Lookup for vulnerable packages by Package URL.

Purlpkg:rpm/redhat/mariadb@1:5.5.37-1?arch=el7_0
Typerpm
Namespaceredhat
Namemariadb
Version1:5.5.37-1
Qualifiers
arch el7_0
Subpath
Is_vulnerabletrue
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
0
url VCID-314a-key6-uyd6
vulnerability_id VCID-314a-key6-uyd6
summary
Multiple vulnerabilities have been found in MySQL, worst of which
    allows local attackers to escalate their privileges.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-2419.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-2419.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-2419
reference_id
reference_type
scores
0
value 0.01268
scoring_system epss
scoring_elements 0.7942
published_at 2026-04-01T12:55:00Z
1
value 0.01268
scoring_system epss
scoring_elements 0.79427
published_at 2026-04-02T12:55:00Z
2
value 0.01268
scoring_system epss
scoring_elements 0.7945
published_at 2026-04-04T12:55:00Z
3
value 0.01268
scoring_system epss
scoring_elements 0.79437
published_at 2026-04-07T12:55:00Z
4
value 0.01268
scoring_system epss
scoring_elements 0.79465
published_at 2026-04-08T12:55:00Z
5
value 0.01268
scoring_system epss
scoring_elements 0.79475
published_at 2026-04-09T12:55:00Z
6
value 0.01268
scoring_system epss
scoring_elements 0.79497
published_at 2026-04-11T12:55:00Z
7
value 0.01268
scoring_system epss
scoring_elements 0.7948
published_at 2026-04-12T12:55:00Z
8
value 0.01268
scoring_system epss
scoring_elements 0.7947
published_at 2026-04-13T12:55:00Z
9
value 0.01268
scoring_system epss
scoring_elements 0.79501
published_at 2026-04-16T12:55:00Z
10
value 0.01268
scoring_system epss
scoring_elements 0.79498
published_at 2026-04-18T12:55:00Z
11
value 0.01268
scoring_system epss
scoring_elements 0.79503
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-2419
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0001
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0001
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0384
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0384
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2419
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2419
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2430
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2430
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2431
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2431
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2432
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2432
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2436
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2436
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2438
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2438
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2440
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2440
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1088134
reference_id 1088134
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1088134
12
reference_url https://security.gentoo.org/glsa/201409-04
reference_id GLSA-201409-04
reference_type
scores
url https://security.gentoo.org/glsa/201409-04
13
reference_url https://access.redhat.com/errata/RHSA-2014:0522
reference_id RHSA-2014:0522
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0522
14
reference_url https://access.redhat.com/errata/RHSA-2014:0536
reference_id RHSA-2014:0536
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0536
15
reference_url https://access.redhat.com/errata/RHSA-2014:0537
reference_id RHSA-2014:0537
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0537
16
reference_url https://access.redhat.com/errata/RHSA-2014:0702
reference_id RHSA-2014:0702
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0702
17
reference_url https://usn.ubuntu.com/2170-1/
reference_id USN-2170-1
reference_type
scores
url https://usn.ubuntu.com/2170-1/
fixed_packages
aliases CVE-2014-2419
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-314a-key6-uyd6
1
url VCID-7g65-mk33-a7e4
vulnerability_id VCID-7g65-mk33-a7e4
summary
Multiple vulnerabilities have been found in MySQL, worst of which
    allows local attackers to escalate their privileges.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-2430.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-2430.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-2430
reference_id
reference_type
scores
0
value 0.00647
scoring_system epss
scoring_elements 0.70685
published_at 2026-04-01T12:55:00Z
1
value 0.00647
scoring_system epss
scoring_elements 0.70699
published_at 2026-04-02T12:55:00Z
2
value 0.00647
scoring_system epss
scoring_elements 0.70718
published_at 2026-04-04T12:55:00Z
3
value 0.00647
scoring_system epss
scoring_elements 0.70695
published_at 2026-04-07T12:55:00Z
4
value 0.00647
scoring_system epss
scoring_elements 0.7074
published_at 2026-04-08T12:55:00Z
5
value 0.00647
scoring_system epss
scoring_elements 0.70756
published_at 2026-04-09T12:55:00Z
6
value 0.00647
scoring_system epss
scoring_elements 0.70779
published_at 2026-04-11T12:55:00Z
7
value 0.00647
scoring_system epss
scoring_elements 0.70762
published_at 2026-04-12T12:55:00Z
8
value 0.00647
scoring_system epss
scoring_elements 0.70746
published_at 2026-04-13T12:55:00Z
9
value 0.00647
scoring_system epss
scoring_elements 0.70791
published_at 2026-04-16T12:55:00Z
10
value 0.00647
scoring_system epss
scoring_elements 0.70798
published_at 2026-04-18T12:55:00Z
11
value 0.00647
scoring_system epss
scoring_elements 0.70775
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-2430
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0001
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0001
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0384
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0384
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2419
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2419
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2430
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2430
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2431
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2431
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2432
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2432
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2436
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2436
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2438
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2438
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2440
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2440
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1088143
reference_id 1088143
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1088143
12
reference_url https://security.gentoo.org/glsa/201409-04
reference_id GLSA-201409-04
reference_type
scores
url https://security.gentoo.org/glsa/201409-04
13
reference_url https://access.redhat.com/errata/RHSA-2014:0522
reference_id RHSA-2014:0522
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0522
14
reference_url https://access.redhat.com/errata/RHSA-2014:0536
reference_id RHSA-2014:0536
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0536
15
reference_url https://access.redhat.com/errata/RHSA-2014:0537
reference_id RHSA-2014:0537
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0537
16
reference_url https://access.redhat.com/errata/RHSA-2014:0702
reference_id RHSA-2014:0702
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0702
17
reference_url https://usn.ubuntu.com/2170-1/
reference_id USN-2170-1
reference_type
scores
url https://usn.ubuntu.com/2170-1/
fixed_packages
aliases CVE-2014-2430
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7g65-mk33-a7e4
2
url VCID-e5j7-u299-7khb
vulnerability_id VCID-e5j7-u299-7khb
summary
Multiple vulnerabilities have been found in MySQL, worst of which
    allows local attackers to escalate their privileges.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-0384.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-0384.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-0384
reference_id
reference_type
scores
0
value 0.00912
scoring_system epss
scoring_elements 0.75793
published_at 2026-04-01T12:55:00Z
1
value 0.00912
scoring_system epss
scoring_elements 0.75797
published_at 2026-04-02T12:55:00Z
2
value 0.00912
scoring_system epss
scoring_elements 0.75829
published_at 2026-04-04T12:55:00Z
3
value 0.00912
scoring_system epss
scoring_elements 0.75808
published_at 2026-04-07T12:55:00Z
4
value 0.00912
scoring_system epss
scoring_elements 0.7584
published_at 2026-04-08T12:55:00Z
5
value 0.00912
scoring_system epss
scoring_elements 0.75852
published_at 2026-04-09T12:55:00Z
6
value 0.00912
scoring_system epss
scoring_elements 0.75876
published_at 2026-04-21T12:55:00Z
7
value 0.00912
scoring_system epss
scoring_elements 0.75857
published_at 2026-04-12T12:55:00Z
8
value 0.00912
scoring_system epss
scoring_elements 0.7585
published_at 2026-04-13T12:55:00Z
9
value 0.00912
scoring_system epss
scoring_elements 0.75888
published_at 2026-04-16T12:55:00Z
10
value 0.00912
scoring_system epss
scoring_elements 0.75891
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-0384
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0001
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0001
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0384
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0384
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2419
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2419
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2430
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2430
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2431
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2431
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2432
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2432
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2436
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2436
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2438
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2438
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2440
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2440
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1088133
reference_id 1088133
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1088133
12
reference_url https://security.gentoo.org/glsa/201409-04
reference_id GLSA-201409-04
reference_type
scores
url https://security.gentoo.org/glsa/201409-04
13
reference_url https://access.redhat.com/errata/RHSA-2014:0522
reference_id RHSA-2014:0522
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0522
14
reference_url https://access.redhat.com/errata/RHSA-2014:0536
reference_id RHSA-2014:0536
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0536
15
reference_url https://access.redhat.com/errata/RHSA-2014:0537
reference_id RHSA-2014:0537
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0537
16
reference_url https://access.redhat.com/errata/RHSA-2014:0702
reference_id RHSA-2014:0702
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0702
17
reference_url https://usn.ubuntu.com/2170-1/
reference_id USN-2170-1
reference_type
scores
url https://usn.ubuntu.com/2170-1/
fixed_packages
aliases CVE-2014-0384
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-e5j7-u299-7khb
3
url VCID-ebse-vm79-w3gs
vulnerability_id VCID-ebse-vm79-w3gs
summary mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2019)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-2481.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-2481.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-2481
reference_id
reference_type
scores
0
value 0.00096
scoring_system epss
scoring_elements 0.26403
published_at 2026-04-21T12:55:00Z
1
value 0.00135
scoring_system epss
scoring_elements 0.3329
published_at 2026-04-02T12:55:00Z
2
value 0.00135
scoring_system epss
scoring_elements 0.33322
published_at 2026-04-04T12:55:00Z
3
value 0.00135
scoring_system epss
scoring_elements 0.33198
published_at 2026-04-08T12:55:00Z
4
value 0.00135
scoring_system epss
scoring_elements 0.33231
published_at 2026-04-09T12:55:00Z
5
value 0.00135
scoring_system epss
scoring_elements 0.33233
published_at 2026-04-11T12:55:00Z
6
value 0.00135
scoring_system epss
scoring_elements 0.33194
published_at 2026-04-12T12:55:00Z
7
value 0.00135
scoring_system epss
scoring_elements 0.3317
published_at 2026-04-13T12:55:00Z
8
value 0.00135
scoring_system epss
scoring_elements 0.33211
published_at 2026-04-16T12:55:00Z
9
value 0.00135
scoring_system epss
scoring_elements 0.33189
published_at 2026-04-18T12:55:00Z
10
value 0.00135
scoring_system epss
scoring_elements 0.33162
published_at 2026-04-01T12:55:00Z
11
value 0.00135
scoring_system epss
scoring_elements 0.33155
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-2481
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://security.netapp.com/advisory/ntap-20190118-0002/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T14:02:31Z/
url https://security.netapp.com/advisory/ntap-20190118-0002/
4
reference_url http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T14:02:31Z/
url http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
5
reference_url http://www.securityfocus.com/bid/106619
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T14:02:31Z/
url http://www.securityfocus.com/bid/106619
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1666743
reference_id 1666743
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1666743
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vsphere:*:*
reference_id cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vsphere:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vsphere:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:windows:*:*
reference_id cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:windows:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:windows:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:8.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.2:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:8.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.4:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:8.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.6:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:8.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:8.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:8.2:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:8.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:8.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:8.4:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:8.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:8.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:8.6:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:8.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:8.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:8.2:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:8.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:8.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:8.4:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:8.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:8.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:8.6:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-2481
reference_id CVE-2019-2481
reference_type
scores
0
value 4.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:P
1
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2019-2481
29
reference_url https://access.redhat.com/errata/RHSA-2014:0702
reference_id RHSA-2014:0702
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0702
30
reference_url https://access.redhat.com/errata/RHSA-2019:2484
reference_id RHSA-2019:2484
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T14:02:31Z/
url https://access.redhat.com/errata/RHSA-2019:2484
31
reference_url https://access.redhat.com/errata/RHSA-2019:2511
reference_id RHSA-2019:2511
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T14:02:31Z/
url https://access.redhat.com/errata/RHSA-2019:2511
32
reference_url https://usn.ubuntu.com/3867-1/
reference_id USN-3867-1
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T14:02:31Z/
url https://usn.ubuntu.com/3867-1/
fixed_packages
aliases CVE-2019-2481
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ebse-vm79-w3gs
4
url VCID-sx5p-wvpr-tqhc
vulnerability_id VCID-sx5p-wvpr-tqhc
summary
Multiple vulnerabilities have been found in MySQL, worst of which
    allows local attackers to escalate their privileges.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-2432.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-2432.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-2432
reference_id
reference_type
scores
0
value 0.00797
scoring_system epss
scoring_elements 0.73956
published_at 2026-04-01T12:55:00Z
1
value 0.00797
scoring_system epss
scoring_elements 0.73963
published_at 2026-04-02T12:55:00Z
2
value 0.00797
scoring_system epss
scoring_elements 0.73989
published_at 2026-04-04T12:55:00Z
3
value 0.00797
scoring_system epss
scoring_elements 0.7396
published_at 2026-04-07T12:55:00Z
4
value 0.00797
scoring_system epss
scoring_elements 0.73994
published_at 2026-04-08T12:55:00Z
5
value 0.00797
scoring_system epss
scoring_elements 0.74007
published_at 2026-04-09T12:55:00Z
6
value 0.00797
scoring_system epss
scoring_elements 0.7403
published_at 2026-04-11T12:55:00Z
7
value 0.00797
scoring_system epss
scoring_elements 0.74012
published_at 2026-04-12T12:55:00Z
8
value 0.00797
scoring_system epss
scoring_elements 0.74004
published_at 2026-04-13T12:55:00Z
9
value 0.00797
scoring_system epss
scoring_elements 0.74044
published_at 2026-04-21T12:55:00Z
10
value 0.00797
scoring_system epss
scoring_elements 0.74053
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-2432
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0001
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0001
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0384
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0384
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2419
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2419
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2430
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2430
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2431
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2431
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2432
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2432
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2436
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2436
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2438
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2438
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2440
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2440
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1088179
reference_id 1088179
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1088179
12
reference_url https://security.gentoo.org/glsa/201409-04
reference_id GLSA-201409-04
reference_type
scores
url https://security.gentoo.org/glsa/201409-04
13
reference_url https://access.redhat.com/errata/RHSA-2014:0522
reference_id RHSA-2014:0522
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0522
14
reference_url https://access.redhat.com/errata/RHSA-2014:0536
reference_id RHSA-2014:0536
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0536
15
reference_url https://access.redhat.com/errata/RHSA-2014:0537
reference_id RHSA-2014:0537
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0537
16
reference_url https://access.redhat.com/errata/RHSA-2014:0702
reference_id RHSA-2014:0702
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0702
17
reference_url https://usn.ubuntu.com/2170-1/
reference_id USN-2170-1
reference_type
scores
url https://usn.ubuntu.com/2170-1/
fixed_packages
aliases CVE-2014-2432
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-sx5p-wvpr-tqhc
5
url VCID-udfp-6t1z-3ucw
vulnerability_id VCID-udfp-6t1z-3ucw
summary
Multiple vulnerabilities have been found in MySQL, worst of which
    allows local attackers to escalate their privileges.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-2436.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-2436.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-2436
reference_id
reference_type
scores
0
value 0.00937
scoring_system epss
scoring_elements 0.76125
published_at 2026-04-01T12:55:00Z
1
value 0.00937
scoring_system epss
scoring_elements 0.7613
published_at 2026-04-02T12:55:00Z
2
value 0.00937
scoring_system epss
scoring_elements 0.76162
published_at 2026-04-04T12:55:00Z
3
value 0.00937
scoring_system epss
scoring_elements 0.76143
published_at 2026-04-07T12:55:00Z
4
value 0.00937
scoring_system epss
scoring_elements 0.76176
published_at 2026-04-08T12:55:00Z
5
value 0.00937
scoring_system epss
scoring_elements 0.76189
published_at 2026-04-09T12:55:00Z
6
value 0.00937
scoring_system epss
scoring_elements 0.76214
published_at 2026-04-11T12:55:00Z
7
value 0.00937
scoring_system epss
scoring_elements 0.7619
published_at 2026-04-12T12:55:00Z
8
value 0.00937
scoring_system epss
scoring_elements 0.76188
published_at 2026-04-13T12:55:00Z
9
value 0.00937
scoring_system epss
scoring_elements 0.76229
published_at 2026-04-16T12:55:00Z
10
value 0.00937
scoring_system epss
scoring_elements 0.76233
published_at 2026-04-18T12:55:00Z
11
value 0.00937
scoring_system epss
scoring_elements 0.76215
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-2436
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0001
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0001
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0384
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0384
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2419
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2419
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2430
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2430
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2431
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2431
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2432
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2432
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2436
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2436
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2438
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2438
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2440
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2440
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1088190
reference_id 1088190
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1088190
12
reference_url https://security.gentoo.org/glsa/201409-04
reference_id GLSA-201409-04
reference_type
scores
url https://security.gentoo.org/glsa/201409-04
13
reference_url https://access.redhat.com/errata/RHSA-2014:0522
reference_id RHSA-2014:0522
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0522
14
reference_url https://access.redhat.com/errata/RHSA-2014:0536
reference_id RHSA-2014:0536
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0536
15
reference_url https://access.redhat.com/errata/RHSA-2014:0537
reference_id RHSA-2014:0537
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0537
16
reference_url https://access.redhat.com/errata/RHSA-2014:0702
reference_id RHSA-2014:0702
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0702
17
reference_url https://usn.ubuntu.com/2170-1/
reference_id USN-2170-1
reference_type
scores
url https://usn.ubuntu.com/2170-1/
fixed_packages
aliases CVE-2014-2436
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-udfp-6t1z-3ucw
6
url VCID-x7st-fcvx-gbb7
vulnerability_id VCID-x7st-fcvx-gbb7
summary
Multiple vulnerabilities have been found in MySQL, worst of which
    allows local attackers to escalate their privileges.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-2431.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-2431.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-2431
reference_id
reference_type
scores
0
value 0.00998
scoring_system epss
scoring_elements 0.76896
published_at 2026-04-01T12:55:00Z
1
value 0.00998
scoring_system epss
scoring_elements 0.76903
published_at 2026-04-02T12:55:00Z
2
value 0.00998
scoring_system epss
scoring_elements 0.76933
published_at 2026-04-04T12:55:00Z
3
value 0.00998
scoring_system epss
scoring_elements 0.76916
published_at 2026-04-07T12:55:00Z
4
value 0.00998
scoring_system epss
scoring_elements 0.76948
published_at 2026-04-08T12:55:00Z
5
value 0.00998
scoring_system epss
scoring_elements 0.76959
published_at 2026-04-09T12:55:00Z
6
value 0.00998
scoring_system epss
scoring_elements 0.76987
published_at 2026-04-11T12:55:00Z
7
value 0.00998
scoring_system epss
scoring_elements 0.76966
published_at 2026-04-12T12:55:00Z
8
value 0.00998
scoring_system epss
scoring_elements 0.76961
published_at 2026-04-13T12:55:00Z
9
value 0.00998
scoring_system epss
scoring_elements 0.77002
published_at 2026-04-16T12:55:00Z
10
value 0.00998
scoring_system epss
scoring_elements 0.77005
published_at 2026-04-18T12:55:00Z
11
value 0.00998
scoring_system epss
scoring_elements 0.76997
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-2431
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0001
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0001
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0384
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0384
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2419
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2419
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2430
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2430
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2431
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2431
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2432
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2432
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2436
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2436
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2438
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2438
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2440
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2440
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1088146
reference_id 1088146
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1088146
12
reference_url https://security.gentoo.org/glsa/201409-04
reference_id GLSA-201409-04
reference_type
scores
url https://security.gentoo.org/glsa/201409-04
13
reference_url https://access.redhat.com/errata/RHSA-2014:0522
reference_id RHSA-2014:0522
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0522
14
reference_url https://access.redhat.com/errata/RHSA-2014:0536
reference_id RHSA-2014:0536
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0536
15
reference_url https://access.redhat.com/errata/RHSA-2014:0537
reference_id RHSA-2014:0537
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0537
16
reference_url https://access.redhat.com/errata/RHSA-2014:0702
reference_id RHSA-2014:0702
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0702
17
reference_url https://usn.ubuntu.com/2170-1/
reference_id USN-2170-1
reference_type
scores
url https://usn.ubuntu.com/2170-1/
fixed_packages
aliases CVE-2014-2431
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-x7st-fcvx-gbb7
7
url VCID-z8m3-5gbt-hya7
vulnerability_id VCID-z8m3-5gbt-hya7
summary
Multiple vulnerabilities have been found in MySQL, worst of which
    allows local attackers to escalate their privileges.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-2438.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-2438.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-2438
reference_id
reference_type
scores
0
value 0.00679
scoring_system epss
scoring_elements 0.71515
published_at 2026-04-01T12:55:00Z
1
value 0.00679
scoring_system epss
scoring_elements 0.71522
published_at 2026-04-02T12:55:00Z
2
value 0.00679
scoring_system epss
scoring_elements 0.71539
published_at 2026-04-04T12:55:00Z
3
value 0.00679
scoring_system epss
scoring_elements 0.71512
published_at 2026-04-07T12:55:00Z
4
value 0.00679
scoring_system epss
scoring_elements 0.71552
published_at 2026-04-13T12:55:00Z
5
value 0.00679
scoring_system epss
scoring_elements 0.71563
published_at 2026-04-09T12:55:00Z
6
value 0.00679
scoring_system epss
scoring_elements 0.71586
published_at 2026-04-11T12:55:00Z
7
value 0.00679
scoring_system epss
scoring_elements 0.7157
published_at 2026-04-12T12:55:00Z
8
value 0.00679
scoring_system epss
scoring_elements 0.71598
published_at 2026-04-16T12:55:00Z
9
value 0.00679
scoring_system epss
scoring_elements 0.71603
published_at 2026-04-18T12:55:00Z
10
value 0.00679
scoring_system epss
scoring_elements 0.71583
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-2438
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0001
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0001
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0384
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0384
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2419
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2419
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2430
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2430
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2431
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2431
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2432
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2432
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2436
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2436
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2438
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2438
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2440
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2440
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1088191
reference_id 1088191
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1088191
12
reference_url https://security.gentoo.org/glsa/201409-04
reference_id GLSA-201409-04
reference_type
scores
url https://security.gentoo.org/glsa/201409-04
13
reference_url https://access.redhat.com/errata/RHSA-2014:0522
reference_id RHSA-2014:0522
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0522
14
reference_url https://access.redhat.com/errata/RHSA-2014:0536
reference_id RHSA-2014:0536
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0536
15
reference_url https://access.redhat.com/errata/RHSA-2014:0537
reference_id RHSA-2014:0537
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0537
16
reference_url https://access.redhat.com/errata/RHSA-2014:0702
reference_id RHSA-2014:0702
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0702
17
reference_url https://usn.ubuntu.com/2170-1/
reference_id USN-2170-1
reference_type
scores
url https://usn.ubuntu.com/2170-1/
fixed_packages
aliases CVE-2014-2438
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-z8m3-5gbt-hya7
Fixing_vulnerabilities
Risk_score2.2
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:rpm/redhat/mariadb@1:5.5.37-1%3Farch=el7_0