Lookup for vulnerable packages by Package URL.

Purlpkg:pypi/mysql-connector-python@8.0.0
Typepypi
Namespace
Namemysql-connector-python
Version8.0.0
Qualifiers
Subpath
Is_vulnerabletrue
Next_non_vulnerable_version9.1.0
Latest_non_vulnerable_version9.1.0
Affected_by_vulnerabilities
0
url VCID-4w4j-hadb-w3e6
vulnerability_id VCID-4w4j-hadb-w3e6
summary
Uncontrolled Resource Consumption
Vulnerability in the MySQL Connectors product of Oracle MySQL. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Connectors. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all MySQL Connectors accessible data and unauthorized ability to cause a hang or frequently repeatable crash (complete DoS) of MySQL Connectors.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2471.json
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2471.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-2471
reference_id
reference_type
scores
0
value 0.63823
scoring_system epss
scoring_elements 0.9843
published_at 2026-04-21T12:55:00Z
1
value 0.63823
scoring_system epss
scoring_elements 0.98411
published_at 2026-04-01T12:55:00Z
2
value 0.63823
scoring_system epss
scoring_elements 0.98413
published_at 2026-04-02T12:55:00Z
3
value 0.63823
scoring_system epss
scoring_elements 0.98416
published_at 2026-04-04T12:55:00Z
4
value 0.63823
scoring_system epss
scoring_elements 0.98419
published_at 2026-04-07T12:55:00Z
5
value 0.63823
scoring_system epss
scoring_elements 0.98422
published_at 2026-04-08T12:55:00Z
6
value 0.63823
scoring_system epss
scoring_elements 0.98423
published_at 2026-04-09T12:55:00Z
7
value 0.63823
scoring_system epss
scoring_elements 0.98426
published_at 2026-04-13T12:55:00Z
8
value 0.63823
scoring_system epss
scoring_elements 0.98431
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-2471
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://www.oracle.com/security-alerts/cpuapr2022.html
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:15:14Z/
url https://www.oracle.com/security-alerts/cpuapr2022.html
4
reference_url https://www.oracle.com/security-alerts/cpuoct2021.html
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:15:14Z/
url https://www.oracle.com/security-alerts/cpuoct2021.html
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2020583
reference_id 2020583
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2020583
6
reference_url https://nvd.nist.gov/vuln/detail/CVE-2021-2471
reference_id CVE-2021-2471
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2021-2471
7
reference_url https://github.com/advisories/GHSA-w6f2-8wx4-47r5
reference_id GHSA-w6f2-8wx4-47r5
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-w6f2-8wx4-47r5
8
reference_url https://access.redhat.com/errata/RHSA-2022:0589
reference_id RHSA-2022:0589
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0589
9
reference_url https://access.redhat.com/errata/RHSA-2022:1013
reference_id RHSA-2022:1013
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1013
10
reference_url https://access.redhat.com/errata/RHSA-2022:5532
reference_id RHSA-2022:5532
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5532
11
reference_url https://access.redhat.com/errata/RHSA-2022:5903
reference_id RHSA-2022:5903
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5903
12
reference_url https://access.redhat.com/errata/RHSA-2022:6407
reference_id RHSA-2022:6407
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6407
fixed_packages
0
url pkg:pypi/mysql-connector-python@8.0.27
purl pkg:pypi/mysql-connector-python@8.0.27
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5cf7-va9h-h3gy
1
vulnerability VCID-a738-ctkd-f3b4
2
vulnerability VCID-hcw3-ymdx-pfas
3
vulnerability VCID-nr5y-ve9m-zfeh
resource_url http://public2.vulnerablecode.io/packages/pkg:pypi/mysql-connector-python@8.0.27
aliases CVE-2021-2471, GHSA-w6f2-8wx4-47r5
risk_score 3.4
exploitability 0.5
weighted_severity 6.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4w4j-hadb-w3e6
1
url VCID-7xu8-ktjc-huhp
vulnerability_id VCID-7xu8-ktjc-huhp
summary
Improper Access Control
Easily exploitable vulnerability allows unauthenticated attacker with network access via TLS to compromise MySQL Connectors. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all MySQL Connectors accessible data as well as unauthorized access to critical data or complete access to all MySQL Connectors accessible data.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00044.html
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T15:56:24Z/
url http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00044.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00053.html
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T15:56:24Z/
url http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00053.html
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-2435
reference_id
reference_type
scores
0
value 0.02601
scoring_system epss
scoring_elements 0.85639
published_at 2026-04-21T12:55:00Z
1
value 0.02601
scoring_system epss
scoring_elements 0.85642
published_at 2026-04-18T12:55:00Z
2
value 0.02601
scoring_system epss
scoring_elements 0.85637
published_at 2026-04-16T12:55:00Z
3
value 0.02728
scoring_system epss
scoring_elements 0.8594
published_at 2026-04-09T12:55:00Z
4
value 0.02728
scoring_system epss
scoring_elements 0.85948
published_at 2026-04-13T12:55:00Z
5
value 0.02728
scoring_system epss
scoring_elements 0.8593
published_at 2026-04-08T12:55:00Z
6
value 0.02728
scoring_system epss
scoring_elements 0.85953
published_at 2026-04-12T12:55:00Z
7
value 0.02728
scoring_system epss
scoring_elements 0.85955
published_at 2026-04-11T12:55:00Z
8
value 0.02728
scoring_system epss
scoring_elements 0.85912
published_at 2026-04-07T12:55:00Z
9
value 0.02728
scoring_system epss
scoring_elements 0.8591
published_at 2026-04-04T12:55:00Z
10
value 0.02728
scoring_system epss
scoring_elements 0.85893
published_at 2026-04-02T12:55:00Z
11
value 0.02728
scoring_system epss
scoring_elements 0.85881
published_at 2026-04-01T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-2435
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2435
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2435
4
reference_url https://cwe.mitre.org/data/definitions/284.html
reference_id
reference_type
scores
url https://cwe.mitre.org/data/definitions/284.html
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://github.com/mysql/mysql-connector-python
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/mysql/mysql-connector-python
7
reference_url https://security.netapp.com/advisory/ntap-20190118-0002
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://security.netapp.com/advisory/ntap-20190118-0002
8
reference_url https://security.netapp.com/advisory/ntap-20190118-0002/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T15:56:24Z/
url https://security.netapp.com/advisory/ntap-20190118-0002/
9
reference_url http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T15:56:24Z/
url http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
10
reference_url http://www.securityfocus.com/bid/106616
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T15:56:24Z/
url http://www.securityfocus.com/bid/106616
11
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=919820
reference_id 919820
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=919820
12
reference_url https://security.archlinux.org/ASA-201902-21
reference_id ASA-201902-21
reference_type
scores
url https://security.archlinux.org/ASA-201902-21
13
reference_url https://security.archlinux.org/AVG-898
reference_id AVG-898
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-898
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vsphere:*:*
reference_id cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vsphere:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vsphere:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
reference_id cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_connectors:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql_connectors:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_connectors:*:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-2435
reference_id CVE-2019-2435
reference_type
scores
0
value 5.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:N
1
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2019-2435
20
reference_url https://github.com/advisories/GHSA-v5rq-w2xm-7g5f
reference_id GHSA-v5rq-w2xm-7g5f
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-v5rq-w2xm-7g5f
fixed_packages
0
url pkg:pypi/mysql-connector-python@8.0.14
purl pkg:pypi/mysql-connector-python@8.0.14
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:pypi/mysql-connector-python@8.0.14
1
url pkg:pypi/mysql-connector-python@8.0.19
purl pkg:pypi/mysql-connector-python@8.0.19
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4w4j-hadb-w3e6
1
vulnerability VCID-5cf7-va9h-h3gy
2
vulnerability VCID-a738-ctkd-f3b4
3
vulnerability VCID-hcw3-ymdx-pfas
4
vulnerability VCID-hpd4-t99c-zffu
5
vulnerability VCID-nr5y-ve9m-zfeh
6
vulnerability VCID-x8uc-src9-6uck
7
vulnerability VCID-ycu7-vn9v-kyce
resource_url http://public2.vulnerablecode.io/packages/pkg:pypi/mysql-connector-python@8.0.19
aliases CVE-2019-2435, GHSA-v5rq-w2xm-7g5f
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7xu8-ktjc-huhp
2
url VCID-a738-ctkd-f3b4
vulnerability_id VCID-a738-ctkd-f3b4
summary
Uncontrolled Ressource Consumption
Vulnerability in the MySQL Connectors product of Oracle MySQL (component: Connector/J). Supported versions that are affected are 8.0.32 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Connectors. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DoS) of MySQL Connectors as well as unauthorized update, insert or delete access to some of MySQL Connectors accessible data and unauthorized read access to a subset of MySQL Connectors accessible data. CVSS 3.1 Base Score 5.3 (Confidentiality, Integrity and Availability impacts).
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21971.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:L/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21971.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-21971
reference_id
reference_type
scores
0
value 0.00143
scoring_system epss
scoring_elements 0.346
published_at 2026-04-02T12:55:00Z
1
value 0.00143
scoring_system epss
scoring_elements 0.3449
published_at 2026-04-21T12:55:00Z
2
value 0.00143
scoring_system epss
scoring_elements 0.34627
published_at 2026-04-04T12:55:00Z
3
value 0.00143
scoring_system epss
scoring_elements 0.34494
published_at 2026-04-07T12:55:00Z
4
value 0.00143
scoring_system epss
scoring_elements 0.34537
published_at 2026-04-08T12:55:00Z
5
value 0.00143
scoring_system epss
scoring_elements 0.34566
published_at 2026-04-09T12:55:00Z
6
value 0.00143
scoring_system epss
scoring_elements 0.34568
published_at 2026-04-11T12:55:00Z
7
value 0.00143
scoring_system epss
scoring_elements 0.34529
published_at 2026-04-12T12:55:00Z
8
value 0.00143
scoring_system epss
scoring_elements 0.34505
published_at 2026-04-13T12:55:00Z
9
value 0.00143
scoring_system epss
scoring_elements 0.34542
published_at 2026-04-16T12:55:00Z
10
value 0.00143
scoring_system epss
scoring_elements 0.34528
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-21971
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:L/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://www.oracle.com/security-alerts/cpuapr2023.html
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T14:38:46Z/
url https://www.oracle.com/security-alerts/cpuapr2023.html
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2196673
reference_id 2196673
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2196673
5
reference_url https://www.oracle.com/security-alerts/cpujul2023.html
reference_id cpujul2023.html
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T14:38:46Z/
url https://www.oracle.com/security-alerts/cpujul2023.html
6
reference_url https://nvd.nist.gov/vuln/detail/CVE-2023-21971
reference_id CVE-2023-21971
reference_type
scores
url https://nvd.nist.gov/vuln/detail/CVE-2023-21971
7
reference_url https://security.netapp.com/advisory/ntap-20230427-0007/
reference_id ntap-20230427-0007
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T14:38:46Z/
url https://security.netapp.com/advisory/ntap-20230427-0007/
8
reference_url https://security.netapp.com/advisory/ntap-20230427-0010/
reference_id ntap-20230427-0010
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T14:38:46Z/
url https://security.netapp.com/advisory/ntap-20230427-0010/
fixed_packages
0
url pkg:pypi/mysql-connector-python@8.0.33
purl pkg:pypi/mysql-connector-python@8.0.33
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-hcw3-ymdx-pfas
resource_url http://public2.vulnerablecode.io/packages/pkg:pypi/mysql-connector-python@8.0.33
aliases CVE-2023-21971
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-a738-ctkd-f3b4
Fixing_vulnerabilities
Risk_score4.0
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:pypi/mysql-connector-python@8.0.0