Lookup for vulnerable packages by Package URL.

Purlpkg:rpm/redhat/mariadb@1:5.5.68-1?arch=el7
Typerpm
Namespaceredhat
Namemariadb
Version1:5.5.68-1
Qualifiers
arch el7
Subpath
Is_vulnerabletrue
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
0
url VCID-16hf-q2fp-3yg4
vulnerability_id VCID-16hf-q2fp-3yg4
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00037.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:06Z/
url http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00037.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-2974.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-2974.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-2974
reference_id
reference_type
scores
0
value 0.00208
scoring_system epss
scoring_elements 0.43225
published_at 2026-04-11T12:55:00Z
1
value 0.00208
scoring_system epss
scoring_elements 0.43097
published_at 2026-04-26T12:55:00Z
2
value 0.00208
scoring_system epss
scoring_elements 0.43202
published_at 2026-04-04T12:55:00Z
3
value 0.00208
scoring_system epss
scoring_elements 0.4314
published_at 2026-04-07T12:55:00Z
4
value 0.00208
scoring_system epss
scoring_elements 0.43192
published_at 2026-04-12T12:55:00Z
5
value 0.00208
scoring_system epss
scoring_elements 0.43204
published_at 2026-04-09T12:55:00Z
6
value 0.00208
scoring_system epss
scoring_elements 0.43174
published_at 2026-04-02T12:55:00Z
7
value 0.00208
scoring_system epss
scoring_elements 0.43096
published_at 2026-04-24T12:55:00Z
8
value 0.00208
scoring_system epss
scoring_elements 0.43162
published_at 2026-04-21T12:55:00Z
9
value 0.00208
scoring_system epss
scoring_elements 0.43226
published_at 2026-04-18T12:55:00Z
10
value 0.00208
scoring_system epss
scoring_elements 0.43237
published_at 2026-04-16T12:55:00Z
11
value 0.00208
scoring_system epss
scoring_elements 0.43116
published_at 2026-04-01T12:55:00Z
12
value 0.00208
scoring_system epss
scoring_elements 0.43177
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-2974
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6DTUCXX5XXPNPFV2PHP6IESGTCFMZOFP/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:06Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6DTUCXX5XXPNPFV2PHP6IESGTCFMZOFP/
5
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7X5D3O4TOQ57KL5FLQEXH2JB2UQYHCUZ/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:06Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7X5D3O4TOQ57KL5FLQEXH2JB2UQYHCUZ/
6
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MKCJLNRK6RHFAHV7ZFD3XO7HNSBU3XOL/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:06Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MKCJLNRK6RHFAHV7ZFD3XO7HNSBU3XOL/
7
reference_url https://security.netapp.com/advisory/ntap-20191017-0002/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:06Z/
url https://security.netapp.com/advisory/ntap-20191017-0002/
8
reference_url http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:06Z/
url http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1764691
reference_id 1764691
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1764691
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-2974
reference_id CVE-2019-2974
reference_type
scores
0
value 4.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:P
1
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2019-2974
21
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:06Z/
url https://security.gentoo.org/glsa/202105-27
22
reference_url https://security.gentoo.org/glsa/202405-25
reference_id GLSA-202405-25
reference_type
scores
url https://security.gentoo.org/glsa/202405-25
23
reference_url https://access.redhat.com/errata/RHSA-2020:3518
reference_id RHSA-2020:3518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3518
24
reference_url https://access.redhat.com/errata/RHSA-2020:3732
reference_id RHSA-2020:3732
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3732
25
reference_url https://access.redhat.com/errata/RHSA-2020:3755
reference_id RHSA-2020:3755
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3755
26
reference_url https://access.redhat.com/errata/RHSA-2020:3757
reference_id RHSA-2020:3757
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3757
27
reference_url https://access.redhat.com/errata/RHSA-2020:4026
reference_id RHSA-2020:4026
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4026
28
reference_url https://access.redhat.com/errata/RHSA-2020:4174
reference_id RHSA-2020:4174
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4174
29
reference_url https://access.redhat.com/errata/RHSA-2020:5246
reference_id RHSA-2020:5246
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5246
30
reference_url https://access.redhat.com/errata/RHSA-2020:5500
reference_id RHSA-2020:5500
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5500
31
reference_url https://access.redhat.com/errata/RHSA-2020:5654
reference_id RHSA-2020:5654
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5654
32
reference_url https://access.redhat.com/errata/RHSA-2020:5663
reference_id RHSA-2020:5663
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5663
33
reference_url https://access.redhat.com/errata/RHSA-2020:5665
reference_id RHSA-2020:5665
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5665
34
reference_url https://usn.ubuntu.com/4195-1/
reference_id USN-4195-1
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:06Z/
url https://usn.ubuntu.com/4195-1/
35
reference_url https://usn.ubuntu.com/4195-2/
reference_id USN-4195-2
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:06Z/
url https://usn.ubuntu.com/4195-2/
fixed_packages
aliases CVE-2019-2974
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-16hf-q2fp-3yg4
1
url VCID-6du1-tzth-k3ht
vulnerability_id VCID-6du1-tzth-k3ht
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00054.html
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:04:05Z/
url http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00054.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2812.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2812.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-2812
reference_id
reference_type
scores
0
value 0.00122
scoring_system epss
scoring_elements 0.31042
published_at 2026-04-26T12:55:00Z
1
value 0.00122
scoring_system epss
scoring_elements 0.31344
published_at 2026-04-01T12:55:00Z
2
value 0.00122
scoring_system epss
scoring_elements 0.31483
published_at 2026-04-02T12:55:00Z
3
value 0.00122
scoring_system epss
scoring_elements 0.31525
published_at 2026-04-04T12:55:00Z
4
value 0.00122
scoring_system epss
scoring_elements 0.31343
published_at 2026-04-07T12:55:00Z
5
value 0.00122
scoring_system epss
scoring_elements 0.31396
published_at 2026-04-08T12:55:00Z
6
value 0.00122
scoring_system epss
scoring_elements 0.31427
published_at 2026-04-09T12:55:00Z
7
value 0.00122
scoring_system epss
scoring_elements 0.3143
published_at 2026-04-11T12:55:00Z
8
value 0.00122
scoring_system epss
scoring_elements 0.31387
published_at 2026-04-12T12:55:00Z
9
value 0.00122
scoring_system epss
scoring_elements 0.3135
published_at 2026-04-13T12:55:00Z
10
value 0.00122
scoring_system epss
scoring_elements 0.31383
published_at 2026-04-16T12:55:00Z
11
value 0.00122
scoring_system epss
scoring_elements 0.31363
published_at 2026-04-18T12:55:00Z
12
value 0.00122
scoring_system epss
scoring_elements 0.31334
published_at 2026-04-21T12:55:00Z
13
value 0.00122
scoring_system epss
scoring_elements 0.31164
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-2812
3
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/77REFDB7DE4WNKQIRGZTF53RFBQOXQLC/
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:04:05Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/77REFDB7DE4WNKQIRGZTF53RFBQOXQLC/
4
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SDGBQYS3A36S4CAZPV5YROHYXYZR6LAH/
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:04:05Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SDGBQYS3A36S4CAZPV5YROHYXYZR6LAH/
5
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TSVLI36TYRTPQGCS24VZQUXCUFOUW4VQ/
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:04:05Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TSVLI36TYRTPQGCS24VZQUXCUFOUW4VQ/
6
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UW2ED32VEUHXFN2J3YQE27JIBV4SC2PI/
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:04:05Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UW2ED32VEUHXFN2J3YQE27JIBV4SC2PI/
7
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X4X2BMF3EILMTXGOZDTPYS3KT5VWLA2P/
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:04:05Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X4X2BMF3EILMTXGOZDTPYS3KT5VWLA2P/
8
reference_url https://security.netapp.com/advisory/ntap-20200416-0003/
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:04:05Z/
url https://security.netapp.com/advisory/ntap-20200416-0003/
9
reference_url https://www.oracle.com/security-alerts/cpuapr2020.html
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:04:05Z/
url https://www.oracle.com/security-alerts/cpuapr2020.html
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1830059
reference_id 1830059
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1830059
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vsphere:*:*
reference_id cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vsphere:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vsphere:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
reference_id cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/detail/CVE-2020-2812
reference_id CVE-2020-2812
reference_type
scores
0
value 4.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:P
1
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
2
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2020-2812
29
reference_url https://security.gentoo.org/glsa/202012-08
reference_id GLSA-202012-08
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:04:05Z/
url https://security.gentoo.org/glsa/202012-08
30
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:04:05Z/
url https://security.gentoo.org/glsa/202105-27
31
reference_url https://access.redhat.com/errata/RHSA-2020:3518
reference_id RHSA-2020:3518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3518
32
reference_url https://access.redhat.com/errata/RHSA-2020:3732
reference_id RHSA-2020:3732
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3732
33
reference_url https://access.redhat.com/errata/RHSA-2020:3755
reference_id RHSA-2020:3755
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3755
34
reference_url https://access.redhat.com/errata/RHSA-2020:3757
reference_id RHSA-2020:3757
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3757
35
reference_url https://access.redhat.com/errata/RHSA-2020:4026
reference_id RHSA-2020:4026
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4026
36
reference_url https://access.redhat.com/errata/RHSA-2020:4174
reference_id RHSA-2020:4174
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4174
37
reference_url https://access.redhat.com/errata/RHSA-2020:5246
reference_id RHSA-2020:5246
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5246
38
reference_url https://access.redhat.com/errata/RHSA-2020:5500
reference_id RHSA-2020:5500
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5500
39
reference_url https://access.redhat.com/errata/RHSA-2020:5654
reference_id RHSA-2020:5654
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5654
40
reference_url https://access.redhat.com/errata/RHSA-2020:5663
reference_id RHSA-2020:5663
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5663
41
reference_url https://access.redhat.com/errata/RHSA-2020:5665
reference_id RHSA-2020:5665
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5665
42
reference_url https://usn.ubuntu.com/4350-1/
reference_id USN-4350-1
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:04:05Z/
url https://usn.ubuntu.com/4350-1/
43
reference_url https://usn.ubuntu.com/4603-1/
reference_id USN-4603-1
reference_type
scores
url https://usn.ubuntu.com/4603-1/
fixed_packages
aliases CVE-2020-2812
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6du1-tzth-k3ht
2
url VCID-gkm2-f4yw-7bh6
vulnerability_id VCID-gkm2-f4yw-7bh6
summary mysql: Server: Parser unspecified vulnerability (CPU Apr 2021)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2144.json
reference_id
reference_type
scores
0
value 7.2
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2144.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-2144
reference_id
reference_type
scores
0
value 0.02717
scoring_system epss
scoring_elements 0.85858
published_at 2026-04-01T12:55:00Z
1
value 0.02717
scoring_system epss
scoring_elements 0.8587
published_at 2026-04-02T12:55:00Z
2
value 0.02717
scoring_system epss
scoring_elements 0.85968
published_at 2026-04-26T12:55:00Z
3
value 0.02717
scoring_system epss
scoring_elements 0.85945
published_at 2026-04-16T12:55:00Z
4
value 0.02717
scoring_system epss
scoring_elements 0.85949
published_at 2026-04-18T12:55:00Z
5
value 0.02717
scoring_system epss
scoring_elements 0.8594
published_at 2026-04-21T12:55:00Z
6
value 0.02717
scoring_system epss
scoring_elements 0.8596
published_at 2026-04-24T12:55:00Z
7
value 0.02717
scoring_system epss
scoring_elements 0.85887
published_at 2026-04-04T12:55:00Z
8
value 0.02717
scoring_system epss
scoring_elements 0.85891
published_at 2026-04-07T12:55:00Z
9
value 0.02717
scoring_system epss
scoring_elements 0.85909
published_at 2026-04-08T12:55:00Z
10
value 0.02717
scoring_system epss
scoring_elements 0.85919
published_at 2026-04-09T12:55:00Z
11
value 0.02717
scoring_system epss
scoring_elements 0.85934
published_at 2026-04-11T12:55:00Z
12
value 0.02717
scoring_system epss
scoring_elements 0.85932
published_at 2026-04-12T12:55:00Z
13
value 0.02717
scoring_system epss
scoring_elements 0.85926
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-2144
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1951749
reference_id 1951749
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1951749
3
reference_url https://access.redhat.com/errata/RHSA-2020:3518
reference_id RHSA-2020:3518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3518
4
reference_url https://access.redhat.com/errata/RHSA-2020:3732
reference_id RHSA-2020:3732
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3732
5
reference_url https://access.redhat.com/errata/RHSA-2020:3755
reference_id RHSA-2020:3755
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3755
6
reference_url https://access.redhat.com/errata/RHSA-2020:3757
reference_id RHSA-2020:3757
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3757
7
reference_url https://access.redhat.com/errata/RHSA-2020:4026
reference_id RHSA-2020:4026
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4026
8
reference_url https://access.redhat.com/errata/RHSA-2020:5246
reference_id RHSA-2020:5246
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5246
9
reference_url https://access.redhat.com/errata/RHSA-2020:5500
reference_id RHSA-2020:5500
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5500
10
reference_url https://access.redhat.com/errata/RHSA-2020:5654
reference_id RHSA-2020:5654
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5654
11
reference_url https://access.redhat.com/errata/RHSA-2020:5663
reference_id RHSA-2020:5663
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5663
12
reference_url https://access.redhat.com/errata/RHSA-2020:5665
reference_id RHSA-2020:5665
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5665
fixed_packages
aliases CVE-2021-2144
risk_score 3.2
exploitability 0.5
weighted_severity 6.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gkm2-f4yw-7bh6
3
url VCID-jrj5-82ey-3fhy
vulnerability_id VCID-jrj5-82ey-3fhy
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2780.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2780.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-2780
reference_id
reference_type
scores
0
value 0.00608
scoring_system epss
scoring_elements 0.69623
published_at 2026-04-01T12:55:00Z
1
value 0.00608
scoring_system epss
scoring_elements 0.69781
published_at 2026-04-26T12:55:00Z
2
value 0.00608
scoring_system epss
scoring_elements 0.69635
published_at 2026-04-02T12:55:00Z
3
value 0.00608
scoring_system epss
scoring_elements 0.69651
published_at 2026-04-04T12:55:00Z
4
value 0.00608
scoring_system epss
scoring_elements 0.69629
published_at 2026-04-07T12:55:00Z
5
value 0.00608
scoring_system epss
scoring_elements 0.6968
published_at 2026-04-08T12:55:00Z
6
value 0.00608
scoring_system epss
scoring_elements 0.69697
published_at 2026-04-09T12:55:00Z
7
value 0.00608
scoring_system epss
scoring_elements 0.69719
published_at 2026-04-11T12:55:00Z
8
value 0.00608
scoring_system epss
scoring_elements 0.69705
published_at 2026-04-12T12:55:00Z
9
value 0.00608
scoring_system epss
scoring_elements 0.69691
published_at 2026-04-13T12:55:00Z
10
value 0.00608
scoring_system epss
scoring_elements 0.69731
published_at 2026-04-16T12:55:00Z
11
value 0.00608
scoring_system epss
scoring_elements 0.6974
published_at 2026-04-18T12:55:00Z
12
value 0.00608
scoring_system epss
scoring_elements 0.69721
published_at 2026-04-21T12:55:00Z
13
value 0.00608
scoring_system epss
scoring_elements 0.69773
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-2780
2
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/77REFDB7DE4WNKQIRGZTF53RFBQOXQLC/
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:33Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/77REFDB7DE4WNKQIRGZTF53RFBQOXQLC/
3
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SDGBQYS3A36S4CAZPV5YROHYXYZR6LAH/
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:33Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SDGBQYS3A36S4CAZPV5YROHYXYZR6LAH/
4
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TSVLI36TYRTPQGCS24VZQUXCUFOUW4VQ/
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:33Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TSVLI36TYRTPQGCS24VZQUXCUFOUW4VQ/
5
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X4X2BMF3EILMTXGOZDTPYS3KT5VWLA2P/
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:33Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X4X2BMF3EILMTXGOZDTPYS3KT5VWLA2P/
6
reference_url https://security.netapp.com/advisory/ntap-20200416-0003/
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:33Z/
url https://security.netapp.com/advisory/ntap-20200416-0003/
7
reference_url https://www.oracle.com/security-alerts/cpuapr2020.html
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:33Z/
url https://www.oracle.com/security-alerts/cpuapr2020.html
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1830056
reference_id 1830056
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1830056
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
reference_id cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
reference_id cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/detail/CVE-2020-2780
reference_id CVE-2020-2780
reference_type
scores
0
value 4.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:P
1
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
2
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2020-2780
24
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:33Z/
url https://security.gentoo.org/glsa/202105-27
25
reference_url https://access.redhat.com/errata/RHSA-2020:3518
reference_id RHSA-2020:3518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3518
26
reference_url https://access.redhat.com/errata/RHSA-2020:3732
reference_id RHSA-2020:3732
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3732
27
reference_url https://access.redhat.com/errata/RHSA-2020:3755
reference_id RHSA-2020:3755
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3755
28
reference_url https://access.redhat.com/errata/RHSA-2020:3757
reference_id RHSA-2020:3757
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3757
29
reference_url https://access.redhat.com/errata/RHSA-2020:4026
reference_id RHSA-2020:4026
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4026
30
reference_url https://access.redhat.com/errata/RHSA-2020:4174
reference_id RHSA-2020:4174
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4174
31
reference_url https://access.redhat.com/errata/RHSA-2020:5246
reference_id RHSA-2020:5246
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5246
32
reference_url https://access.redhat.com/errata/RHSA-2020:5500
reference_id RHSA-2020:5500
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5500
33
reference_url https://access.redhat.com/errata/RHSA-2020:5654
reference_id RHSA-2020:5654
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5654
34
reference_url https://access.redhat.com/errata/RHSA-2020:5663
reference_id RHSA-2020:5663
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5663
35
reference_url https://access.redhat.com/errata/RHSA-2020:5665
reference_id RHSA-2020:5665
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5665
36
reference_url https://usn.ubuntu.com/4350-1/
reference_id USN-4350-1
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:33Z/
url https://usn.ubuntu.com/4350-1/
fixed_packages
aliases CVE-2020-2780
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jrj5-82ey-3fhy
4
url VCID-tp8f-vv6a-j7fb
vulnerability_id VCID-tp8f-vv6a-j7fb
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00054.html
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:00:13Z/
url http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00054.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2752.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2752.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-2752
reference_id
reference_type
scores
0
value 0.00229
scoring_system epss
scoring_elements 0.45683
published_at 2026-04-26T12:55:00Z
1
value 0.00229
scoring_system epss
scoring_elements 0.45663
published_at 2026-04-01T12:55:00Z
2
value 0.00229
scoring_system epss
scoring_elements 0.45728
published_at 2026-04-02T12:55:00Z
3
value 0.00229
scoring_system epss
scoring_elements 0.45748
published_at 2026-04-04T12:55:00Z
4
value 0.00229
scoring_system epss
scoring_elements 0.45697
published_at 2026-04-07T12:55:00Z
5
value 0.00229
scoring_system epss
scoring_elements 0.45753
published_at 2026-04-08T12:55:00Z
6
value 0.00229
scoring_system epss
scoring_elements 0.4575
published_at 2026-04-13T12:55:00Z
7
value 0.00229
scoring_system epss
scoring_elements 0.45772
published_at 2026-04-11T12:55:00Z
8
value 0.00229
scoring_system epss
scoring_elements 0.45742
published_at 2026-04-21T12:55:00Z
9
value 0.00229
scoring_system epss
scoring_elements 0.458
published_at 2026-04-16T12:55:00Z
10
value 0.00229
scoring_system epss
scoring_elements 0.45795
published_at 2026-04-18T12:55:00Z
11
value 0.00229
scoring_system epss
scoring_elements 0.45672
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-2752
3
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UW2ED32VEUHXFN2J3YQE27JIBV4SC2PI/
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:00:13Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UW2ED32VEUHXFN2J3YQE27JIBV4SC2PI/
4
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X4X2BMF3EILMTXGOZDTPYS3KT5VWLA2P/
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:00:13Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X4X2BMF3EILMTXGOZDTPYS3KT5VWLA2P/
5
reference_url https://security.netapp.com/advisory/ntap-20200416-0003/
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:00:13Z/
url https://security.netapp.com/advisory/ntap-20200416-0003/
6
reference_url https://www.oracle.com/security-alerts/cpuapr2020.html
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:00:13Z/
url https://www.oracle.com/security-alerts/cpuapr2020.html
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1835849
reference_id 1835849
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1835849
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
reference_id cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
reference_id cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/detail/CVE-2020-2752
reference_id CVE-2020-2752
reference_type
scores
0
value 3.5
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:S/C:N/I:N/A:P
1
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
2
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2020-2752
19
reference_url https://security.gentoo.org/glsa/202012-08
reference_id GLSA-202012-08
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:00:13Z/
url https://security.gentoo.org/glsa/202012-08
20
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:00:13Z/
url https://security.gentoo.org/glsa/202105-27
21
reference_url https://access.redhat.com/errata/RHSA-2020:3518
reference_id RHSA-2020:3518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3518
22
reference_url https://access.redhat.com/errata/RHSA-2020:3732
reference_id RHSA-2020:3732
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3732
23
reference_url https://access.redhat.com/errata/RHSA-2020:3755
reference_id RHSA-2020:3755
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3755
24
reference_url https://access.redhat.com/errata/RHSA-2020:3757
reference_id RHSA-2020:3757
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3757
25
reference_url https://access.redhat.com/errata/RHSA-2020:4026
reference_id RHSA-2020:4026
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4026
26
reference_url https://access.redhat.com/errata/RHSA-2020:4174
reference_id RHSA-2020:4174
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4174
27
reference_url https://access.redhat.com/errata/RHSA-2020:5246
reference_id RHSA-2020:5246
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5246
28
reference_url https://access.redhat.com/errata/RHSA-2020:5500
reference_id RHSA-2020:5500
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5500
29
reference_url https://access.redhat.com/errata/RHSA-2020:5503
reference_id RHSA-2020:5503
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5503
30
reference_url https://access.redhat.com/errata/RHSA-2020:5654
reference_id RHSA-2020:5654
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5654
31
reference_url https://access.redhat.com/errata/RHSA-2020:5655
reference_id RHSA-2020:5655
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5655
32
reference_url https://access.redhat.com/errata/RHSA-2020:5660
reference_id RHSA-2020:5660
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5660
33
reference_url https://access.redhat.com/errata/RHSA-2020:5662
reference_id RHSA-2020:5662
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5662
34
reference_url https://access.redhat.com/errata/RHSA-2020:5663
reference_id RHSA-2020:5663
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5663
35
reference_url https://access.redhat.com/errata/RHSA-2020:5665
reference_id RHSA-2020:5665
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5665
36
reference_url https://usn.ubuntu.com/4603-1/
reference_id USN-4603-1
reference_type
scores
url https://usn.ubuntu.com/4603-1/
fixed_packages
aliases CVE-2020-2752
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tp8f-vv6a-j7fb
5
url VCID-yt4u-3atp-vfb1
vulnerability_id VCID-yt4u-3atp-vfb1
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2574.json
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2574.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-2574
reference_id
reference_type
scores
0
value 0.0016
scoring_system epss
scoring_elements 0.36632
published_at 2026-04-26T12:55:00Z
1
value 0.0016
scoring_system epss
scoring_elements 0.36881
published_at 2026-04-01T12:55:00Z
2
value 0.0016
scoring_system epss
scoring_elements 0.37051
published_at 2026-04-02T12:55:00Z
3
value 0.0016
scoring_system epss
scoring_elements 0.37084
published_at 2026-04-04T12:55:00Z
4
value 0.0016
scoring_system epss
scoring_elements 0.36912
published_at 2026-04-07T12:55:00Z
5
value 0.0016
scoring_system epss
scoring_elements 0.36962
published_at 2026-04-08T12:55:00Z
6
value 0.0016
scoring_system epss
scoring_elements 0.36975
published_at 2026-04-09T12:55:00Z
7
value 0.0016
scoring_system epss
scoring_elements 0.36984
published_at 2026-04-11T12:55:00Z
8
value 0.0016
scoring_system epss
scoring_elements 0.36948
published_at 2026-04-12T12:55:00Z
9
value 0.0016
scoring_system epss
scoring_elements 0.36922
published_at 2026-04-13T12:55:00Z
10
value 0.0016
scoring_system epss
scoring_elements 0.36967
published_at 2026-04-16T12:55:00Z
11
value 0.0016
scoring_system epss
scoring_elements 0.36951
published_at 2026-04-18T12:55:00Z
12
value 0.0016
scoring_system epss
scoring_elements 0.36892
published_at 2026-04-21T12:55:00Z
13
value 0.0016
scoring_system epss
scoring_elements 0.36665
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-2574
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url http://www.openwall.com/lists/oss-security/2020/09/29/1
reference_id 1
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:05:04Z/
url http://www.openwall.com/lists/oss-security/2020/09/29/1
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1798587
reference_id 1798587
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1798587
5
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:05:04Z/
url https://security.gentoo.org/glsa/202105-27
6
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00007.html
reference_id msg00007.html
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:05:04Z/
url http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00007.html
7
reference_url https://access.redhat.com/errata/RHSA-2020:3518
reference_id RHSA-2020:3518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3518
8
reference_url https://access.redhat.com/errata/RHSA-2020:3732
reference_id RHSA-2020:3732
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3732
9
reference_url https://access.redhat.com/errata/RHSA-2020:3755
reference_id RHSA-2020:3755
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3755
10
reference_url https://access.redhat.com/errata/RHSA-2020:3757
reference_id RHSA-2020:3757
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3757
11
reference_url https://access.redhat.com/errata/RHSA-2020:4026
reference_id RHSA-2020:4026
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4026
12
reference_url https://access.redhat.com/errata/RHSA-2020:4174
reference_id RHSA-2020:4174
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4174
13
reference_url https://access.redhat.com/errata/RHSA-2020:5246
reference_id RHSA-2020:5246
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5246
14
reference_url https://access.redhat.com/errata/RHSA-2020:5500
reference_id RHSA-2020:5500
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5500
15
reference_url https://access.redhat.com/errata/RHSA-2020:5503
reference_id RHSA-2020:5503
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5503
16
reference_url https://access.redhat.com/errata/RHSA-2020:5654
reference_id RHSA-2020:5654
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5654
17
reference_url https://access.redhat.com/errata/RHSA-2020:5655
reference_id RHSA-2020:5655
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5655
18
reference_url https://access.redhat.com/errata/RHSA-2020:5660
reference_id RHSA-2020:5660
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5660
19
reference_url https://access.redhat.com/errata/RHSA-2020:5662
reference_id RHSA-2020:5662
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5662
20
reference_url https://access.redhat.com/errata/RHSA-2020:5663
reference_id RHSA-2020:5663
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5663
21
reference_url https://access.redhat.com/errata/RHSA-2020:5665
reference_id RHSA-2020:5665
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5665
22
reference_url https://usn.ubuntu.com/4250-1/
reference_id USN-4250-1
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:05:04Z/
url https://usn.ubuntu.com/4250-1/
23
reference_url https://usn.ubuntu.com/4250-2/
reference_id USN-4250-2
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:05:04Z/
url https://usn.ubuntu.com/4250-2/
fixed_packages
aliases CVE-2020-2574
risk_score 2.6
exploitability 0.5
weighted_severity 5.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-yt4u-3atp-vfb1
Fixing_vulnerabilities
Risk_score3.2
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:rpm/redhat/mariadb@1:5.5.68-1%3Farch=el7