3YQE27JIBV4SC2PI/
7
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X4X2BMF3EILMTXGOZDTPYS3KT5VWLA2P/
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:04:05Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X4X2BMF3EILMTXGOZDTPYS3KT5VWLA2P/
8
reference_url https://security.netapp.com/advisory/ntap-20200416-0003/
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:04:05Z/
url https://security.netapp.com/advisory/ntap-20200416-0003/
9
reference_url https://www.oracle.com/security-alerts/cpuapr2020.html
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:04:05Z/
url https://www.oracle.com/security-alerts/cpuapr2020.html
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1830059
reference_id 1830059
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1830059
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vsphere:*:*
reference_id cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vsphere:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vsphere:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
reference_id cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/detail/CVE-2020-2812
reference_id CVE-2020-2812
reference_type
scores
0
value 4.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:P
1
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
2
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2020-2812
29
reference_url https://security.gentoo.org/glsa/202012-08
reference_id GLSA-202012-08
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:04:05Z/
url https://security.gentoo.org/glsa/202012-08
30
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:04:05Z/
url https://security.gentoo.org/glsa/202105-27
31
reference_url https://access.redhat.com/errata/RHSA-2020:3518
reference_id RHSA-2020:3518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3518
32
reference_url https://access.redhat.com/errata/RHSA-2020:3732
reference_id RHSA-2020:3732
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3732
33
reference_url https://access.redhat.com/errata/RHSA-2020:3755
reference_id RHSA-2020:3755
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3755
34
reference_url https://access.redhat.com/errata/RHSA-2020:3757
reference_id RHSA-2020:3757
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3757
35
reference_url https://access.redhat.com/errata/RHSA-2020:4026
reference_id RHSA-2020:4026
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4026
36
reference_url https://access.redhat.com/errata/RHSA-2020:4174
reference_id RHSA-2020:4174
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4174
37
reference_url https://access.redhat.com/errata/RHSA-2020:5246
reference_id RHSA-2020:5246
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5246
38
reference_url https://access.redhat.com/errata/RHSA-2020:5500
reference_id RHSA-2020:5500
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5500
39
reference_url https://access.redhat.com/errata/RHSA-2020:5654
reference_id RHSA-2020:5654
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5654
40
reference_url https://access.redhat.com/errata/RHSA-2020:5663
reference_id RHSA-2020:5663
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5663
41
reference_url https://access.redhat.com/errata/RHSA-2020:5665
reference_id RHSA-2020:5665
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5665
42
reference_url https://usn.ubuntu.com/4350-1/
reference_id USN-4350-1
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:04:05Z/
url https://usn.ubuntu.com/4350-1/
43
reference_url https://usn.ubuntu.com/4603-1/
reference_id USN-4603-1
reference_type
scores
url https://usn.ubuntu.com/4603-1/
fixed_packages
aliases CVE-2020-2812
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6du1-tzth-k3ht
9
url VCID-8wpp-suz5-jbam
vulnerability_id VCID-8wpp-suz5-jbam
summary mysql: Server: Pluggable Auth unspecified vulnerability (CPU Jul 2019)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-2737.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-2737.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-2737
reference_id
reference_type
scores
0
value 0.00204
scoring_system epss
scoring_elements 0.42422
published_at 2026-04-21T12:55:00Z
1
value 0.00204
scoring_system epss
scoring_elements 0.42415
published_at 2026-04-01T12:55:00Z
2
value 0.00204
scoring_system epss
scoring_elements 0.42486
published_at 2026-04-02T12:55:00Z
3
value 0.00204
scoring_system epss
scoring_elements 0.42514
published_at 2026-04-04T12:55:00Z
4
value 0.00204
scoring_system epss
scoring_elements 0.42452
published_at 2026-04-07T12:55:00Z
5
value 0.00204
scoring_system epss
scoring_elements 0.42503
published_at 2026-04-08T12:55:00Z
6
value 0.00204
scoring_system epss
scoring_elements 0.42513
published_at 2026-04-09T12:55:00Z
7
value 0.00204
scoring_system epss
scoring_elements 0.42535
published_at 2026-04-11T12:55:00Z
8
value 0.00204
scoring_system epss
scoring_elements 0.42497
published_at 2026-04-12T12:55:00Z
9
value 0.00204
scoring_system epss
scoring_elements 0.42467
published_at 2026-04-13T12:55:00Z
10
value 0.00204
scoring_system epss
scoring_elements 0.42517
published_at 2026-04-16T12:55:00Z
11
value 0.00204
scoring_system epss
scoring_elements 0.42493
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-2737
2
reference_url https://seclists.org/bugtraq/2019/Aug/1
reference_id 1
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:18:30Z/
url https://seclists.org/bugtraq/2019/Aug/1
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1731997
reference_id 1731997
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1731997
4
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/A55N3HZ3JZBXHQMGTUHY63FVTDU5ILEV/
reference_id A55N3HZ3JZBXHQMGTUHY63FVTDU5ILEV
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:18:30Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/A55N3HZ3JZBXHQMGTUHY63FVTDU5ILEV/
5
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CN3JPT5ICOAWQNPFVPVLLYR4TQIX4MXP/
reference_id CN3JPT5ICOAWQNPFVPVLLYR4TQIX4MXP
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:18:30Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CN3JPT5ICOAWQNPFVPVLLYR4TQIX4MXP/
6
reference_url http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
reference_id cpujul2019-5072835.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:18:30Z/
url http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
7
reference_url https://support.f5.com/csp/article/K51272092
reference_id K51272092
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:18:30Z/
url https://support.f5.com/csp/article/K51272092
8
reference_url https://support.f5.com/csp/article/K51272092?utm_source=f5support&amp%3Butm_medium=RSS
reference_id K51272092?utm_source=f5support&amp%3Butm_medium=RSS
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:18:30Z/
url https://support.f5.com/csp/article/K51272092?utm_source=f5support&amp%3Butm_medium=RSS
9
reference_url https://access.redhat.com/errata/RHSA-2019:2484
reference_id RHSA-2019:2484
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:18:30Z/
url https://access.redhat.com/errata/RHSA-2019:2484
10
reference_url https://access.redhat.com/errata/RHSA-2019:2511
reference_id RHSA-2019:2511
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:18:30Z/
url https://access.redhat.com/errata/RHSA-2019:2511
11
reference_url https://access.redhat.com/errata/RHSA-2019:3708
reference_id RHSA-2019:3708
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:18:30Z/
url https://access.redhat.com/errata/RHSA-2019:3708
12
reference_url https://access.redhat.com/errata/RHSA-2020:1100
reference_id RHSA-2020:1100
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1100
13
reference_url https://access.redhat.com/errata/RHSA-2020:4174
reference_id RHSA-2020:4174
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4174
14
reference_url https://access.redhat.com/errata/RHSA-2020:5246
reference_id RHSA-2020:5246
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5246
15
reference_url https://access.redhat.com/errata/RHSA-2020:5663
reference_id RHSA-2020:5663
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5663
16
reference_url http://packetstormsecurity.com/files/153862/Slackware-Security-Advisory-mariadb-Updates.html
reference_id Slackware-Security-Advisory-mariadb-Updates.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:18:30Z/
url http://packetstormsecurity.com/files/153862/Slackware-Security-Advisory-mariadb-Updates.html
17
reference_url https://usn.ubuntu.com/4070-1/
reference_id USN-4070-1
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:18:30Z/
url https://usn.ubuntu.com/4070-1/
18
reference_url https://usn.ubuntu.com/4070-2/
reference_id USN-4070-2
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:18:30Z/
url https://usn.ubuntu.com/4070-2/
19
reference_url https://usn.ubuntu.com/4070-3/
reference_id USN-4070-3
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:18:30Z/
url https://usn.ubuntu.com/4070-3/
fixed_packages
aliases CVE-2019-2737
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8wpp-suz5-jbam
10
url VCID-9dt5-yek1-wfg9
vulnerability_id VCID-9dt5-yek1-wfg9
summary mysql: InnoDB unspecified vulnerability (CPU Apr 2021)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2194.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2194.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-2194
reference_id
reference_type
scores
0
value 0.0117
scoring_system epss
scoring_elements 0.78612
published_at 2026-04-01T12:55:00Z
1
value 0.0117
scoring_system epss
scoring_elements 0.78619
published_at 2026-04-02T12:55:00Z
2
value 0.0117
scoring_system epss
scoring_elements 0.78684
published_at 2026-04-21T12:55:00Z
3
value 0.0117
scoring_system epss
scoring_elements 0.78649
published_at 2026-04-04T12:55:00Z
4
value 0.0117
scoring_system epss
scoring_elements 0.7863
published_at 2026-04-07T12:55:00Z
5
value 0.0117
scoring_system epss
scoring_elements 0.78656
published_at 2026-04-08T12:55:00Z
6
value 0.0117
scoring_system epss
scoring_elements 0.78663
published_at 2026-04-09T12:55:00Z
7
value 0.0117
scoring_system epss
scoring_elements 0.78688
published_at 2026-04-11T12:55:00Z
8
value 0.0117
scoring_system epss
scoring_elements 0.78669
published_at 2026-04-12T12:55:00Z
9
value 0.0117
scoring_system epss
scoring_elements 0.78661
published_at 2026-04-13T12:55:00Z
10
value 0.0117
scoring_system epss
scoring_elements 0.7869
published_at 2026-04-16T12:55:00Z
11
value 0.0117
scoring_system epss
scoring_elements 0.78687
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-2194
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2194
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2194
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1951764
reference_id 1951764
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1951764
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325
reference_id 987325
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325
5
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AKV7TRUEQW6EV45RSZVVFLVQMNHVHBCJ/
reference_id AKV7TRUEQW6EV45RSZVVFLVQMNHVHBCJ
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:43:31Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AKV7TRUEQW6EV45RSZVVFLVQMNHVHBCJ/
6
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7/
reference_id JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:43:31Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7/
7
reference_url https://access.redhat.com/errata/RHSA-2020:5246
reference_id RHSA-2020:5246
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5246
8
reference_url https://access.redhat.com/errata/RHSA-2020:5500
reference_id RHSA-2020:5500
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5500
9
reference_url https://access.redhat.com/errata/RHSA-2020:5654
reference_id RHSA-2020:5654
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5654
10
reference_url https://access.redhat.com/errata/RHSA-2020:5663
reference_id RHSA-2020:5663
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5663
11
reference_url https://access.redhat.com/errata/RHSA-2020:5665
reference_id RHSA-2020:5665
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5665
12
reference_url https://access.redhat.com/errata/RHSA-2021:3590
reference_id RHSA-2021:3590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3590
13
reference_url https://access.redhat.com/errata/RHSA-2021:3811
reference_id RHSA-2021:3811
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3811
14
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UJVUTKKFQAWR7NURCQHQQ5JHTVYGEOYQ/
reference_id UJVUTKKFQAWR7NURCQHQQ5JHTVYGEOYQ
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:43:31Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UJVUTKKFQAWR7NURCQHQQ5JHTVYGEOYQ/
15
reference_url https://usn.ubuntu.com/4952-1/
reference_id USN-4952-1
reference_type
scores
url https://usn.ubuntu.com/4952-1/
16
reference_url https://usn.ubuntu.com/5022-3/
reference_id USN-5022-3
reference_type
scores
url https://usn.ubuntu.com/5022-3/
fixed_packages
aliases CVE-2021-2194
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9dt5-yek1-wfg9
11
url VCID-abbp-ymdk-3qhb
vulnerability_id VCID-abbp-ymdk-3qhb
summary mysql: InnoDB unspecified vulnerability (CPU Jul 2019)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-2758.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-2758.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-2758
reference_id
reference_type
scores
0
value 0.00428
scoring_system epss
scoring_elements 0.62482
published_at 2026-04-18T12:55:00Z
1
value 0.00428
scoring_system epss
scoring_elements 0.62326
published_at 2026-04-01T12:55:00Z
2
value 0.00428
scoring_system epss
scoring_elements 0.62384
published_at 2026-04-02T12:55:00Z
3
value 0.00428
scoring_system epss
scoring_elements 0.62414
published_at 2026-04-04T12:55:00Z
4
value 0.00428
scoring_system epss
scoring_elements 0.6238
published_at 2026-04-07T12:55:00Z
5
value 0.00428
scoring_system epss
scoring_elements 0.62428
published_at 2026-04-08T12:55:00Z
6
value 0.00428
scoring_system epss
scoring_elements 0.62445
published_at 2026-04-09T12:55:00Z
7
value 0.00428
scoring_system epss
scoring_elements 0.62465
published_at 2026-04-21T12:55:00Z
8
value 0.00428
scoring_system epss
scoring_elements 0.62454
published_at 2026-04-12T12:55:00Z
9
value 0.00428
scoring_system epss
scoring_elements 0.62432
published_at 2026-04-13T12:55:00Z
10
value 0.00428
scoring_system epss
scoring_elements 0.62476
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-2758
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1732008
reference_id 1732008
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1732008
4
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/A55N3HZ3JZBXHQMGTUHY63FVTDU5ILEV/
reference_id A55N3HZ3JZBXHQMGTUHY63FVTDU5ILEV
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:18:04Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/A55N3HZ3JZBXHQMGTUHY63FVTDU5ILEV/
5
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CN3JPT5ICOAWQNPFVPVLLYR4TQIX4MXP/
reference_id CN3JPT5ICOAWQNPFVPVLLYR4TQIX4MXP
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:18:04Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CN3JPT5ICOAWQNPFVPVLLYR4TQIX4MXP/
6
reference_url http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
reference_id cpujul2019-5072835.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:18:04Z/
url http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
7
reference_url https://support.f5.com/csp/article/K14118520
reference_id K14118520
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:18:04Z/
url https://support.f5.com/csp/article/K14118520
8
reference_url https://support.f5.com/csp/article/K14118520?utm_source=f5support&amp%3Butm_medium=RSS
reference_id K14118520?utm_source=f5support&amp%3Butm_medium=RSS
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:18:04Z/
url https://support.f5.com/csp/article/K14118520?utm_source=f5support&amp%3Butm_medium=RSS
9
reference_url https://access.redhat.com/errata/RHSA-2019:2484
reference_id RHSA-2019:2484
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:18:04Z/
url https://access.redhat.com/errata/RHSA-2019:2484
10
reference_url https://access.redhat.com/errata/RHSA-2019:2511
reference_id RHSA-2019:2511
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:18:04Z/
url https://access.redhat.com/errata/RHSA-2019:2511
11
reference_url https://access.redhat.com/errata/RHSA-2019:3708
reference_id RHSA-2019:3708
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:18:04Z/
url https://access.redhat.com/errata/RHSA-2019:3708
12
reference_url https://access.redhat.com/errata/RHSA-2020:4174
reference_id RHSA-2020:4174
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4174
13
reference_url https://access.redhat.com/errata/RHSA-2020:5246
reference_id RHSA-2020:5246
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5246
14
reference_url https://access.redhat.com/errata/RHSA-2020:5663
reference_id RHSA-2020:5663
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5663
15
reference_url https://usn.ubuntu.com/4070-1/
reference_id USN-4070-1
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:18:04Z/
url https://usn.ubuntu.com/4070-1/
16
reference_url https://usn.ubuntu.com/4070-3/
reference_id USN-4070-3
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:18:04Z/
url https://usn.ubuntu.com/4070-3/
fixed_packages
aliases CVE-2019-2758
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-abbp-ymdk-3qhb
12
url VCID-gkm2-f4yw-7bh6
vulnerability_id VCID-gkm2-f4yw-7bh6
summary mysql: Server: Parser unspecified vulnerability (CPU Apr 2021)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2144.json
reference_id
reference_type
scores
0
value 7.2
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2144.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-2144
reference_id
reference_type
scores
0
value 0.02717
scoring_system epss
scoring_elements 0.85858
published_at 2026-04-01T12:55:00Z
1
value 0.02717
scoring_system epss
scoring_elements 0.8587
published_at 2026-04-02T12:55:00Z
2
value 0.02717
scoring_system epss
scoring_elements 0.8594
published_at 2026-04-21T12:55:00Z
3
value 0.02717
scoring_system epss
scoring_elements 0.85932
published_at 2026-04-12T12:55:00Z
4
value 0.02717
scoring_system epss
scoring_elements 0.85926
published_at 2026-04-13T12:55:00Z
5
value 0.02717
scoring_system epss
scoring_elements 0.85945
published_at 2026-04-16T12:55:00Z
6
value 0.02717
scoring_system epss
scoring_elements 0.85949
published_at 2026-04-18T12:55:00Z
7
value 0.02717
scoring_system epss
scoring_elements 0.85887
published_at 2026-04-04T12:55:00Z
8
value 0.02717
scoring_system epss
scoring_elements 0.85891
published_at 2026-04-07T12:55:00Z
9
value 0.02717
scoring_system epss
scoring_elements 0.85909
published_at 2026-04-08T12:55:00Z
10
value 0.02717
scoring_system epss
scoring_elements 0.85919
published_at 2026-04-09T12:55:00Z
11
value 0.02717
scoring_system epss
scoring_elements 0.85934
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-2144
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1951749
reference_id 1951749
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1951749
3
reference_url https://access.redhat.com/errata/RHSA-2020:3518
reference_id RHSA-2020:3518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3518
4
reference_url https://access.redhat.com/errata/RHSA-2020:3732
reference_id RHSA-2020:3732
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3732
5
reference_url https://access.redhat.com/errata/RHSA-2020:3755
reference_id RHSA-2020:3755
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3755
6
reference_url https://access.redhat.com/errata/RHSA-2020:3757
reference_id RHSA-2020:3757
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3757
7
reference_url https://access.redhat.com/errata/RHSA-2020:4026
reference_id RHSA-2020:4026
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4026
8
reference_url https://access.redhat.com/errata/RHSA-2020:5246
reference_id RHSA-2020:5246
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5246
9
reference_url https://access.redhat.com/errata/RHSA-2020:5500
reference_id RHSA-2020:5500
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5500
10
reference_url https://access.redhat.com/errata/RHSA-2020:5654
reference_id RHSA-2020:5654
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5654
11
reference_url https://access.redhat.com/errata/RHSA-2020:5663
reference_id RHSA-2020:5663
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5663
12
reference_url https://access.redhat.com/errata/RHSA-2020:5665
reference_id RHSA-2020:5665
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5665
fixed_packages
aliases CVE-2021-2144
risk_score 3.2
exploitability 0.5
weighted_severity 6.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gkm2-f4yw-7bh6
13
url VCID-jrj5-82ey-3fhy
vulnerability_id VCID-jrj5-82ey-3fhy
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2780.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2780.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-2780
reference_id
reference_type
scores
0
value 0.00608
scoring_system epss
scoring_elements 0.69623
published_at 2026-04-01T12:55:00Z
1
value 0.00608
scoring_system epss
scoring_elements 0.69721
published_at 2026-04-21T12:55:00Z
2
value 0.00608
scoring_system epss
scoring_elements 0.69635
published_at 2026-04-02T12:55:00Z
3
value 0.00608
scoring_system epss
scoring_elements 0.69651
published_at 2026-04-04T12:55:00Z
4
value 0.00608
scoring_system epss
scoring_elements 0.69629
published_at 2026-04-07T12:55:00Z
5
value 0.00608
scoring_system epss
scoring_elements 0.6968
published_at 2026-04-08T12:55:00Z
6
value 0.00608
scoring_system epss
scoring_elements 0.69697
published_at 2026-04-09T12:55:00Z
7
value 0.00608
scoring_system epss
scoring_elements 0.69719
published_at 2026-04-11T12:55:00Z
8
value 0.00608
scoring_system epss
scoring_elements 0.69705
published_at 2026-04-12T12:55:00Z
9
value 0.00608
scoring_system epss
scoring_elements 0.69691
published_at 2026-04-13T12:55:00Z
10
value 0.00608
scoring_system epss
scoring_elements 0.69731
published_at 2026-04-16T12:55:00Z
11
value 0.00608
scoring_system epss
scoring_elements 0.6974
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-2780
2
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/77REFDB7DE4WNKQIRGZTF53RFBQOXQLC/
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:33Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/77REFDB7DE4WNKQIRGZTF53RFBQOXQLC/
3
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SDGBQYS3A36S4CAZPV5YROHYXYZR6LAH/
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:33Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SDGBQYS3A36S4CAZPV5YROHYXYZR6LAH/
4
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TSVLI36TYRTPQGCS24VZQUXCUFOUW4VQ/
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:33Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TSVLI36TYRTPQGCS24VZQUXCUFOUW4VQ/
5
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X4X2BMF3EILMTXGOZDTPYS3KT5VWLA2P/
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:33Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X4X2BMF3EILMTXGOZDTPYS3KT5VWLA2P/
6
reference_url https://security.netapp.com/advisory/ntap-20200416-0003/
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:33Z/
url https://security.netapp.com/advisory/ntap-20200416-0003/
7
reference_url https://www.oracle.com/security-alerts/cpuapr2020.html
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:33Z/
url https://www.oracle.com/security-alerts/cpuapr2020.html
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1830056
reference_id 1830056
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1830056
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
reference_id cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
reference_id cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/detail/CVE-2020-2780
reference_id CVE-2020-2780
reference_type
scores
0
value 4.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:P
1
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
2
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2020-2780
24
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:33Z/
url https://security.gentoo.org/glsa/202105-27
25
reference_url https://access.redhat.com/errata/RHSA-2020:3518
reference_id RHSA-2020:3518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3518
26
reference_url https://access.redhat.com/errata/RHSA-2020:3732
reference_id RHSA-2020:3732
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3732
27
reference_url https://access.redhat.com/errata/RHSA-2020:3755
reference_id RHSA-2020:3755
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3755
28
reference_url https://access.redhat.com/errata/RHSA-2020:3757
reference_id RHSA-2020:3757
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3757
29
reference_url https://access.redhat.com/errata/RHSA-2020:4026
reference_id RHSA-2020:4026
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4026
30
reference_url https://access.redhat.com/errata/RHSA-2020:4174
reference_id RHSA-2020:4174
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4174
31
reference_url https://access.redhat.com/errata/RHSA-2020:5246
reference_id RHSA-2020:5246
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5246
32
reference_url https://access.redhat.com/errata/RHSA-2020:5500
reference_id RHSA-2020:5500
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5500
33
reference_url https://access.redhat.com/errata/RHSA-2020:5654
reference_id RHSA-2020:5654
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5654
34
reference_url https://access.redhat.com/errata/RHSA-2020:5663
reference_id RHSA-2020:5663
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5663
35
reference_url https://access.redhat.com/errata/RHSA-2020:5665
reference_id RHSA-2020:5665
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5665
36
reference_url https://usn.ubuntu.com/4350-1/
reference_id USN-4350-1
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:33Z/
url https://usn.ubuntu.com/4350-1/
fixed_packages
aliases CVE-2020-2780
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jrj5-82ey-3fhy
14
url VCID-k6rd-6zrp-ffbm
vulnerability_id VCID-k6rd-6zrp-ffbm
summary
A vulnerability has been discovered in MariaDB which could result
    in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-15180.json
reference_id
reference_type
scores
0
value 9.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-15180.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-15180
reference_id
reference_type
scores
0
value 0.04602
scoring_system epss
scoring_elements 0.89202
published_at 2026-04-01T12:55:00Z
1
value 0.04602
scoring_system epss
scoring_elements 0.89208
published_at 2026-04-02T12:55:00Z
2
value 0.04602
scoring_system epss
scoring_elements 0.89222
published_at 2026-04-04T12:55:00Z
3
value 0.04602
scoring_system epss
scoring_elements 0.89225
published_at 2026-04-07T12:55:00Z
4
value 0.04602
scoring_system epss
scoring_elements 0.89243
published_at 2026-04-08T12:55:00Z
5
value 0.04602
scoring_system epss
scoring_elements 0.89248
published_at 2026-04-09T12:55:00Z
6
value 0.04602
scoring_system epss
scoring_elements 0.89257
published_at 2026-04-11T12:55:00Z
7
value 0.04602
scoring_system epss
scoring_elements 0.89253
published_at 2026-04-12T12:55:00Z
8
value 0.04602
scoring_system epss
scoring_elements 0.8925
published_at 2026-04-13T12:55:00Z
9
value 0.04602
scoring_system epss
scoring_elements 0.89263
published_at 2026-04-18T12:55:00Z
10
value 0.04602
scoring_system epss
scoring_elements 0.89258
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-15180
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15180
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15180
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1894919
reference_id 1894919
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1894919
5
reference_url https://security.gentoo.org/glsa/202011-14
reference_id GLSA-202011-14
reference_type
scores
url https://security.gentoo.org/glsa/202011-14
6
reference_url https://access.redhat.com/errata/RHSA-2020:5246
reference_id RHSA-2020:5246
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5246
7
reference_url https://access.redhat.com/errata/RHSA-2020:5379
reference_id RHSA-2020:5379
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5379
8
reference_url https://access.redhat.com/errata/RHSA-2020:5500
reference_id RHSA-2020:5500
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5500
9
reference_url https://access.redhat.com/errata/RHSA-2020:5654
reference_id RHSA-2020:5654
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5654
10
reference_url https://access.redhat.com/errata/RHSA-2020:5663
reference_id RHSA-2020:5663
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5663
11
reference_url https://access.redhat.com/errata/RHSA-2020:5665
reference_id RHSA-2020:5665
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5665
12
reference_url https://usn.ubuntu.com/4603-1/
reference_id USN-4603-1
reference_type
scores
url https://usn.ubuntu.com/4603-1/
fixed_packages
aliases CVE-2020-15180
risk_score 4.0
exploitability 0.5
weighted_severity 8.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-k6rd-6zrp-ffbm
15
url VCID-p3d4-4dfk-17bu
vulnerability_id VCID-p3d4-4dfk-17bu
summary mysql: InnoDB unspecified vulnerability (CPU Apr 2019)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-2628.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-2628.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-2628
reference_id
reference_type
scores
0
value 0.00112
scoring_system epss
scoring_elements 0.2958
published_at 2026-04-21T12:55:00Z
1
value 0.00132
scoring_system epss
scoring_elements 0.32711
published_at 2026-04-07T12:55:00Z
2
value 0.00132
scoring_system epss
scoring_elements 0.32787
published_at 2026-04-11T12:55:00Z
3
value 0.00132
scoring_system epss
scoring_elements 0.3275
published_at 2026-04-12T12:55:00Z
4
value 0.00132
scoring_system epss
scoring_elements 0.32724
published_at 2026-04-13T12:55:00Z
5
value 0.00132
scoring_system epss
scoring_elements 0.32764
published_at 2026-04-16T12:55:00Z
6
value 0.00132
scoring_system epss
scoring_elements 0.3274
published_at 2026-04-18T12:55:00Z
7
value 0.00132
scoring_system epss
scoring_elements 0.32855
published_at 2026-04-02T12:55:00Z
8
value 0.00132
scoring_system epss
scoring_elements 0.32725
published_at 2026-04-01T12:55:00Z
9
value 0.00132
scoring_system epss
scoring_elements 0.32891
published_at 2026-04-04T12:55:00Z
10
value 0.00132
scoring_system epss
scoring_elements 0.32759
published_at 2026-04-08T12:55:00Z
11
value 0.00132
scoring_system epss
scoring_elements 0.32786
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-2628
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1702977
reference_id 1702977
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1702977
4
reference_url https://support.f5.com/csp/article/K32798641
reference_id K32798641
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T14:00:30Z/
url https://support.f5.com/csp/article/K32798641
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00032.html
reference_id msg00032.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T14:00:30Z/
url http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00032.html
6
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00035.html
reference_id msg00035.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T14:00:30Z/
url http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00035.html
7
reference_url https://access.redhat.com/errata/RHSA-2019:2484
reference_id RHSA-2019:2484
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T14:00:30Z/
url https://access.redhat.com/errata/RHSA-2019:2484
8
reference_url https://access.redhat.com/errata/RHSA-2019:2511
reference_id RHSA-2019:2511
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T14:00:30Z/
url https://access.redhat.com/errata/RHSA-2019:2511
9
reference_url https://access.redhat.com/errata/RHSA-2019:3708
reference_id RHSA-2019:3708
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T14:00:30Z/
url https://access.redhat.com/errata/RHSA-2019:3708
10
reference_url https://access.redhat.com/errata/RHSA-2020:4174
reference_id RHSA-2020:4174
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4174
11
reference_url https://access.redhat.com/errata/RHSA-2020:5246
reference_id RHSA-2020:5246
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5246
12
reference_url https://access.redhat.com/errata/RHSA-2020:5663
reference_id RHSA-2020:5663
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5663
13
reference_url https://usn.ubuntu.com/3957-1/
reference_id USN-3957-1
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T14:00:30Z/
url https://usn.ubuntu.com/3957-1/
14
reference_url https://usn.ubuntu.com/4070-3/
reference_id USN-4070-3
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T14:00:30Z/
url https://usn.ubuntu.com/4070-3/
fixed_packages
aliases CVE-2019-2628
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-p3d4-4dfk-17bu
16
url VCID-pmhc-1rhq-gfeb
vulnerability_id VCID-pmhc-1rhq-gfeb
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14765.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14765.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-14765
reference_id
reference_type
scores
0
value 0.01757
scoring_system epss
scoring_elements 0.82525
published_at 2026-04-01T12:55:00Z
1
value 0.01757
scoring_system epss
scoring_elements 0.82539
published_at 2026-04-02T12:55:00Z
2
value 0.01757
scoring_system epss
scoring_elements 0.82629
published_at 2026-04-21T12:55:00Z
3
value 0.01757
scoring_system epss
scoring_elements 0.82554
published_at 2026-04-04T12:55:00Z
4
value 0.01757
scoring_system epss
scoring_elements 0.8255
published_at 2026-04-07T12:55:00Z
5
value 0.01757
scoring_system epss
scoring_elements 0.82576
published_at 2026-04-08T12:55:00Z
6
value 0.01757
scoring_system epss
scoring_elements 0.82584
published_at 2026-04-09T12:55:00Z
7
value 0.01757
scoring_system epss
scoring_elements 0.82602
published_at 2026-04-11T12:55:00Z
8
value 0.01757
scoring_system epss
scoring_elements 0.82596
published_at 2026-04-12T12:55:00Z
9
value 0.01757
scoring_system epss
scoring_elements 0.82589
published_at 2026-04-13T12:55:00Z
10
value 0.01757
scoring_system epss
scoring_elements 0.82626
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-14765
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14765
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14765
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1890738
reference_id 1890738
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1890738
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623
reference_id 972623
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623
6
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:45:03Z/
url https://security.gentoo.org/glsa/202105-27
7
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR/
reference_id GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:45:03Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR/
8
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JBZZ3XIRPFPAWBZLYBN777ANXSFXAPPB/
reference_id JBZZ3XIRPFPAWBZLYBN777ANXSFXAPPB
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:45:03Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JBZZ3XIRPFPAWBZLYBN777ANXSFXAPPB/
9
reference_url https://lists.debian.org/debian-lts-announce/2021/01/msg00027.html
reference_id msg00027.html
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:45:03Z/
url https://lists.debian.org/debian-lts-announce/2021/01/msg00027.html
10
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4/
reference_id O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:45:03Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4/
11
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OPW5YMZR5C7D7NBZQSTDOB3XAI5QP32Y/
reference_id OPW5YMZR5C7D7NBZQSTDOB3XAI5QP32Y
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:45:03Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OPW5YMZR5C7D7NBZQSTDOB3XAI5QP32Y/
12
reference_url https://access.redhat.com/errata/RHSA-2020:5246
reference_id RHSA-2020:5246
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5246
13
reference_url https://access.redhat.com/errata/RHSA-2020:5500
reference_id RHSA-2020:5500
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5500
14
reference_url https://access.redhat.com/errata/RHSA-2020:5654
reference_id RHSA-2020:5654
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5654
15
reference_url https://access.redhat.com/errata/RHSA-2020:5663
reference_id RHSA-2020:5663
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5663
16
reference_url https://access.redhat.com/errata/RHSA-2020:5665
reference_id RHSA-2020:5665
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5665
17
reference_url https://access.redhat.com/errata/RHSA-2021:3590
reference_id RHSA-2021:3590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3590
18
reference_url https://access.redhat.com/errata/RHSA-2021:3811
reference_id RHSA-2021:3811
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3811
19
reference_url https://usn.ubuntu.com/4604-1/
reference_id USN-4604-1
reference_type
scores
url https://usn.ubuntu.com/4604-1/
20
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6/
reference_id ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:45:03Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6/
fixed_packages
aliases CVE-2020-14765
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pmhc-1rhq-gfeb
17
url VCID-qe1p-f4h5-uyga
vulnerability_id VCID-qe1p-f4h5-uyga
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14812.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14812.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-14812
reference_id
reference_type
scores
0
value 0.01394
scoring_system epss
scoring_elements 0.80331
published_at 2026-04-01T12:55:00Z
1
value 0.01394
scoring_system epss
scoring_elements 0.80338
published_at 2026-04-02T12:55:00Z
2
value 0.01394
scoring_system epss
scoring_elements 0.80417
published_at 2026-04-21T12:55:00Z
3
value 0.01394
scoring_system epss
scoring_elements 0.80358
published_at 2026-04-04T12:55:00Z
4
value 0.01394
scoring_system epss
scoring_elements 0.80347
published_at 2026-04-07T12:55:00Z
5
value 0.01394
scoring_system epss
scoring_elements 0.80376
published_at 2026-04-08T12:55:00Z
6
value 0.01394
scoring_system epss
scoring_elements 0.80386
published_at 2026-04-09T12:55:00Z
7
value 0.01394
scoring_system epss
scoring_elements 0.80405
published_at 2026-04-11T12:55:00Z
8
value 0.01394
scoring_system epss
scoring_elements 0.8039
published_at 2026-04-12T12:55:00Z
9
value 0.01394
scoring_system epss
scoring_elements 0.80383
published_at 2026-04-13T12:55:00Z
10
value 0.01394
scoring_system epss
scoring_elements 0.80412
published_at 2026-04-16T12:55:00Z
11
value 0.01394
scoring_system epss
scoring_elements 0.80413
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-14812
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14812
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14812
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1890756
reference_id 1890756
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1890756
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623
reference_id 972623
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623
6
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:03Z/
url https://security.gentoo.org/glsa/202105-27
7
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JBZZ3XIRPFPAWBZLYBN777ANXSFXAPPB/
reference_id JBZZ3XIRPFPAWBZLYBN777ANXSFXAPPB
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:03Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JBZZ3XIRPFPAWBZLYBN777ANXSFXAPPB/
8
reference_url https://lists.debian.org/debian-lts-announce/2021/01/msg00027.html
reference_id msg00027.html
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:03Z/
url https://lists.debian.org/debian-lts-announce/2021/01/msg00027.html
9
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OPW5YMZR5C7D7NBZQSTDOB3XAI5QP32Y/
reference_id OPW5YMZR5C7D7NBZQSTDOB3XAI5QP32Y
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:03Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OPW5YMZR5C7D7NBZQSTDOB3XAI5QP32Y/
10
reference_url https://access.redhat.com/errata/RHSA-2020:5246
reference_id RHSA-2020:5246
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5246
11
reference_url https://access.redhat.com/errata/RHSA-2020:5500
reference_id RHSA-2020:5500
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5500
12
reference_url https://access.redhat.com/errata/RHSA-2020:5654
reference_id RHSA-2020:5654
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5654
13
reference_url https://access.redhat.com/errata/RHSA-2020:5663
reference_id RHSA-2020:5663
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5663
14
reference_url https://access.redhat.com/errata/RHSA-2020:5665
reference_id RHSA-2020:5665
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5665
15
reference_url https://access.redhat.com/errata/RHSA-2021:3590
reference_id RHSA-2021:3590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3590
16
reference_url https://access.redhat.com/errata/RHSA-2021:3811
reference_id RHSA-2021:3811
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3811
17
reference_url https://usn.ubuntu.com/4604-1/
reference_id USN-4604-1
reference_type
scores
url https://usn.ubuntu.com/4604-1/
fixed_packages
aliases CVE-2020-14812
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qe1p-f4h5-uyga
18
url VCID-rf1r-a5xx-akb3
vulnerability_id VCID-rf1r-a5xx-akb3
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2022.json
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2022.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-2022
reference_id
reference_type
scores
0
value 0.0048
scoring_system epss
scoring_elements 0.64986
published_at 2026-04-01T12:55:00Z
1
value 0.0048
scoring_system epss
scoring_elements 0.65036
published_at 2026-04-02T12:55:00Z
2
value 0.0048
scoring_system epss
scoring_elements 0.65098
published_at 2026-04-21T12:55:00Z
3
value 0.0048
scoring_system epss
scoring_elements 0.65064
published_at 2026-04-04T12:55:00Z
4
value 0.0048
scoring_system epss
scoring_elements 0.65025
published_at 2026-04-07T12:55:00Z
5
value 0.0048
scoring_system epss
scoring_elements 0.65075
published_at 2026-04-08T12:55:00Z
6
value 0.0048
scoring_system epss
scoring_elements 0.65088
published_at 2026-04-09T12:55:00Z
7
value 0.0048
scoring_system epss
scoring_elements 0.65107
published_at 2026-04-11T12:55:00Z
8
value 0.0048
scoring_system epss
scoring_elements 0.65096
published_at 2026-04-12T12:55:00Z
9
value 0.0048
scoring_system epss
scoring_elements 0.65068
published_at 2026-04-13T12:55:00Z
10
value 0.0048
scoring_system epss
scoring_elements 0.65105
published_at 2026-04-16T12:55:00Z
11
value 0.0048
scoring_system epss
scoring_elements 0.65114
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-2022
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2022
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2022
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1922389
reference_id 1922389
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1922389
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795
reference_id 980795
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795
5
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CS5THZSGI7O2CZO44NWYE57AG2T7NK3K/
reference_id CS5THZSGI7O2CZO44NWYE57AG2T7NK3K
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:25Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CS5THZSGI7O2CZO44NWYE57AG2T7NK3K/
6
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:25Z/
url https://security.gentoo.org/glsa/202105-27
7
reference_url https://security.netapp.com/advisory/ntap-20210219-0003/
reference_id ntap-20210219-0003
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:25Z/
url https://security.netapp.com/advisory/ntap-20210219-0003/
8
reference_url https://access.redhat.com/errata/RHSA-2020:5246
reference_id RHSA-2020:5246
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5246
9
reference_url https://access.redhat.com/errata/RHSA-2020:5500
reference_id RHSA-2020:5500
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5500
10
reference_url https://access.redhat.com/errata/RHSA-2020:5654
reference_id RHSA-2020:5654
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5654
11
reference_url https://access.redhat.com/errata/RHSA-2020:5663
reference_id RHSA-2020:5663
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5663
12
reference_url https://access.redhat.com/errata/RHSA-2020:5665
reference_id RHSA-2020:5665
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5665
13
reference_url https://access.redhat.com/errata/RHSA-2021:3590
reference_id RHSA-2021:3590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3590
14
reference_url https://access.redhat.com/errata/RHSA-2021:3811
reference_id RHSA-2021:3811
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3811
15
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T7EAHJPWOOF4D6PEFLXW5IQWRRSZ3HRC/
reference_id T7EAHJPWOOF4D6PEFLXW5IQWRRSZ3HRC
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:25Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T7EAHJPWOOF4D6PEFLXW5IQWRRSZ3HRC/
16
reference_url https://usn.ubuntu.com/4716-1/
reference_id USN-4716-1
reference_type
scores
url https://usn.ubuntu.com/4716-1/
fixed_packages
aliases CVE-2021-2022
risk_score 2.0
exploitability 0.5
weighted_severity 4.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rf1r-a5xx-akb3
19
url VCID-sutj-xqjr-puee
vulnerability_id VCID-sutj-xqjr-puee
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00054.html
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:04:01Z/
url http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00054.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2814.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2814.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-2814
reference_id
reference_type
scores
0
value 0.00125
scoring_system epss
scoring_elements 0.3169
published_at 2026-04-21T12:55:00Z
1
value 0.00125
scoring_system epss
scoring_elements 0.3184
published_at 2026-04-02T12:55:00Z
2
value 0.00125
scoring_system epss
scoring_elements 0.31709
published_at 2026-04-01T12:55:00Z
3
value 0.00125
scoring_system epss
scoring_elements 0.31884
published_at 2026-04-04T12:55:00Z
4
value 0.00125
scoring_system epss
scoring_elements 0.31703
published_at 2026-04-07T12:55:00Z
5
value 0.00125
scoring_system epss
scoring_elements 0.31755
published_at 2026-04-08T12:55:00Z
6
value 0.00125
scoring_system epss
scoring_elements 0.31785
published_at 2026-04-09T12:55:00Z
7
value 0.00125
scoring_system epss
scoring_elements 0.31788
published_at 2026-04-11T12:55:00Z
8
value 0.00125
scoring_system epss
scoring_elements 0.31748
published_at 2026-04-12T12:55:00Z
9
value 0.00125
scoring_system epss
scoring_elements 0.31713
published_at 2026-04-13T12:55:00Z
10
value 0.00125
scoring_system epss
scoring_elements 0.31744
published_at 2026-04-16T12:55:00Z
11
value 0.00125
scoring_system epss
scoring_elements 0.31722
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-2814
3
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/77REFDB7DE4WNKQIRGZTF53RFBQOXQLC/
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:04:01Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/77REFDB7DE4WNKQIRGZTF53RFBQOXQLC/
4
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SDGBQYS3A36S4CAZPV5YROHYXYZR6LAH/
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:04:01Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SDGBQYS3A36S4CAZPV5YROHYXYZR6LAH/
5
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TSVLI36TYRTPQGCS24VZQUXCUFOUW4VQ/
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:04:01Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TSVLI36TYRTPQGCS24VZQUXCUFOUW4VQ/
6
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UW2ED32VEUHXFN2J3YQE27JIBV4SC2PI/
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:04:01Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UW2ED32VEUHXFN2J3YQE27JIBV4SC2PI/
7
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X4X2BMF3EILMTXGOZDTPYS3KT5VWLA2P/
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:04:01Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X4X2BMF3EILMTXGOZDTPYS3KT5VWLA2P/
8
reference_url https://security.netapp.com/advisory/ntap-20200416-0003/
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:04:01Z/
url https://security.netapp.com/advisory/ntap-20200416-0003/
9
reference_url https://www.oracle.com/security-alerts/cpuapr2020.html
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:04:01Z/
url https://www.oracle.com/security-alerts/cpuapr2020.html
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1830060
reference_id 1830060
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1830060
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vsphere:*:*
reference_id cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vsphere:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vsphere:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
reference_id cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/detail/CVE-2020-2814
reference_id CVE-2020-2814
reference_type
scores
0
value 4.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:P
1
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
2
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2020-2814
26
reference_url https://security.gentoo.org/glsa/202012-08
reference_id GLSA-202012-08
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:04:01Z/
url https://security.gentoo.org/glsa/202012-08
27
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:04:01Z/
url https://security.gentoo.org/glsa/202105-27
28
reference_url https://access.redhat.com/errata/RHSA-2020:3518
reference_id RHSA-2020:3518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3518
29
reference_url https://access.redhat.com/errata/RHSA-2020:3732
reference_id RHSA-2020:3732
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3732
30
reference_url https://access.redhat.com/errata/RHSA-2020:3755
reference_id RHSA-2020:3755
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3755
31
reference_url https://access.redhat.com/errata/RHSA-2020:3757
reference_id RHSA-2020:3757
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3757
32
reference_url https://access.redhat.com/errata/RHSA-2020:4174
reference_id RHSA-2020:4174
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4174
33
reference_url https://access.redhat.com/errata/RHSA-2020:5246
reference_id RHSA-2020:5246
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5246
34
reference_url https://access.redhat.com/errata/RHSA-2020:5500
reference_id RHSA-2020:5500
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5500
35
reference_url https://access.redhat.com/errata/RHSA-2020:5654
reference_id RHSA-2020:5654
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5654
36
reference_url https://access.redhat.com/errata/RHSA-2020:5663
reference_id RHSA-2020:5663
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5663
37
reference_url https://access.redhat.com/errata/RHSA-2020:5665
reference_id RHSA-2020:5665
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5665
38
reference_url https://usn.ubuntu.com/4603-1/
reference_id USN-4603-1
reference_type
scores
url https://usn.ubuntu.com/4603-1/
fixed_packages
aliases CVE-2020-2814
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-sutj-xqjr-puee
20
url VCID-t4uh-zy3q-qbey
vulnerability_id VCID-t4uh-zy3q-qbey
summary mysql: Server: Security: Privileges unspecified vulnerability (CPU Jul 2019)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-2739.json
reference_id
reference_type
scores
0
value 5.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-2739.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-2739
reference_id
reference_type
scores
0
value 0.00032
scoring_system epss
scoring_elements 0.09367
published_at 2026-04-21T12:55:00Z
1
value 0.00032
scoring_system epss
scoring_elements 0.09274
published_at 2026-04-01T12:55:00Z
2
value 0.00032
scoring_system epss
scoring_elements 0.09273
published_at 2026-04-02T12:55:00Z
3
value 0.00032
scoring_system epss
scoring_elements 0.09325
published_at 2026-04-04T12:55:00Z
4
value 0.00032
scoring_system epss
scoring_elements 0.09239
published_at 2026-04-07T12:55:00Z
5
value 0.00032
scoring_system epss
scoring_elements 0.09314
published_at 2026-04-08T12:55:00Z
6
value 0.00032
scoring_system epss
scoring_elements 0.0936
published_at 2026-04-09T12:55:00Z
7
value 0.00032
scoring_system epss
scoring_elements 0.09369
published_at 2026-04-11T12:55:00Z
8
value 0.00032
scoring_system epss
scoring_elements 0.09341
published_at 2026-04-12T12:55:00Z
9
value 0.00032
scoring_system epss
scoring_elements 0.09328
published_at 2026-04-13T12:55:00Z
10
value 0.00032
scoring_system epss
scoring_elements 0.09217
published_at 2026-04-16T12:55:00Z
11
value 0.00032
scoring_system epss
scoring_elements 0.09216
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-2739
2
reference_url https://seclists.org/bugtraq/2019/Aug/1
reference_id 1
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:18:27Z/
url https://seclists.org/bugtraq/2019/Aug/1
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1731999
reference_id 1731999
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1731999
4
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/A55N3HZ3JZBXHQMGTUHY63FVTDU5ILEV/
reference_id A55N3HZ3JZBXHQMGTUHY63FVTDU5ILEV
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:18:27Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/A55N3HZ3JZBXHQMGTUHY63FVTDU5ILEV/
5
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CN3JPT5ICOAWQNPFVPVLLYR4TQIX4MXP/
reference_id CN3JPT5ICOAWQNPFVPVLLYR4TQIX4MXP
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:18:27Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CN3JPT5ICOAWQNPFVPVLLYR4TQIX4MXP/
6
reference_url http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
reference_id cpujul2019-5072835.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:18:27Z/
url http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
7
reference_url https://support.f5.com/csp/article/K51272092
reference_id K51272092
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:18:27Z/
url https://support.f5.com/csp/article/K51272092
8
reference_url https://support.f5.com/csp/article/K51272092?utm_source=f5support&amp%3Butm_medium=RSS
reference_id K51272092?utm_source=f5support&amp%3Butm_medium=RSS
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:18:27Z/
url https://support.f5.com/csp/article/K51272092?utm_source=f5support&amp%3Butm_medium=RSS
9
reference_url https://access.redhat.com/errata/RHSA-2019:2484
reference_id RHSA-2019:2484
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:18:27Z/
url https://access.redhat.com/errata/RHSA-2019:2484
10
reference_url https://access.redhat.com/errata/RHSA-2019:2511
reference_id RHSA-2019:2511
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:18:27Z/
url https://access.redhat.com/errata/RHSA-2019:2511
11
reference_url https://access.redhat.com/errata/RHSA-2019:3708
reference_id RHSA-2019:3708
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:18:27Z/
url https://access.redhat.com/errata/RHSA-2019:3708
12
reference_url https://access.redhat.com/errata/RHSA-2020:1100
reference_id RHSA-2020:1100
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1100
13
reference_url https://access.redhat.com/errata/RHSA-2020:4174
reference_id RHSA-2020:4174
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4174
14
reference_url https://access.redhat.com/errata/RHSA-2020:5246
reference_id RHSA-2020:5246
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5246
15
reference_url https://access.redhat.com/errata/RHSA-2020:5663
reference_id RHSA-2020:5663
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5663
16
reference_url http://packetstormsecurity.com/files/153862/Slackware-Security-Advisory-mariadb-Updates.html
reference_id Slackware-Security-Advisory-mariadb-Updates.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:18:27Z/
url http://packetstormsecurity.com/files/153862/Slackware-Security-Advisory-mariadb-Updates.html
17
reference_url https://usn.ubuntu.com/4070-1/
reference_id USN-4070-1
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:18:27Z/
url https://usn.ubuntu.com/4070-1/
18
reference_url https://usn.ubuntu.com/4070-2/
reference_id USN-4070-2
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:18:27Z/
url https://usn.ubuntu.com/4070-2/
19
reference_url https://usn.ubuntu.com/4070-3/
reference_id USN-4070-3
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:18:27Z/
url https://usn.ubuntu.com/4070-3/
fixed_packages
aliases CVE-2019-2739
risk_score 2.3
exploitability 0.5
weighted_severity 4.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-t4uh-zy3q-qbey
21
url VCID-tp8f-vv6a-j7fb
vulnerability_id VCID-tp8f-vv6a-j7fb
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00054.html
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:00:13Z/
url http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00054.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2752.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2752.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-2752
reference_id
reference_type
scores
0
value 0.00229
scoring_system epss
scoring_elements 0.45795
published_at 2026-04-18T12:55:00Z
1
value 0.00229
scoring_system epss
scoring_elements 0.45663
published_at 2026-04-01T12:55:00Z
2
value 0.00229
scoring_system epss
scoring_elements 0.45728
published_at 2026-04-02T12:55:00Z
3
value 0.00229
scoring_system epss
scoring_elements 0.45748
published_at 2026-04-04T12:55:00Z
4
value 0.00229
scoring_system epss
scoring_elements 0.45697
published_at 2026-04-07T12:55:00Z
5
value 0.00229
scoring_system epss
scoring_elements 0.45753
published_at 2026-04-08T12:55:00Z
6
value 0.00229
scoring_system epss
scoring_elements 0.4575
published_at 2026-04-13T12:55:00Z
7
value 0.00229
scoring_system epss
scoring_elements 0.45772
published_at 2026-04-11T12:55:00Z
8
value 0.00229
scoring_system epss
scoring_elements 0.45742
published_at 2026-04-21T12:55:00Z
9
value 0.00229
scoring_system epss
scoring_elements 0.458
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-2752
3
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UW2ED32VEUHXFN2J3YQE27JIBV4SC2PI/
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:00:13Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UW2ED32VEUHXFN2J3YQE27JIBV4SC2PI/
4
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X4X2BMF3EILMTXGOZDTPYS3KT5VWLA2P/
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:00:13Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X4X2BMF3EILMTXGOZDTPYS3KT5VWLA2P/
5
reference_url https://security.netapp.com/advisory/ntap-20200416-0003/
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:00:13Z/
url https://security.netapp.com/advisory/ntap-20200416-0003/
6
reference_url https://www.oracle.com/security-alerts/cpuapr2020.html
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:00:13Z/
url https://www.oracle.com/security-alerts/cpuapr2020.html
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1835849
reference_id 1835849
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1835849
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
reference_id cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
reference_id cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/detail/CVE-2020-2752
reference_id CVE-2020-2752
reference_type
scores
0
value 3.5
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:S/C:N/I:N/A:P
1
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
2
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2020-2752
19
reference_url https://security.gentoo.org/glsa/202012-08
reference_id GLSA-202012-08
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:00:13Z/
url https://security.gentoo.org/glsa/202012-08
20
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:00:13Z/
url https://security.gentoo.org/glsa/202105-27
21
reference_url https://access.redhat.com/errata/RHSA-2020:3518
reference_id RHSA-2020:3518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3518
22
reference_url https://access.redhat.com/errata/RHSA-2020:3732
reference_id RHSA-2020:3732
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3732
23
reference_url https://access.redhat.com/errata/RHSA-2020:3755
reference_id RHSA-2020:3755
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3755
24
reference_url https://access.redhat.com/errata/RHSA-2020:3757
reference_id RHSA-2020:3757
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3757
25
reference_url https://access.redhat.com/errata/RHSA-2020:4026
reference_id RHSA-2020:4026
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4026
26
reference_url https://access.redhat.com/errata/RHSA-2020:4174
reference_id RHSA-2020:4174
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4174
27
reference_url https://access.redhat.com/errata/RHSA-2020:5246
reference_id RHSA-2020:5246
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5246
28
reference_url https://access.redhat.com/errata/RHSA-2020:5500
reference_id RHSA-2020:5500
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5500
29
reference_url https://access.redhat.com/errata/RHSA-2020:5503
reference_id RHSA-2020:5503
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5503
30
reference_url https://access.redhat.com/errata/RHSA-2020:5654
reference_id RHSA-2020:5654
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5654
31
reference_url https://access.redhat.com/errata/RHSA-2020:5655
reference_id RHSA-2020:5655
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5655
32
reference_url https://access.redhat.com/errata/RHSA-2020:5660
reference_id RHSA-2020:5660
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5660
33
reference_url https://access.redhat.com/errata/RHSA-2020:5662
reference_id RHSA-2020:5662
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5662
34
reference_url https://access.redhat.com/errata/RHSA-2020:5663
reference_id RHSA-2020:5663
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5663
35
reference_url https://access.redhat.com/errata/RHSA-2020:5665
reference_id RHSA-2020:5665
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5665
36
reference_url https://usn.ubuntu.com/4603-1/
reference_id USN-4603-1
reference_type
scores
url https://usn.ubuntu.com/4603-1/
fixed_packages
aliases CVE-2020-2752
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tp8f-vv6a-j7fb
22
url VCID-trm4-u9va-3fhz
vulnerability_id VCID-trm4-u9va-3fhz
summary mariadb-connector-c: Improper validation of content in a OK packet received from server
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-13249.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-13249.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-13249
reference_id
reference_type
scores
0
value 0.00702
scoring_system epss
scoring_elements 0.72
published_at 2026-04-01T12:55:00Z
1
value 0.00702
scoring_system epss
scoring_elements 0.72008
published_at 2026-04-02T12:55:00Z
2
value 0.00702
scoring_system epss
scoring_elements 0.72028
published_at 2026-04-04T12:55:00Z
3
value 0.00702
scoring_system epss
scoring_elements 0.72004
published_at 2026-04-07T12:55:00Z
4
value 0.00702
scoring_system epss
scoring_elements 0.72043
published_at 2026-04-08T12:55:00Z
5
value 0.00702
scoring_system epss
scoring_elements 0.72055
published_at 2026-04-09T12:55:00Z
6
value 0.00702
scoring_system epss
scoring_elements 0.72079
published_at 2026-04-11T12:55:00Z
7
value 0.00702
scoring_system epss
scoring_elements 0.72062
published_at 2026-04-12T12:55:00Z
8
value 0.00702
scoring_system epss
scoring_elements 0.72047
published_at 2026-04-13T12:55:00Z
9
value 0.00702
scoring_system epss
scoring_elements 0.72088
published_at 2026-04-16T12:55:00Z
10
value 0.00702
scoring_system epss
scoring_elements 0.72095
published_at 2026-04-18T12:55:00Z
11
value 0.00702
scoring_system epss
scoring_elements 0.7208
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-13249
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1839827
reference_id 1839827
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1839827
4
reference_url https://access.redhat.com/errata/RHSA-2020:4174
reference_id RHSA-2020:4174
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4174
5
reference_url https://access.redhat.com/errata/RHSA-2020:5246
reference_id RHSA-2020:5246
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5246
6
reference_url https://access.redhat.com/errata/RHSA-2020:5500
reference_id RHSA-2020:5500
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5500
7
reference_url https://access.redhat.com/errata/RHSA-2020:5503
reference_id RHSA-2020:5503
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5503
8
reference_url https://access.redhat.com/errata/RHSA-2020:5654
reference_id RHSA-2020:5654
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5654
9
reference_url https://access.redhat.com/errata/RHSA-2020:5655
reference_id RHSA-2020:5655
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5655
10
reference_url https://access.redhat.com/errata/RHSA-2020:5660
reference_id RHSA-2020:5660
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5660
11
reference_url https://access.redhat.com/errata/RHSA-2020:5662
reference_id RHSA-2020:5662
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5662
12
reference_url https://access.redhat.com/errata/RHSA-2020:5663
reference_id RHSA-2020:5663
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5663
13
reference_url https://access.redhat.com/errata/RHSA-2020:5665
reference_id RHSA-2020:5665
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5665
14
reference_url https://usn.ubuntu.com/4603-1/
reference_id USN-4603-1
reference_type
scores
url https://usn.ubuntu.com/4603-1/
fixed_packages
aliases CVE-2020-13249
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-trm4-u9va-3fhz
23
url VCID-upmt-kdja-37fj
vulnerability_id VCID-upmt-kdja-37fj
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00037.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:59Z/
url http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00037.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-2938.json
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-2938.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-2938
reference_id
reference_type
scores
0
value 0.00087
scoring_system epss
scoring_elements 0.24863
published_at 2026-04-21T12:55:00Z
1
value 0.00087
scoring_system epss
scoring_elements 0.24952
published_at 2026-04-01T12:55:00Z
2
value 0.00087
scoring_system epss
scoring_elements 0.25031
published_at 2026-04-02T12:55:00Z
3
value 0.00087
scoring_system epss
scoring_elements 0.2507
published_at 2026-04-04T12:55:00Z
4
value 0.00087
scoring_system epss
scoring_elements 0.24845
published_at 2026-04-07T12:55:00Z
5
value 0.00087
scoring_system epss
scoring_elements 0.24913
published_at 2026-04-08T12:55:00Z
6
value 0.00087
scoring_system epss
scoring_elements 0.24959
published_at 2026-04-09T12:55:00Z
7
value 0.00087
scoring_system epss
scoring_elements 0.24974
published_at 2026-04-11T12:55:00Z
8
value 0.00087
scoring_system epss
scoring_elements 0.24934
published_at 2026-04-12T12:55:00Z
9
value 0.00087
scoring_system epss
scoring_elements 0.24879
published_at 2026-04-13T12:55:00Z
10
value 0.00087
scoring_system epss
scoring_elements 0.24893
published_at 2026-04-16T12:55:00Z
11
value 0.00087
scoring_system epss
scoring_elements 0.24886
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-2938
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6DTUCXX5XXPNPFV2PHP6IESGTCFMZOFP/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:59Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6DTUCXX5XXPNPFV2PHP6IESGTCFMZOFP/
5
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7X5D3O4TOQ57KL5FLQEXH2JB2UQYHCUZ/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:59Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7X5D3O4TOQ57KL5FLQEXH2JB2UQYHCUZ/
6
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MKCJLNRK6RHFAHV7ZFD3XO7HNSBU3XOL/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:59Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MKCJLNRK6RHFAHV7ZFD3XO7HNSBU3XOL/
7
reference_url https://security.netapp.com/advisory/ntap-20191017-0002/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:59Z/
url https://security.netapp.com/advisory/ntap-20191017-0002/
8
reference_url http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:59Z/
url http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1764680
reference_id 1764680
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1764680
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*
reference_id cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*
reference_id cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-2938
reference_id CVE-2019-2938
reference_type
scores
0
value 3.5
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:S/C:N/I:N/A:P
1
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2019-2938
26
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:59Z/
url https://security.gentoo.org/glsa/202105-27
27
reference_url https://security.gentoo.org/glsa/202405-25
reference_id GLSA-202405-25
reference_type
scores
url https://security.gentoo.org/glsa/202405-25
28
reference_url https://access.redhat.com/errata/RHSA-2020:3518
reference_id RHSA-2020:3518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3518
29
reference_url https://access.redhat.com/errata/RHSA-2020:3732
reference_id RHSA-2020:3732
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3732
30
reference_url https://access.redhat.com/errata/RHSA-2020:3755
reference_id RHSA-2020:3755
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3755
31
reference_url https://access.redhat.com/errata/RHSA-2020:3757
reference_id RHSA-2020:3757
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3757
32
reference_url https://access.redhat.com/errata/RHSA-2020:4174
reference_id RHSA-2020:4174
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4174
33
reference_url https://access.redhat.com/errata/RHSA-2020:5246
reference_id RHSA-2020:5246
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5246
34
reference_url https://access.redhat.com/errata/RHSA-2020:5500
reference_id RHSA-2020:5500
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5500
35
reference_url https://access.redhat.com/errata/RHSA-2020:5654
reference_id RHSA-2020:5654
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5654
36
reference_url https://access.redhat.com/errata/RHSA-2020:5663
reference_id RHSA-2020:5663
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5663
37
reference_url https://access.redhat.com/errata/RHSA-2020:5665
reference_id RHSA-2020:5665
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5665
38
reference_url https://usn.ubuntu.com/4195-1/
reference_id USN-4195-1
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:59Z/
url https://usn.ubuntu.com/4195-1/
39
reference_url https://usn.ubuntu.com/4195-2/
reference_id USN-4195-2
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:59Z/
url https://usn.ubuntu.com/4195-2/
fixed_packages
aliases CVE-2019-2938
risk_score 2.0
exploitability 0.5
weighted_severity 4.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-upmt-kdja-37fj
24
url VCID-vcyx-58nm-gbba
vulnerability_id VCID-vcyx-58nm-gbba
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2007.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2007.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-2007
reference_id
reference_type
scores
0
value 0.00531
scoring_system epss
scoring_elements 0.67187
published_at 2026-04-01T12:55:00Z
1
value 0.00531
scoring_system epss
scoring_elements 0.67224
published_at 2026-04-02T12:55:00Z
2
value 0.00531
scoring_system epss
scoring_elements 0.67287
published_at 2026-04-21T12:55:00Z
3
value 0.00531
scoring_system epss
scoring_elements 0.6726
published_at 2026-04-13T12:55:00Z
4
value 0.00531
scoring_system epss
scoring_elements 0.67248
published_at 2026-04-04T12:55:00Z
5
value 0.00531
scoring_system epss
scoring_elements 0.67225
published_at 2026-04-07T12:55:00Z
6
value 0.00531
scoring_system epss
scoring_elements 0.67276
published_at 2026-04-08T12:55:00Z
7
value 0.00531
scoring_system epss
scoring_elements 0.67289
published_at 2026-04-09T12:55:00Z
8
value 0.00531
scoring_system epss
scoring_elements 0.67309
published_at 2026-04-11T12:55:00Z
9
value 0.00531
scoring_system epss
scoring_elements 0.67296
published_at 2026-04-12T12:55:00Z
10
value 0.00531
scoring_system epss
scoring_elements 0.67308
published_at 2026-04-18T12:55:00Z
11
value 0.00531
scoring_system epss
scoring_elements 0.67295
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-2007
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1922382
reference_id 1922382
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1922382
3
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CS5THZSGI7O2CZO44NWYE57AG2T7NK3K/
reference_id CS5THZSGI7O2CZO44NWYE57AG2T7NK3K
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:43Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CS5THZSGI7O2CZO44NWYE57AG2T7NK3K/
4
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:43Z/
url https://security.gentoo.org/glsa/202105-27
5
reference_url https://security.netapp.com/advisory/ntap-20210622-0001/
reference_id ntap-20210622-0001
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:43Z/
url https://security.netapp.com/advisory/ntap-20210622-0001/
6
reference_url https://access.redhat.com/errata/RHSA-2019:3708
reference_id RHSA-2019:3708
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3708
7
reference_url https://access.redhat.com/errata/RHSA-2020:1100
reference_id RHSA-2020:1100
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1100
8
reference_url https://access.redhat.com/errata/RHSA-2020:3518
reference_id RHSA-2020:3518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3518
9
reference_url https://access.redhat.com/errata/RHSA-2020:3732
reference_id RHSA-2020:3732
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3732
10
reference_url https://access.redhat.com/errata/RHSA-2020:3755
reference_id RHSA-2020:3755
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3755
11
reference_url https://access.redhat.com/errata/RHSA-2020:3757
reference_id RHSA-2020:3757
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3757
12
reference_url https://access.redhat.com/errata/RHSA-2020:5246
reference_id RHSA-2020:5246
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5246
13
reference_url https://access.redhat.com/errata/RHSA-2020:5503
reference_id RHSA-2020:5503
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5503
14
reference_url https://access.redhat.com/errata/RHSA-2020:5655
reference_id RHSA-2020:5655
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5655
15
reference_url https://access.redhat.com/errata/RHSA-2020:5660
reference_id RHSA-2020:5660
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5660
16
reference_url https://access.redhat.com/errata/RHSA-2020:5662
reference_id RHSA-2020:5662
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5662
17
reference_url https://access.redhat.com/errata/RHSA-2020:5663
reference_id RHSA-2020:5663
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5663
18
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T7EAHJPWOOF4D6PEFLXW5IQWRRSZ3HRC/
reference_id T7EAHJPWOOF4D6PEFLXW5IQWRRSZ3HRC
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:43Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T7EAHJPWOOF4D6PEFLXW5IQWRRSZ3HRC/
fixed_packages
aliases CVE-2021-2007
risk_score 1.6
exploitability 0.5
weighted_severity 3.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vcyx-58nm-gbba
25
url VCID-vfy8-8xty-kuau
vulnerability_id VCID-vfy8-8xty-kuau
summary mysql: Server: XML unspecified vulnerability (CPU Jul 2019)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-2740.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-2740.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-2740
reference_id
reference_type
scores
0
value 0.00409
scoring_system epss
scoring_elements 0.61274
published_at 2026-04-21T12:55:00Z
1
value 0.00409
scoring_system epss
scoring_elements 0.61125
published_at 2026-04-01T12:55:00Z
2
value 0.00409
scoring_system epss
scoring_elements 0.61205
published_at 2026-04-02T12:55:00Z
3
value 0.00409
scoring_system epss
scoring_elements 0.61233
published_at 2026-04-04T12:55:00Z
4
value 0.00409
scoring_system epss
scoring_elements 0.612
published_at 2026-04-07T12:55:00Z
5
value 0.00409
scoring_system epss
scoring_elements 0.61247
published_at 2026-04-08T12:55:00Z
6
value 0.00409
scoring_system epss
scoring_elements 0.61262
published_at 2026-04-09T12:55:00Z
7
value 0.00409
scoring_system epss
scoring_elements 0.61282
published_at 2026-04-11T12:55:00Z
8
value 0.00409
scoring_system epss
scoring_elements 0.61268
published_at 2026-04-12T12:55:00Z
9
value 0.00409
scoring_system epss
scoring_elements 0.61249
published_at 2026-04-13T12:55:00Z
10
value 0.00409
scoring_system epss
scoring_elements 0.61289
published_at 2026-04-16T12:55:00Z
11
value 0.00409
scoring_system epss
scoring_elements 0.61294
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-2740
2
reference_url https://seclists.org/bugtraq/2019/Aug/1
reference_id 1
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:18:26Z/
url https://seclists.org/bugtraq/2019/Aug/1
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1732000
reference_id 1732000
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1732000
4
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/A55N3HZ3JZBXHQMGTUHY63FVTDU5ILEV/
reference_id A55N3HZ3JZBXHQMGTUHY63FVTDU5ILEV
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:18:26Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/A55N3HZ3JZBXHQMGTUHY63FVTDU5ILEV/
5
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CN3JPT5ICOAWQNPFVPVLLYR4TQIX4MXP/
reference_id CN3JPT5ICOAWQNPFVPVLLYR4TQIX4MXP
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:18:26Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CN3JPT5ICOAWQNPFVPVLLYR4TQIX4MXP/
6
reference_url http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
reference_id cpujul2019-5072835.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:18:26Z/
url http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
7
reference_url https://support.f5.com/csp/article/K03444640
reference_id K03444640
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:18:26Z/
url https://support.f5.com/csp/article/K03444640
8
reference_url https://support.f5.com/csp/article/K03444640?utm_source=f5support&amp%3Butm_medium=RSS
reference_id K03444640?utm_source=f5support&amp%3Butm_medium=RSS
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:18:26Z/
url https://support.f5.com/csp/article/K03444640?utm_source=f5support&amp%3Butm_medium=RSS
9
reference_url https://access.redhat.com/errata/RHSA-2019:2484
reference_id RHSA-2019:2484
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:18:26Z/
url https://access.redhat.com/errata/RHSA-2019:2484
10
reference_url https://access.redhat.com/errata/RHSA-2019:2511
reference_id RHSA-2019:2511
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:18:26Z/
url https://access.redhat.com/errata/RHSA-2019:2511
11
reference_url https://access.redhat.com/errata/RHSA-2019:3708
reference_id RHSA-2019:3708
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:18:26Z/
url https://access.redhat.com/errata/RHSA-2019:3708
12
reference_url https://access.redhat.com/errata/RHSA-2020:1100
reference_id RHSA-2020:1100
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1100
13
reference_url https://access.redhat.com/errata/RHSA-2020:4174
reference_id RHSA-2020:4174
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4174
14
reference_url https://access.redhat.com/errata/RHSA-2020:5246
reference_id RHSA-2020:5246
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5246
15
reference_url https://access.redhat.com/errata/RHSA-2020:5663
reference_id RHSA-2020:5663
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5663
16
reference_url http://packetstormsecurity.com/files/153862/Slackware-Security-Advisory-mariadb-Updates.html
reference_id Slackware-Security-Advisory-mariadb-Updates.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:18:26Z/
url http://packetstormsecurity.com/files/153862/Slackware-Security-Advisory-mariadb-Updates.html
17
reference_url https://usn.ubuntu.com/4070-1/
reference_id USN-4070-1
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:18:26Z/
url https://usn.ubuntu.com/4070-1/
18
reference_url https://usn.ubuntu.com/4070-2/
reference_id USN-4070-2
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:18:26Z/
url https://usn.ubuntu.com/4070-2/
19
reference_url https://usn.ubuntu.com/4070-3/
reference_id USN-4070-3
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:18:26Z/
url https://usn.ubuntu.com/4070-3/
fixed_packages
aliases CVE-2019-2740
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vfy8-8xty-kuau
26
url VCID-yt4u-3atp-vfb1
vulnerability_id VCID-yt4u-3atp-vfb1
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2574.json
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2574.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-2574
reference_id
reference_type
scores
0
value 0.0016
scoring_system epss
scoring_elements 0.37051
published_at 2026-04-02T12:55:00Z
1
value 0.0016
scoring_system epss
scoring_elements 0.36881
published_at 2026-04-01T12:55:00Z
2
value 0.0016
scoring_system epss
scoring_elements 0.37084
published_at 2026-04-04T12:55:00Z
3
value 0.0016
scoring_system epss
scoring_elements 0.36912
published_at 2026-04-07T12:55:00Z
4
value 0.0016
scoring_system epss
scoring_elements 0.36962
published_at 2026-04-08T12:55:00Z
5
value 0.0016
scoring_system epss
scoring_elements 0.36975
published_at 2026-04-09T12:55:00Z
6
value 0.0016
scoring_system epss
scoring_elements 0.36984
published_at 2026-04-11T12:55:00Z
7
value 0.0016
scoring_system epss
scoring_elements 0.36948
published_at 2026-04-12T12:55:00Z
8
value 0.0016
scoring_system epss
scoring_elements 0.36922
published_at 2026-04-13T12:55:00Z
9
value 0.0016
scoring_system epss
scoring_elements 0.36967
published_at 2026-04-16T12:55:00Z
10
value 0.0016
scoring_system epss
scoring_elements 0.36951
published_at 2026-04-18T12:55:00Z
11
value 0.0016
scoring_system epss
scoring_elements 0.36892
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-2574
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url http://www.openwall.com/lists/oss-security/2020/09/29/1
reference_id 1
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:05:04Z/
url http://www.openwall.com/lists/oss-security/2020/09/29/1
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1798587
reference_id 1798587
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1798587
5
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:05:04Z/
url https://security.gentoo.org/glsa/202105-27
6
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00007.html
reference_id msg00007.html
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:05:04Z/
url http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00007.html
7
reference_url https://access.redhat.com/errata/RHSA-2020:3518
reference_id RHSA-2020:3518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3518
8
reference_url https://access.redhat.com/errata/RHSA-2020:3732
reference_id RHSA-2020:3732
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3732
9
reference_url https://access.redhat.com/errata/RHSA-2020:3755
reference_id RHSA-2020:3755
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3755
10
reference_url https://access.redhat.com/errata/RHSA-2020:3757
reference_id RHSA-2020:3757
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3757
11
reference_url https://access.redhat.com/errata/RHSA-2020:4026
reference_id RHSA-2020:4026
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4026
12
reference_url https://access.redhat.com/errata/RHSA-2020:4174
reference_id RHSA-2020:4174
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4174
13
reference_url https://access.redhat.com/errata/RHSA-2020:5246
reference_id RHSA-2020:5246
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5246
14
reference_url https://access.redhat.com/errata/RHSA-2020:5500
reference_id RHSA-2020:5500
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5500
15
reference_url https://access.redhat.com/errata/RHSA-2020:5503
reference_id RHSA-2020:5503
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5503
16
reference_url https://access.redhat.com/errata/RHSA-2020:5654
reference_id RHSA-2020:5654
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5654
17
reference_url https://access.redhat.com/errata/RHSA-2020:5655
reference_id RHSA-2020:5655
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5655
18
reference_url https://access.redhat.com/errata/RHSA-2020:5660
reference_id RHSA-2020:5660
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5660
19
reference_url https://access.redhat.com/errata/RHSA-2020:5662
reference_id RHSA-2020:5662
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5662
20
reference_url https://access.redhat.com/errata/RHSA-2020:5663
reference_id RHSA-2020:5663
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5663
21
reference_url https://access.redhat.com/errata/RHSA-2020:5665
reference_id RHSA-2020:5665
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5665
22
reference_url https://usn.ubuntu.com/4250-1/
reference_id USN-4250-1
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:05:04Z/
url https://usn.ubuntu.com/4250-1/
23
reference_url https://usn.ubuntu.com/4250-2/
reference_id USN-4250-2
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:05:04Z/
url https://usn.ubuntu.com/4250-2/
fixed_packages
aliases CVE-2020-2574
risk_score 2.6
exploitability 0.5
weighted_severity 5.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-yt4u-3atp-vfb1
Fixing_vulnerabilities
Risk_score4.0
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:rpm/redhat/rh-mariadb103-galera@25.3.31-1%3Farch=el7