Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/mysql-connector-java@5.1.10%2Bdfsg-2
Typedeb
Namespacedebian
Namemysql-connector-java
Version5.1.10+dfsg-2
Qualifiers
Subpath
Is_vulnerabletrue
Next_non_vulnerable_version5.1.49-0+deb9u1
Latest_non_vulnerable_version5.1.49-0+deb9u1
Affected_by_vulnerabilities
0
url VCID-28f6-ud4w-aug9
vulnerability_id VCID-28f6-ud4w-aug9
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2934.json
reference_id
reference_type
scores
0
value 5.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2934.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-2934
reference_id
reference_type
scores
0
value 0.0016
scoring_system epss
scoring_elements 0.36828
published_at 2026-04-01T12:55:00Z
1
value 0.0016
scoring_system epss
scoring_elements 0.36908
published_at 2026-04-16T12:55:00Z
2
value 0.0016
scoring_system epss
scoring_elements 0.36985
published_at 2026-04-02T12:55:00Z
3
value 0.0016
scoring_system epss
scoring_elements 0.37019
published_at 2026-04-04T12:55:00Z
4
value 0.0016
scoring_system epss
scoring_elements 0.36848
published_at 2026-04-07T12:55:00Z
5
value 0.0016
scoring_system epss
scoring_elements 0.36899
published_at 2026-04-08T12:55:00Z
6
value 0.0016
scoring_system epss
scoring_elements 0.36914
published_at 2026-04-09T12:55:00Z
7
value 0.0016
scoring_system epss
scoring_elements 0.36922
published_at 2026-04-11T12:55:00Z
8
value 0.0016
scoring_system epss
scoring_elements 0.36887
published_at 2026-04-12T12:55:00Z
9
value 0.0016
scoring_system epss
scoring_elements 0.36862
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-2934
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2875
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2875
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2933
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2933
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2934
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2934
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://lists.debian.org/debian-lts-announce/2020/06/msg00015.html
reference_id
reference_type
scores
0
value 5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:00:45Z/
url https://lists.debian.org/debian-lts-announce/2020/06/msg00015.html
7
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4QDR2WOUETBT76WAO5NNCCXSAM3AGG3D/
reference_id
reference_type
scores
0
value 5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:00:45Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4QDR2WOUETBT76WAO5NNCCXSAM3AGG3D/
8
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MDKQVPFT4Z4SFPBH6YNFMJOXKS2YYKHA/
reference_id
reference_type
scores
0
value 5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:00:45Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MDKQVPFT4Z4SFPBH6YNFMJOXKS2YYKHA/
9
reference_url https://www.debian.org/security/2020/dsa-4703
reference_id
reference_type
scores
0
value 5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:00:45Z/
url https://www.debian.org/security/2020/dsa-4703
10
reference_url https://www.oracle.com/security-alerts/cpuapr2020.html
reference_id
reference_type
scores
0
value 5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:00:45Z/
url https://www.oracle.com/security-alerts/cpuapr2020.html
11
reference_url https://www.oracle.com/security-alerts/cpujan2022.html
reference_id
reference_type
scores
0
value 5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:00:45Z/
url https://www.oracle.com/security-alerts/cpujan2022.html
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1851014
reference_id 1851014
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1851014
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_connector\/j:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql_connector\/j:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_connector\/j:*:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:weblogic_server:12.1.3.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:weblogic_server:12.1.3.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:weblogic_server:12.1.3.0.0:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:weblogic_server:12.2.1.3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:weblogic_server:12.2.1.3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:weblogic_server:12.2.1.3.0:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:weblogic_server:12.2.1.4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:weblogic_server:12.2.1.4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:weblogic_server:12.2.1.4.0:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:weblogic_server:14.1.1.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:weblogic_server:14.1.1.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:weblogic_server:14.1.1.0.0:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/detail/CVE-2020-2934
reference_id CVE-2020-2934
reference_type
scores
0
value 5.1
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:P/I:P/A:P
1
value 5.0
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L
2
value 5.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L
url https://nvd.nist.gov/vuln/detail/CVE-2020-2934
23
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:00:45Z/
url https://security.gentoo.org/glsa/202105-27
24
reference_url https://access.redhat.com/errata/RHSA-2020:4960
reference_id RHSA-2020:4960
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4960
25
reference_url https://access.redhat.com/errata/RHSA-2020:4961
reference_id RHSA-2020:4961
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4961
26
reference_url https://access.redhat.com/errata/RHSA-2021:5134
reference_id RHSA-2021:5134
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:5134
fixed_packages
0
url pkg:deb/debian/mysql-connector-java@5.1.49-0%2Bdeb9u1
purl pkg:deb/debian/mysql-connector-java@5.1.49-0%2Bdeb9u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-connector-java@5.1.49-0%252Bdeb9u1
aliases CVE-2020-2934
risk_score 2.3
exploitability 0.5
weighted_severity 4.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-28f6-ud4w-aug9
1
url VCID-3j8x-ev9x-1kh1
vulnerability_id VCID-3j8x-ev9x-1kh1
summary
Improper Access Control in MySQL Connectors Java
Unspecified vulnerability in the MySQL Connectors component in Oracle MySQL 5.1.34 and earlier allows remote authenticated users to affect confidentiality and integrity via unknown vectors related to Connector/J.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00026.html
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00026.html
1
reference_url http://lists.opensuse.org/opensuse-updates/2015-05/msg00089.html
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://lists.opensuse.org/opensuse-updates/2015-05/msg00089.html
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2575.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2575.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-2575
reference_id
reference_type
scores
0
value 0.01777
scoring_system epss
scoring_elements 0.82684
published_at 2026-04-13T12:55:00Z
1
value 0.01777
scoring_system epss
scoring_elements 0.82689
published_at 2026-04-12T12:55:00Z
2
value 0.01777
scoring_system epss
scoring_elements 0.82617
published_at 2026-04-01T12:55:00Z
3
value 0.01777
scoring_system epss
scoring_elements 0.82634
published_at 2026-04-02T12:55:00Z
4
value 0.01777
scoring_system epss
scoring_elements 0.82694
published_at 2026-04-11T12:55:00Z
5
value 0.01777
scoring_system epss
scoring_elements 0.82648
published_at 2026-04-04T12:55:00Z
6
value 0.01777
scoring_system epss
scoring_elements 0.82644
published_at 2026-04-07T12:55:00Z
7
value 0.01777
scoring_system epss
scoring_elements 0.82677
published_at 2026-04-09T12:55:00Z
8
value 0.01777
scoring_system epss
scoring_elements 0.8267
published_at 2026-04-08T12:55:00Z
9
value 0.01777
scoring_system epss
scoring_elements 0.82723
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-2575
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2575
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2575
5
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-2575
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2015-2575
6
reference_url https://security.netapp.com/advisory/ntap-20150417-0003
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://security.netapp.com/advisory/ntap-20150417-0003
7
reference_url https://security.netapp.com/advisory/ntap-20150417-0003/
reference_id
reference_type
scores
url https://security.netapp.com/advisory/ntap-20150417-0003/
8
reference_url http://www.debian.org/security/2016/dsa-3621
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.debian.org/security/2016/dsa-3621
9
reference_url http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1212764
reference_id 1212764
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1212764
11
reference_url https://github.com/advisories/GHSA-gc43-g62c-99g2
reference_id GHSA-gc43-g62c-99g2
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-gc43-g62c-99g2
fixed_packages
0
url pkg:deb/debian/mysql-connector-java@5.1.42-1~deb8u1
purl pkg:deb/debian/mysql-connector-java@5.1.42-1~deb8u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-28f6-ud4w-aug9
1
vulnerability VCID-u33b-3n5s-4qfv
2
vulnerability VCID-ucu7-scqc-nkcc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-connector-java@5.1.42-1~deb8u1
aliases CVE-2015-2575, GHSA-gc43-g62c-99g2
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3j8x-ev9x-1kh1
2
url VCID-rwme-t5cx-vub3
vulnerability_id VCID-rwme-t5cx-vub3
summary
Incorrect Privilege Assignment
Difficult to exploit vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Connectors. While the vulnerability is in MySQL Connectors, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of MySQL Connectors.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3523.json
reference_id
reference_type
scores
0
value 8.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3523.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-3523
reference_id
reference_type
scores
0
value 0.01646
scoring_system epss
scoring_elements 0.82008
published_at 2026-04-16T12:55:00Z
1
value 0.01646
scoring_system epss
scoring_elements 0.81972
published_at 2026-04-13T12:55:00Z
2
value 0.01646
scoring_system epss
scoring_elements 0.81977
published_at 2026-04-12T12:55:00Z
3
value 0.01646
scoring_system epss
scoring_elements 0.81989
published_at 2026-04-11T12:55:00Z
4
value 0.01646
scoring_system epss
scoring_elements 0.81969
published_at 2026-04-09T12:55:00Z
5
value 0.01646
scoring_system epss
scoring_elements 0.81961
published_at 2026-04-08T12:55:00Z
6
value 0.01646
scoring_system epss
scoring_elements 0.81935
published_at 2026-04-07T12:55:00Z
7
value 0.01646
scoring_system epss
scoring_elements 0.81939
published_at 2026-04-04T12:55:00Z
8
value 0.01646
scoring_system epss
scoring_elements 0.81916
published_at 2026-04-02T12:55:00Z
9
value 0.01646
scoring_system epss
scoring_elements 0.81905
published_at 2026-04-01T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-3523
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3523
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3523
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.6
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:S/C:P/I:P/A:P
1
value 8.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url http://www.debian.org/security/2017/dsa-3840
reference_id
reference_type
scores
0
value 8.5
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T16:22:40Z/
url http://www.debian.org/security/2017/dsa-3840
5
reference_url http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
reference_id
reference_type
scores
0
value 8.5
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T16:22:40Z/
url http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
6
reference_url http://www.securityfocus.com/bid/97982
reference_id
reference_type
scores
0
value 8.5
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T16:22:40Z/
url http://www.securityfocus.com/bid/97982
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1444759
reference_id 1444759
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1444759
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:connector\/j:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:connector\/j:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:connector\/j:*:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-3523
reference_id CVE-2017-3523
reference_type
scores
0
value 6.0
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:S/C:P/I:P/A:P
1
value 8.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H
2
value 8.5
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H
3
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2017-3523
10
reference_url https://github.com/advisories/GHSA-2xxh-f8r3-hvvr
reference_id GHSA-2xxh-f8r3-hvvr
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-2xxh-f8r3-hvvr
fixed_packages
0
url pkg:deb/debian/mysql-connector-java@5.1.42-1~deb8u1
purl pkg:deb/debian/mysql-connector-java@5.1.42-1~deb8u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-28f6-ud4w-aug9
1
vulnerability VCID-u33b-3n5s-4qfv
2
vulnerability VCID-ucu7-scqc-nkcc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-connector-java@5.1.42-1~deb8u1
aliases CVE-2017-3523, GHSA-2xxh-f8r3-hvvr
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rwme-t5cx-vub3
3
url VCID-u33b-3n5s-4qfv
vulnerability_id VCID-u33b-3n5s-4qfv
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2875.json
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2875.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-2875
reference_id
reference_type
scores
0
value 0.0069
scoring_system epss
scoring_elements 0.71745
published_at 2026-04-01T12:55:00Z
1
value 0.0069
scoring_system epss
scoring_elements 0.71828
published_at 2026-04-16T12:55:00Z
2
value 0.0069
scoring_system epss
scoring_elements 0.71753
published_at 2026-04-02T12:55:00Z
3
value 0.0069
scoring_system epss
scoring_elements 0.71771
published_at 2026-04-04T12:55:00Z
4
value 0.0069
scoring_system epss
scoring_elements 0.71746
published_at 2026-04-07T12:55:00Z
5
value 0.0069
scoring_system epss
scoring_elements 0.71785
published_at 2026-04-13T12:55:00Z
6
value 0.0069
scoring_system epss
scoring_elements 0.71796
published_at 2026-04-09T12:55:00Z
7
value 0.0069
scoring_system epss
scoring_elements 0.7182
published_at 2026-04-11T12:55:00Z
8
value 0.0069
scoring_system epss
scoring_elements 0.71803
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-2875
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2875
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2875
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2933
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2933
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2934
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2934
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://lists.debian.org/debian-lts-announce/2020/06/msg00015.html
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:02:06Z/
url https://lists.debian.org/debian-lts-announce/2020/06/msg00015.html
7
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4QDR2WOUETBT76WAO5NNCCXSAM3AGG3D/
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:02:06Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4QDR2WOUETBT76WAO5NNCCXSAM3AGG3D/
8
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MDKQVPFT4Z4SFPBH6YNFMJOXKS2YYKHA/
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:02:06Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MDKQVPFT4Z4SFPBH6YNFMJOXKS2YYKHA/
9
reference_url https://www.debian.org/security/2020/dsa-4703
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:02:06Z/
url https://www.debian.org/security/2020/dsa-4703
10
reference_url https://www.oracle.com/security-alerts/cpuapr2020.html
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:02:06Z/
url https://www.oracle.com/security-alerts/cpuapr2020.html
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1851019
reference_id 1851019
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1851019
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_connector\/j:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql_connector\/j:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_connector\/j:*:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/detail/CVE-2020-2875
reference_id CVE-2020-2875
reference_type
scores
0
value 4.0
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:P/I:P/A:N
1
value 4.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N
2
value 4.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2020-2875
18
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 4.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:02:06Z/
url https://security.gentoo.org/glsa/202105-27
19
reference_url https://access.redhat.com/errata/RHSA-2020:4960
reference_id RHSA-2020:4960
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4960
20
reference_url https://access.redhat.com/errata/RHSA-2020:4961
reference_id RHSA-2020:4961
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4961
21
reference_url https://access.redhat.com/errata/RHSA-2021:5134
reference_id RHSA-2021:5134
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:5134
fixed_packages
0
url pkg:deb/debian/mysql-connector-java@5.1.49-0%2Bdeb9u1
purl pkg:deb/debian/mysql-connector-java@5.1.49-0%2Bdeb9u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-connector-java@5.1.49-0%252Bdeb9u1
aliases CVE-2020-2875
risk_score 2.1
exploitability 0.5
weighted_severity 4.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-u33b-3n5s-4qfv
4
url VCID-ucu7-scqc-nkcc
vulnerability_id VCID-ucu7-scqc-nkcc
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2933.json
reference_id
reference_type
scores
0
value 2.2
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2933.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-2933
reference_id
reference_type
scores
0
value 0.00732
scoring_system epss
scoring_elements 0.72642
published_at 2026-04-01T12:55:00Z
1
value 0.00732
scoring_system epss
scoring_elements 0.72736
published_at 2026-04-16T12:55:00Z
2
value 0.00732
scoring_system epss
scoring_elements 0.7265
published_at 2026-04-02T12:55:00Z
3
value 0.00732
scoring_system epss
scoring_elements 0.72667
published_at 2026-04-04T12:55:00Z
4
value 0.00732
scoring_system epss
scoring_elements 0.72645
published_at 2026-04-07T12:55:00Z
5
value 0.00732
scoring_system epss
scoring_elements 0.72684
published_at 2026-04-08T12:55:00Z
6
value 0.00732
scoring_system epss
scoring_elements 0.72697
published_at 2026-04-09T12:55:00Z
7
value 0.00732
scoring_system epss
scoring_elements 0.72721
published_at 2026-04-11T12:55:00Z
8
value 0.00732
scoring_system epss
scoring_elements 0.72704
published_at 2026-04-12T12:55:00Z
9
value 0.00732
scoring_system epss
scoring_elements 0.72694
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-2933
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2875
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2875
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2933
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2933
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2934
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2934
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 2.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://lists.debian.org/debian-lts-announce/2020/06/msg00015.html
reference_id
reference_type
scores
0
value 2.2
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:00:47Z/
url https://lists.debian.org/debian-lts-announce/2020/06/msg00015.html
7
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4QDR2WOUETBT76WAO5NNCCXSAM3AGG3D/
reference_id
reference_type
scores
0
value 2.2
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:00:47Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4QDR2WOUETBT76WAO5NNCCXSAM3AGG3D/
8
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MDKQVPFT4Z4SFPBH6YNFMJOXKS2YYKHA/
reference_id
reference_type
scores
0
value 2.2
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:00:47Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MDKQVPFT4Z4SFPBH6YNFMJOXKS2YYKHA/
9
reference_url https://www.debian.org/security/2020/dsa-4703
reference_id
reference_type
scores
0
value 2.2
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:00:47Z/
url https://www.debian.org/security/2020/dsa-4703
10
reference_url https://www.oracle.com/security-alerts/cpuapr2020.html
reference_id
reference_type
scores
0
value 2.2
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:00:47Z/
url https://www.oracle.com/security-alerts/cpuapr2020.html
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1851022
reference_id 1851022
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1851022
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_connector\/j:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql_connector\/j:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_connector\/j:*:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/detail/CVE-2020-2933
reference_id CVE-2020-2933
reference_type
scores
0
value 3.5
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:S/C:N/I:N/A:P
1
value 2.2
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L
2
value 2.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L
url https://nvd.nist.gov/vuln/detail/CVE-2020-2933
18
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 2.2
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:00:47Z/
url https://security.gentoo.org/glsa/202105-27
19
reference_url https://access.redhat.com/errata/RHSA-2020:4960
reference_id RHSA-2020:4960
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4960
20
reference_url https://access.redhat.com/errata/RHSA-2020:4961
reference_id RHSA-2020:4961
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4961
fixed_packages
0
url pkg:deb/debian/mysql-connector-java@5.1.49-0%2Bdeb9u1
purl pkg:deb/debian/mysql-connector-java@5.1.49-0%2Bdeb9u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-connector-java@5.1.49-0%252Bdeb9u1
aliases CVE-2020-2933
risk_score 1.6
exploitability 0.5
weighted_severity 3.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ucu7-scqc-nkcc
5
url VCID-un2e-gea1-xue9
vulnerability_id VCID-un2e-gea1-xue9
summary
Incorrect Privilege Assignment
Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where MySQL Connectors executes to compromise MySQL Connectors. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of MySQL.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3589.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3589.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-3589
reference_id
reference_type
scores
0
value 0.00167
scoring_system epss
scoring_elements 0.37823
published_at 2026-04-16T12:55:00Z
1
value 0.00167
scoring_system epss
scoring_elements 0.37673
published_at 2026-04-01T12:55:00Z
2
value 0.00167
scoring_system epss
scoring_elements 0.37855
published_at 2026-04-02T12:55:00Z
3
value 0.00167
scoring_system epss
scoring_elements 0.3788
published_at 2026-04-04T12:55:00Z
4
value 0.00167
scoring_system epss
scoring_elements 0.37759
published_at 2026-04-07T12:55:00Z
5
value 0.00167
scoring_system epss
scoring_elements 0.37809
published_at 2026-04-08T12:55:00Z
6
value 0.00167
scoring_system epss
scoring_elements 0.37822
published_at 2026-04-09T12:55:00Z
7
value 0.00167
scoring_system epss
scoring_elements 0.37836
published_at 2026-04-11T12:55:00Z
8
value 0.00167
scoring_system epss
scoring_elements 0.378
published_at 2026-04-12T12:55:00Z
9
value 0.00167
scoring_system epss
scoring_elements 0.37775
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-3589
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3586
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3586
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3589
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3589
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 1.7
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:S/C:N/I:P/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url http://www.debian.org/security/2017/dsa-3857
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
1
value LOW
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:44:31Z/
url http://www.debian.org/security/2017/dsa-3857
6
reference_url http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
1
value LOW
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:44:31Z/
url http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
7
reference_url http://www.securityfocus.com/bid/97836
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:44:31Z/
url http://www.securityfocus.com/bid/97836
8
reference_url http://www.securitytracker.com/id/1038287
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:44:31Z/
url http://www.securitytracker.com/id/1038287
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1444407
reference_id 1444407
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1444407
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:connector\/j:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:connector\/j:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:connector\/j:*:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-3589
reference_id CVE-2017-3589
reference_type
scores
0
value 2.1
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:N/I:P/A:N
1
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
2
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
3
value LOW
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2017-3589
12
reference_url https://github.com/advisories/GHSA-cjcf-wm2p-59h5
reference_id GHSA-cjcf-wm2p-59h5
reference_type
scores
0
value LOW
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-cjcf-wm2p-59h5
fixed_packages
0
url pkg:deb/debian/mysql-connector-java@5.1.42-1~deb8u1
purl pkg:deb/debian/mysql-connector-java@5.1.42-1~deb8u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-28f6-ud4w-aug9
1
vulnerability VCID-u33b-3n5s-4qfv
2
vulnerability VCID-ucu7-scqc-nkcc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-connector-java@5.1.42-1~deb8u1
aliases CVE-2017-3589, GHSA-cjcf-wm2p-59h5
risk_score 1.5
exploitability 0.5
weighted_severity 3.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-un2e-gea1-xue9
6
url VCID-xpjh-mszn-buag
vulnerability_id VCID-xpjh-mszn-buag
summary
Privilege
An easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Connectors.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3586.json
reference_id
reference_type
scores
0
value 6.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3586.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-3586
reference_id
reference_type
scores
0
value 0.00802
scoring_system epss
scoring_elements 0.74132
published_at 2026-04-16T12:55:00Z
1
value 0.00802
scoring_system epss
scoring_elements 0.74093
published_at 2026-04-13T12:55:00Z
2
value 0.00802
scoring_system epss
scoring_elements 0.741
published_at 2026-04-12T12:55:00Z
3
value 0.00802
scoring_system epss
scoring_elements 0.74118
published_at 2026-04-11T12:55:00Z
4
value 0.00802
scoring_system epss
scoring_elements 0.74097
published_at 2026-04-09T12:55:00Z
5
value 0.00802
scoring_system epss
scoring_elements 0.74077
published_at 2026-04-04T12:55:00Z
6
value 0.00802
scoring_system epss
scoring_elements 0.74045
published_at 2026-04-01T12:55:00Z
7
value 0.00802
scoring_system epss
scoring_elements 0.74051
published_at 2026-04-02T12:55:00Z
8
value 0.00802
scoring_system epss
scoring_elements 0.74082
published_at 2026-04-08T12:55:00Z
9
value 0.00802
scoring_system epss
scoring_elements 0.74049
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-3586
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3586
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3586
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3589
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3589
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:P/I:P/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url http://www.debian.org/security/2017/dsa-3857
reference_id
reference_type
scores
0
value 6.4
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:44:34Z/
url http://www.debian.org/security/2017/dsa-3857
6
reference_url http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
reference_id
reference_type
scores
0
value 6.4
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:44:34Z/
url http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
7
reference_url http://www.securityfocus.com/bid/97784
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:44:34Z/
url http://www.securityfocus.com/bid/97784
8
reference_url http://www.securityfocus.com/bid/97982
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:44:34Z/
url http://www.securityfocus.com/bid/97982
9
reference_url http://www.securitytracker.com/id/1038287
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:44:34Z/
url http://www.securitytracker.com/id/1038287
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1444406
reference_id 1444406
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1444406
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_connectors:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql_connectors:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_connectors:*:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-3586
reference_id CVE-2017-3586
reference_type
scores
0
value 5.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:P/I:P/A:N
1
value 6.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N
2
value 6.4
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N
3
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2017-3586
13
reference_url https://github.com/advisories/GHSA-pwh7-92h3-mqr6
reference_id GHSA-pwh7-92h3-mqr6
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-pwh7-92h3-mqr6
fixed_packages
0
url pkg:deb/debian/mysql-connector-java@5.1.42-1~deb8u1
purl pkg:deb/debian/mysql-connector-java@5.1.42-1~deb8u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-28f6-ud4w-aug9
1
vulnerability VCID-u33b-3n5s-4qfv
2
vulnerability VCID-ucu7-scqc-nkcc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-connector-java@5.1.42-1~deb8u1
aliases CVE-2017-3586, GHSA-pwh7-92h3-mqr6
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xpjh-mszn-buag
Fixing_vulnerabilities
Risk_score4.0
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-connector-java@5.1.10%252Bdfsg-2