Lookup for vulnerable packages by Package URL.

Purlpkg:maven/mysql/mysql-connector-java@5.1.42
Typemaven
Namespacemysql
Namemysql-connector-java
Version5.1.42
Qualifiers
Subpath
Is_vulnerabletrue
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
0
url VCID-28f6-ud4w-aug9
vulnerability_id VCID-28f6-ud4w-aug9
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2934.json
reference_id
reference_type
scores
0
value 5.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2934.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-2934
reference_id
reference_type
scores
0
value 0.0016
scoring_system epss
scoring_elements 0.36828
published_at 2026-04-01T12:55:00Z
1
value 0.0016
scoring_system epss
scoring_elements 0.36862
published_at 2026-04-13T12:55:00Z
2
value 0.0016
scoring_system epss
scoring_elements 0.36985
published_at 2026-04-02T12:55:00Z
3
value 0.0016
scoring_system epss
scoring_elements 0.37019
published_at 2026-04-04T12:55:00Z
4
value 0.0016
scoring_system epss
scoring_elements 0.36848
published_at 2026-04-07T12:55:00Z
5
value 0.0016
scoring_system epss
scoring_elements 0.36899
published_at 2026-04-08T12:55:00Z
6
value 0.0016
scoring_system epss
scoring_elements 0.36914
published_at 2026-04-09T12:55:00Z
7
value 0.0016
scoring_system epss
scoring_elements 0.36922
published_at 2026-04-11T12:55:00Z
8
value 0.0016
scoring_system epss
scoring_elements 0.36887
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-2934
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2875
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2875
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2933
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2933
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2934
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2934
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://lists.debian.org/debian-lts-announce/2020/06/msg00015.html
reference_id
reference_type
scores
0
value 5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:00:45Z/
url https://lists.debian.org/debian-lts-announce/2020/06/msg00015.html
7
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4QDR2WOUETBT76WAO5NNCCXSAM3AGG3D/
reference_id
reference_type
scores
0
value 5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:00:45Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4QDR2WOUETBT76WAO5NNCCXSAM3AGG3D/
8
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MDKQVPFT4Z4SFPBH6YNFMJOXKS2YYKHA/
reference_id
reference_type
scores
0
value 5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:00:45Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MDKQVPFT4Z4SFPBH6YNFMJOXKS2YYKHA/
9
reference_url https://www.debian.org/security/2020/dsa-4703
reference_id
reference_type
scores
0
value 5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:00:45Z/
url https://www.debian.org/security/2020/dsa-4703
10
reference_url https://www.oracle.com/security-alerts/cpuapr2020.html
reference_id
reference_type
scores
0
value 5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:00:45Z/
url https://www.oracle.com/security-alerts/cpuapr2020.html
11
reference_url https://www.oracle.com/security-alerts/cpujan2022.html
reference_id
reference_type
scores
0
value 5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:00:45Z/
url https://www.oracle.com/security-alerts/cpujan2022.html
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1851014
reference_id 1851014
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1851014
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_connector\/j:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql_connector\/j:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_connector\/j:*:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:weblogic_server:12.1.3.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:weblogic_server:12.1.3.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:weblogic_server:12.1.3.0.0:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:weblogic_server:12.2.1.3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:weblogic_server:12.2.1.3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:weblogic_server:12.2.1.3.0:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:weblogic_server:12.2.1.4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:weblogic_server:12.2.1.4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:weblogic_server:12.2.1.4.0:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:weblogic_server:14.1.1.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:weblogic_server:14.1.1.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:weblogic_server:14.1.1.0.0:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/detail/CVE-2020-2934
reference_id CVE-2020-2934
reference_type
scores
0
value 5.1
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:P/I:P/A:P
1
value 5.0
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L
2
value 5.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L
url https://nvd.nist.gov/vuln/detail/CVE-2020-2934
23
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:00:45Z/
url https://security.gentoo.org/glsa/202105-27
24
reference_url https://access.redhat.com/errata/RHSA-2020:4960
reference_id RHSA-2020:4960
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4960
25
reference_url https://access.redhat.com/errata/RHSA-2020:4961
reference_id RHSA-2020:4961
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4961
26
reference_url https://access.redhat.com/errata/RHSA-2021:5134
reference_id RHSA-2021:5134
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:5134
fixed_packages
0
url pkg:maven/mysql/mysql-connector-java@5.1.49
purl pkg:maven/mysql/mysql-connector-java@5.1.49
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7v7q-8wa6-hff5
1
vulnerability VCID-e37q-8shh-v7aw
2
vulnerability VCID-ht8v-kvcr-77ds
3
vulnerability VCID-xap5-du1j-c7ed
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/mysql/mysql-connector-java@5.1.49
1
url pkg:maven/mysql/mysql-connector-java@8.0.20
purl pkg:maven/mysql/mysql-connector-java@8.0.20
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4w4j-hadb-w3e6
1
vulnerability VCID-e37q-8shh-v7aw
2
vulnerability VCID-xap5-du1j-c7ed
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/mysql/mysql-connector-java@8.0.20
aliases CVE-2020-2934
risk_score 2.3
exploitability 0.5
weighted_severity 4.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-28f6-ud4w-aug9
1
url VCID-7v7q-8wa6-hff5
vulnerability_id VCID-7v7q-8wa6-hff5
summary
Improper Access Control
A vulnerability in the MySQL Connectors component of Oracle MySQL exists. Successful attacks of this vulnerability can result in takeover of MySQL Connectors.
references
0
reference_url https://access.redhat.com/errata/RHSA-2019:1545
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T18:16:07Z/
url https://access.redhat.com/errata/RHSA-2019:1545
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-3258.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-3258.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-3258
reference_id
reference_type
scores
0
value 0.04126
scoring_system epss
scoring_elements 0.88634
published_at 2026-04-09T12:55:00Z
1
value 0.04126
scoring_system epss
scoring_elements 0.88583
published_at 2026-04-01T12:55:00Z
2
value 0.04126
scoring_system epss
scoring_elements 0.88592
published_at 2026-04-02T12:55:00Z
3
value 0.04126
scoring_system epss
scoring_elements 0.88639
published_at 2026-04-13T12:55:00Z
4
value 0.04126
scoring_system epss
scoring_elements 0.88638
published_at 2026-04-12T12:55:00Z
5
value 0.04126
scoring_system epss
scoring_elements 0.88646
published_at 2026-04-11T12:55:00Z
6
value 0.04126
scoring_system epss
scoring_elements 0.88609
published_at 2026-04-04T12:55:00Z
7
value 0.04126
scoring_system epss
scoring_elements 0.88611
published_at 2026-04-07T12:55:00Z
8
value 0.04126
scoring_system epss
scoring_elements 0.88629
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-3258
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://security.netapp.com/advisory/ntap-20181018-0002
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://security.netapp.com/advisory/ntap-20181018-0002
5
reference_url https://security.netapp.com/advisory/ntap-20181018-0002/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T18:16:07Z/
url https://security.netapp.com/advisory/ntap-20181018-0002/
6
reference_url http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T18:16:07Z/
url http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
7
reference_url http://www.securityfocus.com/bid/105589
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T18:16:07Z/
url http://www.securityfocus.com/bid/105589
8
reference_url http://www.securitytracker.com/id/1041888
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T18:16:07Z/
url http://www.securitytracker.com/id/1041888
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1640615
reference_id 1640615
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1640615
10
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-3258
reference_id CVE-2018-3258
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2018-3258
11
reference_url https://github.com/advisories/GHSA-4vrv-ch96-6h42
reference_id GHSA-4vrv-ch96-6h42
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-4vrv-ch96-6h42
12
reference_url https://access.redhat.com/errata/RHSA-2020:4366
reference_id RHSA-2020:4366
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4366
fixed_packages
0
url pkg:maven/mysql/mysql-connector-java@8.0.13
purl pkg:maven/mysql/mysql-connector-java@8.0.13
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-28f6-ud4w-aug9
1
vulnerability VCID-4w4j-hadb-w3e6
2
vulnerability VCID-e37q-8shh-v7aw
3
vulnerability VCID-ht8v-kvcr-77ds
4
vulnerability VCID-u33b-3n5s-4qfv
5
vulnerability VCID-xap5-du1j-c7ed
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/mysql/mysql-connector-java@8.0.13
aliases CVE-2018-3258, GHSA-4vrv-ch96-6h42
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7v7q-8wa6-hff5
2
url VCID-e37q-8shh-v7aw
vulnerability_id VCID-e37q-8shh-v7aw
summary
Unknown Vulnerability
Vulnerability in the MySQL Connectors product of Oracle MySQL (component: Connector/J). Supported versions that are affected are 8.0.27 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Connectors. Successful attacks of this vulnerability can result in takeover of MySQL Connectors.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21363.json
reference_id
reference_type
scores
0
value 6.6
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21363.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21363
reference_id
reference_type
scores
0
value 0.01012
scoring_system epss
scoring_elements 0.7715
published_at 2026-04-11T12:55:00Z
1
value 0.01012
scoring_system epss
scoring_elements 0.77081
published_at 2026-04-07T12:55:00Z
2
value 0.01012
scoring_system epss
scoring_elements 0.77113
published_at 2026-04-08T12:55:00Z
3
value 0.01012
scoring_system epss
scoring_elements 0.77123
published_at 2026-04-09T12:55:00Z
4
value 0.01012
scoring_system epss
scoring_elements 0.77129
published_at 2026-04-12T12:55:00Z
5
value 0.01012
scoring_system epss
scoring_elements 0.77069
published_at 2026-04-02T12:55:00Z
6
value 0.01012
scoring_system epss
scoring_elements 0.77125
published_at 2026-04-13T12:55:00Z
7
value 0.01012
scoring_system epss
scoring_elements 0.77098
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21363
2
reference_url https://www.oracle.com/security-alerts/cpujan2022.html
reference_id
reference_type
scores
0
value 6.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-24T17:38:01Z/
url https://www.oracle.com/security-alerts/cpujan2022.html
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2047343
reference_id 2047343
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2047343
4
reference_url https://nvd.nist.gov/vuln/detail/CVE-2022-21363
reference_id CVE-2022-21363
reference_type
scores
0
value 6.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2022-21363
5
reference_url https://github.com/advisories/GHSA-g76j-4cxx-23h9
reference_id GHSA-g76j-4cxx-23h9
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-g76j-4cxx-23h9
6
reference_url https://access.redhat.com/errata/RHSA-2022:4623
reference_id RHSA-2022:4623
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:4623
7
reference_url https://access.redhat.com/errata/RHSA-2022:4918
reference_id RHSA-2022:4918
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:4918
8
reference_url https://access.redhat.com/errata/RHSA-2022:4919
reference_id RHSA-2022:4919
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:4919
9
reference_url https://access.redhat.com/errata/RHSA-2022:4922
reference_id RHSA-2022:4922
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:4922
10
reference_url https://access.redhat.com/errata/RHSA-2022:5532
reference_id RHSA-2022:5532
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5532
fixed_packages
0
url pkg:maven/mysql/mysql-connector-java@8.0.28
purl pkg:maven/mysql/mysql-connector-java@8.0.28
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-xap5-du1j-c7ed
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/mysql/mysql-connector-java@8.0.28
aliases CVE-2022-21363, GHSA-g76j-4cxx-23h9
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-e37q-8shh-v7aw
3
url VCID-ht8v-kvcr-77ds
vulnerability_id VCID-ht8v-kvcr-77ds
summary
Improper Input Validation
Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where MySQL Connectors executes to compromise MySQL Connectors. Successful attacks require human interaction from a person other than the attacker and can result in takeover of MySQL Connectors.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-2692.json
reference_id
reference_type
scores
0
value 6.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-2692.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-2692
reference_id
reference_type
scores
0
value 0.01012
scoring_system epss
scoring_elements 0.77123
published_at 2026-04-13T12:55:00Z
1
value 0.01012
scoring_system epss
scoring_elements 0.77061
published_at 2026-04-01T12:55:00Z
2
value 0.01012
scoring_system epss
scoring_elements 0.77067
published_at 2026-04-02T12:55:00Z
3
value 0.01012
scoring_system epss
scoring_elements 0.77096
published_at 2026-04-04T12:55:00Z
4
value 0.01012
scoring_system epss
scoring_elements 0.77079
published_at 2026-04-07T12:55:00Z
5
value 0.01012
scoring_system epss
scoring_elements 0.77112
published_at 2026-04-08T12:55:00Z
6
value 0.01012
scoring_system epss
scoring_elements 0.77121
published_at 2026-04-09T12:55:00Z
7
value 0.01012
scoring_system epss
scoring_elements 0.77148
published_at 2026-04-11T12:55:00Z
8
value 0.01012
scoring_system epss
scoring_elements 0.77128
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-2692
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://security.netapp.com/advisory/ntap-20190423-0002
reference_id
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://security.netapp.com/advisory/ntap-20190423-0002
4
reference_url https://security.netapp.com/advisory/ntap-20190423-0002/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T15:55:48Z/
url https://security.netapp.com/advisory/ntap-20190423-0002/
5
reference_url https://snyk.io/vuln/SNYK-JAVA-MYSQL-174574
reference_id
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://snyk.io/vuln/SNYK-JAVA-MYSQL-174574
6
reference_url http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
reference_id
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T15:55:48Z/
url http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
7
reference_url http://www.securityfocus.com/bid/107925
reference_id
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T15:55:48Z/
url http://www.securityfocus.com/bid/107925
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1703402
reference_id 1703402
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1703402
9
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-2692
reference_id CVE-2019-2692
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2019-2692
10
reference_url https://github.com/advisories/GHSA-jcq3-cprp-m333
reference_id GHSA-jcq3-cprp-m333
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-jcq3-cprp-m333
11
reference_url https://access.redhat.com/errata/RHSA-2020:5568
reference_id RHSA-2020:5568
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5568
fixed_packages
0
url pkg:maven/mysql/mysql-connector-java@8.0.16
purl pkg:maven/mysql/mysql-connector-java@8.0.16
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-28f6-ud4w-aug9
1
vulnerability VCID-4w4j-hadb-w3e6
2
vulnerability VCID-e37q-8shh-v7aw
3
vulnerability VCID-xap5-du1j-c7ed
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/mysql/mysql-connector-java@8.0.16
aliases CVE-2019-2692, GHSA-jcq3-cprp-m333
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ht8v-kvcr-77ds
4
url VCID-u33b-3n5s-4qfv
vulnerability_id VCID-u33b-3n5s-4qfv
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2875.json
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2875.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-2875
reference_id
reference_type
scores
0
value 0.0069
scoring_system epss
scoring_elements 0.71745
published_at 2026-04-01T12:55:00Z
1
value 0.0069
scoring_system epss
scoring_elements 0.71803
published_at 2026-04-12T12:55:00Z
2
value 0.0069
scoring_system epss
scoring_elements 0.71753
published_at 2026-04-02T12:55:00Z
3
value 0.0069
scoring_system epss
scoring_elements 0.71771
published_at 2026-04-04T12:55:00Z
4
value 0.0069
scoring_system epss
scoring_elements 0.71746
published_at 2026-04-07T12:55:00Z
5
value 0.0069
scoring_system epss
scoring_elements 0.71785
published_at 2026-04-13T12:55:00Z
6
value 0.0069
scoring_system epss
scoring_elements 0.71796
published_at 2026-04-09T12:55:00Z
7
value 0.0069
scoring_system epss
scoring_elements 0.7182
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-2875
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2875
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2875
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2933
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2933
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2934
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2934
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://lists.debian.org/debian-lts-announce/2020/06/msg00015.html
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:02:06Z/
url https://lists.debian.org/debian-lts-announce/2020/06/msg00015.html
7
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4QDR2WOUETBT76WAO5NNCCXSAM3AGG3D/
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:02:06Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4QDR2WOUETBT76WAO5NNCCXSAM3AGG3D/
8
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MDKQVPFT4Z4SFPBH6YNFMJOXKS2YYKHA/
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:02:06Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MDKQVPFT4Z4SFPBH6YNFMJOXKS2YYKHA/
9
reference_url https://www.debian.org/security/2020/dsa-4703
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:02:06Z/
url https://www.debian.org/security/2020/dsa-4703
10
reference_url https://www.oracle.com/security-alerts/cpuapr2020.html
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:02:06Z/
url https://www.oracle.com/security-alerts/cpuapr2020.html
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1851019
reference_id 1851019
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1851019
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_connector\/j:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql_connector\/j:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_connector\/j:*:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/detail/CVE-2020-2875
reference_id CVE-2020-2875
reference_type
scores
0
value 4.0
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:P/I:P/A:N
1
value 4.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N
2
value 4.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2020-2875
18
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 4.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:02:06Z/
url https://security.gentoo.org/glsa/202105-27
19
reference_url https://access.redhat.com/errata/RHSA-2020:4960
reference_id RHSA-2020:4960
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4960
20
reference_url https://access.redhat.com/errata/RHSA-2020:4961
reference_id RHSA-2020:4961
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4961
21
reference_url https://access.redhat.com/errata/RHSA-2021:5134
reference_id RHSA-2021:5134
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:5134
fixed_packages
0
url pkg:maven/mysql/mysql-connector-java@5.1.49
purl pkg:maven/mysql/mysql-connector-java@5.1.49
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7v7q-8wa6-hff5
1
vulnerability VCID-e37q-8shh-v7aw
2
vulnerability VCID-ht8v-kvcr-77ds
3
vulnerability VCID-xap5-du1j-c7ed
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/mysql/mysql-connector-java@5.1.49
1
url pkg:maven/mysql/mysql-connector-java@8.0.15
purl pkg:maven/mysql/mysql-connector-java@8.0.15
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-28f6-ud4w-aug9
1
vulnerability VCID-4w4j-hadb-w3e6
2
vulnerability VCID-e37q-8shh-v7aw
3
vulnerability VCID-ht8v-kvcr-77ds
4
vulnerability VCID-xap5-du1j-c7ed
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/mysql/mysql-connector-java@8.0.15
aliases CVE-2020-2875
risk_score 2.1
exploitability 0.5
weighted_severity 4.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-u33b-3n5s-4qfv
5
url VCID-ucu7-scqc-nkcc
vulnerability_id VCID-ucu7-scqc-nkcc
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2933.json
reference_id
reference_type
scores
0
value 2.2
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2933.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-2933
reference_id
reference_type
scores
0
value 0.00732
scoring_system epss
scoring_elements 0.72642
published_at 2026-04-01T12:55:00Z
1
value 0.00732
scoring_system epss
scoring_elements 0.72694
published_at 2026-04-13T12:55:00Z
2
value 0.00732
scoring_system epss
scoring_elements 0.7265
published_at 2026-04-02T12:55:00Z
3
value 0.00732
scoring_system epss
scoring_elements 0.72667
published_at 2026-04-04T12:55:00Z
4
value 0.00732
scoring_system epss
scoring_elements 0.72645
published_at 2026-04-07T12:55:00Z
5
value 0.00732
scoring_system epss
scoring_elements 0.72684
published_at 2026-04-08T12:55:00Z
6
value 0.00732
scoring_system epss
scoring_elements 0.72697
published_at 2026-04-09T12:55:00Z
7
value 0.00732
scoring_system epss
scoring_elements 0.72721
published_at 2026-04-11T12:55:00Z
8
value 0.00732
scoring_system epss
scoring_elements 0.72704
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-2933
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2875
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2875
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2933
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2933
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2934
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2934
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 2.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://lists.debian.org/debian-lts-announce/2020/06/msg00015.html
reference_id
reference_type
scores
0
value 2.2
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:00:47Z/
url https://lists.debian.org/debian-lts-announce/2020/06/msg00015.html
7
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4QDR2WOUETBT76WAO5NNCCXSAM3AGG3D/
reference_id
reference_type
scores
0
value 2.2
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:00:47Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4QDR2WOUETBT76WAO5NNCCXSAM3AGG3D/
8
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MDKQVPFT4Z4SFPBH6YNFMJOXKS2YYKHA/
reference_id
reference_type
scores
0
value 2.2
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:00:47Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MDKQVPFT4Z4SFPBH6YNFMJOXKS2YYKHA/
9
reference_url https://www.debian.org/security/2020/dsa-4703
reference_id
reference_type
scores
0
value 2.2
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:00:47Z/
url https://www.debian.org/security/2020/dsa-4703
10
reference_url https://www.oracle.com/security-alerts/cpuapr2020.html
reference_id
reference_type
scores
0
value 2.2
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:00:47Z/
url https://www.oracle.com/security-alerts/cpuapr2020.html
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1851022
reference_id 1851022
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1851022
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_connector\/j:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql_connector\/j:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_connector\/j:*:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/detail/CVE-2020-2933
reference_id CVE-2020-2933
reference_type
scores
0
value 3.5
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:S/C:N/I:N/A:P
1
value 2.2
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L
2
value 2.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L
url https://nvd.nist.gov/vuln/detail/CVE-2020-2933
18
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 2.2
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:00:47Z/
url https://security.gentoo.org/glsa/202105-27
19
reference_url https://access.redhat.com/errata/RHSA-2020:4960
reference_id RHSA-2020:4960
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4960
20
reference_url https://access.redhat.com/errata/RHSA-2020:4961
reference_id RHSA-2020:4961
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4961
fixed_packages
0
url pkg:maven/mysql/mysql-connector-java@5.1.49
purl pkg:maven/mysql/mysql-connector-java@5.1.49
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7v7q-8wa6-hff5
1
vulnerability VCID-e37q-8shh-v7aw
2
vulnerability VCID-ht8v-kvcr-77ds
3
vulnerability VCID-xap5-du1j-c7ed
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/mysql/mysql-connector-java@5.1.49
aliases CVE-2020-2933
risk_score 1.6
exploitability 0.5
weighted_severity 3.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ucu7-scqc-nkcc
6
url VCID-xap5-du1j-c7ed
vulnerability_id VCID-xap5-du1j-c7ed
summary
Improper Access Control
Vulnerability in the MySQL Connectors product of Oracle MySQL (component: Connector/J). Supported versions that are affected are 8.1.0 and prior. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise MySQL Connectors. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in MySQL Connectors, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of MySQL Connectors.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22102.json
reference_id
reference_type
scores
0
value 8.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22102.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-22102
reference_id
reference_type
scores
0
value 0.03493
scoring_system epss
scoring_elements 0.87594
published_at 2026-04-13T12:55:00Z
1
value 0.03493
scoring_system epss
scoring_elements 0.87597
published_at 2026-04-12T12:55:00Z
2
value 0.03493
scoring_system epss
scoring_elements 0.87549
published_at 2026-04-02T12:55:00Z
3
value 0.03493
scoring_system epss
scoring_elements 0.87562
published_at 2026-04-04T12:55:00Z
4
value 0.03493
scoring_system epss
scoring_elements 0.87565
published_at 2026-04-07T12:55:00Z
5
value 0.03493
scoring_system epss
scoring_elements 0.87584
published_at 2026-04-08T12:55:00Z
6
value 0.03493
scoring_system epss
scoring_elements 0.87601
published_at 2026-04-11T12:55:00Z
7
value 0.03493
scoring_system epss
scoring_elements 0.8759
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-22102
2
reference_url https://github.com/mysql/mysql-connector-j
reference_id
reference_type
scores
0
value 8.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H
1
value 8.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/mysql/mysql-connector-j
3
reference_url https://github.com/mysql/mysql-connector-j/compare/8.1.0...8.2.0
reference_id
reference_type
scores
0
value 8.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H
1
value 8.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/mysql/mysql-connector-j/compare/8.1.0...8.2.0
4
reference_url https://security.netapp.com/advisory/ntap-20231027-0007
reference_id
reference_type
scores
0
value 8.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H
1
value 8.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://security.netapp.com/advisory/ntap-20231027-0007
5
reference_url https://security.netapp.com/advisory/ntap-20231027-0007/
reference_id
reference_type
scores
0
value 8.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-06T15:27:01Z/
url https://security.netapp.com/advisory/ntap-20231027-0007/
6
reference_url https://www.oracle.com/security-alerts/cpuoct2023.html
reference_id
reference_type
scores
0
value 8.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H
1
value 8.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
2
value HIGH
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-06T15:27:01Z/
url https://www.oracle.com/security-alerts/cpuoct2023.html
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2256474
reference_id 2256474
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2256474
8
reference_url https://nvd.nist.gov/vuln/detail/CVE-2023-22102
reference_id CVE-2023-22102
reference_type
scores
0
value 8.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H
1
value 8.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2023-22102
9
reference_url https://github.com/advisories/GHSA-m6vm-37g8-gqvh
reference_id GHSA-m6vm-37g8-gqvh
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-m6vm-37g8-gqvh
fixed_packages
aliases CVE-2023-22102, GHSA-m6vm-37g8-gqvh
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xap5-du1j-c7ed
Fixing_vulnerabilities
0
url VCID-un2e-gea1-xue9
vulnerability_id VCID-un2e-gea1-xue9
summary
Incorrect Privilege Assignment
Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where MySQL Connectors executes to compromise MySQL Connectors. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of MySQL.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3589.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3589.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-3589
reference_id
reference_type
scores
0
value 0.00167
scoring_system epss
scoring_elements 0.37775
published_at 2026-04-13T12:55:00Z
1
value 0.00167
scoring_system epss
scoring_elements 0.37673
published_at 2026-04-01T12:55:00Z
2
value 0.00167
scoring_system epss
scoring_elements 0.37855
published_at 2026-04-02T12:55:00Z
3
value 0.00167
scoring_system epss
scoring_elements 0.3788
published_at 2026-04-04T12:55:00Z
4
value 0.00167
scoring_system epss
scoring_elements 0.37759
published_at 2026-04-07T12:55:00Z
5
value 0.00167
scoring_system epss
scoring_elements 0.37809
published_at 2026-04-08T12:55:00Z
6
value 0.00167
scoring_system epss
scoring_elements 0.37822
published_at 2026-04-09T12:55:00Z
7
value 0.00167
scoring_system epss
scoring_elements 0.37836
published_at 2026-04-11T12:55:00Z
8
value 0.00167
scoring_system epss
scoring_elements 0.378
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-3589
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3586
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3586
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3589
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3589
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 1.7
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:S/C:N/I:P/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url http://www.debian.org/security/2017/dsa-3857
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
1
value LOW
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:44:31Z/
url http://www.debian.org/security/2017/dsa-3857
6
reference_url http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
1
value LOW
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:44:31Z/
url http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
7
reference_url http://www.securityfocus.com/bid/97836
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:44:31Z/
url http://www.securityfocus.com/bid/97836
8
reference_url http://www.securitytracker.com/id/1038287
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:44:31Z/
url http://www.securitytracker.com/id/1038287
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1444407
reference_id 1444407
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1444407
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:connector\/j:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:connector\/j:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:connector\/j:*:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-3589
reference_id CVE-2017-3589
reference_type
scores
0
value 2.1
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:N/I:P/A:N
1
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
2
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
3
value LOW
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2017-3589
12
reference_url https://github.com/advisories/GHSA-cjcf-wm2p-59h5
reference_id GHSA-cjcf-wm2p-59h5
reference_type
scores
0
value LOW
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-cjcf-wm2p-59h5
fixed_packages
0
url pkg:maven/mysql/mysql-connector-java@5.1.42
purl pkg:maven/mysql/mysql-connector-java@5.1.42
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-28f6-ud4w-aug9
1
vulnerability VCID-7v7q-8wa6-hff5
2
vulnerability VCID-e37q-8shh-v7aw
3
vulnerability VCID-ht8v-kvcr-77ds
4
vulnerability VCID-u33b-3n5s-4qfv
5
vulnerability VCID-ucu7-scqc-nkcc
6
vulnerability VCID-xap5-du1j-c7ed
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/mysql/mysql-connector-java@5.1.42
aliases CVE-2017-3589, GHSA-cjcf-wm2p-59h5
risk_score 1.5
exploitability 0.5
weighted_severity 3.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-un2e-gea1-xue9
1
url VCID-xpjh-mszn-buag
vulnerability_id VCID-xpjh-mszn-buag
summary
Privilege
An easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Connectors.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3586.json
reference_id
reference_type
scores
0
value 6.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3586.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-3586
reference_id
reference_type
scores
0
value 0.00802
scoring_system epss
scoring_elements 0.74093
published_at 2026-04-13T12:55:00Z
1
value 0.00802
scoring_system epss
scoring_elements 0.74045
published_at 2026-04-01T12:55:00Z
2
value 0.00802
scoring_system epss
scoring_elements 0.74051
published_at 2026-04-02T12:55:00Z
3
value 0.00802
scoring_system epss
scoring_elements 0.74077
published_at 2026-04-04T12:55:00Z
4
value 0.00802
scoring_system epss
scoring_elements 0.74049
published_at 2026-04-07T12:55:00Z
5
value 0.00802
scoring_system epss
scoring_elements 0.74082
published_at 2026-04-08T12:55:00Z
6
value 0.00802
scoring_system epss
scoring_elements 0.74097
published_at 2026-04-09T12:55:00Z
7
value 0.00802
scoring_system epss
scoring_elements 0.74118
published_at 2026-04-11T12:55:00Z
8
value 0.00802
scoring_system epss
scoring_elements 0.741
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-3586
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3586
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3586
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3589
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3589
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:P/I:P/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url http://www.debian.org/security/2017/dsa-3857
reference_id
reference_type
scores
0
value 6.4
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:44:34Z/
url http://www.debian.org/security/2017/dsa-3857
6
reference_url http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
reference_id
reference_type
scores
0
value 6.4
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:44:34Z/
url http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
7
reference_url http://www.securityfocus.com/bid/97784
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:44:34Z/
url http://www.securityfocus.com/bid/97784
8
reference_url http://www.securityfocus.com/bid/97982
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:44:34Z/
url http://www.securityfocus.com/bid/97982
9
reference_url http://www.securitytracker.com/id/1038287
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:44:34Z/
url http://www.securitytracker.com/id/1038287
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1444406
reference_id 1444406
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1444406
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_connectors:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql_connectors:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_connectors:*:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-3586
reference_id CVE-2017-3586
reference_type
scores
0
value 5.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:P/I:P/A:N
1
value 6.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N
2
value 6.4
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N
3
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2017-3586
13
reference_url https://github.com/advisories/GHSA-pwh7-92h3-mqr6
reference_id GHSA-pwh7-92h3-mqr6
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-pwh7-92h3-mqr6
fixed_packages
0
url pkg:maven/mysql/mysql-connector-java@5.1.42
purl pkg:maven/mysql/mysql-connector-java@5.1.42
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-28f6-ud4w-aug9
1
vulnerability VCID-7v7q-8wa6-hff5
2
vulnerability VCID-e37q-8shh-v7aw
3
vulnerability VCID-ht8v-kvcr-77ds
4
vulnerability VCID-u33b-3n5s-4qfv
5
vulnerability VCID-ucu7-scqc-nkcc
6
vulnerability VCID-xap5-du1j-c7ed
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/mysql/mysql-connector-java@5.1.42
aliases CVE-2017-3586, GHSA-pwh7-92h3-mqr6
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xpjh-mszn-buag
Risk_score4.0
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:maven/mysql/mysql-connector-java@5.1.42